Labyrinth

Deception: Labyrinth

Click to explore the offer:

What is Labyrinth?

Labyrinth is a deception-based threat detection technology that identifies and blocks cyber attacks on a corporate network. The solution, based on unique threat detection technologies, proactively protects IT / IoT / OT networks from targeted attacks, advanced and unknown threats, botnets, zero-day attacks and malicious insider attacks. The platform provides a simple and powerful tool to detect intruders inside the corporate network as early as possible. Easily deployed in virtual, physical or hybrid IT environments, it detects threats without continuous monitoring and generating excessive data.
Labyrinth features

Main features and functions of Labyrinth

Early detection of online threats

Labyrinth detects any targeted, suspicious activity at an early stage of an attack. Labyrinth Points (network decoys) are designed to capture threat activity as the attacker tries to understand the network and find their target. When an attacker attacks a specific Point, Labyrinth collects all the details about it: the sources of the threat, the tools used and the vulnerabilities exploited. At the same time, all actual resources and services operate without any disruption.

Precise notifications 

Labyrinth supports security operations teams (SOCs) with highly reliable alerts, with less than 1% false alarms. By nature, Labyrinth Points are silent until they are touched. No one is supposed to interact with them, so any interaction with a point is extremely suspicious. This differentiates Labyrinth from security solutions that aim to analyse all network activity and produce a lot of digital 'noise'.

Rapid response to incidents

Labyrinth provides an intelligent analytical tool for incident investigation and threat identification. All collected incidents are enriched with the necessary security data from the incident response platform. The breach indicators (IoCs) generated by Labyrinth are automatically synchronised with third-party solutions to prevent attacks. This allows immediate action to be taken in the event of an attack: understanding it, performing forensic analysis, responding confidently and developing better defences for the future.

Proactive defence

Most detection technologies stop an attack once it is detected and do not give the attacker a chance to investigate it. Labyrinth allows you to learn more about the nature of the attack and better understand the tools and techniques used by attackers. The solution generates and installs artefacts (fake data) on hosts (stations and servers) with the aim of engaging attackers with a tempting decoy. Instead of waiting to see what the attacker's next move will be, the artefacts direct the attacker to an isolated environment to be observed.

Detection of targeted attacks

To effectively counter targeted attacks, it is crucial to understand the attackers' techniques, tools and objectives. Labyrinth's deception platform lulls hackers or malicious internal intruders into a false sense of security and provides insight into their skills and motives. Knowing what attackers know about corporate networks, applications and employees helps create more accurate profiles of attackers and apply the best possible defence against them. It also reveals weaknesses in corporate defences that could be exploited by attackers in the future.

Post-infection detection

The Labyrinth deception platform implemented in corporate networks can serve as a highly reliable warning system for attacks that bypass network edge security. Seeder agents, deployed on servers and workstations, mimic the most 'palatable' artefacts to an attacker. What appears to be a high-powered and poorly protected administrator account is a trap that lures the attacker into the Labyrinth system. It is then possible to monitor the attackers' actions of interacting with the Points (the system's decoys), gathering valuable information about threats that have penetrated other corporate network defences.

Internal movement recognition

In the lateral movement phase, the attacker moves from one resource to another on the corporate network. Labyrinth's deception platform is designed to detect early reconnaissance, credential theft and internal traffic. It allows companies to gain visibility of such threats at an early stage, a complex task for traditional security solutions. Labyrinth directs the next step in the deception ecosystem attack and immediately reveals the attacker.

Reduction in dwell time

The Labyrinth platform's detection mechanism is particularly effective in reducing dwell time, the time an attacker remains unnoticed on a corporate network. Long dwell time is a key prerequisite for an attacker to successfully launch an attack. Labyrinth reduces the dwell time of attacks by configuring honeypots, decoys and artefacts for attackers. Labyrinth's deception platform reduces the time and ability of attackers to move through corporate networks and stops them before they reach critical resources and services.

High interaction decoys

Labyrinth's deception platform is based on Points - high-interaction honeypots with intelligent functions. Points are identical to enterprise resources and run real operating systems, applications and services with fake data. They allow the attacker to log in and respond to their request to understand their intentions. Points lure for long periods of time, observing attackers and collecting valuable data about their tools and techniques. In addition to this, Points creates local breach indicators (IoCs) and machine-readable threat information (MRTI).

Diversity and reliability of decoys

Points reflect vulnerabilities in production networks, emulating the real operating system/image, services and applications for IoT, SCADA / OT / ICS, POS, network and telecoms environments. Fake workstations, servers, devices, applications, services and protocols look identical to real assets. The points not only emulate the vulnerabilities most attractive to attackers, but also behave like real hosts. Depending on the type, they can send broadcast requests, change IP addresses and connect to message sites. This makes it possible to mix decoys in a production environment and differentiate them from the rest of the assets so that they can be selected as a target for an attacker.

Multi-layer protection

Labyrinth implements a full imitation stack to provide the highest level of protection to its customers. Low-interaction artefacts on the front line of defence emulate in-house applications and are only used for basic threat detection. They are easy to detect and bypass and inform attackers that they are in a minefield. This distracts opportunistic attackers and gives targeted attackers false confidence that they have discovered imitations in the network. Meanwhile, high-interaction decoys go unnoticed and provide detection of advanced threats.

Automation

The Labyrinth deception platform automatically identifies hosts, services and connection paths between them to streamline and customise the creation and deployment of decoys and traps. Advanced networking features allow new paths to be dynamically created in Labyrinth and Points to be updated. Labyrinth provides automated management and periodic refreshing of Points deployed in a production environment to maintain their authenticity. The lightweight, automated and flexible solution saves time and provides a high level of security from day one of deployment.

Scalability

Labyrinth can be scaled effectively in large, distributed corporate networks. Each emulated Point is a lightweight process running on a virtual machine. As a result, scalability is not based on computing resources, but on constructing and deploying a comprehensive set of decoys and traps across the network environment. The automated creation and deployment of Points helps companies streamline the scaling process and achieve full protection of all network segments.
Why Labyrinth

Why use Labyrinth?

01

Stopping advanced threats

 Labyrinth detects targeted and advanced attacks without requiring any prior knowledge of the form, type or behaviour of the threat. The platform detects known and unknown threats at the earliest stage of the attack lifecycle.
02

Reduction in operating costs

Reduction in operating costs. Labyrinth does not collect large amounts of data, does not generate false alarms, and does not require special skills to operate. It is easily implemented into the existing security infrastructure and does not generate false alarms.
03

Automated incident response

Labyrinth accelerates incident response through integrations with third-party solutions that automate isolation, blocking and threat hunting.
04

Minimum manual configuration 

Quick and simple implementation with no system conflicts and minimal system maintenance: no databases, signatures or rules to configure and update.
05

No impact on performance 

No negative impact on the performance of network devices, hosts, servers or applications.