Labyrinth
Deception-based intrusion detection platform for corporate network defense.

Labyrinth
Deception-based intrusion detection platform for corporate network defense.
450+ Data Points Per Product and Company
Track competitive landscapes, evaluate vendor risk for investments, or find the right security stack for your clients.
Labyrinth Description
Labyrinth is a cybersecurity company that develops and operates a deception-based intrusion detection platform designed to identify and respond to malicious activities within corporate networks. The platform works by creating an illusion of real IT services, applications, and vulnerabilities to lure attackers, monitor their behavior, and isolate them from the actual network infrastructure. The Labyrinth Deception Platform covers several key security functions: early intrusion detection (including unauthorized access, vulnerability exploitation, and command-and-control attacks), data gathering and analysis (threat identification, pattern analysis, content analysis), and automated response (generation of threat indicators, isolation of compromised hosts, and incident logging and reporting). Key capabilities include lateral movement recognition, post-infection detection via agents deployed on servers and workstations that mimic high-value artifacts, dwell time reduction, and targeted attack uncovering. The platform also features client honeypots for active defense, detecting malicious servers and man-in-the-middle (MITM) attacks, as well as advanced web application protection through an embedded deception layer. The solution is designed for deployment on-premise and in the cloud, with a focus on minimal setup time, low false-positive rates (under 1%), and no requirement for specialized skills. It integrates with SIEM systems and threat prevention solutions via automatic IoC synchronization. Labyrinth is a member of ECSO (European Cyber Security Organisation) and PCSI, and has been reviewed on Gartner Peer Insights and G2. It was a finalist for the ECSO CISO Choice Award 2025.
POPULAR
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox