Cymmetria’s MazeRunner platform lets you dominate an attacker’s movements from the very beginning – and lead them to a monitored deception network.
MazeRunner shifts the balance of power to the defender’s side. It intercepts attackers during the reconnaissance phase, when they have no knowledge of the network. The hackers are led through a carefully planned path toward a controlled location. At this point, believing the target is real, the attacker is revealed and their tools confiscated.
We leverage virtualization to automate the creation of deception elements. This enables low-friction, scalable deployment. Our technology allows us to minimally affect the organization – while perfectly blending into your network and mimicking your business processes.
MazeRunner monitors attacker movement from the very beginning, collecting valuable information about tools and tactics, approach vector, and behavior. Since the attacker will be the only one active in the deception network, the logs will only show their steps, enabling faster and better forensics. Each monitored attack expands your knowledge of the enemy and helps you adapt and recover faster.
Breadcrumbs lead attackers away
from real targets.
Get information on the attacker’s entry point
and each of their movements.
Once a breadcrumb is picked up,
it means an attacker touched it.
MazeRunner alerts are real.
Decoys collect forensic data, including
the source/origin of the attack, tools used by the attacker, and more.
Create a footprint of the attack to share with existing organizational defense mechanisms. The attacker cannot use their tools without being detected.
MazeRunner enhances the value of existing security tools by generating attack signatures that allow immediate attack detection and mitigation.