A comprehensive cyber
deception solution

Cymmetria MazeRunner diverts attackers from organizational targets,
and leads them to controlled environments where they are disarmed

cyber hunting

Control attacker movement

Divert attackers into our decoy network by placing breadcrumbs at their attack routes.

cyber deception attack mitigation

Mitigate attacks

Once a decoy is attacked, signatures are generated and distributed to your existing security mechanisms.

cyber deception forensics

Get forensic data

The source, details, tools and
tactics of the attack are yours to analyze.

Now YOU hunt THEM

Our MazeRunner solution creates enterprise-grade hacker deception campaigns that match business processes in the organization. The deception campaigns are made of centrally managed decoys and breadcrumbs. Breadcrumbs lead the attackers to decoys, and when an attack is executed on a decoy, forensic data is gathered. Attack signatures are generated, ready to be used by existing security tools to block the attack in the organization.

 Download product whitepaper

Our Technology

MazeRunner leverages virtualization technology to automate the creation and management Of Deception Campaigns. MazeRunner technology provides easy and frictionless deployment in any environment. Decoys are fullstack virtual machines that blend in their surroundings, while breadcrumbs can be placed on devices throughout the organization.

 Download product whitepaper

Trust the super team.

Cymmetria’s team consists of cyber deception and InfoSec veterans, military specialists, and APT and malware researchers. The company is backed by leading investors such as Y Combinator and Sherpa Capital, and has already gained traction throughout the InfoSec community and global media.