Labyrinth Deception Platform Alternatives
Labyrinth Deception Platform is described as 'Labyrinth Deception Platform is a deception-based threat detection technology that identifies and blocks cyber-attacks from within a corporate network. Powered by unique threat detection technologies, our solution proactively defends your network from targeted' and is an app. There are five alternatives to Labyrinth Deception Platform for Linux, SaaS, Windows, Online / Web-based and Self-Hosted solutions. The best alternative is Thinkst Canary. It's not free, so if you're looking for a free alternative, you could try Aves Netsec or Cowrie. Other great apps like Labyrinth Deception Platform are Kippo and Attivo Networks.
- Paid • Proprietary
- Self-Hosted
Thinkst Canary
Is this a good alternative?YesNo5 alternatives to Thinkst Canary- Paid • Proprietary
- Software as a Service (SaaS)
Order, configure and deploy your Canaries throughout your network. (These can be hardware, virtual or cloud-based birds!) Make one a Windows file server, another a router, throw in a few Linux webservers while you're at it.
Thinkst Canary Features
Aves Netsec
Is this a good alternative?YesNo- Freemium • Proprietary
5 alternatives to Aves Netsec- Windows
- Linux
- Online
- Software as a Service (SaaS)
Rapid cybersecurity detection capability delivered by our proprietary deception platform. Deception is a powerful way to increase and speed up threat detection capability across any type of network. Try our cloud-based software - now free up to 45 days of use.
Cowrie is a medium interaction SSH and Telnet honeypot designed to log brute force attacks and the shell interaction performed by the attacker. Cowrie also functions as an SSH and telnet proxy to observe attacker behavior to another system.
Cowrie Features
Kippo is a medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by the attacker.
Kippo Features
Attivo Networks
Is this a good alternative?YesNo6 alternatives to Attivo Networks- Paid • Proprietary
- Self-Hosted
Deception technology for early and accurate threat detection of in-network threats. Decoys, endpoint, application, and data deceptions deceive and detect attackers.