Ripjar Labyrinth

Investigate threats at the speed of thought.

Your security team is drowning in data but starved of insight. Your threat feeds, internal logs, open-source intelligence and sensitive reports sit in silos. Connecting them takes time. Time that attackers don't give you.

Ripjar Labyrinth is a threat investigation platform that fuses structured and unstructured data into a single investigation environment with national security-grade data protection built in. It is used by government agencies, defence organisations and financial institutions to investigate counter-terrorism, sanctions evasion, fraud networks and insider threats.

Who uses Labyrinth

Built for the people who protect organisations.

Incident response & SOC teams

Monitor, detect, investigate and respond to cyber threats. A unified workspace that takes your team from detection to action. 

Threat hunters

Investigate emerging threats from across the IT security community. Understand your organisation’s exposure before it becomes an incident. 

Intelligence consumers

Share investigation outputs across and beyond your organisation. Labyrinth supports dissemination of threat analysis and reporting to large numbers of stakeholders. 

Capabilities

Six capabilities. One investigation environment.

Investigations

Follow your nose into the data. Pivot across systems, enrich findings and build a complete picture of a threat in a single workspace. 

Data Fusion and Security

Every dataset. Every classification. One platform.

Labyrinth understands common data standards including STIX, TAXII, MITRE ATT&CK and the Open Cybersecurity Schema Framework (OCSF). It can be extended through workflows to support any new standard that emerges.

Data security is not an afterthought. Built on national security heritage, Labyrinth protects data down to individual attributes using Attribute-Based Access Control. Sensitive and open-source data can coexist safely, accessible only to those with the need and entitlement to see it.

Use Cases

Built for the hardest problems.

Counter-terrorism

Map networks of individuals, organisations and transactions. Identify facilitators and financiers across jurisdictions.

Sanctions evasion investigation

Trace ownership structures, beneficial ownership chains and shipping networks designed to circumvent sanctions regimes.

Fraud networks

Uncover coordinated fraud rings operating across multiple identities, accounts and geographies. 

Insider threat

Correlate access patterns, communications and external connections to identify anomalous behaviour.

See Ripjar Labyrinth in action.

Request a Labyrinth demo to see how it helps your team investigate faster and share intelligence with confidence.