{"id":18513,"date":"2021-05-03T17:21:54","date_gmt":"2021-05-03T17:21:54","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=18513"},"modified":"2022-08-02T04:38:06","modified_gmt":"2022-08-02T04:38:06","slug":"mitre-edr-evaluations-carbanak-fin7","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-edr-evaluations-carbanak-fin7\/","title":{"rendered":"Latest MITRE EDR Evaluations Contain Some Surprises"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">MITRE Engenuity last month released the latest MITRE ATT&amp;CK evaluations of endpoint security products, and the results contain some pretty big surprises.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">MITRE doesn&#8217;t analyze or comment on the evaluations and instead just makes the data available for vendors and cybersecurity buyers to use as they see fit. That said, the raw numbers alone contain some interesting insights. In the weeks ahead, we&#8217;ll be using the results as we re-examine our top <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\"><span style=\"font-weight: 400;\">endpoint detection and response (EDR)<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/antivirus-software\/\"><span style=\"font-weight: 400;\">antivirus<\/span><\/a><span style=\"font-weight: 400;\"> product lists. Also see our analysis of <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-protection-tests-endpoint-security\/\">MITRE&#8217;s new endpoint security protection tests<\/a>.<\/span><\/p>\n<p><em>For the 2022 MITRE endpoint security results, see <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-endpoint-security-results\/\">Latest MITRE Endpoint Security Results Show Some Familiar Names on Top<\/a><\/em><\/p>\n<p><span style=\"font-weight: 400;\">The latest evaluations were dubbed <\/span><a href=\"https:\/\/attackevals.mitre-engenuity.org\/enterprise\/carbanak_fin7\/\"><span style=\"font-weight: 400;\">Carbanak+FIN7<\/span><\/a><span style=\"font-weight: 400;\"> and were modeled after threat groups that target the banking and retail industries. Previous evaluation rounds were modeled after the APT29 and APT3 threat groups connected to the governments of Russia and China, respectively. APT 29 was behind two of the more notorious attacks of recent years, the <\/span><a href=\"https:\/\/www.esecurityplanet.com\/threats\/\"><span style=\"font-weight: 400;\">2016 DNC<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/\"><span style=\"font-weight: 400;\">2020 SolarWinds<\/span><\/a><span style=\"font-weight: 400;\"> hacks, so the MITRE evaluations are among the most rigorous testing a cybersecurity product can face.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">MITRE results analyzed<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Here are the surprising &#8211; and not-so surprising &#8211; results in our analysis of the Carbanak+FIN7 evaluations. We focused on two data points: the attack techniques detected by telemetry, meaning little processing was required to detect the technique, and those detections that required analytic processing. Those two were combined in a category MITRE called &#8220;visibility,&#8221; which is the overall detection rate of the 174 attack techniques the vendors were tested on. See a chart of the MITRE results at the bottom of this article.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">SentinelOne tops the charts<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">In overall performance, SentinelOne detected every technique, 164 by telemetry and 174 by telemetry or analytic processing. For a vendor we already rate highly, SentinelOne&#8217;s results are still surprising. SentinelOne&#8217;s users are already among the happiest in the EDR space; they now have another reason to smile.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Palo Alto Networks remains king<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">As impressive as SentinelOne&#8217;s performance was, it wasn&#8217;t enough to knock Palo Alto Networks from the top of the pack. After years of stellar independent testing, Palo Alto&#8217;s second-place finish continues to paint a picture of consistent excellence against a wide range of attack techniques. Palo Alto detected 169 of the 174 MITRE evaluation techniques, good for a 97% overall rate. All vendors had their own spin on the results, and Palo Alto noted that it blocked 100% of attacks in the MITRE <\/span><a href=\"https:\/\/blog.paloaltonetworks.com\/2021\/04\/mitre-round-3-protecting-against-carbanak\/\"><span style=\"font-weight: 400;\">protection evaluation<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Symantec and McAfee still got game<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">In a market full of new and exciting upstarts, Symantec and McAfee showed that being an established tech vendor doesn&#8217;t mean you can&#8217;t innovate and stay on top of the market. Of the 29 EDR vendors that participated in the evaluations, Symantec came in sixth place with an overall score of 91%, while McAfee was thirteenth with just under 87%. Considering the size of their combined customer base, that&#8217;s good news for cybersecurity in general.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Cybereason makes a statement<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Cybereason continues to climb in the rankings. The nine-year-old Boston-based company came out on top in NSS Labs testing last year, and now they&#8217;re adding to that success with a fifth-place MITRE showing and 92% detection rate. The company is showing that &#8220;next-gen EDR&#8221; is more than a marketing slogan.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Leaders stay leaders<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">A number of our other top EDR vendors placed in the top 10 in the latest MITRE evaluations: Trend Micro, Check Point, VMware CarbonBlack and CrowdStrike were also in the top 10, followed closely by <a href=\"https:\/\/prf.hn\/l\/kgJAB03\" rel=\"noopener sponsored\" target=\"_blank\">F-Secure<\/a> and Microsoft (yes, that free antivirus software that comes packaged with Windows 10 is very good). The only top 10 MITRE finisher not on our top EDR products list somewhere is six-year-old Cynet, so you can bet they&#8217;ll now get another look; they&#8217;re already making waves in the <\/span><a href=\"https:\/\/www.esecurityplanet.com\/threats\/xdr-emerges-as-a-key-next-generation-security-tool\/\"><span style=\"font-weight: 400;\">XDR<\/span><\/a><span style=\"font-weight: 400;\"> space.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Some need improvement<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">One reason MITRE doesn&#8217;t analyze results or rank participants is to encourage participation &#8211; vendors are expected to use the results to improve their products, which in turn is good for their customers (and their customers&#8217; customers, which is pretty much all of us). That said, a few well-known vendors had overall detection rates of around 70% in the latest MIRE evaluations: Cisco, Sophos, Fortinet, Micro Focus and Malwarebytes. They&#8217;re likely already using the evaluations to improve their products, and we&#8217;d like to see them return to the MITRE evaluations in future rounds with strong results. We&#8217;ve seen a number of impressive test results in the past from Sophos and Fortinet in particular, so users can expect quick action there. And the presence of Micro Focus in the evaluations is interesting, as the company is largely a <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/siem-tools\/\"><span style=\"font-weight: 400;\">SIEM<\/span><\/a><span style=\"font-weight: 400;\"> vendor &#8211; it would be valuable info if MITRE were to conduct evaluations targeted at other critical cybersecurity systems like SIEM and <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/top-ngfw\/\"><span style=\"font-weight: 400;\">firewalls<\/span><\/a><span style=\"font-weight: 400;\">. Thus far the MITRE evaluations have overwhelmingly attracted EDR vendors.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And one noteworthy vendor skipped the latest MITRE round: Kaspersky, which has previously participated in both MITRE and NSS Labs tests, with good results.<\/span><\/p>\n<figure id=\"attachment_18521\" aria-describedby=\"caption-attachment-18521\" style=\"width: 689px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-18521 size-large\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/05\/MITRE-EDR-Carbanak-results-1-689x1024.png\" alt=\"MITRE Carbanak results\" width=\"689\" height=\"1024\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/MITRE-EDR-Carbanak-results-1-689x1024.png 689w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/MITRE-EDR-Carbanak-results-1-202x300.png 202w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/MITRE-EDR-Carbanak-results-1-768x1142.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/MITRE-EDR-Carbanak-results-1-1033x1536.png 1033w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/MITRE-EDR-Carbanak-results-1-1377x2048.png 1377w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/MITRE-EDR-Carbanak-results-1-150x223.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/MITRE-EDR-Carbanak-results-1-300x446.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/MITRE-EDR-Carbanak-results-1-696x1035.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/MITRE-EDR-Carbanak-results-1-1068x1588.png 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/MITRE-EDR-Carbanak-results-1.png 1538w\" sizes=\"(max-width: 689px) 100vw, 689px\" \/><figcaption id=\"caption-attachment-18521\" class=\"wp-caption-text\">MITRE Carbanak+FIN7 evaluations analyzed. Graphic by Aubri Ziegler<\/figcaption><\/figure>\n\n\n<div id=\"ta-campaign-widget-66d6ec2758011-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6ec2758011\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6ec2758011\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6ec2758011\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6ec2758011\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6ec2758011\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6ec2758011\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>MITRE Engenuity last month released the latest MITRE ATT&amp;CK evaluations of endpoint security products, and the results contain some pretty big surprises. MITRE doesn&#8217;t analyze or comment on the evaluations and instead just makes the data available for vendors and cybersecurity buyers to use as they see fit. That said, the raw numbers alone contain [&hellip;]<\/p>\n","protected":false},"author":163,"featured_media":18541,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[19],"tags":[28055,31080],"b2b_audience":[34],"b2b_industry":[],"b2b_product":[378,375,379],"class_list":["post-18513","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-endpoint","tag-edr","tag-edr-comparison","b2b_audience-evaluation-and-selection","b2b_product-endpoint-security","b2b_product-security-management","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Latest MITRE EDR Evaluations Contain Some Surprises<\/title>\n<meta name=\"description\" content=\"The MITRE ATT&amp;CK evaluations are the most rigorous testing a cybersecurity product can face. We analyze the latest endpoint security results.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-edr-evaluations-carbanak-fin7\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Latest MITRE EDR Evaluations Contain Some Surprises\" \/>\n<meta property=\"og:description\" content=\"The MITRE ATT&amp;CK evaluations are the most rigorous testing a cybersecurity product can face. We analyze the latest endpoint security results.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-edr-evaluations-carbanak-fin7\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-03T17:21:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-02T04:38:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/Carbanak.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Paul Shread\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paul Shread\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-edr-evaluations-carbanak-fin7\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-edr-evaluations-carbanak-fin7\/\"},\"author\":{\"name\":\"Paul Shread\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04\"},\"headline\":\"Latest MITRE EDR Evaluations Contain Some Surprises\",\"datePublished\":\"2021-05-03T17:21:54+00:00\",\"dateModified\":\"2022-08-02T04:38:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-edr-evaluations-carbanak-fin7\/\"},\"wordCount\":861,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-edr-evaluations-carbanak-fin7\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/Carbanak.jpeg\",\"keywords\":[\"EDR\",\"EDR comparison\"],\"articleSection\":[\"Endpoint\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-edr-evaluations-carbanak-fin7\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-edr-evaluations-carbanak-fin7\/\",\"name\":\"Latest MITRE EDR Evaluations Contain Some Surprises\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-edr-evaluations-carbanak-fin7\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-edr-evaluations-carbanak-fin7\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/Carbanak.jpeg\",\"datePublished\":\"2021-05-03T17:21:54+00:00\",\"dateModified\":\"2022-08-02T04:38:06+00:00\",\"description\":\"The MITRE ATT&CK evaluations are the most rigorous testing a cybersecurity product can face. We analyze the latest endpoint security results.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-edr-evaluations-carbanak-fin7\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-edr-evaluations-carbanak-fin7\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-edr-evaluations-carbanak-fin7\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/Carbanak.jpeg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/Carbanak.jpeg\",\"width\":1200,\"height\":800,\"caption\":\"mitre results\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-edr-evaluations-carbanak-fin7\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Latest MITRE EDR Evaluations Contain Some Surprises\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04\",\"name\":\"Paul Shread\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg\",\"caption\":\"Paul Shread\"},\"description\":\"Former eSecurityPlanet Editor Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including award-winning articles on endpoint security and virtual data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds market analyst and cybersecurity certifications. In a previous life he worked for daily newspapers, including the Baltimore Sun, and spent 7 years covering the federal government. Al Haig once compared him to Bob Woodward (true story - just ask Google).\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/paul-shread-2\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Latest MITRE EDR Evaluations Contain Some Surprises","description":"The MITRE ATT&CK evaluations are the most rigorous testing a cybersecurity product can face. We analyze the latest endpoint security results.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-edr-evaluations-carbanak-fin7\/","og_locale":"en_US","og_type":"article","og_title":"Latest MITRE EDR Evaluations Contain Some Surprises","og_description":"The MITRE ATT&CK evaluations are the most rigorous testing a cybersecurity product can face. We analyze the latest endpoint security results.","og_url":"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-edr-evaluations-carbanak-fin7\/","og_site_name":"eSecurity Planet","article_published_time":"2021-05-03T17:21:54+00:00","article_modified_time":"2022-08-02T04:38:06+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/Carbanak.jpeg","type":"image\/jpeg"}],"author":"Paul Shread","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Paul Shread","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-edr-evaluations-carbanak-fin7\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-edr-evaluations-carbanak-fin7\/"},"author":{"name":"Paul Shread","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04"},"headline":"Latest MITRE EDR Evaluations Contain Some Surprises","datePublished":"2021-05-03T17:21:54+00:00","dateModified":"2022-08-02T04:38:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-edr-evaluations-carbanak-fin7\/"},"wordCount":861,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-edr-evaluations-carbanak-fin7\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/Carbanak.jpeg","keywords":["EDR","EDR comparison"],"articleSection":["Endpoint"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-edr-evaluations-carbanak-fin7\/","url":"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-edr-evaluations-carbanak-fin7\/","name":"Latest MITRE EDR Evaluations Contain Some Surprises","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-edr-evaluations-carbanak-fin7\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-edr-evaluations-carbanak-fin7\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/Carbanak.jpeg","datePublished":"2021-05-03T17:21:54+00:00","dateModified":"2022-08-02T04:38:06+00:00","description":"The MITRE ATT&CK evaluations are the most rigorous testing a cybersecurity product can face. We analyze the latest endpoint security results.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-edr-evaluations-carbanak-fin7\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/endpoint\/mitre-edr-evaluations-carbanak-fin7\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-edr-evaluations-carbanak-fin7\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/Carbanak.jpeg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/Carbanak.jpeg","width":1200,"height":800,"caption":"mitre results"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-edr-evaluations-carbanak-fin7\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Latest MITRE EDR Evaluations Contain Some Surprises"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04","name":"Paul Shread","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg","caption":"Paul Shread"},"description":"Former eSecurityPlanet Editor Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including award-winning articles on endpoint security and virtual data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds market analyst and cybersecurity certifications. In a previous life he worked for daily newspapers, including the Baltimore Sun, and spent 7 years covering the federal government. Al Haig once compared him to Bob Woodward (true story - just ask Google).","url":"https:\/\/www.esecurityplanet.com\/author\/paul-shread-2\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18513"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/163"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=18513"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18513\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/18541"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=18513"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=18513"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=18513"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=18513"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=18513"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=18513"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}