{"id":21570,"date":"2022-04-05T15:51:12","date_gmt":"2022-04-05T15:51:12","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=21570"},"modified":"2022-06-29T18:30:35","modified_gmt":"2022-06-29T18:30:35","slug":"mitre-endpoint-security-results","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-endpoint-security-results\/","title":{"rendered":"Latest MITRE Endpoint Security Results Show Some Familiar Names on Top"},"content":{"rendered":"<p>MITRE Engenuity has released the latest round of its ATT&amp;CK endpoint security evaluations, and the results show some familiar names leading the pack with the most detections.<\/p>\n<p>The MITRE evaluations are unique in that they emulate <a href=\"https:\/\/www.esecurityplanet.com\/threats\/advanced-persistent-threat\/\">advanced persistent threat (APT)<\/a> and nation-state hacking techniques, making them different from tests that might look at static <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\">malware<\/a> samples, for example.<\/p>\n<p>Last year, MITRE added Protection evaluations in addition to its Detection tests. While the detection tests are aimed at <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">endpoint detection and response (EDR)<\/a> tools, protection tests favor <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/antivirus-vs-epp-vs-edr\/\">endpoint protection platforms (EPP)<\/a>, which are somewhat like traditional <a href=\"https:\/\/www.esecurityplanet.com\/products\/antivirus-software\/\">antivirus software<\/a>, except with the greater sophistication that enterprise IT security requires. EDR and EPP tools have been merging over the years, yet they retain distinct functions.<\/p>\n<p>While the MITRE tests are unique in the depth of security information they provide to both buyers and vendors, they come with a number of caveats, as both MITRE and security vendors have noted.<\/p>\n<ul>\n<li>MITRE <a href=\"https:\/\/medium.com\/mitre-engenuity\/making-sense-of-att-ck-evaluations-data-42ca844940b9\" target=\"_blank\" rel=\"noopener\">doesn&#8217;t score results<\/a> or try to say who &#8220;won,&#8221; and instead just provides the raw data. It&#8217;s up to security buyers and vendors how to use it.<\/li>\n<li>Vendors provide information on the tools and configuration they used, so buyers can use that info to see if the configuration is relevant to their environment.<\/li>\n<li>The tests don&#8217;t check for false positives, so there&#8217;s no disincentive to keep vendors from tuning their tools so they catch everything.<\/li>\n<li>And automated features are often turned off to allow for certain attack techniques, so the results don&#8217;t always reflect a security tool&#8217;s full capabilities.<\/li>\n<\/ul>\n<p>So while the MITRE tests give buyers more data than they might otherwise have, they&#8217;re still encouraged to do their own research and testing, just as vendors will use the results to improve security defenses.<\/p>\n<p>But just as vendors spin the results to their advantage, we too will parse the data to try to put some shape to it &#8211; with the caveat that you really need to make sure that any security tool you buy is the right one for your environment. There&#8217;s no substitute for your own evaluation in your own environment.<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">Top Endpoint Detection &amp; Response (EDR) Solutions<\/a><\/p>\n<h2>Analyzing the Results<\/h2>\n<p>An earlier draft of this article relied on the methodology that Cynet had used to analyze the results (more on that in a moment). But after a couple of objections to that approach from readers, we&#8217;re returning to <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-protection-tests-endpoint-security\/\">the simple and straightforward methodology<\/a> we used last year, where we quantified protection and detection test results and averaged the two.<\/p>\n<p>Of the 30 vendors who took part in the MITRE evaluations, 22 did both the Detection and Protection evaluations, so we&#8217;ll separate them from the Detection only group. And the data is <a href=\"https:\/\/attackevals.mitre-engenuity.org\/enterprise\/participants\/?adversaries=wizard-spider-sandworm\" target=\"_blank\" rel=\"noopener\">publicly available<\/a>, so anyone can access it and analyze it, which we would encourage you to do.<\/p>\n<p>There were 9 broad tests in the Protection evaluation and 109 steps in the Detection evaluation, but those numbers dropped to 8 and 90, respectively, for vendors who didn&#8217;t participate in the Linux tests.<\/p>\n<p>The 9 Protection tests also included 109 attack techniques. Cynet <a href=\"https:\/\/www.cynet.com\/blog\/learn-how-to-interpret-the-2022-mitre-attck-evaluation-results\/\" target=\"_blank\" rel=\"noopener\">scored those tests<\/a> based on how early in the attack path the threat was stopped. That&#8217;s an important way to look at the data, but the problem was it wound up scoring some vendors who eventually stopped a threat lower than some who missed it entirely. A rough example: A vendor who stopped one threat on the first step but missed another one entirely might score higher than a vendor who stopped both attacks on, say, the 5th step.<\/p>\n<p>In a statement to <em>eSecurity Planet<\/em>, Cynet CTO Aviad Hasnis defended the company&#8217;s approach. &#8220;<span lang=\"EN-US\">The early you stop an attacker &#8211; the more efficient you are as a vendor to prevent additional malicious activities from taking place. Think about a malware that steals credentials. If you stop the malware when it is dropped on the computer, nothing bad actually happens. Alternatively, if you stop it at a later stage, your credentials will already be stolen. This is exactly what MITRE tested<\/span>.&#8221;<\/p>\n<p>Perhaps there&#8217;s a way to scale the results to include both the depth of penetration and the broader stop\/no stop score, but again, we encourage all who are interested in the tests to examine the <a href=\"https:\/\/attackevals.mitre-engenuity.org\/enterprise\/participants\/?adversaries=wizard-spider-sandworm\" target=\"_blank\" rel=\"noopener\">MITRE data<\/a> themselves.<\/p>\n<h2>Good Results for Cybersecurity<\/h2>\n<p>Twelve of the 22 vendors stopped all the Protection tests they faced, a promising showing for cybersecurity in general.<\/p>\n<p>Seven of the vendors stopped all 9 of the Protection tests, including the one Linux test: Cybereason, SentinelOne, Cynet, Palo Alto Networks, CrowdStrike, Microsoft, and BlackBerry Cylance.<\/p>\n<p>Another four vendors stopped all 8 Windows attack tests while skipping the Linux test: McAfee (now combined with FireEye as <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/mcafee-cloud-launches-as-skyhigh-security\/\">Trellix<\/a>), Fortinet, VMware Carbon Black, and Deep Instinct. Trend Micro stopped 8 attacks, and the 9th was prevented from executing by a detection rule.<\/p>\n<p>Below are the broad results for the vendors that participated in both the Detection and Protection evaluations:<\/p>\n<table dir=\"ltr\" style=\"width: 702px; height: 870px;\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\n<colgroup>\n<col width=\"143\" \/>\n<col width=\"118\" \/>\n<col width=\"112\" \/>\n<col width=\"120\" \/>\n<col width=\"95\" \/>\n<col width=\"92\" \/><\/colgroup>\n<tbody>\n<tr style=\"height: 21px;\">\n<td><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Protection tests&quot;}\">Protection<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Protection %&quot;}\">Protect %<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Detection steps&quot;}\">Detection<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Detection %&quot;}\">Detect %<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Combined %&quot;}\">Overall%<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Cybereason&quot;}\">Cybereason<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:5,&quot;2&quot;:&quot;m\/d&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:44813}\">9\/9<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:1}\">100.00%<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;109\/109&quot;}\">109\/109<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:1}\">100.00%<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:1}\">100.00%<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;SentinelOne&quot;}\">SentinelOne<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:5,&quot;2&quot;:&quot;m\/d&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:44813}\">9\/9<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:1}\">100.00%<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;108\/109&quot;}\">108\/109<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.9908256880733946}\">99.08%<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.9954128440366973}\">99.54%<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Cynet&quot;}\">Cynet<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:5,&quot;2&quot;:&quot;m\/d&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:44813}\">9\/9<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:1}\">100.00%<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;107\/109&quot;}\">107\/109<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.981651376146789}\">98.17%<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.9908256880733946}\">99.08%<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Palo Alto Networks&quot;}\">Palo Alto Networks<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:5,&quot;2&quot;:&quot;m\/d&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:44813}\">9\/9<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:1}\">100.00%<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;107\/109&quot;}\">107\/109<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.981651376146789}\">98.17%<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.9908256880733946}\">99.08%<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;CrowdStrike&quot;}\">CrowdStrike<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:5,&quot;2&quot;:&quot;m\/d&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:44813}\">9\/9<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:1}\">100.00%<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;105\/109&quot;}\">105\/109<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.963302752293578}\">96.33%<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.981651376146789}\">98.17%<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Microsoft&quot;}\">Microsoft<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:5,&quot;2&quot;:&quot;m\/d&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:44813}\">9\/9<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:1}\">100.00%<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;98\/109&quot;}\">98\/109<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.8990825688073395}\">89.91%<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.9495412844036697}\">94.95%<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;BlackBerry Cylance&quot;}\">BlackBerry Cylance<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:5,&quot;2&quot;:&quot;m\/d&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:44813}\">9\/9<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:1}\">100.00%<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;89\/109&quot;}\">89\/109<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.8165137614678899}\">81.65%<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.908256880733945}\">90.83%<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;McAfee&quot;}\">McAfee<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:5,&quot;2&quot;:&quot;m\/d&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:44781}\">8\/8<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:1}\">100.00%<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;107\/109&quot;}\">107\/109<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.981651376146789}\">98.17%<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.9908256880733946}\">99.08%<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Fortinet&quot;}\">Fortinet<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:5,&quot;2&quot;:&quot;m\/d&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:44781}\">8\/8<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:1}\">100.00%<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;87\/90&quot;}\">87\/90<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.9666666666666667}\">96.67%<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.9833333333333334}\">98.33%<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Trend Micro&quot;}\">Trend Micro<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:5,&quot;2&quot;:&quot;m\/d&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:44781}\">8\/8<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:1}\">100.00%<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;105\/109&quot;}\">105\/109<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.963302752293578}\">96.33%<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.981651376146789}\">98.17%<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;VMware Carbon Black&quot;}\">VMware Carbon Black<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:5,&quot;2&quot;:&quot;m\/d&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:44781}\">8\/8<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:1}\">100.00%<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;90\/109&quot;}\">90\/109<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.8256880733944955}\">82.57%<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.9128440366972477}\">91.28%<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Deep Instinct&quot;}\">Deep Instinct<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:5,&quot;2&quot;:&quot;m\/d&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:44781}\">8\/8<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:1}\">100.00%<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;63\/90&quot;}\">63\/90<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.7}\">70.00%<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.85}\">85.00%<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td data-sheets-textstyleruns=\"{&quot;1&quot;:0,&quot;2&quot;:{}}\uee10{&quot;1&quot;:7}\" data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Malwarebytes&quot;}\">Malwarebytes<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:5,&quot;2&quot;:&quot;m\/d&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:44750}\">7\/8<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.875}\">87.50%<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;83\/90&quot;}\">83\/90<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.9222222222222223}\">92.22%<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.8986111111111111}\">89.86%<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Check Point&quot;}\">Check Point<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:5,&quot;2&quot;:&quot;m\/d&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:44751}\">7\/9<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.7777777777777778}\">77.78%<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;103\/109&quot;}\">103\/109<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.944954128440367}\">94.50%<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.8613659531090724}\">86.14%<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Cisco&quot;}\">Cisco<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:5,&quot;2&quot;:&quot;m\/d&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:44751}\">7\/9<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.7777777777777778}\">77.78%<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;90\/109&quot;}\">90\/109<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.8256880733944955}\">82.57%<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.8017329255861366}\">80.17%<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;FireEye&quot;}\">FireEye<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:5,&quot;2&quot;:&quot;m\/d&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:44720}\">6\/8<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.75}\">75.00%<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;89\/109&quot;}\">89\/109<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.8165137614678899}\">81.65%<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.783256880733945}\">78.33%<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Broadcom Symantec&quot;}\">Broadcom Symantec<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:5,&quot;2&quot;:&quot;m\/d&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:44721}\">6\/9<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.6666666666666666}\">66.67%<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;92\/109&quot;}\">92\/109<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.8440366972477065}\">84.40%<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.7553516819571866}\">75.54%<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;AhnLab&quot;}\">AhnLab<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:5,&quot;2&quot;:&quot;m\/d&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:44689}\">5\/8<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.625}\">62.50%<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;83\/90&quot;}\">83\/90<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.9222222222222223}\">92.22%<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.7736111111111111}\">77.36%<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Sophos&quot;}\">Sophos<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:5,&quot;2&quot;:&quot;m\/d&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:44689}\">5\/8<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.625}\">62.50%<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;88\/109&quot;}\">88\/109<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.8073394495412844}\">80.73%<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.7161697247706422}\">71.62%<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Cycraft&quot;}\">Cycraft<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:5,&quot;2&quot;:&quot;m\/d&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:44660}\">4\/9<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.4444444444444444}\">44.44%<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;77\/109&quot;}\">77\/109<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.7064220183486238}\">70.64%<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.5754332313965341}\">57.54%<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;ESET&quot;}\">ESET<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:5,&quot;2&quot;:&quot;m\/d&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:44659}\">4\/8<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.5}\">50.00%<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;75\/90&quot;}\">75\/90<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.8333333333333334}\">83.33%<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.6666666666666667}\">66.67%<\/td>\n<\/tr>\n<tr style=\"height: 21px;\">\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Uptycs&quot;}\">Uptycs<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:5,&quot;2&quot;:&quot;m\/d&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:44570}\">1\/9<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.1111111111111111}\">11.11%<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;92\/109&quot;}\">92\/109<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.8440366972477065}\">84.40%<\/td>\n<td data-sheets-numberformat=\"{&quot;1&quot;:3,&quot;2&quot;:&quot;0.00%&quot;,&quot;3&quot;:1}\" data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:0.4775739041794088}\">47.76%<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>Many of those vendors also did well in <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-protection-tests-endpoint-security\/\">last year&#8217;s results<\/a>, demonstrating consistency across a range of advanced threats. Palo Alto&#8217;s performance in independent testing over the years has been so consistently strong that the company has been our <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-cybersecurity-companies\/\">top overall cybersecurity vendor<\/a> for some time now, but 11 other vendors participating in the MITRE evaluations also made our overall top companies list. And we rank most of the MITRE participants on our <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">top EDR products<\/a> list, which we will update shortly.<\/p>\n<h2>Difficult Tests<\/h2>\n<p>The MITRE tests remain the most challenging a security vendor can face.\u00a0The Detection tests emulated the Wizard Spider threat group that uses the Ryuk <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">ransomware<\/a> and the Russian Sandworm group behind <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">NotPetya<\/a>. The Protection steps looked at <a href=\"https:\/\/www.esecurityplanet.com\/applications\/microsoft-blocks-vba-macros-msix-protocol\/\">Emotet and TrickBot<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/products\/active-directory-security-tools\/\">Active Directory<\/a> credential dumping, Ryuk, <a href=\"https:\/\/www.esecurityplanet.com\/threats\/microsoft-issues-proxyshell-advisory-after-attacks-begin\/\">WebShell<\/a> compromise, <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-prevent-dns-attacks\/\">domain host<\/a> compromise, and NotPetya.<\/p>\n<figure id=\"attachment_21574\" aria-describedby=\"caption-attachment-21574\" style=\"width: 106px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-21574\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/04\/Mitre-detect-only-1-106x300.png\" alt=\"MITRE detection tests\" width=\"106\" height=\"300\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/Mitre-detect-only-1-106x300.png 106w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/Mitre-detect-only-1-150x426.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/Mitre-detect-only-1-300x853.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/Mitre-detect-only-1.png 395w\" sizes=\"(max-width: 106px) 100vw, 106px\" \/><figcaption id=\"caption-attachment-21574\" class=\"wp-caption-text\">Detection only vendors. Source: Cynet<\/figcaption><\/figure>\n<p>Given the severity of the threats, the results are good news for the industry in general at a time when <a href=\"https:\/\/www.esecurityplanet.com\/networks\/network-security-guidance\/\">cyberwar<\/a> has also become a concern.<\/p>\n<p>And to the right are the vendors that participated in the detection evaluations only. We&#8217;ve always taken the view that vendors should be applauded for participating in independent tests, both for the information that gives potential buyers and for the improvement that will result in cybersecurity products.<\/p>\n<p>MITRE will soon follow with results for <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-expands-security-testing-to-services-deception-tools\/\">deception tools and security services<\/a>, the organization&#8217;s first moves beyond endpoint security.<\/p>\n<p>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/products\/xdr-security-solutions\/\">Top XDR Security Solutions<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6c89eb875c-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6c89eb875c\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6c89eb875c\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6c89eb875c\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6c89eb875c\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6c89eb875c\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6c89eb875c\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>MITRE Engenuity has released the latest round of its ATT&amp;CK endpoint security evaluations, and the results show some familiar names leading the pack with the most detections. The MITRE evaluations are unique in that they emulate advanced persistent threat (APT) and nation-state hacking techniques, making them different from tests that might look at static malware [&hellip;]<\/p>\n","protected":false},"author":163,"featured_media":21598,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[19,17],"tags":[28055,30655,13283],"b2b_audience":[33,34],"b2b_industry":[],"b2b_product":[378],"class_list":["post-21570","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-endpoint","category-products","tag-edr","tag-epp","tag-mitre","b2b_audience-awareness-and-consideration","b2b_audience-evaluation-and-selection","b2b_product-endpoint-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Latest MITRE Endpoint Security Results Show Some Familiar Names on Top | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"The latest MITRE test results are good news for cyberscurity in general, and for several EDR vendors in particular.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-endpoint-security-results\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Latest MITRE Endpoint Security Results Show Some Familiar Names on Top | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"The latest MITRE test results are good news for cyberscurity in general, and for several EDR vendors in particular.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-endpoint-security-results\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-05T15:51:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-29T18:30:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/sentinelone-mitre2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"924\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Paul Shread\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paul Shread\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-endpoint-security-results\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-endpoint-security-results\/\"},\"author\":{\"name\":\"Paul Shread\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04\"},\"headline\":\"Latest MITRE Endpoint Security Results Show Some Familiar Names on Top\",\"datePublished\":\"2022-04-05T15:51:12+00:00\",\"dateModified\":\"2022-06-29T18:30:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-endpoint-security-results\/\"},\"wordCount\":1126,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-endpoint-security-results\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/sentinelone-mitre2.jpg\",\"keywords\":[\"EDR\",\"EPP\",\"Mitre\"],\"articleSection\":[\"Endpoint\",\"Products\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-endpoint-security-results\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-endpoint-security-results\/\",\"name\":\"Latest MITRE Endpoint Security Results Show Some Familiar Names on Top | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-endpoint-security-results\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-endpoint-security-results\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/sentinelone-mitre2.jpg\",\"datePublished\":\"2022-04-05T15:51:12+00:00\",\"dateModified\":\"2022-06-29T18:30:35+00:00\",\"description\":\"The latest MITRE test results are good news for cyberscurity in general, and for several EDR vendors in particular.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-endpoint-security-results\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-endpoint-security-results\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-endpoint-security-results\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/sentinelone-mitre2.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/sentinelone-mitre2.jpg\",\"width\":924,\"height\":450,\"caption\":\"sentinelone mitre\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-endpoint-security-results\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Latest MITRE Endpoint Security Results Show Some Familiar Names on Top\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04\",\"name\":\"Paul Shread\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg\",\"caption\":\"Paul Shread\"},\"description\":\"Former eSecurityPlanet Editor Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including award-winning articles on endpoint security and virtual data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds market analyst and cybersecurity certifications. In a previous life he worked for daily newspapers, including the Baltimore Sun, and spent 7 years covering the federal government. Al Haig once compared him to Bob Woodward (true story - just ask Google).\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/paul-shread-2\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Latest MITRE Endpoint Security Results Show Some Familiar Names on Top | eSecurity Planet","description":"The latest MITRE test results are good news for cyberscurity in general, and for several EDR vendors in particular.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-endpoint-security-results\/","og_locale":"en_US","og_type":"article","og_title":"Latest MITRE Endpoint Security Results Show Some Familiar Names on Top | eSecurity Planet","og_description":"The latest MITRE test results are good news for cyberscurity in general, and for several EDR vendors in particular.","og_url":"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-endpoint-security-results\/","og_site_name":"eSecurity Planet","article_published_time":"2022-04-05T15:51:12+00:00","article_modified_time":"2022-06-29T18:30:35+00:00","og_image":[{"width":924,"height":450,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/sentinelone-mitre2.jpg","type":"image\/jpeg"}],"author":"Paul Shread","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Paul Shread","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-endpoint-security-results\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-endpoint-security-results\/"},"author":{"name":"Paul Shread","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04"},"headline":"Latest MITRE Endpoint Security Results Show Some Familiar Names on Top","datePublished":"2022-04-05T15:51:12+00:00","dateModified":"2022-06-29T18:30:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-endpoint-security-results\/"},"wordCount":1126,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-endpoint-security-results\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/sentinelone-mitre2.jpg","keywords":["EDR","EPP","Mitre"],"articleSection":["Endpoint","Products"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-endpoint-security-results\/","url":"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-endpoint-security-results\/","name":"Latest MITRE Endpoint Security Results Show Some Familiar Names on Top | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-endpoint-security-results\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-endpoint-security-results\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/sentinelone-mitre2.jpg","datePublished":"2022-04-05T15:51:12+00:00","dateModified":"2022-06-29T18:30:35+00:00","description":"The latest MITRE test results are good news for cyberscurity in general, and for several EDR vendors in particular.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-endpoint-security-results\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/endpoint\/mitre-endpoint-security-results\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-endpoint-security-results\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/sentinelone-mitre2.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/sentinelone-mitre2.jpg","width":924,"height":450,"caption":"sentinelone mitre"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-endpoint-security-results\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Latest MITRE Endpoint Security Results Show Some Familiar Names on Top"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04","name":"Paul Shread","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg","caption":"Paul Shread"},"description":"Former eSecurityPlanet Editor Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including award-winning articles on endpoint security and virtual data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds market analyst and cybersecurity certifications. In a previous life he worked for daily newspapers, including the Baltimore Sun, and spent 7 years covering the federal government. Al Haig once compared him to Bob Woodward (true story - just ask Google).","url":"https:\/\/www.esecurityplanet.com\/author\/paul-shread-2\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/21570"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/163"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=21570"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/21570\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/21598"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=21570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=21570"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=21570"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=21570"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=21570"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=21570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}