{"id":31982,"date":"2023-09-22T23:36:25","date_gmt":"2023-09-22T23:36:25","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=31982"},"modified":"2023-11-14T16:03:58","modified_gmt":"2023-11-14T16:03:58","slug":"mitre-results-2023","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/trends\/mitre-results-2023\/","title":{"rendered":"MITRE ATT&amp;CK Evaluations 2023: Palo Alto, Microsoft, CrowdStrike &amp; Cybereason Lead the Way"},"content":{"rendered":"\n<p>MITRE Engenuity has released its 2023 ATT&amp;CK evaluations, examining how top cybersecurity vendors detect and prevent sophisticated cyberthreats. This year, the evaluations focused on the techniques of Turla, a Russia-based threat group.<\/p>\n\n\n\n<p>Turla uses a command-and-control network, as well as open source tools, which are more difficult to protect and easier to exploit because anyone can edit \u2014 and abuse \u2014 the code.<\/p>\n\n\n\n<p>This year&#8217;s MITRE analysis tested vendors&#8217; ability to detect two scenarios called SNAKE and CARBON. MITRE used multiple offensive security tools, including Keylogger and Mimikatz, to launch attacks on vendors&#8217; environments. The vendors were also tested on protection capabilities, undergoing thirteen tests \u2014 some with many steps \u2014 to see at which step they could halt an attack.<\/p>\n\n\n\n<p>MITRE&#8217;s detection and protection evaluations have usually attracted endpoint security vendors, with the detection evaluations best suited for <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">endpoint detection and response (EDR)<\/a> products and the protection tests focusing on the abilities of endpoint protection platforms (<a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/antivirus-vs-epp-vs-edr\/\">EPP<\/a>). Vendors offering both EDR and EPP capabilities for Windows and Linux are able to participate in more steps of an evaluation than vendors with more limited offerings. Over time, security vendors whose primary strengths lie elsewhere have increasingly participated in the respected program.<\/p>\n\n\n\n<p>We encourage security buyers to research these vendors, including their MITRE scores over time, before making a purchase. Our analysis provides one way to look at the MITRE evaluations from an angle that can be helpful. But as we noted in <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-endpoint-security-results\/\">our analysis of last year&#8217;s results<\/a>, your organization will need to test security products in your own infrastructure before you know if it will work for you. And looking into the details of the MITRE tests may also give you significant information about how a product might perform in your environment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Analyze This Year\u2019s MITRE Results<\/h2>\n\n\n\n<p>The <a href=\"https:\/\/attackevals.mitre-engenuity.org\/enterprise\/participants\/?adversaries=turla\" target=\"_blank\" rel=\"noreferrer noopener\">MITRE results<\/a> were separated into two categories: detection (SNAKE and CARBON scenarios) and protection (13 tests of a product&#8217;s ability to stop an attack).<\/p>\n\n\n\n<p>The detection evaluation involved 143 total steps. For vendors who skipped the Linux tests, that number drops to 132. To calculate the detection scores, we divided the total number of successfully detected steps by 143 (or 132).<\/p>\n\n\n\n<p>The detection tests include an analytics score, a telemetry score, and a visibility score. Analytics coverage not only detects the threat but also tags it with the MITRE standard identification. Telemetry coverage is the collection of raw data about a threat event, not necessarily including context. Visibility coverage is the overall number of detections that MITRE tested and the vendor successfully detected. We cover only the visibility score in our analysis of MITRE testing.<\/p>\n\n\n\n<p>Cisco&#8217;s and Check Point&#8217;s detection and protection scores weren&#8217;t recorded due to technological issues, according to MITRE.<\/p>\n\n\n\n<p>The protection component consists of 13 tests, evaluating which vendors can stop all thirteen attack sequences and how quickly they can do so. Most of the 13 tests had multiple attack steps. Protection tests were optional, and not all vendors participated, including Rapid7 and WithSecure.<\/p>\n\n\n\n<p>On the protection side, there were a few tests in particular with which multiple vendors struggled. Many vendors missed test three, including Fortinet, Bitdefender, and Sophos. Malwarebytes couldn&#8217;t complete it either.<\/p>\n\n\n\n<p>And many struggled with test seven as well. While Fortinet eventually completed seven, it took many steps. Same for Bitdefender. VMware Carbon Black didn&#8217;t complete test seven, and Tehtris missed every step. A few vendors ran into trouble with test 13 as well. This year&#8217;s evaluations revealed some common threads, with a few notable protection tests that appeared to be particularly hard.<\/p>\n\n\n\n<p>Palo Alto Networks had a perfect score, detecting all 143 detection tests and stopping all 13 protection evaluations on the first step. Three other vendors \u2014 Microsoft, CrowdStrike and Cybereason \u2014 all successfully detected the 143 detection tests and stopped the 13 protection attacks, but missed a small number of the protection steps before stopping the threat.<\/p>\n\n\n\n<p>A number of other vendors had strong showings, but the results for many vendors left room for improvement, especially on the protection end. Many high-profile security vendors failed to stop multiple protection tests. Product teams typically use the tests to improve their offerings, so participation is always a net positive.<\/p>\n\n\n\n<p>Vendors have noted a number of caveats about the evaluations \u2014 namely, that the detection tests can potentially be gamed by vendors setting detection sensitivity levels high enough to produce false alerts in the real world, and some vendors have said they had to disable key security features to participate. Those caveats make the protection tests the more important of the two, and many welcomed them when they were <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-protection-tests-endpoint-security\/\">introduced two years ago<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Detection &amp; Protection Results Were a Mixed Bag<\/h2>\n\n\n\n<p>Many of last year&#8217;s winners scored high for detection again this year, including Palo Alto, Microsoft, CrowdStrike, and Cybereason. Five vendors received perfect visibility scores in the detection evaluations, and Sophos was one vendor that scored a noteworthy comeback from a middling 2022 result, underscoring that vendors often use the results to better their products.<\/p>\n\n\n\n<p>The following table gives the overall visibility score for each vendor in the detection tests, from highest number of successful detection tests to the lowest.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td colspan=\"2\"><strong>Detection visibility score, in percent<\/strong><\/td><\/tr><tr><td>Crowdstrike<\/td><td>100%<\/td><\/tr><tr><td>Cybereason<\/td><td>100%<\/td><\/tr><tr><td>Cynet<\/td><td>100%<\/td><\/tr><tr><td>Microsoft<\/td><td>100%<\/td><\/tr><tr><td>Palo Alto<\/td><td>100%<\/td><\/tr><tr><td>Sophos<\/td><td>98.6%<\/td><\/tr><tr><td>Fortinet<\/td><td>97.9%<\/td><\/tr><tr><td>Bitdefender<\/td><td>91.61%<\/td><\/tr><tr><td>Deep Instinct<\/td><td>89.39%<\/td><\/tr><tr><td>SentinelOne<\/td><td>88.11%<\/td><\/tr><tr><td>Trend Micro<\/td><td>88.11%<\/td><\/tr><tr><td>Uptycs<\/td><td>88.11%<\/td><\/tr><tr><td>Harfang Labs<\/td><td>87.41%<\/td><\/tr><tr><td>Malwarebytes<\/td><td>82.52%<\/td><\/tr><tr><td>Blackberry<\/td><td>81.82%<\/td><\/tr><tr><td>Trellix<\/td><td>81.12%<\/td><\/tr><tr><td>Elastic<\/td><td>80.42%<\/td><\/tr><tr><td>WatchGuard<\/td><td>78.79%<\/td><\/tr><tr><td>Qualys<\/td><td>78.32%<\/td><\/tr><tr><td>Taegis (secureworks)<\/td><td>78.32%<\/td><\/tr><tr><td>ESET<\/td><td>77.62%<\/td><\/tr><tr><td>Symantec<\/td><td>75.52%<\/td><\/tr><tr><td>Ahn Labs<\/td><td>74.24%<\/td><\/tr><tr><td>IBM Security<\/td><td>72.03%<\/td><\/tr><tr><td>VMware Carbon Black<\/td><td>72.03%<\/td><\/tr><tr><td>Rapid7<\/td><td>70.63%<\/td><\/tr><tr><td>Tehtris<\/td><td>67.13%<\/td><\/tr><tr><td>WithSecure<\/td><td>67.13%<\/td><\/tr><tr><td>Somma<\/td><td>58.74%<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>The protection test results this year displayed a wide performance range. Only seven vendors stopped all the tests they faced, the same number as last year. But many vendors missed multiple protection tests entirely. There were 13 tests total, and many contained multiple steps. This table compares three different items:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The number of tests, out of 13, that the vendor was able to stop<\/li>\n\n\n\n<li>The number of tests, out of 13, that the vendor stopped on the first step<\/li>\n\n\n\n<li>The number of total steps the vendor missed out of all 13 tests (for example, if they stopped one test on the fifth step, they missed four steps for that test alone)<\/li>\n<\/ul>\n\n\n\n<p>These metrics show different facets of the protection tests, rather than a single overall percentage.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Vendor<\/strong><\/td><td><strong>Number of stopped tests<\/strong><\/td><td><strong>Tests stopped on first step<\/strong><\/td><td><strong>Steps missed<\/strong><\/td><\/tr><tr><td>Palo Alto<\/td><td>13\/13<\/td><td>13\/13<\/td><td>0<\/td><\/tr><tr><td>CrowdStrike<\/td><td>13\/13<\/td><td>12\/13<\/td><td>4<\/td><\/tr><tr><td>Cybereason<\/td><td>13\/13<\/td><td>12\/13<\/td><td>1<\/td><\/tr><tr><td>Microsoft<\/td><td>13\/13<\/td><td>12\/13<\/td><td>2<\/td><\/tr><tr><td>SentinelOne<\/td><td>13\/13<\/td><td>12\/13<\/td><td>3<\/td><\/tr><tr><td>Trend Micro<\/td><td>13\/13<\/td><td>10\/13<\/td><td>3<\/td><\/tr><tr><td>Symantec<\/td><td>13\/13<\/td><td>12\/13<\/td><td>1<\/td><\/tr><tr><td>Cynet<\/td><td>12\/13<\/td><td>9\/13<\/td><td>7<\/td><\/tr><tr><td>Fortinet<\/td><td>12\/13<\/td><td>8\/13<\/td><td>43<\/td><\/tr><tr><td>Bitdefender<\/td><td>12\/13<\/td><td>11\/13<\/td><td>14<\/td><\/tr><tr><td>Deep Instinct<\/td><td>12\/13<\/td><td>10\/13<\/td><td>5<\/td><\/tr><tr><td>Ahn Labs<\/td><td>12\/13<\/td><td>11\/13<\/td><td>5<\/td><\/tr><tr><td>Sophos<\/td><td>11\/13<\/td><td>11\/13<\/td><td>10<\/td><\/tr><tr><td>Blackberry<\/td><td>11\/13<\/td><td>10\/13<\/td><td>5<\/td><\/tr><tr><td>Trellix<\/td><td>11\/13<\/td><td>11\/13<\/td><td>10<\/td><\/tr><tr><td>Elastic<\/td><td>11\/13<\/td><td>11\/13<\/td><td>4<\/td><\/tr><tr><td>ESET<\/td><td>10\/13<\/td><td>8\/13<\/td><td>27<\/td><\/tr><tr><td>VMware Carbon Black<\/td><td>10\/13<\/td><td>4\/13<\/td><td>18<\/td><\/tr><tr><td>WatchGuard<\/td><td>9\/13<\/td><td>3\/13<\/td><td>25<\/td><\/tr><tr><td>IBM Security<\/td><td>9\/13<\/td><td>1\/13<\/td><td>40<\/td><\/tr><tr><td>Uptycs<\/td><td>8\/13<\/td><td>3\/13<\/td><td>41<\/td><\/tr><tr><td>Malwarebytes<\/td><td>7\/13<\/td><td>2\/13<\/td><td>38<\/td><\/tr><tr><td>Tehtris<\/td><td>7\/13<\/td><td>5\/13<\/td><td>46<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Palo Alto stopped all the tests, once again earning our confidence as the <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-cybersecurity-companies\/\">top overall cybersecurity vendor<\/a>. Symantec and Cybereason did particularly well here. Malwarebytes and Tehtris were the lowest performers on the protection side, only managing to stop 7 of 13 tests. And while Fortinet stopped 12 of the tests, it missed a sizable 43 attack steps during the testing process. The deeper intruders get into your environment, the more damage they can do.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Bottom Line: MITRE Scores Are Valuable, But Not Everything<\/h2>\n\n\n\n<p>MITRE evaluations are far from easy for security vendors, and that difficulty makes them particularly valuable in a market where <a href=\"https:\/\/www.esecurityplanet.com\/trends\/most-security-product-buyers-arent-getting-promised-results\/\">buyers don&#8217;t have a lot of visibility<\/a>. Even vendors who choose to undergo only the detection tests, like Rapid7, are to be commended for pursuing excellence in a field \u2014 like EDR \u2014 that they aren&#8217;t best known for.<\/p>\n\n\n\n<p>We encourage you to study the MITRE results for yourself if you&#8217;re interested in knowing more or are considering making a purchase from one of these vendors. Our interpretation is just one method of looking at the data.<\/p>\n\n\n\n<p>Threats only grow more sophisticated over time, and security providers have the difficult task of keeping up with threat actors&#8217; ingenuity. That makes MITRE evaluations one of the best available tools for both security buyers and vendors to learn.<\/p>\n\n\n\n<p>Read next:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/top-cybersecurity-companies\/\"><strong>The Top Cybersecurity Companies<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\"><strong>Top Endpoint Detection and Response (EDR) Solutions<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/siem-mitre-attack\/\"><strong>Enterprise SIEMs Miss 76 Percent of MITRE ATT&amp;CK Techniques<\/strong><\/a><\/li>\n<\/ul>\n\n\n\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-top3 row\">\n    \n        <!--\n            ICP Plugin - body top3\n            ----------\n            Category: \n            Country: HK\n        -->\n    <\/div>\n<!-- ICP Plugin: End -->\n\n\n<div id=\"ta-campaign-widget-66d6f0a7033d7-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f0a7033d7\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f0a7033d7\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f0a7033d7\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f0a7033d7\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f0a7033d7\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f0a7033d7\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>MITRE Engenuity has released its 2023 ATT&amp;CK evaluations, examining how top cybersecurity vendors detect and prevent sophisticated cyberthreats. This year, the evaluations focused on the techniques of Turla, a Russia-based threat group. Turla uses a command-and-control network, as well as open source tools, which are more difficult to protect and easier to exploit because anyone [&hellip;]<\/p>\n","protected":false},"author":238,"featured_media":31990,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[16],"tags":[3790,28055,14404,3414,730,3622],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[31788,378,395,31776],"class_list":["post-31982","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trends","tag-cybersecurity","tag-edr","tag-endpoint-security","tag-network-security","tag-security","tag-testing","b2b_audience-awareness-and-consideration","b2b_product-advanced-persistent-threats","b2b_product-endpoint-security","b2b_product-firewalls-and-intrusion-prevention-and-detection","b2b_product-siem"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>MITRE ATT&amp;CK Results 2023: Palo Alto, Microsoft, CrowdStrike Lead the Way<\/title>\n<meta name=\"description\" content=\"MITRE has released its 2023 ATT&amp;CK Evaluations, with a focus on Turla. Discover which companies aced the test and which fell short.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/trends\/mitre-results-2023\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MITRE ATT&amp;CK Results 2023: Palo Alto, Microsoft, CrowdStrike Lead the Way\" \/>\n<meta property=\"og:description\" content=\"MITRE has released its 2023 ATT&amp;CK Evaluations, with a focus on Turla. Discover which companies aced the test and which fell short.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/trends\/mitre-results-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-22T23:36:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-14T16:03:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/mitre-turla-2023-tests.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"713\" \/>\n\t<meta property=\"og:image:height\" content=\"678\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jenna Phipps\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jenna Phipps\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/mitre-results-2023\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/mitre-results-2023\/\"},\"author\":{\"name\":\"Jenna Phipps\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb\"},\"headline\":\"MITRE ATT&amp;CK Evaluations 2023: Palo Alto, Microsoft, CrowdStrike &amp; Cybereason Lead the Way\",\"datePublished\":\"2023-09-22T23:36:25+00:00\",\"dateModified\":\"2023-11-14T16:03:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/mitre-results-2023\/\"},\"wordCount\":1324,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/mitre-results-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/mitre-turla-2023-tests.jpg\",\"keywords\":[\"cybersecurity\",\"EDR\",\"endpoint security\",\"network security\",\"security\",\"testing\"],\"articleSection\":[\"Trends\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/mitre-results-2023\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/trends\/mitre-results-2023\/\",\"name\":\"MITRE ATT&CK Results 2023: Palo Alto, Microsoft, CrowdStrike Lead the Way\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/mitre-results-2023\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/mitre-results-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/mitre-turla-2023-tests.jpg\",\"datePublished\":\"2023-09-22T23:36:25+00:00\",\"dateModified\":\"2023-11-14T16:03:58+00:00\",\"description\":\"MITRE has released its 2023 ATT&CK Evaluations, with a focus on Turla. Discover which companies aced the test and which fell short.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/mitre-results-2023\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/trends\/mitre-results-2023\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/mitre-results-2023\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/mitre-turla-2023-tests.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/mitre-turla-2023-tests.jpg\",\"width\":713,\"height\":678,\"caption\":\"mitre 2023 att&ck evaluations\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/mitre-results-2023\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"MITRE ATT&amp;CK Evaluations 2023: Palo Alto, Microsoft, CrowdStrike &amp; Cybereason Lead the Way\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb\",\"name\":\"Jenna Phipps\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg\",\"caption\":\"Jenna Phipps\"},\"description\":\"Jenna Phipps is a staff writer for eSecurity Planet and has years of experience in B2B technical content writing. She covers security practices, vulnerabilities, data protection, and the top products in the cybersecurity industry. She also writes about the importance of cybersecurity technologies and training in business environments, as well as the role that security plays in data storage and management. When Jenna's not writing about security, you can find her reading, shopping, eating smoothie bowls, or spending time with friends.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jphipps\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"MITRE ATT&CK Results 2023: Palo Alto, Microsoft, CrowdStrike Lead the Way","description":"MITRE has released its 2023 ATT&CK Evaluations, with a focus on Turla. Discover which companies aced the test and which fell short.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/trends\/mitre-results-2023\/","og_locale":"en_US","og_type":"article","og_title":"MITRE ATT&CK Results 2023: Palo Alto, Microsoft, CrowdStrike Lead the Way","og_description":"MITRE has released its 2023 ATT&CK Evaluations, with a focus on Turla. Discover which companies aced the test and which fell short.","og_url":"https:\/\/www.esecurityplanet.com\/trends\/mitre-results-2023\/","og_site_name":"eSecurity Planet","article_published_time":"2023-09-22T23:36:25+00:00","article_modified_time":"2023-11-14T16:03:58+00:00","og_image":[{"width":713,"height":678,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/mitre-turla-2023-tests.jpg","type":"image\/jpeg"}],"author":"Jenna Phipps","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jenna Phipps","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/trends\/mitre-results-2023\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/mitre-results-2023\/"},"author":{"name":"Jenna Phipps","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb"},"headline":"MITRE ATT&amp;CK Evaluations 2023: Palo Alto, Microsoft, CrowdStrike &amp; Cybereason Lead the Way","datePublished":"2023-09-22T23:36:25+00:00","dateModified":"2023-11-14T16:03:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/mitre-results-2023\/"},"wordCount":1324,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/mitre-results-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/mitre-turla-2023-tests.jpg","keywords":["cybersecurity","EDR","endpoint security","network security","security","testing"],"articleSection":["Trends"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/trends\/mitre-results-2023\/","url":"https:\/\/www.esecurityplanet.com\/trends\/mitre-results-2023\/","name":"MITRE ATT&CK Results 2023: Palo Alto, Microsoft, CrowdStrike Lead the Way","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/mitre-results-2023\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/mitre-results-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/mitre-turla-2023-tests.jpg","datePublished":"2023-09-22T23:36:25+00:00","dateModified":"2023-11-14T16:03:58+00:00","description":"MITRE has released its 2023 ATT&CK Evaluations, with a focus on Turla. Discover which companies aced the test and which fell short.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/mitre-results-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/trends\/mitre-results-2023\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/trends\/mitre-results-2023\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/mitre-turla-2023-tests.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/09\/mitre-turla-2023-tests.jpg","width":713,"height":678,"caption":"mitre 2023 att&ck evaluations"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/trends\/mitre-results-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"MITRE ATT&amp;CK Evaluations 2023: Palo Alto, Microsoft, CrowdStrike &amp; Cybereason Lead the Way"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb","name":"Jenna Phipps","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg","caption":"Jenna Phipps"},"description":"Jenna Phipps is a staff writer for eSecurity Planet and has years of experience in B2B technical content writing. She covers security practices, vulnerabilities, data protection, and the top products in the cybersecurity industry. She also writes about the importance of cybersecurity technologies and training in business environments, as well as the role that security plays in data storage and management. When Jenna's not writing about security, you can find her reading, shopping, eating smoothie bowls, or spending time with friends.","url":"https:\/\/www.esecurityplanet.com\/author\/jphipps\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/31982"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/238"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=31982"}],"version-history":[{"count":2,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/31982\/revisions"}],"predecessor-version":[{"id":32827,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/31982\/revisions\/32827"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/31990"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=31982"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=31982"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=31982"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=31982"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=31982"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=31982"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}