{"id":14147,"date":"2021-04-21T07:00:00","date_gmt":"2021-04-21T07:00:00","guid":{"rendered":"https:\/\/eodishasamachar.com\/en\/2021\/04\/21\/exceptional-attack-protection-proven-in-rigorous-mitre-engenuity-attck-evaluations\/"},"modified":"2021-04-21T07:00:00","modified_gmt":"2021-04-21T07:00:00","slug":"exceptional-attack-protection-proven-in-rigorous-mitre-engenuity-attck-evaluations","status":"publish","type":"post","link":"https:\/\/eodishasamachar.com\/en\/2021\/04\/21\/exceptional-attack-protection-proven-in-rigorous-mitre-engenuity-attck-evaluations\/","title":{"rendered":"Exceptional Attack Protection Proven in Rigorous MITRE Engenuity ATT&#038;CK\u00ae Evaluations"},"content":{"rendered":"<p> \n<\/p>\n<div id=\"\">\n                            <!--<a class=\"format-txt\" href=\"{baseURL}\/View\/{release.id}?_download=1\">View this article in .txt format<\/a>--><\/p>\n<p class=\"subheadline\">\n                               Trend Micro\u2019s flagship threat detection and response platform proves its advantages in sophisticated simulations                            <\/p>\n<p>HONG KONG SAR &#8211;\u00a0<a href=\"https:\/\/www.media-outreach.com\/\">Media OutReach<\/a>\u00a0&#8211; 21 April 2021&#13;<br \/>\n&#8211;<b> <\/b><a href=\"https:\/\/www.trendmicro.com\/en_hk\/business.html\"\/> (<a href=\"https:\/\/www.google.com\/finance?q=TYO:4704\"\/>;<a href=\"https:\/\/www.trendmicro.com\/us\/about-us\/investor-relations\/index.html\"\/>),&#13;<br \/>\na global&#13;<br \/>\ncybersecurity leader, excelled in the latest ATT&amp;CK Evaluation performed by&#13;<br \/>\nMITRE Engenuity. The Trend Micro Vision One<sup>TM<\/sup> platform quickly&#13;<br \/>\ndetected 96% of attack steps from the simulation that mimicked the behavior of&#13;<br \/>\ntwo infamous APT groups.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Unlike other industry organizations that test a product&#8217;s&#13;<br \/>\nability to detect and prevent various malware samples, MITRE Engenuity&#8217;s ATT&amp;CK&#13;<br \/>\nEvaluations appraise a <sdt sdttag=\"goog_rdk_17\" id=\"1149792838\"\/>solutions&#8217;&#13;<br \/>\nability to detect targeted attacks leveraging known adversary behavior. This&#13;<br \/>\napproach more closely mirrors real-world attacks that are most critical. MITRE&#13;<br \/>\nEngenuity focused on techniques associated with notorious threat groups&#13;<br \/>\nCarbanak and FIN7 in this year&#8217;s simulations.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p><b><i>Click here to read the full MITRE Engenuity ATT&amp;CK&#13;<br \/>\nEvaluation for Trend Micro Vision One: <\/i><\/b><a href=\"https:\/\/resources.trendmicro.com\/MITRE-Attack-Evaluations.html\"><b><i>https:\/\/resources.trendmicro.com\/MITRE-Attack-Evaluations.html<\/i><\/b><\/a><b><i>.&#13;<br \/>\n<\/i><\/b><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p><b><i>\u00a0<\/i><\/b><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>&#8220;Security has been about&#13;<br \/>\nspotting the tools used in an attack: MITRE Engenuity adds the dimension of&#13;<br \/>\nrecognizing rather the patterns of an attacker, no matter when different tools&#13;<br \/>\nare used,&#8221; said Greg Young, vice president of cybersecurity for Trend Micro.&#13;<br \/>\n&#8220;MITRE ATT&amp;CK is, like the attacks it models, complex. Doing well on a third-party&#13;<br \/>\ntest like this is satisfying \u2013 and with 96% visibility, we did very well here \u2013&#13;<br \/>\nespecially considering it models techniques used by two of the world&#8217;s most&#13;<br \/>\ncapable threat groups. An even bigger success is helping educate organizations&#13;<br \/>\nthat ATT&amp;CK isn&#8217;t just about the test but that ATT&amp;CK can be a part of&#13;<br \/>\nthe everyday playbook for SOCs, which is reflected in our solutions.&#8221;<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>This year&#8217;s test included two simulated breaches, one at a&#13;<br \/>\nhotel and one at a bank, using typical APT tactics such as elevation of&#13;<br \/>\nprivileges, credential theft, lateral movement and data exfiltration.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Trend Micro Vision One recorded the following impressive&#13;<br \/>\nresults:<\/p>\n<ul>\n<li>Delivered&#13;<br \/>\n96% of attack coverage to provide visibility of 167 out of 174 simulated steps&#13;<br \/>\nacross the evaluations. This broad visibility allows customers to have a clear&#13;<br \/>\npicture of the attack and respond faster.<\/li>\n<li>100%&#13;<br \/>\nof attacks against the Linux host were detected, capturing 14\/14 attacker&#13;<br \/>\nsteps, which is especially important considering its huge increase in use by&#13;<br \/>\nmany organizations. <\/li>\n<li>139&#13;<br \/>\npieces of telemetry were enriched by the Trend Micro Vision One platform to&#13;<br \/>\nprovide extremely effective threat visibility to better understand and&#13;<br \/>\ninvestigate attacks. This is critical for SOC analysts.<\/li>\n<li>90% of attack simulations were prevented&#13;<br \/>\nthrough automated detection and response very early on in each test. Deflecting&#13;<br \/>\nrisk early on frees up investigation resources, allowing teams to focus on the&#13;<br \/>\nharder security problems to solve.<\/li>\n<\/ul>\n<p>Trend Micro Vision One allows customers to see more and&#13;<br \/>\nrespond faster \u2014 collecting and automatically correlating telemetry across&#13;<br \/>\nemail, endpoints, servers, cloud workloads and networks to speed up detections&#13;<br \/>\nand investigations.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Its performance against techniques used by two of the&#13;<br \/>\nworld&#8217;s most formidable cybercrime enterprises proves its value in threat&#13;<br \/>\ndetection and response, and ability to optimize cyber-risk reduction for&#13;<br \/>\ncustomers. <\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>The MITRE ATT&amp;CK framework helps industry define and&#13;<br \/>\nstandardize how to describe cyber-attack techniques \u2014 offering organizations a&#13;<br \/>\ncommon and regularly updated language to triage detection and response as&#13;<br \/>\nefficiently as possible.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>This year&#8217;s strong performance in MITRE Engenuity&#8217;s&#13;<br \/>\nATT&amp;CK Evaluation is the second in a row for Trend Micro, whose&#13;<br \/>\ncapabilities also impressed in the 2020 tests.<\/p>\n<\/p><\/div>\n\n<br \/><a href=\"https:\/\/www.media-outreach.com\/news\/2021-04-21\/74718\/exceptional-attack-protection-proven-in-rigorous-mitre-engenuity-attck-evaluations\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Trend Micro\u2019s flagship threat detection and response platform proves its advantages in sophisticated simulations HONG KONG SAR &#8211;\u00a0Media OutReach\u00a0&#8211; 21 April 2021&#13; &#8211; (;),&#13; a global&#13; cybersecurity leader, excelled in the latest ATT&amp;CK Evaluation performed by&#13; MITRE Engenuity. The Trend Micro Vision OneTM platform quickly&#13; detected 96% of attack steps from the simulation that mimicked &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[60],"tags":[],"_links":{"self":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/14147"}],"collection":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/comments?post=14147"}],"version-history":[{"count":0,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/14147\/revisions"}],"wp:attachment":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/media?parent=14147"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/categories?post=14147"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/tags?post=14147"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}