{"id":113171,"date":"2020-07-06T13:00:00","date_gmt":"2020-07-06T20:00:00","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=113171"},"modified":"2020-07-30T19:49:06","modified_gmt":"2020-07-31T02:49:06","slug":"cortex-mitre-attck-round-2","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2020\/07\/cortex-mitre-attck-round-2\/","title":{"rendered":"The Ultimate Guide to the MITRE ATT&amp;CK Round 2 Evaluation"},"content":{"rendered":"<p><i><span style=\"font-weight: 400;\">Download your free copy of <\/span><\/i><a href=\"https:\/\/start.paloaltonetworks.com\/ultimate-guide-to-mitre-attack-2-EDR.html\"><i><span style=\"font-weight: 400;\">The Ultimate Guide to the MITRE ATT&amp;CK Round 2 Evaluation <\/span><\/i><\/a><i><span style=\"font-weight: 400;\">today.<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">The Round 2 MITRE ATT&amp;CK Evaluation \u2013 in which endpoint detection and response (EDR) vendors were tested against the attack techniques of the threat actor group known as<\/span> <a href=\"https:\/\/attackevals.mitre.org\/APT29\/\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">APT29 aka Cozy Bear<\/span><\/a><span style=\"font-weight: 400;\"> \u2013 provided objective proof of the detection capabilities of various solutions in the endpoint security market.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But, as MITRE does not directly rank vendors in their evaluations, the cybersecurity community responded exactly as you\u2019d expect: Each company interpreted the results to position their own solutions as superior. Can you believe it? Everybody won!<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\"  class=\"alignright wp-image-113173 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/07\/MITREguide.png\" alt=\"The Ultimate Guide to the MITRE ATT&amp;CK Round 2 EDR Evaluation\" width=\"400\" height=\"519\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Well, everybody except for perhaps security teams, who are left with mixed messages about the results and about where they should invest to ensure that their companies are protected.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We\u2019re super excited that <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/04\/cortex-mitre\/\"><span style=\"font-weight: 400;\">Cortex XDR was once again unsurpassed in attack technique coverage<\/span><\/a><span style=\"font-weight: 400;\">. But we know that you need more information than that, so we\u2019ve packaged together a much more comprehensive analysis of the data. As each company and security team has different needs and strategies (and, therefore, different criteria for ranking solutions), we\u2019ve reviewed the MITRE data from a number of different angles in a robust guide to the MITRE Evaluation that will help you determine your own winners, including:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">How the MITRE ATT&amp;CK Round 2 Evaluation worked and what was (and wasn\u2019t) tested.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">How EDR vendors ranked on a number of different criteria, including number and quality of detections, correlations, usability and more.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">What each of the above criteria means for your company, and which other criteria may be important to consider when building a detectionand response program.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">How to use the free tools provided by MITRE to compare vendors head-to-head on specific attack techniques, helping to inform your next EDR (or XDR) investment.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Download your free copy of <\/span><a href=\"https:\/\/start.paloaltonetworks.com\/ultimate-guide-to-mitre-attack-2-EDR.html\"><span style=\"font-weight: 400;\">The Ultimate Guide to the MITRE ATT&amp;CK Round 2 Evaluation<\/span><\/a> <span style=\"font-weight: 400;\">today to see rankings of the top detection and response vendors, and learn how extended detection and response (XDR) capabilities can take your SecOps visibility and efficiency to the next level.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For security teams seeking to evaluate EDR and XDR vendors, we've put together The Ultimate Guide to the MITRE ATT&amp;CK Round 2 Evaluation. <\/p>\n","protected":false},"author":657,"featured_media":111998,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6770],"tags":[6737,606],"coauthors":[6810],"class_list":["post-113171","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-the-future","tag-cortex-xdr","tag-mitre","sec_ops_category-must-read-articles"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/05\/MTH-summit-facebook-blank-1200x630-1.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/113171","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/657"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=113171"}],"version-history":[{"count":8,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/113171\/revisions"}],"predecessor-version":[{"id":117066,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/113171\/revisions\/117066"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/111998"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=113171"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=113171"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=113171"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=113171"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}