{"id":99048,"date":"2019-05-29T11:40:58","date_gmt":"2019-05-29T18:40:58","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=99048"},"modified":"2020-03-11T13:35:36","modified_gmt":"2020-03-11T20:35:36","slug":"xdr-cortex-xdr-sets-standard-mitres-attck-evaluations","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2019\/05\/xdr-cortex-xdr-sets-standard-mitres-attck-evaluations\/","title":{"rendered":"Cortex XDR and Traps Outperform in MITRE Evaluation"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">We are pleased to announce <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/cortex\/cortex-xdr\/mitre\"><span style=\"font-weight: 400;\">the results<\/span><\/a><span style=\"font-weight: 400;\"> of an independent test that demonstrate the value of our recently launched Cortex XDR product in combination with Traps. The evaluation, which used the MITRE ATT&amp;CK framework, shows that Cortex XDR and Traps provide the broadest coverage with fewest missed attack techniques among 10 Endpoint Detection-and-Response (EDR) vendors. <\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>Broadest Coverage Across Attack Techniques<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Cortex XDR and Traps provide the best endpoint visibility and the highest coverage across different attack techniques, according to the MITRE <\/span><span style=\"font-weight: 400;\">ATT&amp;CK results<\/span><span style=\"font-weight: 400;\">. Coverage puts emphasis on the ability to gather telemetry across 136 attack techniques, generate real time alerts and provide enrichment for threats. The test results show that Cortex XDR and Traps provide coverage for 121 of the 136 techniques, more than any other vendor.<\/span><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Coverage_for_Lee.png\"><div style=\"max-width:100%\" data-width=\"1572\"><span class=\"ar-custom\" style=\"padding-bottom:66.22%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone wp-image-99293 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Coverage_for_Lee.png\" alt=\"\" width=\"1572\" height=\"1041\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Coverage_for_Lee.png 1572w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Coverage_for_Lee-230x152.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Coverage_for_Lee-768x509.png 768w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Coverage_for_Lee-500x331.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Coverage_for_Lee-453x300.png 453w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Coverage_for_Lee-60x40.png 60w\" sizes=\"auto, (max-width: 1572px) 100vw, 1572px\" \/><\/span><\/div><\/a><\/p>\n<p><i><span style=\"font-weight: 400;\">This chart was created by Palo Alto Networks to quantify vendor efficacy with the MITRE ATT&amp;CK evaluation. <\/span><\/i><\/p>\n<p>&nbsp;<\/p>\n<p><b>Automated Detection Reduces Missed Attacks<\/b><\/p>\n<p><span style=\"font-weight: 400;\">When it comes to threat detection, we strive to automate the process because relying on humans for detection can yield inconsistent or delayed detections. The MITRE testing validates this approach. Cortex XDR and Traps had the best detection coverage with zero delayed detections compared to other vendors who relied on a human process. The highly automated AI approach provided more coverage and more consistency with no delays.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Misses_for_Lee.png\"><div style=\"max-width:100%\" data-width=\"1695\"><span class=\"ar-custom\" style=\"padding-bottom:55.63%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone wp-image-99306 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Misses_for_Lee.png\" alt=\"\" width=\"1695\" height=\"943\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Misses_for_Lee.png 1695w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Misses_for_Lee-230x128.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Misses_for_Lee-768x427.png 768w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Misses_for_Lee-500x278.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Misses_for_Lee-510x284.png 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Misses_for_Lee-72x40.png 72w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Misses_for_Lee-539x300.png 539w\" sizes=\"auto, (max-width: 1695px) 100vw, 1695px\" \/><\/span><\/div><\/a><\/p>\n<p><i><span style=\"font-weight: 400;\">This chart was created by Palo Alto Networks for quantifying vendor efficacy with the MITRE ATT&amp;CK evaluation. <\/span><\/i><\/p>\n<p>&nbsp;<\/p>\n<p><b>About Cortex XDR<\/b><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/company\/press\/2019\/palo-alto-networks-introduces-cortex-the-industrys-only-open-and-integrated-ai-based-continuous-security-platform\"><span style=\"font-weight: 400;\">Cortex XDR<\/span><\/a><span style=\"font-weight: 400;\"> is the first detection and response product that natively integrates<\/span><span style=\"font-weight: 400;\"> network, endpoint and cloud data to stop sophisticated attacks. <\/span><span style=\"font-weight: 400;\">This helps organizations reduce the mean time to detect and respond to attacks. MITRE specifically tested endpoint-only capabilities in a version of the product with no additional managed services. Palo Alto Networks worked with MITRE Corp, a non-profit that developed the widely used ATT&amp;CK framework for evaluating detection and response products.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">MITRE's ATT&amp;CK framework provides an extensive list of capabilities and techniques that attackers have used in various real-world attacks. Organizations can use this framework to evaluate the efficacy and efficiency of their security controls. Their first-round evaluation reproduced the attack vectors of the <\/span><a href=\"https:\/\/attack.mitre.org\/groups\/G0022\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">APT3 group<\/span><\/a><span style=\"font-weight: 400;\">. MITRE releases raw results, but does not score, rank or produce quantitative analysis of the results. Forrester Research created a set of scripts to help score the results, which we have used to illustrate how Cortex XDR ranks under coverage, missed techniques and alerts. For more information on Forrester\u2019s methodology, visit the Forrester blog <\/span><a href=\"https:\/\/go.forrester.com\/blogs\/measuring-vendor-efficacy-using-the-MITRE-attck-evaluation\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">here<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>Conclusion<\/b><\/p>\n<p><span style=\"font-weight: 400;\">MITRE has developed an excellent framework that helps security operations team evaluate vendor products across the full breadth of detections and investigations. Based on the latest test results, we encourage customers who are evaluating an EDR project to reach out to Palo Alto networks to understand the MITRE framework, the techniques used in the testing, and how to interpret the results. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Customers face a challenge in their ability to detect threats when they have unmanaged devices or devices where they cannot install an endpoint agent. It is important to complement the endpoint data with network data so customers can expand coverage against threats across their entire digital domain. Cortex XDR and Traps deliver on this vision. We plan to engage MITRE in a second round of evaluations to include data collected beyond just endpoints.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To learn more about Cortex XDR and Traps, please visit the <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/products\/xdr\"><span style=\"font-weight: 400;\">Cortex XDR product page<\/span><\/a><span style=\"font-weight: 400;\"> and the <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/traps\"><span style=\"font-weight: 400;\">Traps product page<\/span><\/a><span style=\"font-weight: 400;\">. The full results of all participating vendors, including Palo Alto Networks, can be found <\/span><a href=\"https:\/\/attackevals.mitre.org\/evaluations.html\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">here<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We are pleased to announce the results of an independent test that demonstrate the value of our recently launched Cortex XDR product in combination with Traps. The evaluation, which used the MITRE &hellip;<\/p>\n","protected":false},"author":645,"featured_media":99171,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6770],"tags":[6737,5810,6789],"coauthors":[6788,6734],"class_list":["post-99048","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-the-future","tag-cortex-xdr","tag-endpoint-detection-and-response","tag-mitre-attck-evaluation"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/cortex-xdr-blogimage-no-date-600x350.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/99048","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/645"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=99048"}],"version-history":[{"count":12,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/99048\/revisions"}],"predecessor-version":[{"id":107547,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/99048\/revisions\/107547"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/99171"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=99048"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=99048"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=99048"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=99048"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}