Blogs

Sophos excels in the 2024 MITRE ATT&CK®

Sophos excels in the 2024 MITRE ATT&CK® Evaluations: Enterprise

Results from the latest ATT&CK Evaluations for endpoint detection and response solutions.  -Written by Paul Murray

  • Spoiler alert! Sophos has once again achieved exceptional results in the latest 2024 MITRE ATT&CK Evaluations for Enterprise. In this round, Sophos XDR achieved:
  • The highest possible (‘Technique’) ratings for  100%of adversary activities in the Windows and Linux ransomware attack scenarios
  • The highest possible (‘Technique’) ratings for 78 out of 80total adversary activities across all three comprehensive scenarios
  • ‘Analytic coverage’ ratings for 79 out of 80total adversary activities activities

What are MITRE ATT&CK® Evaluations?

MITRE ATT&CK® Evaluations are among the world’s most respected independent security tests. They emulate the tactics, techniques, and procedures (TTPs) leveraged by real-world adversarial groups and evaluate each participating vendor’s ability to detect, analyze, and describe threats, with output aligned to the language and structure of the MITRE ATT&CK® Framework.

There is no singular way to interpret the results of ATT&CK Evaluations, and they are not intended to be competitive analyses. The results show what the evaluation observed and do not result in a “winner” or “leader” – despite what some vendors might like you to think!

There is nuance in the ways each vendor’s tool works and how it presents information to the analyst using it, and your individual needs and preferences play a vital role in determining which solution is best for you and your team. Learn about Sophos Extended Detection and Response (XDR)

How did Sophos perform in this evaluation?

Throughout the evaluation, MITRE executed three discrete attack scenarios (DPRK, CL0P, and LockBit), comprising a total of 16 steps and 80 sub-steps.

Sophos XDR delivered impressive results, achieving:

  • The highest possible (‘Technique’) ratings for  100%of adversary activities in the Windows and Linux ransomware attack scenarios
  • The highest possible (‘Technique’) ratings for 78 out of 80total adversary activities across all three comprehensive scenarios
  • ‘Analytic coverage’ ratings for 79 out of 80total adversary activities activities

Recent Posts

Why data modeling is a MUST for your Oracle to Snowflake migration

Database migrations can feel like a gamble. And with any high-stakes, enterprise-level bet,making the wrong move comes with serious consequences. Costs, credibility, compliance, customer trust and competitive advantage are all on the line. Would you place a bet blindfolded? Probably

Read More >

Active Directory backup strategies you need today

Active Directory backup has been an important topic for a long time. Today however, with identity-based attacks on the rise and AI empowering a broader base of threat actors, several aspects of the process have taken on new urgency. This

Read More >

Talk to Us

Contact us using the information below. We’ll respond promptly to your inquiries and feedback
email

Schedule

8:00am - 5:00pm, Monday - Friday

				
					/* 

Copy this code on section to modify colors of icons, submit button, hovers 
depends on the webpage theme.

Note: Keep visibility disabled, Do not Edit this

*/

/*Contact Content Icons & Text*/
.contact-iconbox .elementor-icon {
    color: pink;
    fill: pink;
}
.contact-iconbox .elementor-icon:hover{
    color: violet;
     fill:violet ;
}
.contact-iconbox p a, .contact-iconbox p{
    color: pink !important;
}
.contact-iconbox p a:hover, .contact-iconbox p:hover{
    color: violet !important;
}

/*Contact Form*/
.contact-form .elementor-widget-container{
    background:red !important;
}
.contact-form label{
    color: blue;
}
.contact-form .wpforms-submit-container button{
    border-color: pink !important;
    background: pink !important;
}
.contact-form .wpforms-submit-container button:hover{
    background: violet !important;
    border-color: violet !important;
}