One TM platform very successful in ATT & CK test

OneTM platform very successful in Miter ATT & CK test

Share post

Strict tests by MITER Engenuity ATT & CK® prove exceptional protection against cyber attacks. Trend Micro's new platform for detection and response proves its advantages in sophisticated simulations.

Trend Micro, one of the world's leading providers of IT security, scores extremely well in the latest ATT & CK evaluation by MITER Engenuity. The Trend Micro Vision OneTM platform quickly identified 96 percent of the attack steps in the simulation, which mimicked the behavior of two notorious advanced persistent threats (APT) groups.

Realistic attacks in the MITER test

In contrast to other test institutes that test products for their ability to identify and defend against various malware variants, the ATT & CK evaluations from MITER Engenuity assess the ability of a solution to detect targeted attacks using already known methods. This approach better reflects the particularly critical attacks that are actually taking place. In this year's simulations, MITER Engenuity focused on approaches associated with the well-known Carbanak and FIN7 threat groups.

"So far, the focus in the area of ​​security has been on the detection of the attack instruments used: MITER Engenuity adds another component to this, in that the behavioral patterns of an attacker are detected - regardless of the use of various tools," explains Richard Werner, Business Consultant at Trend Micro. “MITER ATT & CK is complex, just like the simulated attacks. Getting a good result on a third-party test like this one is very gratifying. With a transparency of 96 percent, we did very well here - especially with regard to the simulated techniques, which are used by two of the world's most capable threat groups. An even greater success is to show companies that ATT & CK not only focuses on the test, but that ATT & CK can be part of everyday security operations teams (SOCs). This is also reflected in our solutions. "

Typical APT tactics as a method of attack

This year's test included two simulated vulnerabilities, one in a hotel and the other in a bank. Typical APT tactics such as granting increased access authorizations, theft of access data, lateral movements and data exfiltration were used here.

Trend Micro Vision One achieved the following outstanding results:

  • An attack coverage of 96 percent, so that 167 of 174 simulated steps were transparent in the evaluations. This comprehensive transparency enables customers to get a clear picture of the attack and to react more quickly.
  • Detection of 100 percent of attacks on the Linux host, with 14 of 14 attack steps recorded. This is particularly relevant in view of the fact that the use of Linux is increasing rapidly in many companies.
  • 139 telemetry data sets were enriched by the Trend Micro Vision One platform to enable particularly efficient risk transparency for a better understanding and faster investigation of attacks. This is vital for SOC analysts.
  • 90 percent of the attack simulations were prevented at a very early point in time in every test thanks to automatic detection and response. The early defense against risks frees up resources for research in IT teams. This allows them to focus on solving more difficult security problems.

Trend Micro Vision One enables organizations to see more and act faster by collecting and automatically correlating telemetry data across email, endpoints, servers, cloud workloads, and networks. This speeds up detection and investigation.

The effectiveness against techniques used by two of the world's most sophisticated cybercrime groups proves the platform's value in detecting and countering threats and the ability to reduce cyber risks for customers.

MITER ATT & CK framework explains cyber attack techniques

The MITER ATT & CK framework supports the industry in defining and standardizing the description of cyber attack techniques and offers companies a common and regularly updated language to prioritize detection and response as efficiently as possible.

This year's excellent result in the ATT & CK evaluation of MITER Engenuity is the second in a row for Trend Micro, whose performance already impressed in the tests in 2020.

More at TrendMicro.com

 


About Trend Micro

As one of the world's leading providers of IT security, Trend Micro helps create a secure world for digital data exchange. With over 30 years of security expertise, global threat research, and constant innovation, Trend Micro offers protection for businesses, government agencies, and consumers. Thanks to our XGen™ security strategy, our solutions benefit from a cross-generational combination of defense techniques optimized for leading-edge environments. Networked threat information enables better and faster protection. Optimized for cloud workloads, endpoints, email, the IIoT and networks, our connected solutions provide centralized visibility across the entire enterprise for faster threat detection and response.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more