Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

MITRE ATT&CK Evaluation Showcases SentinelOne Leading in EDR Performance

Singularity Provides Unprecedented Actionable Threat Coverage and Context, While Decreasing Time and Skill Level to Simplify Cyber Defense

SentinelOnethe autonomous cybersecurity platform company, released its results from the MITRE ATT&CK APT29 report. Out of the 29 endpoint vendors evaluated, SentinelOne was the product-driven EDR performance leader with the lowest number of missed detections — showcasing the company’s success in defeating every attack, at every second across all major enterprise attack surfaces by empowering security team efficiency with unprecedented actionable threat context and visibility. To learn more about SentinelOne’s performance in MITRE ATT&CK APT29, join the webinar held on Wednesday, April 29 at 9AM PDT.

MITRE ATT&CK Evaluation Showcases SentinelOne Leading in EDR Performance

SentinelOne Singularity was evaluated on its ability to detect attack techniques deployed by APT29, a threat group that has been attributed to the Russian government. By integrating the MITRE framework with its ActiveEDR, Singularity eliminates the traditional and manual work required by analysts to correlate and investigate their findings. Automatically, security personnel can discover where an attack is coming from, what the attack is attempting to compromise, and actionable insight into how to fix it — autonomously preventing and remediating the threat without human intervention.

Recommended AI News: HBO Max Available to Millions of AT&T Customers on May 27

Key outcome related results from the MITRE evaluation include:

  • SentinelOne achieved the highest number of combined high-quality detections and the highest number of automated correlations. Analysts are drowning in data, and simply aren’t able to keep up with sophisticated attack vectors. Singularity helps turn data into stories, so analysts can focus on the alerts that matter most.
  • SentinelOne grouped all data over the 3-day MITRE test into a mere 11 console alerts, with each alert containing all the details within. Fewer alerts in the management console are better than more alerts, and Singularity successfully grouped together relevant related data, context, and correlation, making it easier for analysts to understand and act.
  • SentinelOne had the highest number of tool-only detections and the highest number of human/MDR detections. High scores in both these areas showcase that Singularity can detect threats without the support of additional tools and proves Vigilance Managed Detection and Response (MDR) provides a world-class SOC service on top of a world-class product.

Recommended AI News: Arista Delivers Cognitive WiFi for Collaboration, Video and Chat Applications

“Today’s EDR platforms must be able to consume and correlate data at scale or they will fail,” said Chris Bates, CISO, SentinelOne. “CISO’s don’t want or need more data — they want context and intelligence to make existing data actionable and meaningful within the MITRE framework. Singularity’s performance in the APT29 report delivers on our promise of unrivaled product innovation, offering a comprehensive view of the entire enterprise to help organizations defend against every attack, at every stage in the threat lifecycle, through a singular autonomous platform.”

SentinelOne was one the first endpoint companies to correlate alerts in product with the MITRE ATT&CK framework, embrace the MITRE ATT&CK Endpoint Protection Product Evaluation, and incorporate the MITRE ATT&CK framework as the new threat hunting standard, demonstrating the company’s leadership in providing immediate and enriched threat context and visibility within the MITRE framework.

Related Posts
1 of 40,645

Comments are closed, but trackbacks and pingbacks are open.