Subscribe to Email Updates

Subscribe

mitre-banner

MITRE ATT&CK Evaluation - Bitdefender a Stellar EDR Vendor For Midsized Organizations & MSPs

By Andra Cazacu on Apr 30, 2020 | 0 Comments

Apr 21st saw much anticipated release of the MITRE ATT&CK® Evaluation framework. With many vendors claiming success in MITRE ATT&CK latest Evaluation results, it may be difficult to read between the noise and discover which solution makes most sense for your organization.

While we at Bitdefender also provide focused competitive charts, we also include full competition views, showcasing the superiority of our technologies across the entire vendor landscape, in tests that we considered representative to our market segments.

In the latest ATT&CK Evaluation, Bitdefender shined at actionable detections & alerts across every steps of the entire attack chain, confirming its top fit for resource and skill constrained midsized organizations that are eager to extend their EDR capabilities but are concerned about the complexity of these solutions.

If you are looking to consider Bitdefender as an EDR vendor based on ATT&CK, here are some key categories from ATT&CK which best match the needs for this type of organizations and how Bitdefender stacks up against each of them.

Gain The Most Complete And Meaningful Coverage of the Attack Chain 

The best place to start in evaluating ATT&CK results for any company is how well a vendor covered the 19-step attack chain, from initial compromise to final privilege escalation.  

ATT&CK results show unequivocally how Bitdefender achieved maximum coverage in the entire attack chain, after not missing a single step. Aside from breadth of coverage, Bitdefender is also surfacing multiple detections in each step for techniques, tactics and general -- the most relevant categories for mid-sized organizations and MSPs who are often resource, skills and time-constraint and are looking for the most accurate processed EDR data, not just telemetry. 

The chart below displays a stripped-down view of our core competition in these markets. You can also preview here a full chart against all participant vendors.

Mittre Attack coverage for mid-sized organisation & MSPs. Evaluation resuts chart: Bitdefender (100%) , SentinelOne(95%), Crowdsrtrike(89%), Symantec (74%), McAfee & Microsoft (68%), Kaspersky (53%)

Why focus on GeneralTactic and Techniques? According to MITRE’s definitions, the final 3 detection categories are the most contextual ones. While Telemetry requires internal security expertise that will search through historical dataand MSSP are indicators provided by external managed detection and response services, the final three categories are those than provide most intuitive detection delivered directly by the product, for internal security operating teams.

For example, while a telemetry detection would look tell you at a command line output that a certain command was run by a workstation by a given username, a technique detection would tell you that a process tried to perform an unauthorized lateral movement (in Bitdefender’s case, as part of a visually rich representation).

Watch "Discover how to interpret MITRE ATTACK Evaluation course" with Bitdefender's Director if Cyber Threat Intelligence

Increase Chances of Pinpointing Sophisticated Attacks. Receive The Most Contextual Detections Across The Entire Attack Chain 

Bitdefender not only covers all attack chain steps with high-quality detection categoriesbut it also provides high number of techniques, tactics and general detections across the entire key chain.

Bitdefender was able to produce a total of 97 detections across the entire 19 attack steps. Since these numbers are also focused on the top 3 most context-rich detections according to MITRE, organizations that are looking for breadth of visibility will receive from Bitdefender the indicators of suspicious activities across the entire attack chain.

This confirms that security admins will have the best chances of spotting suspicious activities indicating a sophisticated undergoing attack, as well as multiple chances to immediately pinpoint and stop the attack chain before information is exfiltrated.

These scores can be obtained easily just by deselecting first three categories from the MITRE ATT&CK representation. It will showcase how each vendor does in providing meaningful detections across every step an attack takes, from the initial compromise all the way the exfiltration and covering traces. The greener the data representation is, the more insightful it becomes for a security team.

Bitdefender Overview by MITRE ATTACK Evaluation (General, Tactic, Technique evaluation results graphic)

Screenshot from MITRE ATT&CK Evaluation of APT29 showcasing Bitdefender detects every step of the entire attack with meaningful detections, excluding raw categories (telemetry and MSSP) and none. 

Note: Clean Up step presented in the chart is no longer taken into account by MITRE

 

Actual MITRE definitions from their website: 

Telemetry. Minimally processed data collected by the capability showing that event(s) occurred specific to the behavior under test. (i.e. showing the procedure/command that was executed). 

Techniques. Processed data specifying ATT&CK Technique or equivalent level of enrichment to the data collected by the capability.  

Full definitions can be accessed here.

The chart below displays a stripped-down view of our core competition for the contextual attack detections produced. You can also preview here a full chart against all participant vendors

MITRE ATTACK Evaluation - Top Contextual Attack Detections for Mid-sized Organisations and MSPs scores: Bitdefender-97, Sentinel One-65, Trend Micro-60,Symantec-56, Crowdstrike-47, Microsoft-36, McAfee-35, Kaspersky-28

The Most Actionable EDR on The Market. The Highest Number Of Attack Technique Detections of Any Vendor  

Equally relevant to the breadth of Bitdefender’s detection across the entire attack chain is its clear focus to prioritizing attack techniques to every other detection type, a key element in helping organizations of any size to correctly decipher malicious activities of highly versed attackers. 

mitre-attack-evaluation-fig4

The MITRE’s website snapshot not only indicates Bitdefender will trigger relevant and fully contextualized detections in every step of the attack chain, but also provide most in the form of attack techniques, the easiest-to-interpret and most actionable EDR detections for resource and skill-constrained security teams.

Bitdefender dominates MITRE ATT&CK Evaluation charts with the 68 techniques alertsand a staggering 15 distance from the next in line competitor (FireEye), and an even larger difference to other core competitors.

The chart below displays a stripped-down view of our core competition for attack techniques. You can also preview here a full chart against all participant vendors

mitre-attack-evaluation-fig5

To get a sense of the value in providing detection as attack technique and the richness of context for smaller security teams, below are several examples from Bitdefender’s console, showcasing both how our detections are mapped against MITRE ATT&CK framework, as well as the breadth of detailed information provided in the detection tab.

The first case showcases step of the APT29 attack chain, with the console clearly specifying Powershell is attempting a lateral movement.

Mitre Attack Evaluation - Bitdefender GravityZone console - attack techniques detection maping view

Mitre Attack evaluation - Bitdefender GravityZone console  - detailed information over the MITRE ATTACK framework screenshot.

Another good example to showcase is that of the initial collection and exfiltration by APT29 of the attack data (step 7, sub-step 7.B.4 – technique result T1048). As seen in the screenshot below, Bitdefender captured as an attack technique and announced in the admin that a compressed file was transferred over the network’, providing a clear and actionable alert, together with a full list of markers for further investigations.

Mitre Attack Evaluation shwcase - Bitdefender GravityZone console view - the initial collectiona nd exfiliation by APT29

Both examples showcase the breadth of Bitdefender’s detections across various stages of the APT attack chain, including relevant and fully contextualized alerts, and a powerful ratio of attack techniques.

MITRE ATT&CK Evaluation Is A More Complex Tool For Practitioners. Other Evaluations Speak For Themselves

MITRE is not meant to be a pinpoint winners or rank vendors against each other, but to be a powerful tool for security practitioners looking to pinpoint the best EDR solution for their teams. But there are other independent testing organisations focused on decision makers, which also provide high level analysis of their results and pinpoint vendors.

Through the successful completion of the ATT&CK evaluation testing and excellent results in identifying and alerting across the entire attack chain , Bitdefender has once confirmed its strong EDR offering,  following up on the excellent results in Forrester Wave for EDR (March 2020) where is was nominated ‘the biggest EDR vendor you haven’t considered but should have’.  

Bitdefender is also an NSS Labs A+ Recommended Vendor (February 2020), winner of AV-Test Best Protection Award (February 2020) and a 100% scored vendor in AV-Comparatives first testing against advanced attacks (December 2019).

If you are looking to secure your infrastructure, get a free, 90-day full product evaluation for GravityZone Ultra Plus, a unique, limited-time offer in the market. 

 If you are a service provider, get a free full-featured trial of the multitenant security suite, Bitdefender Cloud Security for MSP. 

Bitdefender is a technology provider of choice, with 38% of cybersecurity vendors worldwide using one or more Bitdefender technologies. To maintain the high quality and accuracy of its detection, Bitdefender remains committed to developing technologies in house, and to maintaining over 50% of its workforce in R&D teams. 

Why Is Every Competitor Claiming Success with MITRE? 

MITRE ATT&CK Evaluation consists of very rigorous vendor scoring, but it does not nominate winners or even create vendor ranking.

Learn how to navigate success claims from different security vendors and how to use MITRE ATT&CKs against your organization’s profile, according to MITRE’s guidelines and definitions in their APT29 Evaluation.

Share This Post On

Author: Andra Cazacu

Andra Cazacu, PMC Level III Certified, AltMBA Alumni, is leading the enterprise integrated solutions team at Bitdefender. As a senior security expert with a mix background of technology and product marketing, her focus for the past 10 years has been to explore how companies anticipate and prevent breaches, through the adoption emerging technologies, key partnerships between security and virtualization providers, as well as public and private sector collaborations. She is happiest when uncovering new and existing use cases for machine learning and other technologies designed to hold cyber criminals at bay so she can contribute to making the corporate world a safer place.