Providing Higher Confidence Detections
In this year’s simulations, MITRE Engenuity focused on the tactics, techniques, and procedures (TTPs) of Turla. This Russian advanced persistent threat (APT) group is known for its sophisticated malware and ability to evade detection for long periods of time.
Our Trend Vision One™ platform was tested against simulated breaches inspired by their real-world attacks, ensuring customers have meaningful visibility to react and respond to today’s threats.
Trend Micro Vision One™ extended detection and response solution was tested against simulated breaches inspired by real-world attacks to ensure customers can appropriately visualize and address today’s threats.
Section 1 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Trend Vision One recorded the following impressive results:
100%
detection of all critical attack steps in the evaluation - ensuring visibility was never in doubt
Achieved #1
in the protection category - limiting noise and alert fatigue and keeping analysts focused
Ranked #1
in the protection category – ensuring that attacks are prevented early in the attack lifecycle.
100%
(#1 performer)
of attacks against the Linux host detected and prevented, capturing attacker steps and preventing a simulated attack – especially important considering Linux is the most used OS in cloud-native applications.
MITRE ATT&CK EVALUATIONS – Turla
Section 3 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
This year's strong performance in MITRE Engenuity ATT&CK Evaluations is the fourth in a row for Trend.
With over 146 billion threats blocked in 2022 - a staggering 55% increase from 2021 - greater risk visibility is crucial to proactively stop even the most advanced attacks.
Trend Vision One allows you to quickly see the story of an attack and respond faster and more confidently. Automatically correlating threat data from different areas of the endpoint, server, cloud workload, and network provides better alerts to your security teams.
Section 5 - Column 2. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Section 5 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Section 5 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Have security questions or want to learn more?
Section 6 - Column 2. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Section 6 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Section 6 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.