{"id":5604,"date":"2022-11-11T11:35:01","date_gmt":"2022-11-11T11:35:01","guid":{"rendered":"https:\/\/partnernews.sophos.com\/en-us\/?p=5604"},"modified":"2022-11-11T14:10:48","modified_gmt":"2022-11-11T14:10:48","slug":"sophos-mdr-results-from-the-first-mitre-engenuity-attck-evaluation-for-security-service-providers","status":"publish","type":"post","link":"https:\/\/partnernews.sophos.com\/it-it\/2022\/11\/resources\/sophos-mdr-results-from-the-first-mitre-engenuity-attck-evaluation-for-security-service-providers\/","title":{"rendered":"Sophos MDR: Results from the first MITRE Engenuity ATT&#038;CK Evaluation for Security Service Providers"},"content":{"rendered":"<p>On November 9, 2022,\u00a0<a href=\"https:\/\/mitre-engenuity.org\/\" target=\"_blank\" rel=\"noopener\">MITRE Engenuity<\/a>\u2122 released the results from their first-ever ATT&amp;CK\u00ae Evaluation for Security Services Providers. The evaluations highlighted results across 15 security services providers, assessing their capabilities in detecting, analyzing, and describing adversary behavior.<\/p>\n<p><a href=\"https:\/\/www.sophos.com\/en-us\/products\/managed-detection-and-response\" target=\"_blank\" rel=\"noopener\">Sophos Managed Detection and Response<\/a>\u00a0(MDR) successfully reported malicious activity across all 10 MITRE ATT&amp;CK\u00ae steps, excelling in its ability to detect and respond to sophisticated threat actors with speed and precision.<\/p>\n<h2>Why MITRE Engenuity introduced an ATT&amp;CK Evaluation for managed services<\/h2>\n<p>For nearly 5 years, MITRE Engenuity has conducted independent evaluations of cybersecurity products using an open methodology based on the ATT&amp;CK knowledge base. These evaluations are predicated on real-world attack emulations that simulate the tactics, techniques, and procedures (TTPs) of relevant advanced persistent threats (APTs) and task vendor participants with demonstrating their ability to detect, analyze, and describe those activities.<\/p>\n<p>The primary objective of ATT&amp;CK Evaluations is to help cybersecurity solution providers\u2014and the organizations they support\u2014make better decisions to combat cyberthreats and improve threat detection capabilities. However,\u00a0<a href=\"https:\/\/info.mitre-engenuity.org\/hubfs\/ATTACK%20Evals\/2021%20Managed%20Services%20Report.pdf\" target=\"_blank\" rel=\"noopener\">MITRE survey results<\/a>\u00a0have shown that it\u2019s challenges related to\u00a0<i>people<\/i>\u00a0(training and hiring), not cybersecurity products and technology, that are the main limitation preventing organizations from advancing their security operations programs.<\/p>\n<p>In its survey of more than 400,000 information security professionals worldwide, MITRE Engenuity found that 58% of organizations rely on managed services to either complement their in-house security operations center (SOC), or serve as their main line of defense. This number was even higher (68%) when considering companies under 5,000 employees. At the same time, roughly half of these organizations reported a lack of confidence in their managed service\u2019s people or technology.<\/p>\n<p>In response to the rapid adoption of managed services and associated cybersecurity challenges, MITRE Engenuity developed and administered a new evaluation methodology that allows end users to better understand how security services like Sophos MDR address adversary behavior.<\/p>\n<h2>What is OilRig?<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-87927\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/11\/b7d61f78-b127-4854-8ec6-26702ff43367.png?w=290\" sizes=\"auto, (max-width: 290px) 100vw, 290px\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/11\/b7d61f78-b127-4854-8ec6-26702ff43367.png 748w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/11\/b7d61f78-b127-4854-8ec6-26702ff43367.png?resize=290,300 290w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/11\/b7d61f78-b127-4854-8ec6-26702ff43367.png?resize=32,32 32w\" alt=\"\" width=\"290\" height=\"300\" \/>The MITRE Engenuity ATT&amp;CK Evaluation for Security Service Providers evaluated Sophos MDR and other vendors\u2019 abilities to detect and analyze attack tactics and techniques simulating those used by\u00a0<a href=\"https:\/\/attack.mitre.org\/groups\/G0049\/\" target=\"_blank\" rel=\"noopener\">OilRig,<\/a>\u00a0an Iranian government-affiliated threat actor \u2013 also known as APT34 and Helix Kitten.<\/p>\n<p>OilRig has conducted operations relying on social engineering, stolen credentials, and supply chain attacks, resulting in the theft of sensitive data from critical infrastructure, financial services, government, military, and telecommunications.<\/p>\n<p>This threat actor was selected for use in the MITRE ATT&amp;CK Evaluation for Security Service Providers based on its evasion and persistence techniques, its complexity, and its relevancy to industry.<\/p>\n<p>Unlike MITRE Engenuity\u2019s ATT&amp;CK Evaluations for Enterprise, which follow an open book methodology where participating vendors know in advance the adversary being emulated, the MITRE Engenuity\u2019s Security Services evaluation did not disclose the adversary group or the technique scope.<\/p>\n<h2>How did Sophos MDR perform in the MITRE Engenuity ATT&amp;CK Evaluation for Security Service Providers?<\/h2>\n<p>Sophos Managed Detection and Response (MDR) successfully reported malicious activity across all 10 MITRE ATT&amp;CK steps, excelling in its ability to detect and respond to sophisticated threat actors with speed and precision. This was a detection-only evaluation, meaning that MITRE Engenuity did not evaluate vendors\u2019 ability to execute threat response actions.<\/p>\n<p>It is important to note that ATT&amp;CK Evaluations are not competitive analyses and do not designate a \u201cwinner.\u201d And while there is no singular way for analyzing, ranking, or rating the participating vendors, Sophos MDR recorded an exceptional performance with results that validate our position as one of the top performing security services vendors in the market. This report is a great addition to your sales toolkit when discussing MDR opportunities with customers and prospects.<\/p>\n<p>For more details about the evaluations and their results, visit\u00a0<a href=\"https:\/\/attackevals.mitre-engenuity.org\/managed-services\/managed-services\" target=\"_blank\" rel=\"noopener\">https:\/\/attackevals.mitre-engenuity.org\/managed-services\/managed-services<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sophos MDR recorded an exceptional performance with results that validate our position as one of the top performing security services vendors in the market. <\/p>\n","protected":false},"author":11,"featured_media":3000005274,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[72],"tags":[174,183,184,175,112],"coauthors":[182],"class_list":["post-5604","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-resources","tag-managed-detection-and-response-mdr","tag-mitre","tag-mitre-attck","tag-security-operations-sec-ops","tag-third-party-reviews"],"jetpack_featured_media_url":"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2022\/08\/featured-image-sophos-mdr-and-marque-app-icon-1600x960px.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/partnernews.sophos.com\/it-it\/wp-json\/wp\/v2\/posts\/5604","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/partnernews.sophos.com\/it-it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/partnernews.sophos.com\/it-it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/it-it\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/it-it\/wp-json\/wp\/v2\/comments?post=5604"}],"version-history":[{"count":1,"href":"https:\/\/partnernews.sophos.com\/it-it\/wp-json\/wp\/v2\/posts\/5604\/revisions"}],"predecessor-version":[{"id":5607,"href":"https:\/\/partnernews.sophos.com\/it-it\/wp-json\/wp\/v2\/posts\/5604\/revisions\/5607"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/it-it\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/partnernews.sophos.com\/it-it\/wp-json\/wp\/v2\/media?parent=5604"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/it-it\/wp-json\/wp\/v2\/categories?post=5604"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/it-it\/wp-json\/wp\/v2\/tags?post=5604"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/it-it\/wp-json\/wp\/v2\/coauthors?post=5604"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}