Palo Alto Networks

CORTEX XDR See the 2020 MITREATT&CK Results

Cortex XDR is the future of EDR

Download the guide Watch the webinar

Get insight into how the top EDR vendors performed

The MITRE ATT&CK Evaluations provide an objective view into how leading vendors measure up against advanced attacks. For two years in a row, Cortex XDR™ has delivered unsurpassed detection against real-world attack scenarios.

These tests prove that Cortex XDR can deliver your security team:

  • The best overall visibility into attack techniques
  • Accurate, highly correlated detections that accelerate investigations
  • A leading combination of human and AI-delivered detection
Get the guide

Key Takeaways

The best coverage

No vendor detected more attack behaviors than Cortex XDR in either the APT-3 or the APT-29 MITRE ATT&CK evaluations. Cortex XDR detected 88.9% of APT-3 attack techniques and 90% of APT-29 attack techniques.

MITRE ATT&CK evaluations
  • APT 29
  • APT 3
APT 3: Realtime specific alerts and enriched telemetry data
  • Enrichment
  • Realtime specific alerts

Key Takeaways

High-quality detection

Your team needs speed, accuracy and confidence in your investigations. Cortex XDR delivers rich detections with specific information about the tactics and techniques being used.

Speed and flexibility

All Cortex XDR users benefit from superior automated, real-time product detections – but now, your security team can choose to have additional support delivered by the Cortex XDR Managed Threat Hunting service, a leader in the MITRE APT-29 test.

Coverage across the attack lifecycle

Attackers take a series of steps to accomplish their goals, from gaining initial access to exfiltrating data.
Cortex XDR generated detections in every single attack phase across all of MITRE’s attack testing scenarios.

Cortex XDR Detections in the MITRE APT3 Evaluation

DETECTION TYPES
  • ALERTS
  • ENRICHMENT
  • TELEMETRY
cortex xdr detection in the mitre apt3 evaluation cortex xdr detection mobile view

Learn more about the MITRE results and what they mean

Attackers take a series of steps to accomplish their goals, from gaining initial access to exfiltrating data. Cortex XDR generated detections in every single attack phase across all of MITRE’s attack testing scenarios.

Read Round 1 guide

How to Pick a Winner in EDR

  • Read round 1 guide
Read Round 2 guide

The Ultimate Guide to the MITRE ATT&CK Round 2 EDR Evaluation

  • Read round 2 guide
 test results

See more test results, analyst perspectives and customer reviews

  • Learn more

Get your copy now!

By submitting this form, you agree to our Terms. View our Privacy Statement.
round1 mitre guide 1 round1 mitre guide 2

Your guide is ready for download!

We hope you find this guide insightful as you work towards your EDR evaluation.

Download the guide
demo center

Demo Center

If you enjoy this content, check out our Demo Center.

Webinar

Webinar

We have more than 600 recorded webinars you can view at your leisure.

expert overview

Our experts are standing by

If you want a report, video, white paper or something else, we have it.

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Products A-Z
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Customers
  • Careers
  • Contact Us
  • Manage Email Preferences
  • Newsroom
  • Product Certifications
Report a Vulnerability
Create an account or login

Copyright © 2023 Palo Alto Networks. All rights reserved