100% of Sophos XDR detections for adversary activities targeting Windows and Linux devices provide rich analytic coverage and achieve the highest possible ratings
Sophos earns strong results in the 2024 MITRE ATT&CK Evaluations: Enterprise. Sophos XDR detected 100% of the adversary behaviors in attack scenarios targeting Windows and Linux platforms, mimicking malware strains from ruthless ransomware-as-a-service gangs LockBit and CL0P. Further, all of Sophos’ responses to these ransomware attack scenarios were marked “technique” – the highest possible rating that denotes who, what, when, where, why and how attacks were carried out.
Simon Reed, chief research and scientific officer at Sophos. “Sophos is committed to transparency and conducting third party measurement to help security buyers make informed decisions to strengthen their security posture.”
Sophos XDR achieved:
- ‘Analytic coverage’ ratings for 99% of sub-steps (79 out of 80) across three comprehensive attack scenarios
- Highest possible (‘Technique’) ratings for 98% of sub-steps (78 out of 80)
- Highest possible (‘Technique’) ratings for 100% of sub-steps in the Windows and Linux ransomware attack scenarios
“Attackers are relentless to innovate techniques to bypass trusted security defenses. This assessment from MITRE helps security buyers evaluate the effectiveness against today’s threats,” said Simon Reed, chief research and scientific officer at Sophos. “Sophos is committed to transparency and conducting third party measurement to help security buyers make informed decisions to strengthen their security posture. We’re proud of Sophos XDR’s ongoing excellence both in industry testing and real-world frontline defenses. We’re consistently evolving our solutions, just like attackers are constantly evolving their tactics, so our customers can stop known and unknown threats before they escalate into destructive attacks.”