Kaspersky in MITRE ATT&CK;®
ROUND 2 (APT29) EVALUATION RESULTS
MITRE ATT&CK;® is an open knowledge database where attackers' arsenals and behaviors are collected and categorized by MITRE researchers, based on multiple real-world studies and threat reports. ATT&CK; is a valuable framework for organizations seeking a better understanding of specific threats they may face. Since 2018, MITRE has been evaluating cybersecurity products, based on the ATT&CK; framework. In these evaluations, researchers emulate known adversary behaviors to reveal how each product detects the different steps of a targeted attack. There are no scores, rankings, or ratings in this evaluation. Instead, MITRE shows how each vendor approaches threat defense within the context of ATT&CK;, so any organization can see the true capabilities of a security product in addressing its individual concerns. In 2019, Kaspersky took part in MITRE ATT&CK; Evaluation Round 2: our security products were tested against attack techniques of the APT29 threat group. Here you'll find the evaluation results and important comparative metrics, together with our views on MITRE methodologies.
![](https://webcf.waybackmachine.org/web/20221028184300im_/https://content.kaspersky-labs.com/se/com/content/en-global/images/enterprise/products/evaluation--results/evaluation--results.png)
![](https://webcf.waybackmachine.org/web/20221028184300im_/https://www.kaspersky.com/content/en-global/images/enterprise/case-studies/mitre_round_2_evaluation_results.png)
![](https://webcf.waybackmachine.org/web/20221028184300im_/https://www.kaspersky.com/content/en-global/images/enterprise/case-studies/mitre-compare-banner.png)
![](https://webcf.waybackmachine.org/web/20221028184300im_/https://www.kaspersky.com/content/en-global/images/enterprise/case-studies/Config.png)
![](https://webcf.waybackmachine.org/web/20221028184300im_/https://www.kaspersky.com/content/en-global/images/enterprise/case-studies/evaluation-insights.png)
![](https://webcf.waybackmachine.org/web/20221028184300im_/https://www.kaspersky.com/content/en-global/images/enterprise/case-studies/mitre_behind%20apt29.png)
![](https://webcf.waybackmachine.org/web/20221028184300im_/https://www.kaspersky.com/content/en-global/images/enterprise/case-studies/mitre_being_tested_by_experience.png)
![](https://webcf.waybackmachine.org/web/20221028184300im_/https://www.kaspersky.com/content/en-global/images/enterprise/case-studies/mitre_edr_mapping.png)
![](https://webcf.waybackmachine.org/web/20221028184300im_/https://www.kaspersky.com/content/en-global/images/enterprise/case-studies/MDR.png)
![](https://webcf.waybackmachine.org/web/20221028184300im_/https://www.kaspersky.com/content/en-global/images/enterprise/case-studies/APT-Reporting.png)
![](https://webcf.waybackmachine.org/web/20221028184300im_/https://www.kaspersky.com/content/en-global/images/enterprise/case-studies/industroyer.png)