Comparing evaluations of Endpoint Detection and Response (EDR) solutions

Jorrit Folmer
4 min readAug 15, 2019

--

Laptops and PC’s are an important point of entry for cyber attackers because they are operated by humans that can be easily tricked into clicking on malicious links or email attachments. When those laptops and PC’s are used in an enterprise they are called endpoints, and often run special software to mitigate cyber threats.

But which EDR solution is the best?

MITRE

Thanks to MITRE, an American non-profit organisation, we can now compare performance of various Endpoint Detection and Response solutions. This evaluation is unique because it puts a well documented cyber threat in a lab environment and tracks detection throughout the attack path. MITRE published the results, but deliberately without ranking, scoring or rating. Make up your own mind.

This is MITRE:

Screenshot of MITRE “About us” page showing gun toting soldiers
They solve problems

And apparently they’re not afraid to point out that “cyber” is the fifth domain in warfare besides land, see, air and space.

In the cyber domain they’re famous for creating the MITRE ATT&CK matrix, an information product that helps organisations think about their cyber defence in a more attacker oriented way: from initial access via privilege escalation and lateral movement to impact.

We approve of us

MITRE doesn’t assign scores in their EDR evaluation and in this ranking vacuum you can only imagine what most vendors did:

  • “Carbon Black outperforms all other EDR solutions” (source)
  • “CounterTack Platform leads with fast automated detections” (source)
  • “CrowdStrike Falcon […] the most effective EDR solution” (source)
  • “[…] Endgame as the first zero training endpoint protection” (source)
  • “FireEye Endpoint Security […] the most effective EDR solution” (source)
  • “[…] evaluation showcases the effectiveness of SentinelOne’s platform” (source)
  • “[…] Windows Defender ATP demonstrated industry-leading optics […]” (source)
  • “[…] Cybereason best enables defenders […]” (source)
  • “Cortex XDR and Traps Outperform in MITRE Evaluation” (source)

Unbiased wall of charts

Loading the evaluation results into Splunk, via this Python script, leads to the charts below.

The evaluation simulated 136 steps of an advanced persistent threat. For example the first chart shows that 60 attacker steps on a total of 136 weren’t detected by the chart leader of main detection type “None”.

You can read up on the main detection types here.

Bar chart of failed detections by EDR vendor, showing that RSA is leading.
Number of detection fails per vendor. It may not be a coincidence that RSA is missing from the cheering press release crowd.
Bar chart of Telemetry detections by vendor, showing 7 vendors hovering around 100 and 3 lagging.
If you just want the logs and create your own rules in a SIEM, look no further than this chart (or Sysmon)
Enrichment is Telemetry++
Almost empty bar chart of IOC detection type, with Palo Alto Networks showing 10 detections
IOC is dead
Signal about general attacker behaviour in a sea of telemetry
Signal about specific attacker behaviour in a sea of telemetry

Another dimension

Three other modifiers are included in the evaluation. Did you already read up on the detection types and modifiers here?

By tainted they mean correlated, which is helpful for analysts
Realtime?
Detected, but not without needing special vendor assistance

The ultimate noise generator

If you only care about raw data and do correlation on your own outside of the EDR solution, this chart ranks vendors based on Telemetry, Enrichment and IOC results:

Log, I’m your father

The ultimate signal detector in a sea of noise

If you look for EDR solutions based on signal/noise ratio, this chart ranks vendors based on General or Specific Behaviour divided by the amount of Telemetry,Enrichment or IOC results:

I can see all obstacles in my way

Draw your own conclusions

  1. Download Splunk for free (Windows, MacOS, Linux)
  2. Download and install the free app for Splunkbase or Github to play with the data yourself.

There are endless possibilities to slice and dice the EDR evaluation results. Drop me a line with how and why if you did.

--

--