SlideShare a Scribd company logo
MITRE ATT&CK®
framework
and Managed XDR
Finding the real cyber attacks in the noise
2/5
MITRE ATT&CK®
framework and Managed XDR
Contents
Challenges of managing XDR 3
Introduction to MITRE 4
On the ATT&CK 4
The winning formula 5
About OpenText Cybersecurity 5
3/5
MITRE ATT&CK®
framework and Managed XDR
Challenges of managing XDR
When expanding their security field of vision to spot subtle attacks, organizations
typically get buried in overwhelming amounts of data, distracting from the
real problems.
Cyber attack surface has increased immensely with digital transformation and
hybrid cloud adoption. Many Managed Security Services are only alert services,
where 75 percent of businesses waste as much time on false positive alerts as they
spend on legitimate attacks.1
Everyone could benefit from an approach that ensures
threat-informed detections cut through the noise to know what is actually on their
network, endpoints, the cloud and beyond.
Mounting a great defence is about more than simply being vigilant; it is also about
understanding what a serious threat is so the organization can optimize resources
to counteract the offender’s actions. Many organizations are facing shortfalls
for skilled cybersecurity specialists2
and an inability to respond fast enough to
potential threats to mitigate risks.
Add to that defensive shortage the fact that bad actors are becoming ever more
sophisticated and adept at breaching enterprise defences unnoticed. Increasingly,
cyber attackers are playing a long game—embedding malicious software
inside enterprise systems, building persistence and waiting for the opportune
time to strike.
Rooting out what these bad actors have hidden can be both daunting and
prohibitively time consuming. To be effective in shutting down potential trouble,
it is essential to both recognize what is an actual threat and rapidly detect every
real attack tactic.
1 
SRS Networks, 75% of Businesses Waste Just As Much Time on False Positive Security Threats,
Study Finds. (2021)
2 (ISC)², 2022 Cybersecurity Workforce Study. (October 2022)
4/5
MITRE ATTCK®
framework and Managed XDR
Introduction to MITRE
Spun out from the Massachusetts Institute of Technology in 1958, MITRE has
undertaken to create a comprehensive list of known cyber attack tactics and
techniques. Open to government, education and commercial organizations, the
MITRE ATTCK®
framework is intended to create a standard taxonomy to improve
communications regarding cyber attackers.
The first-ever independent MITRE Engenuity ATTCK Evaluations for Managed
Services3
showed just how difficult it is to achieve and maintain that type of
defensive posture. Sixteen leading cybersecurity providers opted to showcase their
ability to identify and analyze a threat and describe adversary behavior, but only
OpenText was able to minimize false positive noise to zero while identifying every
attack vector that was deployed.4
With its Managed Extended Detection and Response (MxDR) solution, OpenText
was the fastest in a field including some of the sector’s top vendors,5
identifying the
threat actor and detecting every attack tactic within seven minutes while defending
successfully against a simulated OilRig attack.
In a world where malicious actors continue to develop new attack vectors
while organizations of all sizes attempt to keep up with the demand for skilled
cybersecurity resources, an effective defense aligned with MITRE ATTCK is
something no one can afford to disregard.
On the ATTCK
For those who are new to the MITRE ATTCK concept, or who need a short
refresher, these are the basics:
• MITRE ATTCK (Adversarial Tactics, Techniques, and Common Knowledge) is a
globally-accessible knowledge base of adversary tactics and techniques based
on real-world observations.
• The index continues to evolve with the threat landscape and has become
a trusted knowledge base for the industry to understand attacker models,
methodologies and mitigation.
• The ATTCK knowledge base is used as a foundation for the development of
specific threat models and methodologies.
• ATTCK can be used in several ways to help security operations, threat
intelligence and security architecture.
• ATTCK is updated twice a year, using publicly available threat intelligence and
incident reporting. The current version is #12.
As a knowledge base of commonly used techniques and tactics, MITRE ATTCK
is employed by organizations around the world to effectively identify the distinct
stages of a cyber attack. Because most attacks use some aspect of the ATTCK
matrix over time, the framework provides effective enterprise detection and
response techniques to actively recognize the various stages.
3 MITRE Engenuity ATTCK Evaluations, OilRig Managed Services Evaluation 2022.
4 OpenText, OpenText is a leader in Detection and Response. (Nov. 9, 2022)
5 Participants in the evaluation included: Atos, Bitdefender, BlackBerry, BlueVoyant, Critical Start, CrowdStrike,
Microsoft®
, NVISO, OpenText, Palo Alto Networks, Rapid7, Red Canary, SentinelOne, Sophos, Trend Micro
and WithSecure.
5/5
Copyright © 2023 Open Text. All Rights Reserved. Trademarks owned by Open Text.
For more information, visit: https://www.opentext.com/about/copyright-information • 04.23 | 22436.EN
The winning formula
To score the highest results in MITRE Engenuity ATTCK Evaluations—
including eliminating false positives and scoring a 100 percent detection rate6
—
OpenText applied its advanced behavioral approach to threat detection.
Some key use cases for the MITRE ATTCK framework include:
• Detection and Analytics
• Adversary Emulation and Red Teaming
• Threat Intelligence Assessments
• Engineering
As threat actors continue to gain sophistication, sharing tools and tactics, it grows
increasingly important to have the tools to both protect and surveil organizations’
entire system—network, endpoints, cloud and everything else. OpenText MxDR is
a fully remote, cloud-based virtual security operations center that provides rapid
detection, response and remediation of cyber threats.
Using behavioral analytics aligned to the MITRE ATTCK framework, along with
proprietary threat research, OpenText MxDR provides continuous threat monitoring
in real time. It provides early detection in the cyber kill chain, digital forensic
investigations, advanced threat hunting by a team of skilled specialists, along with
incident response and remediation.
Through better vision and better response—OpenText MxDR empowers
organizations to combat increasingly sophisticated threats while controlling
ever-mounting costs.
About OpenText Cybersecurity
OpenText Cybersecurity provides comprehensive security solutions for companies
and partners of all sizes. From prevention to detection and response, to recovery,
investigation and compliance, this unified end-to-end platform helps customers
build cyber resilience via a holistic security portfolio.
Powered by actionable insights from realtime contextual threat intelligence,
OpenText Cybersecurity customers benefit from high efficacy products, a compliant
experience and simplified security to help manage business risk.
Connect with us:
• OpenText CEO Mark Barrenechea’s blog
• Twitter | LinkedIn
6 MITRE Engenuity ATTCK Evaluations, OilRig Managed Services Evaluation 2022.
opentext.com/contact

More Related Content

PDF
OpenText Managed Extended Detection and Response (MxDR)
PDF
OpenText MxDR Advanced EDR Agent with Autonomous, Next-Gen Protection
PDF
The Role Of Data Analytics In Cybersecurity
PDF
Top 10 MDR Tools in 2025 - Boost Your Cyber Defence
PDF
OpenText Threat Hunting Service
PPTX
What i learned at issa international summit 2019
PPTX
Kaspersky Next XDR Expert Product Presentation 1909 EN.pptx
PDF
Enhancing Cybersecurity Defenses: A Multicriteria Decision-Making Approach to...
OpenText Managed Extended Detection and Response (MxDR)
OpenText MxDR Advanced EDR Agent with Autonomous, Next-Gen Protection
The Role Of Data Analytics In Cybersecurity
Top 10 MDR Tools in 2025 - Boost Your Cyber Defence
OpenText Threat Hunting Service
What i learned at issa international summit 2019
Kaspersky Next XDR Expert Product Presentation 1909 EN.pptx
Enhancing Cybersecurity Defenses: A Multicriteria Decision-Making Approach to...

Similar to MITRE ATT&CK framework and Managed XDR Position Paper (20)

PDF
Enhancing Cybersecurity Defenses: A Multicriteria Decision
PDF
Cyber Threat Hunting Workshop.pdf
PDF
Cyber Threat Hunting Workshop.pdf
PDF
Microsoft Azure Security Techniquesand How Azure security can enhance your or...
PDF
OpenText Cyber Resilience Fastrak
PPTX
hyderabad ins tech and management cyber security
PDF
Top 10 Cybersecurity Trends in 2024: Benefits, Challenges | Insider Market Re...
PPTX
Cyber Threat Hunting Workshop
PDF
The Future of Cyber Defense: Top Technologies and Providers
PPTX
What is Crowdstrike.pptx
PPTX
2024 Most Influential Cyber Security Technologies_ A Detailed Recap.pptx
PDF
Security Operations Center scenario Interview based Questions
PDF
Explore SOC (Security Operations Center)-based Interview Questions to Unlock ...
PDF
Empowering Cyber Resilience with Seqrite XDR: The Future of Data Privacy & Th...
PDF
Network Detection and Response (NDR): The Future of Intelligent Cybersecurity
PDF
Managed Detection and Response (MDR) Whitepaper
PPTX
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
PPTX
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
PDF
Symantec cyber-resilience
PDF
CROs must be part of the cybersecurity solution by david x martin
Enhancing Cybersecurity Defenses: A Multicriteria Decision
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
Microsoft Azure Security Techniquesand How Azure security can enhance your or...
OpenText Cyber Resilience Fastrak
hyderabad ins tech and management cyber security
Top 10 Cybersecurity Trends in 2024: Benefits, Challenges | Insider Market Re...
Cyber Threat Hunting Workshop
The Future of Cyber Defense: Top Technologies and Providers
What is Crowdstrike.pptx
2024 Most Influential Cyber Security Technologies_ A Detailed Recap.pptx
Security Operations Center scenario Interview based Questions
Explore SOC (Security Operations Center)-based Interview Questions to Unlock ...
Empowering Cyber Resilience with Seqrite XDR: The Future of Data Privacy & Th...
Network Detection and Response (NDR): The Future of Intelligent Cybersecurity
Managed Detection and Response (MDR) Whitepaper
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
Symantec cyber-resilience
CROs must be part of the cybersecurity solution by david x martin

More from Marc St-Pierre (20)

PDF
Opentext Incident Response (IR) Service Overview.pdf
PDF
Digital Forensics & Incident Response (DFIR) Service Overview.pdf
PDF
OpenText AI project security and compliance services
PDF
Data Protection Services Service Overview.pdf
PDF
OpenText Vulnerability Assessment & Penetration Testing
PDF
Opentext Managed XDR paves the way for CyberResilience
PDF
OpenText Security Health Check Service
PDF
OpenText Cybersecurity Tabletop Exercise
PDF
OpenText Cyber Resilience Program
PDF
OpenText AI & Analytics Services and Solutions Catalog
PDF
The Incident Response Decision Tree
PDF
US Medical University trust OpenText to guard against cyber threats-en.pdf
PDF
Opentext Translation and Localization Services
PDF
Digital Ethical Risk Assessment
PDF
OpenText Translation & Localization Services
PDF
Opentext Decisiv
PDF
OpenText Taxonomy Catalog & Services
PDF
Open text security services catalog
PDF
OpenText Legal Technology Solutions
PDF
Smart migration Solution overview
Opentext Incident Response (IR) Service Overview.pdf
Digital Forensics & Incident Response (DFIR) Service Overview.pdf
OpenText AI project security and compliance services
Data Protection Services Service Overview.pdf
OpenText Vulnerability Assessment & Penetration Testing
Opentext Managed XDR paves the way for CyberResilience
OpenText Security Health Check Service
OpenText Cybersecurity Tabletop Exercise
OpenText Cyber Resilience Program
OpenText AI & Analytics Services and Solutions Catalog
The Incident Response Decision Tree
US Medical University trust OpenText to guard against cyber threats-en.pdf
Opentext Translation and Localization Services
Digital Ethical Risk Assessment
OpenText Translation & Localization Services
Opentext Decisiv
OpenText Taxonomy Catalog & Services
Open text security services catalog
OpenText Legal Technology Solutions
Smart migration Solution overview

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
KodekX | Application Modernization Development
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Encapsulation theory and applications.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Electronic commerce courselecture one. Pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
KodekX | Application Modernization Development
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Encapsulation theory and applications.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
NewMind AI Weekly Chronicles - August'25 Week I
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Understanding_Digital_Forensics_Presentation.pptx
Empathic Computing: Creating Shared Understanding
Chapter 3 Spatial Domain Image Processing.pdf
Machine learning based COVID-19 study performance prediction
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Electronic commerce courselecture one. Pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
MYSQL Presentation for SQL database connectivity
Dropbox Q2 2025 Financial Results & Investor Presentation
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf

MITRE ATT&CK framework and Managed XDR Position Paper

  • 1. MITRE ATT&CK® framework and Managed XDR Finding the real cyber attacks in the noise
  • 2. 2/5 MITRE ATT&CK® framework and Managed XDR Contents Challenges of managing XDR 3 Introduction to MITRE 4 On the ATT&CK 4 The winning formula 5 About OpenText Cybersecurity 5
  • 3. 3/5 MITRE ATT&CK® framework and Managed XDR Challenges of managing XDR When expanding their security field of vision to spot subtle attacks, organizations typically get buried in overwhelming amounts of data, distracting from the real problems. Cyber attack surface has increased immensely with digital transformation and hybrid cloud adoption. Many Managed Security Services are only alert services, where 75 percent of businesses waste as much time on false positive alerts as they spend on legitimate attacks.1 Everyone could benefit from an approach that ensures threat-informed detections cut through the noise to know what is actually on their network, endpoints, the cloud and beyond. Mounting a great defence is about more than simply being vigilant; it is also about understanding what a serious threat is so the organization can optimize resources to counteract the offender’s actions. Many organizations are facing shortfalls for skilled cybersecurity specialists2 and an inability to respond fast enough to potential threats to mitigate risks. Add to that defensive shortage the fact that bad actors are becoming ever more sophisticated and adept at breaching enterprise defences unnoticed. Increasingly, cyber attackers are playing a long game—embedding malicious software inside enterprise systems, building persistence and waiting for the opportune time to strike. Rooting out what these bad actors have hidden can be both daunting and prohibitively time consuming. To be effective in shutting down potential trouble, it is essential to both recognize what is an actual threat and rapidly detect every real attack tactic. 1 SRS Networks, 75% of Businesses Waste Just As Much Time on False Positive Security Threats, Study Finds. (2021) 2 (ISC)², 2022 Cybersecurity Workforce Study. (October 2022)
  • 4. 4/5 MITRE ATTCK® framework and Managed XDR Introduction to MITRE Spun out from the Massachusetts Institute of Technology in 1958, MITRE has undertaken to create a comprehensive list of known cyber attack tactics and techniques. Open to government, education and commercial organizations, the MITRE ATTCK® framework is intended to create a standard taxonomy to improve communications regarding cyber attackers. The first-ever independent MITRE Engenuity ATTCK Evaluations for Managed Services3 showed just how difficult it is to achieve and maintain that type of defensive posture. Sixteen leading cybersecurity providers opted to showcase their ability to identify and analyze a threat and describe adversary behavior, but only OpenText was able to minimize false positive noise to zero while identifying every attack vector that was deployed.4 With its Managed Extended Detection and Response (MxDR) solution, OpenText was the fastest in a field including some of the sector’s top vendors,5 identifying the threat actor and detecting every attack tactic within seven minutes while defending successfully against a simulated OilRig attack. In a world where malicious actors continue to develop new attack vectors while organizations of all sizes attempt to keep up with the demand for skilled cybersecurity resources, an effective defense aligned with MITRE ATTCK is something no one can afford to disregard. On the ATTCK For those who are new to the MITRE ATTCK concept, or who need a short refresher, these are the basics: • MITRE ATTCK (Adversarial Tactics, Techniques, and Common Knowledge) is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. • The index continues to evolve with the threat landscape and has become a trusted knowledge base for the industry to understand attacker models, methodologies and mitigation. • The ATTCK knowledge base is used as a foundation for the development of specific threat models and methodologies. • ATTCK can be used in several ways to help security operations, threat intelligence and security architecture. • ATTCK is updated twice a year, using publicly available threat intelligence and incident reporting. The current version is #12. As a knowledge base of commonly used techniques and tactics, MITRE ATTCK is employed by organizations around the world to effectively identify the distinct stages of a cyber attack. Because most attacks use some aspect of the ATTCK matrix over time, the framework provides effective enterprise detection and response techniques to actively recognize the various stages. 3 MITRE Engenuity ATTCK Evaluations, OilRig Managed Services Evaluation 2022. 4 OpenText, OpenText is a leader in Detection and Response. (Nov. 9, 2022) 5 Participants in the evaluation included: Atos, Bitdefender, BlackBerry, BlueVoyant, Critical Start, CrowdStrike, Microsoft® , NVISO, OpenText, Palo Alto Networks, Rapid7, Red Canary, SentinelOne, Sophos, Trend Micro and WithSecure.
  • 5. 5/5 Copyright © 2023 Open Text. All Rights Reserved. Trademarks owned by Open Text. For more information, visit: https://www.opentext.com/about/copyright-information • 04.23 | 22436.EN The winning formula To score the highest results in MITRE Engenuity ATTCK Evaluations— including eliminating false positives and scoring a 100 percent detection rate6 — OpenText applied its advanced behavioral approach to threat detection. Some key use cases for the MITRE ATTCK framework include: • Detection and Analytics • Adversary Emulation and Red Teaming • Threat Intelligence Assessments • Engineering As threat actors continue to gain sophistication, sharing tools and tactics, it grows increasingly important to have the tools to both protect and surveil organizations’ entire system—network, endpoints, cloud and everything else. OpenText MxDR is a fully remote, cloud-based virtual security operations center that provides rapid detection, response and remediation of cyber threats. Using behavioral analytics aligned to the MITRE ATTCK framework, along with proprietary threat research, OpenText MxDR provides continuous threat monitoring in real time. It provides early detection in the cyber kill chain, digital forensic investigations, advanced threat hunting by a team of skilled specialists, along with incident response and remediation. Through better vision and better response—OpenText MxDR empowers organizations to combat increasingly sophisticated threats while controlling ever-mounting costs. About OpenText Cybersecurity OpenText Cybersecurity provides comprehensive security solutions for companies and partners of all sizes. From prevention to detection and response, to recovery, investigation and compliance, this unified end-to-end platform helps customers build cyber resilience via a holistic security portfolio. Powered by actionable insights from realtime contextual threat intelligence, OpenText Cybersecurity customers benefit from high efficacy products, a compliant experience and simplified security to help manage business risk. Connect with us: • OpenText CEO Mark Barrenechea’s blog • Twitter | LinkedIn 6 MITRE Engenuity ATTCK Evaluations, OilRig Managed Services Evaluation 2022. opentext.com/contact