{"id":2930,"date":"2025-09-23T00:52:49","date_gmt":"2025-09-23T00:52:49","guid":{"rendered":"http:\/\/ft365.org\/index.php\/2025\/09\/23\/major-cyber-threat-detection-vendors-pull-out-of-mitre-evaluations-test\/"},"modified":"2025-09-23T00:52:49","modified_gmt":"2025-09-23T00:52:49","slug":"major-cyber-threat-detection-vendors-pull-out-of-mitre-evaluations-test","status":"publish","type":"post","link":"http:\/\/ft365.org\/index.php\/2025\/09\/23\/major-cyber-threat-detection-vendors-pull-out-of-mitre-evaluations-test\/","title":{"rendered":"Major Cyber Threat Detection Vendors Pull Out of MITRE Evaluations Test"},"content":{"rendered":"<div id=\"cphContent_pnlArticleBody\">\n<div id=\"layout-9e034577-53ae-4d2c-9022-fbf237cdcb25\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"0\">\n<p>Three major providers of cybersecurity solutions have decided not to take part in the 2025 edition of MITRE\u2019s annual endpoint detection and response (EDR) solution test.<\/p>\n<p>After Microsoft announced it would not participate in MITRE Engenuity ATT&#038;CK Evaluations: Enterprise 2025 in June, SentinelOne and Palo Alto Networks confirmed on September 12 they were also pulling out of the test for this year.<\/p>\n<p>These decisions have raised concerns among the cybersecurity community about the program\u2019s future and relevancy. These moves are especially surprising since the three companies are major cybersecurity vendors and all performed well in the 2024 test, in which Microsoft\u2019s solution topped MITRE\u2019s tests, SentinelOne ranked fifth and Palo Alto ranked 12th.<\/p>\n<\/p><\/div>\n<figure id=\"layout-3d61d032-e1c6-4ca0-872a-069f368ef4ee\" data-layout-id=\"4\" data-edit-folder-name=\"image\" data-index=\"1\"><img decoding=\"async\" src=\"http:\/\/ft365.org\/wp-content\/uploads\/2025\/09\/localimages\/49dda8ba-638c-48ff-9cb4-8bd7001074a8.png\" alt=\"Credit: Poetra.RH \/ bluestork \/ Shutterstock.com\"><figcaption>Credit: Poetra.RH \/ bluestork \/ Shutterstock.com<\/figcaption><\/figure>\n<div id=\"layout-c19346cf-56b2-4e48-84b8-a48bc1a09257\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"2\">\n<p>It is a particularly surprising decision for Microsoft, which used its ranking in the test to promote its solution, Microsoft Defender XDR, as recently as December 2024.<\/p>\n<p>Interestingly, all three companies justified the move by saying they wanted to prioritize product development and innovation.<\/p>\n<p>However, experts have suggested that other factors may also be at play, including the tests becoming increasingly seen as promotional rather than achieving real security gains.<\/p>\n<p><em>Infosecurity<\/em> spoke with Charles Clancy, MITRE CTO and SVP of MITRE Labs, who shared key elements of the evolution of the evaluation test that could explain the decisions ahead of the results of this year\u2019s test in December 2025.<\/p>\n<h2><strong>Backstory of\u00a0ATT&#038;CK Evaluations: Enterprise<\/strong><\/h2>\n<p>MITRE Corporation is a US-based non-profit organization running many cybersecurity programs, including some on behalf of the US government.<\/p>\n<p>MITRE introduced its ATT&#038;CK framework in 2015, which quickly became the standard tool in the cybersecurity industry for mapping real-world cyber adversaries\u2019 techniques, tactics and procedures (TTPs).<\/p>\n<p>In 2019, MITRE ATT&#038;CK launched its first Evaluations program to \u201cfill a gap in the security testing market,\u201d Clancy argued.<\/p>\n<p>\u201cThere were many types of third-party testing out there for cybersecurity products, but each one of them had their own process and scoring methodology, leading to inconsistent results and a lack of rigor that wasn\u2019t driving the industry forward,\u201d he explained.<\/p>\n<p>MITRE Engenuity ATT&#038;CK Evaluations: Enterprise is the most regular of all Evaluations tests, occurring every year since its launch.<\/p>\n<p>In a LinkedIn post, Igal Gofman, the director of engineering at CrowdStrike and a former security researcher at Microsoft and Tenable, called the test the \u201cOlympics of cybersecurity.\u201d<\/p>\n<p>Among the 1000 people working in MITRE\u2019s cybersecurity practice, 133 are dedicated to MITRE ATT&#038;CK, of whom 12 to 15 people are working on the Evaluations tests, Clancy told <em>Infosecurity<\/em>.<\/p>\n<p>Each year, the team behind the testing program picks one of several real-life adversaries and\/or attack chains based on their TTPs mapped in ATT&#038;CK.<\/p>\n<p>They then test the EDR solutions of participating vendors in simulated attacks using Caldera, MITRE\u2019s own automated adversary emulation platform, according to several criteria, including detection results, false positives and true negatives.<\/p>\n<p>Although this test can be used to compare how effective EDR solutions are, Clancy noted it should not be seen as a longitudinal benchmark because each annual test differs greatly from the previous one.<\/p>\n<p>\u201cThe ethos we\u2019re trying to drive in the testing is comparison of an individual product to detect a particular threat actor. Simulating different adversaries year over year is really important to understand different classes of emerging threats,\u201d Clancy said.<\/p>\n<h2><strong>Inside the Test&#8217;s 2024 and 2025 Editions<\/strong><\/h2>\n<p>In 2024, MITRE ATT&#038;CK Evaluations: Enterprise emulated 14 techniques across 7 tactics from known North Korean-affiliated hackers, 16 techniques across 7 tactics from the CL0P ransomware group and 31 techniques across 11 tactics from the LockBit ransomware group.<\/p>\n<p>CrowdStrike, one of the leading EDR providers, did not take part in that year\u2019s edition, with one member of the CrowdStrike subreddit \u2013 who claimed to be working for the company \u2013 suggesting that the evaluation was set to take place shortly after the July 19 global outage that affected the company\u2019s EDR product.<\/p>\n<p>That year, Microsoft, ESET and Cybereason topped the ranking, followed by ThreatDown, SentinelOne and Bitdefender.<\/p>\n<\/p><\/div>\n<figure id=\"layout-4d6e158e-6565-4ebe-8f58-89d0cad0760f\" data-layout-id=\"4\" data-edit-folder-name=\"image\" data-index=\"3\"><img decoding=\"async\" src=\"http:\/\/ft365.org\/wp-content\/uploads\/2025\/09\/localimages\/a4f80974-e89d-4f86-bbe5-243a667d6fa7.png\" alt=\"Source: MITRE\"><figcaption>Source: MITRE<\/figcaption><\/figure>\n<div id=\"layout-929008ef-9a25-4516-bdf5-a014d7fd9d0f\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"4\">\n<p>In 2025, the ATT&#038;CK Evaluations team has selected two scenarios:<\/p>\n<ul>\n<li>A Scattered Spider scenario: multi-faceted intrusion in a hybrid environment that features social engineering, cloud infrastructure exploitation, identity abuse and living off the land (LOTL) techniques<\/li>\n<li>A Chinese-aligned cyber-espionage scenario: evasive intrusion highlighting the adversary\u2019s adept use of social engineering, abuse of legitimate applications and services, establishing persistent mechanisms and employing custom malware to evade detection<\/li>\n<\/ul>\n<p>While he admitted vendors can vary year-over-year, Clancy assured they can rely on \u201ca lot of repeat customers.\u201d<\/p>\n<h2><strong>Why Vendors Are Pulling Out of MITRE\u2019s\u00a0Test<\/strong><\/h2>\n<p>However, this year\u2019s edition, the results of which are expected in December, will be missing three major players: Microsoft, SentinelOne and Palo Alto Networks.<\/p>\n<p>Microsoft announced it will not take part in this year\u2019s test on June 13, claiming that this decision \u201callows us to focus all our resources on the Secure Future Initiative and on delivering product innovation to our customers.\u201d<\/p>\n<p>On September 12, SentinelOne and Palo Alto released similar statements.<\/p>\n<p>The former said it wanted to \u201cprioritize our product and engineering resources on customer-focused initiatives while accelerating our platform roadmap,\u201d while the latter explained that this decision \u201cenables us to further accelerate critical platform innovations that directly address our customers&#8217; most pressing security challenges and respond even faster to the evolving threat landscape.\u201d<\/p>\n<p>When contacted by <em>Infosecurity<\/em>, SentinelOne and Palo Alto Networks declined to provide further comment. Microsoft did not respond to a request for comment.<\/p>\n<p>However, MITRE\u2019s Clancy said he is in close contact with the three vendors and believes he knows the reasons that made them pull out of this year\u2019s test.<\/p>\n<p>First, as the vendors said in their statements, taking part in MITRE ATT&#038;CK Evaluations program requires a resource-intensive commitment, suggesting that the time and personnel dedicated to it are lost on other projects.<\/p>\n<p>Then, Clancy said that the team behind the test strives to make it harder every year and conceded they may have pushed it too far this year.<\/p>\n<p>\u201cEach year, we want to design a test that\u2019s harder than the year before in order to drive the whole industry forward, since the test can offer an opportunity for vendors to upgrade their products in preparation for the test and once they get the results. And sometimes, we don\u2019t get the balance quite right,\u201d he explained.<\/p>\n<p>Speaking to <em>Infosecurity<\/em>, Vishal Santharam, a senior product manager for endpoint security products at ManageEngine, elaborated on Clancy\u2019s point.<\/p>\n<p>\u201cIn 2024, MITRE started recording the volume of alerts in the evaluations, which is always a challenge for a vendor to tune in to. More alerts mean increased alert fatigue,\u201d he said, referring to a Forrester study decoding the 2024 MITRE Evaluations: Enterprise based on alert volume.<\/p>\n<\/p><\/div>\n<figure id=\"layout-658dec23-3f72-4967-abb8-9587563814d8\" data-layout-id=\"4\" data-edit-folder-name=\"image\" data-index=\"5\"><img decoding=\"async\" src=\"http:\/\/ft365.org\/wp-content\/uploads\/2025\/09\/localimages\/03adfcfd-9d43-4d83-8ea0-911141493b9a.png\" alt=\"Source: Forrester\"><figcaption>Source: Forrester<\/figcaption><\/figure>\n<div id=\"layout-45c7c088-75f4-4d34-8b25-64a2616936cc\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"6\">\n<p>Additionally, Santharam noted that the 2025 Evaluations: Enterprise test included cloud environment, \u201cwhich is untested territory and requires even more attention from vendors.\u201d<\/p>\n<p>Finally, Clancy told <em>Infosecurity <\/em>that his team used to run a vendor forum each year to prepare for the MITRE ATT&#038;CK Evaluations: Enterprise test.<\/p>\n<p>\u201cThis forum, which was helpful in working with industry to set the objectives of the test each year, fell off over the last couple of years,\u201d Clancy admitted.<\/p>\n<p>On LinkedIn, CrowdStrike\u2019s Gofman argued that the MITRE Evaluations tests were initially a great initiative to benchmark security solutions, but they turned into \u201cvendor theater\u201d in recent years.<\/p>\n<div>\n<p>\u201cVendors investing huge resources for PR wins, not real security improvements. With MITRE and CISA under pressure from budget cuts and changes, some vendors likely saw an opportunity to step back,\u201d he said.<\/p>\n<p> \u201cThe concept of TTP-based testing is still valuable, but the way it\u2019s evolved, outdated, overly endpoint-focused, detached from real-world threats is far less so,\u201d he added.<\/p>\n<\/div>\n<p>Patrick Garrity, a vulnerability researcher at VulnCheck, corroborated this view: \u201c[It] sounds like this benchmarking activity has become a giant distraction to building better products in exchange for publicity,\u201d he said in another LinkedIn post.<\/p>\n<p>Despite these concerns, Clancy confirmed that a dozen cybersecurity vendors were still taking part in the 2025 edition of the test.<\/p>\n<h2><strong>MITRE to Reboot Vendor Forum in 2026<\/strong><\/h2>\n<p>Clancy told <em>Infosecurity<\/em> that his team intended to re-establish the vendor forum ahead of MITRE ATT&#038;CK Evaluations: Enterprise 2026.<\/p>\n<p>\u201cThis is something we\u2019re already working to re-establish for the 2026 edition,\u201d he said.<\/p>\n<p>He later made this ambition public in a LinkedIn post published on September 18, after SentinelOne and Palo Alto announced they would not participate in the 2025 edition.<\/p>\n<\/p><\/div>\n<figure id=\"layout-31c3a2da-f7ba-40c3-b477-af29bf3f30d9\" data-layout-id=\"8\" data-edit-folder-name=\"embed\" data-index=\"7\"><\/figure>\n<div id=\"layout-ffe67711-b3e2-4f9e-80e6-ad2906ff7a28\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"8\">\n<p>Santharam also told <em>Infosecurity<\/em> that ManageEngine was\u00a0 working on an EDR solution and intended to participate in MITRE Engenuity ATT&#038;CK Evaluations: Enterprise in 2026.<\/p>\n<div>\n<p>&#8220;The Advanced Anti-Malware and Next-Gen AV products from ManageEngine were certified by AV-Comparatives on their first try.\u00a0\u00a0The solution paves the way for our next EDR\u00a0offering while also providing comprehensive protection against malware and ransomware,&#8221;\u00a0he said.\u00a0<\/p>\n<p> &#8220;We are also gearing up to take part in the forthcoming Gartner Magic Quadrant for Endpoint Protection Platform (EPP), and the MITRE ATT&#038;CK tests.\u00a0In addition to proving the robustness and reliability of our technology, these independent assessments also assist clients in developing confidence in our EDR capabilities.&#8221;<\/p>\n<\/div><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Three major providers of cybersecurity solutions have decided not to take part in the 2025 edition of MITRE\u2019s annual endpoint detection and response (EDR) solution test. After Microsoft announced it would not participate in MITRE Engenuity ATT&amp;CK Evaluations: Enterprise 2025 in June, SentinelOne and Palo Alto Networks confirmed on September 12 they were also pulling<\/p>\n","protected":false},"author":2,"featured_media":2931,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2930","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"featured_image_urls":{"full":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/09\/2930-5551346a-8115-4f32-93cd-24d517723220.jpg",300,300,false],"thumbnail":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/09\/2930-5551346a-8115-4f32-93cd-24d517723220-150x150.jpg",150,150,true],"medium":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/09\/2930-5551346a-8115-4f32-93cd-24d517723220.jpg",300,300,false],"medium_large":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/09\/2930-5551346a-8115-4f32-93cd-24d517723220.jpg",300,300,false],"large":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/09\/2930-5551346a-8115-4f32-93cd-24d517723220.jpg",300,300,false],"1536x1536":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/09\/2930-5551346a-8115-4f32-93cd-24d517723220.jpg",300,300,false],"2048x2048":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/09\/2930-5551346a-8115-4f32-93cd-24d517723220.jpg",300,300,false],"morenews-featured":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/09\/2930-5551346a-8115-4f32-93cd-24d517723220.jpg",300,300,false],"morenews-large":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/09\/2930-5551346a-8115-4f32-93cd-24d517723220.jpg",300,300,false],"morenews-medium":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/09\/2930-5551346a-8115-4f32-93cd-24d517723220.jpg",300,300,false],"crawlomatic_preview_image":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/09\/2930-5551346a-8115-4f32-93cd-24d517723220-146x146.jpg",146,146,true]},"author_info":{"display_name":"henry","author_link":"http:\/\/ft365.org\/index.php\/author\/henry\/"},"category_info":"<a href=\"http:\/\/ft365.org\/index.php\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","tag_info":"Uncategorized","comment_count":"0","_links":{"self":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/2930","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/comments?post=2930"}],"version-history":[{"count":0,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/2930\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media\/2931"}],"wp:attachment":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media?parent=2930"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/categories?post=2930"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/tags?post=2930"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}