This website uses cookies to ensure you get the best experience on our website.
Please note that by continuing to use this site you consent to the terms of our Privacy and Data Protection Policy.
Accept

AV-Comparatives Introduces Enterprise-Class EDR-Test @RSA2020

As the number and complexity of advanced persistent threats increase, so does the importance of endpoint detection and response systems. AV-Comparatives has developed a comprehensive methodology for testing enterprise-class EDR (Endpoint Detection and Response) systems, with tests commencing mid-Q2 2020, and results being published around the end of Q3 2020. AV-Comparatives have been working closely with the IT security teams, security practitioners and security operation centre (SOC) personnel of typical enterprises that already employ EDR systems or are planning to do so in the future.

Scenarios

The scenarios to be used in AVC’s test of EDR products are based on this feedback. The test framework is flexible enough to allow for different scenarios in the future, as the technical nature of advanced threats (including APTs) evolves.

This will be the first time that such a comprehensive comparative test of EDR systems has been performed. It will allow participating vendors to showcase their respective products’ features, functionality, and detection/response metrics, as well as illustrating the value provided by investing in these solutions.

Detecting and Monitoring

The aim of the test will not be to determine whether the endpoints have been protected against compromise, but to evaluate the effectiveness of the tested systems in detecting and monitoring the attacks and providing reporting and remediation functions. We will require vendors to disable the protection (blocking) and prevention capabilities of their respective products during the entirety of the test timeframe. This will allow the attacks to run their full course, thus demonstrating the abilities of the EDR products to detect, record, analyse and respond to them.

Kill-Chain

The methodology considers the typical stages of an attack kill-chain, in order to find out how the tested EDR products identify, detect and collect data on them. These include initial access, execution, persistence, privilege escalation, credential access, data collection and exfiltration.

Various aspects of the tested EDR systems’ functionality will be validated, including time to respond, threat classification, threat resolution options, threat timeline, endpoint and user data, and the ability to correlate and present data from multiple sources, including third-party.

Obfuscation

AV-Comparatives’ EDR testing methodology will include obfuscation techniques in the attacks, to determine the tested products’ abilities to cope with detection-avoidance mechanisms in realistic enterprise-attack scenarios.

For more information please contact the AVC EDR team via mail: [email protected]