Check Point offers the widest coverage of the MITRE ATT&CK matrix
Our AI prevention technologies uniquely utilize MITRE knowledge base taxonomy, to predict zero-day attacks and accelerate detection, investigation and response across network, endpoint, mobile and cloud.

Below are the tactics and techniques representing the MITRE ATT&CK® Matrix for Enterprise and Mobile. The Matrix contains information for the following platforms: Windows, macOS, Linux, PRE, Azure AD, Office 365, Google Workspace, SaaS, IaaS, Network, Containers.
Enterprise Matrix
Mobile Matrix
Initial Access4 techniques |
Execution3 techniques |
Persistence7 techniques |
Privilege Escalation3 techniques |
Defense Evasion14 techniques |
Credential Access5 techniques |
Discovery8 techniques |
Lateral Movement2 techniques |
Collection13 techniques |
Command and Control8 techniques |
Exfiltration2 techniques |
Impact9 techniques |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
Check Point schneidet im MITRE Engenuity ATT&CK Test als führender Anbieter von Endpoint-Sicherheit hervorragend ab
Erfahren Sie, wie Harmony Endpoint eine 100-prozentige Erkennung bei allen getesteten, einzigartigen ATT&CK-Techniken erreicht hat




