Check Point offers the widest coverage of the MITRE ATT&CK matrix
Our AI prevention technologies uniquely utilize MITRE knowledge base taxonomy, to predict zero-day attacks and accelerate detection, investigation and response across network, endpoint, mobile and cloud.

Below are the tactics and techniques representing the MITRE ATT&CK® Matrix for Enterprise and Mobile. The Matrix contains information for the following platforms: Windows, macOS, Linux, PRE, Azure AD, Office 365, Google Workspace, SaaS, IaaS, Network, Containers.
Enterprise Matrix
Mobile Matrix
Initial Access4 techniques |
Execution3 techniques |
Persistence7 techniques |
Privilege Escalation3 techniques |
Defense Evasion14 techniques |
Credential Access5 techniques |
Discovery8 techniques |
Lateral Movement2 techniques |
Collection13 techniques |
Command and Control8 techniques |
Exfiltration2 techniques |
Impact9 techniques |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
엔드포인트 보안 분야를 선도하는 Check Point의 리더십을 인정한 MITRE Engenuity ATT&CK® 평가
테스트를 통해 ATT&CK 기술 전반에서 Harmony Endpoint가 100% 탐지를 달성한 방법을 알아보세요.




