How Reveal(x) Network Detection & Response Makes MITRE ATT&CK Easier
Back to top
July 2, 2020
How Reveal(x) Network Detection & Response Makes MITRE ATT&CK Easier
As the MITRE ATT&CK Framework grows rapidly more useful and more widely adopted by security operations teams, we are always looking for ways to make it easier to integrate ATT&CK into investigation workflows. Our existing detection cards offer background information about attack behaviors, including links to MITRE ATT&CK TTPs. That means analysts don't have to search in a separate location or resort to Googling to know the implications of a given detection or to find out where on the Framework a particular detection might have relevance.
With Reveal(x) version 8.1 we're taking the MITRE ATT&CK integration to the next level. Users can now view detections on a visual matrix, mapped to the MITRE ATT&CK Framework, as well as search their environment for detections by MITRE ATT&CK code.
Watch this three minute video to see how the new feature works, then dive into our free online demo to try it for yourself!

Security Product Marketing Manager
As a Sr. Product Marketing Manager at ExtraHop, Chase strives to extract the signal from the noise in the cybersecurity market, to provide security leaders and practitioners with information they can actually use to stay ahead of advanced persistent threats. Chase would never claim to be an expert at anything, but some topics he has above-average knowledge about include network detection and response, security operations, cryptography, and a grab bag of cybersecurity frameworks including NIST CSF, MITRE ATT&CK and D3FEND, and the CIS Top 20 controls.
