Loading...
Browse 243 mitre attack tools
Managed threat detection, hunting, and response service by Mandiant experts
Managed threat detection, hunting, and response service by Mandiant experts
24/7 managed threat detection, investigation, and response service
24/7 managed threat detection, investigation, and response service
XTM portfolio for threat intel, attack surface visibility & adversary simulation
XTM portfolio for threat intel, attack surface visibility & adversary simulation
SIEM platform with user analytics and automation for threat detection
SIEM platform with user analytics and automation for threat detection
24/7 MDR service with automated threat hunting and response capabilities
24/7 MDR service with automated threat hunting and response capabilities
AI-powered automated pen testing & continuous red teaming platform
AI-powered automated pen testing & continuous red teaming platform
AI-enhanced CNAPP securing cloud environments from dev to runtime
AI-enhanced CNAPP securing cloud environments from dev to runtime
XDR platform with NDR, EDR, deception, AD security, and CNAPP capabilities
XDR platform with NDR, EDR, deception, AD security, and CNAPP capabilities
Exposure validation platform combining BAS and attack path validation (CART)
Exposure validation platform combining BAS and attack path validation (CART)
SaaS BAS platform automating C2 attacks with AI-driven remediation plans
SaaS BAS platform automating C2 attacks with AI-driven remediation plans
Cloud-native endpoint DLP with insider risk mgmt and user education
Cloud-native endpoint DLP with insider risk mgmt and user education
Red teaming service that emulates real-world adversaries to test defenses
Red teaming service that emulates real-world adversaries to test defenses
Threat intelligence platform providing global threat visibility and IoCs
Threat intelligence platform providing global threat visibility and IoCs
24x7 MDR service with global SOC teams for threat detection and response
24x7 MDR service with global SOC teams for threat detection and response
Container and Linux workload security for hybrid and multi-cloud environments
Container and Linux workload security for hybrid and multi-cloud environments
EDR platform with automated cross-endpoint correlation and prevention-first approach
EDR platform with automated cross-endpoint correlation and prevention-first approach
Searchable repository of Sigma detection rules for threat hunting and SIEM
Searchable repository of Sigma detection rules for threat hunting and SIEM
Threat intelligence database with 500M+ malicious IPs, domains, and IOCs via API
Threat intelligence database with 500M+ malicious IPs, domains, and IOCs via API
Continuous pentesting service monitoring web apps & APIs for code changes
Continuous pentesting service monitoring web apps & APIs for code changes
Cloud-native SIEM for log management, threat detection, investigation, and response
Cloud-native SIEM for log management, threat detection, investigation, and response
Automated ransomware attack emulation platform for defense validation
Automated ransomware attack emulation platform for defense validation
Automated security validation platform for testing attack surfaces continuously
Automated security validation platform for testing attack surfaces continuously
Automated internal network penetration testing and security validation platform
Automated internal network penetration testing and security validation platform
Next-gen antivirus & EDR with pattern/behavior detection engines
Next-gen antivirus & EDR with pattern/behavior detection engines
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance