All reports

08/2021 - 08/2021

Breach Response (NDR Detection): VMware NSX Network Detection and Response 2021 Q3

VMware NSX Breach Response



SE Labs tested VMware NSX Network Detection and Response against a range of hacking attacks designed to compromise systems and penetrate target networks in the same way as criminals and other attackers breach systems and networks.

VMware NSX Breach Response Test

Full chains of attack were used, meaning that testers behaved as real attackers, probing targets using a variety of tools, techniques and vectors before attempting to gain lower-level and more powerful access. Finally, the testers/attackers attempted to complete their missions, which might include stealing information, damaging systems and connecting to other systems on the network.

Loader Loading…
EAD Logo Taking too long?

Reload Reload document
| Open Open in new tab

Download

Tested products from:

VMware

APT groups include:

  • FIN7 & Carbanak
  • OilRig
  • APT3
  • APT29

All reports

07/2021 - 07/2021

Breach Response (Protection): BlackBerry Protect and Optics 2021 Q2

Breach Response BlackBerry



SE Labs tested BlackBerry Protect and Optics in this Breach Response test. We pitted it against a range of hacking attacks designed to compromise systems and penetrate target networks. These are the same techniques criminals and other attackers use to breach systems and networks in the real world.

Breach Response Test: BlackBerry Protect

Testers used full chains of attack, meaning that they behaved as real attackers. We probed targets using a variety of tools, techniques and vectors before attempting to gain lower-level and more powerful access.

Finally, the testers/ attackers attempted to complete their missions. This might include stealing information, damaging systems and connecting to other systems on the network.

Loader Loading…
EAD Logo Taking too long?

Reload Reload document
| Open Open in new tab

Download

Tested products from:

BlackBerry

All reports

12/2020 - 12/2020

Breach Response (Protection): CrowdStrike Falcon 2020 Q4

SE Labs tested CrowdStrike Falcon in this Breach Response test. We pitted it against a range of hacking attacks designed to compromise systems and penetrate target networks. These are the same techniques criminals and other attackers use to breach systems and networks in the real world.

Testers used full chains of attack, meaning that they behaved as real attackers. We probed targets using a variety of tools, techniques and vectors before attempting to gain lower-level and more powerful access.

Finally, the testers/ attackers attempted to complete their missions. This might include stealing information, damaging systems and connecting to other systems on the network.

Loader Loading…
EAD Logo Taking too long?

Reload Reload document
| Open Open in new tab

Download

All reports

08/2020 - 08/2020

Breach Response (Detection): Crowdstrike Falcon 2020 Q2

SE Labs tested Crowdstrike Falcon in this Breach Response test, pitting it against a range of hacking attacks designed to compromise systems and penetrate target networks in the same way as criminals and other attackers breach systems and networks.

Full chains of attack were used, meaning that testers behaved as real attackers, probing targets using a variety of tools, techniques and vectors before attempting to gain lower-level and more powerful access.

Finally, the testers/ attackers attempted to complete their missions, which might include stealing information, damaging systems and connecting to other systems on the network.

Loader Loading…
EAD Logo Taking too long?

Reload Reload document
| Open Open in new tab

Download

All reports

08/2020 - 08/2020

Breach Response (Protection): SentinelOne 2020 Q2

SE Labs tested SentinelOne in this Breach Response test, pitting it against a range of hacking attacks designed to compromise systems and penetrate target networks in the same way as criminals and other attackers breach systems and networks.

Full chains of attack were used, meaning that testers behaved as real attackers, probing targets using a variety of tools, techniques and vectors before attempting to gain lower-level and more powerful access.

Finally, the testers/ attackers attempted to complete their missions, which might include stealing information, damaging systems and connecting to other systems on the network.

Loader Loading…
EAD Logo Taking too long?

Reload Reload document
| Open Open in new tab

Download

All reports

02/2019 - 02/2019

Breach Response Test: Symantec Endpoint Security Complete

Loader Loading…
EAD Logo Taking too long?

Reload Reload document
| Open Open in new tab

Download

All reports

02/2019 - 02/2019

Breach Response Test: Kaspersky Anti Targeted Attack Platform

Loader Loading…
EAD Logo Taking too long?

Reload Reload document
| Open Open in new tab

Download

Contact us

Give us a few details about yourself and describe your inquiriy. We will get back to you as soon as possible.

Get in touch

Feel free to reach out to us with any questions or inquiries

info@selabs.uk Connect with us Find us