All reports

12/2020 - 12/2020

Breach Response (Protection): CrowdStrike Falcon 2020 Q4

SE Labs tested CrowdStrike Falcon in this Breach Response test. We pitted it against a range of hacking attacks designed to compromise systems and penetrate target networks. These are the same techniques criminals and other attackers use to breach systems and networks in the real world.

Testers used full chains of attack, meaning that they behaved as real attackers. We probed targets using a variety of tools, techniques and vectors before attempting to gain lower-level and more powerful access.

Finally, the testers/ attackers attempted to complete their missions. This might include stealing information, damaging systems and connecting to other systems on the network.

Loader Loading…
EAD Logo Taking too long?

Reload Reload document
| Open Open in new tab

Download

All reports

08/2020 - 08/2020

Breach Response (Detection): Crowdstrike Falcon 2020 Q2

SE Labs tested Crowdstrike Falcon in this Breach Response test, pitting it against a range of hacking attacks designed to compromise systems and penetrate target networks in the same way as criminals and other attackers breach systems and networks.

Full chains of attack were used, meaning that testers behaved as real attackers, probing targets using a variety of tools, techniques and vectors before attempting to gain lower-level and more powerful access.

Finally, the testers/ attackers attempted to complete their missions, which might include stealing information, damaging systems and connecting to other systems on the network.

Loader Loading…
EAD Logo Taking too long?

Reload Reload document
| Open Open in new tab

Download

All reports

08/2020 - 08/2020

Breach Response (Protection): SentinelOne 2020 Q2

SE Labs tested SentinelOne in this Breach Response test, pitting it against a range of hacking attacks designed to compromise systems and penetrate target networks in the same way as criminals and other attackers breach systems and networks.

Full chains of attack were used, meaning that testers behaved as real attackers, probing targets using a variety of tools, techniques and vectors before attempting to gain lower-level and more powerful access.

Finally, the testers/ attackers attempted to complete their missions, which might include stealing information, damaging systems and connecting to other systems on the network.

Loader Loading…
EAD Logo Taking too long?

Reload Reload document
| Open Open in new tab

Download

All reports

02/2019 - 02/2019

Breach Response Test: Symantec Endpoint Security Complete

Loader Loading…
EAD Logo Taking too long?

Reload Reload document
| Open Open in new tab

Download

All reports

02/2019 - 02/2019

Breach Response Test: Kaspersky Anti Targeted Attack Platform

Loader Loading…
EAD Logo Taking too long?

Reload Reload document
| Open Open in new tab

Download

All reports

06/2018 - 06/2018

Network Security Appliance Test

Loader Loading…
EAD Logo Taking too long?

Reload Reload document
| Open Open in new tab

Download

All reports

01/2018 - 01/2018

Network Security Appliance Test

Loader Loading…
EAD Logo Taking too long?

Reload Reload document
| Open Open in new tab

Download

All reports

12/2017 - 12/2017

Network Security Appliance Test

Loader Loading…
EAD Logo Taking too long?

Reload Reload document
| Open Open in new tab

Download

All reports

07/2017 - 07/2017

Network Security Appliance Test

Loader Loading…
EAD Logo Taking too long?

Reload Reload document
| Open Open in new tab

Download

Contact us

Give us a few details about yourself and describe your inquiriy. We will get back to you as soon as possible.

Get in touch

Feel free to reach out to us with any questions or inquiries

info@selabs.uk Connect with us Find us