Mapping Talon’s Enterpriser Browser Capabilities To the MITRE ATT&CK Framework


MITRE ATT&CK® is a comprehensive, open framework for consistently identifying, classifying, and deconstructing cyberattacks. It includes a vast knowledge base of common adversarial tactics, techniques, and procedures (TTPs) based on real-world observations. Organizations can use ATT&CK to assess risks, strengthen security, and improve threat detection and mitigation efforts.

The ATT&CK framework provides a common taxonomy that lets security professionals (SOC staff, threat hunters, red and blue teams, pen testers, security vendors, threat intelligence providers, etc.) easily exchange information and collaborate using the same language. It helps information security teams identify security gaps, reduce vulnerabilities, and shore up defenses.

ATT&CK organizes adversarial techniques into a collection of tactics to help security professionals efficiently detect, track, and mitigate threats. The tactics describe what the adversary is trying to accomplish, e.g., gain initial access to a system. The techniques (and sub-techniques) describe the actions the adversary takes to achieve their goals, e.g., via a phishing attack.

The current matrix, ATT&CK v13, includes three distinct collections of tactics:

  • Enterprise tactics for Windows, macOS, Linux, cloud, and network systems
  • Mobile tactics for Apple iOS and Android devices
  • Industrial Control Systems (ICS) tactics for Supervisory Control and Data Acquisition (SCADA) systems and other industrial control systems

The Talon Enterprise Browser is a hardened, Chromium-based browser with advanced security functionality, specifically designed to protect modern web applications and hybrid workforces.

Talon browser transforms the usual web browser into a full-fledged enterprise security monitoring and policy enforcement engine, giving corporate IT and security teams deep visibility and tight control over web services and user actions.

This matrix describes how Talon’s Enterprise Browser addresses certain MITRE ATT&CK enterprise tactics, techniques, and sub-techniques.

    [0] => WP_Term Object
            [term_id] => 17
            [name] => Talon's Coverage of MITRE ATT&CK
            [slug] => talons-coverage-of-mitre-attack
            [term_group] => 0
            [term_taxonomy_id] => 17
            [taxonomy] => mitre-type
            [description] => 
            [parent] => 0
            [count] => 0
            [filter] => raw
            [term_order] => 36


Talon’s Coverage of Mitre Att&Ck

Talon’s Coverage of MITRE ATT&CK (1 – 2)
Command and Control
Command and Control (3 – 4)
Credential Access
Defense Evasion
Defense Evasion (5 – 6)
Execution (7 – 8)
Impact (9 – 10)
Initial Access
Lateral Movement
Lateral Movement (11 – 12)
Privilege Escalation
Privilege Escalation (13 – 14)
Resource Development

Learn how Talon’s Enterprise Browser maps to the MITRE ATT&CK framework.

Download Whitepaper

Talon has joined forces with Palo Alto Networks to secure all users and devices