Mitiga Appoints Charlie Thomas as CEO READ THE RELEASE

Mitiga Announces $30M Series B Led by SYN Ventures READ THE NEWS

We are excited to announce the partnership between Mitiga, a leading Cloud and SaaS Detection and Response (CDR) provider, and Torq, a no-code security automation platform. This partnership directly addresses the gaps in SecOps teams' tools and expertise in handling threats in the complex and evolving world of cloud and SaaS environments. By combining Mitiga’s advanced TDIR solution for Cloud and SaaS environments, with Torq’s automation, this integration delivers the visibility, speed, precision, and control that SecOps teams need to tackle modern cloud and SaaS threats.

Mitiga + Torq = Powerful, Automated Cloud and SaaS Threat Response

Torq is a no-code security automation platform designed to simplify security operations through customizable, automated workflows. By integrating with a wide range of security tools, Torq enables organizations to automate responses to security incidents, improving both response speed and efficiency while minimizing manual intervention.

The integration between Mitiga and Torq provides a holistic solution for managing threats and security incidents in cloud and SaaS environments. Mitiga’s real-time threat detection alerts are fed directly into Torq, where they trigger automated workflows, allowing security teams to respond rapidly and efficiently—even in environments where teams might lack specific cloud or SaaS expertise.

torq-img
Mitiga integrates with Torq to enable effective SaaS and cloud threat response

Key Benefits of the Integration

Orchestrated Response to Cloud and SaaS Threats

When a threat is detected, the integration allows security teams to orchestrate responses to isolate or stop an adversary. Torq can automate actions such as disabling a user, resetting passwords, canceling active tokens, stopping services, reducing privileges, and other critical actions. This orchestration ensures a rapid and consistent response to mitigate potential threats before they can escalate—empowering teams to act even in complex, cloud-specific scenarios.

Automated User Action Verification via Communication Channels

Another key aspect of this integration is automating the often slow and manual process of verifying suspicious actions with the original user. In many security incidents, determining whether a suspicious action—such as a login or privilege escalation—was legitimate or malicious can take time as security teams attempt to verify it with the user. Through integrations with communication platforms like Slack, Teams, and email, Torq can accelerate this process by automatically sending verification requests to the user. This integration helps security teams quickly determine if the action was legitimate or a potential threat, allowing them to either dismiss the alert or take swift, appropriate action. By automating these verifications, organizations can significantly reduce the time it takes to investigate incidents and reduce the risk of prolonged exposure to threats.

Enhanced Incident Context with Forensic Data

Mitiga’s alerts provide deep forensic context, including detailed profiles of involved users, roles, and assets, along with the original logs that triggered the alert. Torq uses this forensic data to enrich the response workflows, giving security teams critical insights into the scope and nature of the incident. This added context helps drive more precise and effective response decisions, especially in cloud and SaaS environments where visibility and data granularity are crucial.

Automated Incident Management

Torq enables security teams to automate key incident management tasks, such as investigating suspicious activity, notifying stakeholders, and triggering predefined mitigation workflows. By automating these steps, security teams can respond quickly and consistently, improving operational efficiency and reducing human error, all while navigating the unique challenges of securing cloud and SaaS applications.

Seamless Alert Lifecycle Management

Once a threat has been mitigated and the incident resolved, the integration ensures that alerts are automatically closed in Mitiga. This closes the loop on incident management, eliminating the need for manual follow-up and allowing security teams to focus on the next critical task.

Power Your Team’s Threat Mitigation with Mitiga and Torq

With this powerful integration, security teams can fully automate their cloud and SaaS detection and response processes, ensuring faster, more effective threat mitigation while reducing manual effort. The combination of Mitiga’s deep forensic insights and Torq’s flexible automation capabilities gives organizations the tools they need to protect their cloud environments with speed and precision, even in environments where security tooling and expertise have traditionally lagged.

LAST UPDATED:

October 31, 2024

Want to learn more about how integrations can power your team’s threat detection, investigation, and response for cloud and SaaS? Request a demo with a cloud security expert today.

Don't miss these stories:

Hunting Conditional Access Policy Bypass in the Wild: Leveraging Malicious Browser Extensions for Seamless Initial Access

Mitiga’s threat detection and investigation experts conduct a threat hunt showing how attackers can bypass credential collection techniques to gain access to further information.

Is Your CDR Vision Cloudy? Why Complete, Panoramic Visibility Across SaaS, Identity, and Infrastructure is a Must

Security teams need to recognize the shortcomings of traditional cloud security approaches and learn why agentless panoramic visibility is a must for effective CDR.

Understanding the Sisense Breach: A Guide to Cloud Threat Hunting for Sisense Customers

On April 11, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) announced its collaboration with private industry partners to address a significant security breach affecting Sisense, a prominent provider of data analytics services. This compromise, unearthed by independent security researchers, raised alarms within the cybersecurity community, prompting swift action from both government agencies and affected organizations.

The Rising Threat of AI-Enabled Adversaries: Preparing for the Next Wave of Cloud and SaaS Attacks

Learn how adversaries weaponize AI technology and strategies to defend against AI-enabled threats.

Cyber Trends for 2024: What Security Leaders Should be Executing Next

As we hurtle into this new year, it’s already clear that there is an evolving set of cyber risks that organizations will need to contend with successfully to manage threats and grow their organizational resilience in 2024. Below, I’ll outline three of the biggest ones, sharing recommendations and execution checklists that can help enterprises enhance their threat readiness and elevate security postures as the threat landscape continues to evolve.

How to Protect Your Business From the Most Dangerous Cyberthreats

Ransomware attacks are on the rise, and it now more important then ever to be prepared. Be prepared by having an up-to-date incident response plan. Learn more.