Mitiga, the cloud and SaaS incident response leader, today announced that Cisco Investments has made a strategic investment in the company. The funding will help support significant market adoption among the many transforming enterprises seeking modern security solutions for their cloud and SaaS environments. Mitiga is at the forefront of a new wave in cloud investigation and response capabilities, providing the industry’s only complete Cloud Investigation and Response Automation (CIRA) solution: IR2. This proactive approach to incident response delivers the capabilities required to shut down breaches across cloud and SaaS environments.

“We are thrilled to add Cisco Investments to our group of investors and see it as a huge opportunity to have a larger influence on the CIRA market,” stated Tal Mozes, co-founder and CEO of Mitiga. “I’ve been in the cybersecurity industry for over 25 years, and during that time there have been few advancements in the ways companies handle incident response (IR). Prior to Mitiga entering the market, IR was only offered as a professional service which is not compatible with a modern architecture that includes cloud and SaaS applications. Today, incident response needs to deliver faster response times, reduced investigation overhead and continuous attack detection. We look forward to working with Cisco to continue delivering modern solutions that help companies minimize the impact of inevitable cloud and SaaS related breaches.”

Recognizing the need for a new set of solutions, Gartner® recently defined CIRA as “an emerging technology that forensically collects, analyzes and applies analytics and machine learning on cloud and various forensic data sources. The defining goal of these offerings is to forensically analyze incidents, find and collect related files, and correlate log events in support of comprehensive investigations of confirmed threats. These tools are also leveraged for human resource violations, legal cases, and data breach events for legal cases or law enforcement.”1

Mitiga provides the industry’s only complete CIRA solution, to simplify and dramatically accelerate cloud and SaaS breach investigations, offering cloud-driven companies a new level of cyber and organizational resilience.

Mitiga's IR2 platform performs continuous hunts for emerging attacks based on the company’s constantly growing cloud attack scenario library (CASL), the industry’s first and only database dedicated to cloud and SaaS multi-vector hunts. When a breach occurs, IR2 provides instant answers by proactively gathering, organizing, and analyzing forensic-level data, and delivering insights in a single pane of glass. By enabling ongoing readiness and compressing the investigation time from weeks or months to hours, Mitiga's solution reduces recovery time and incident-related damage—getting customers back to business fast.

  1. Gartner, Emerging Tech: Security — Cloud Investigation and Response Automation Offers Transformation Opportunities, Lawrence Pingree, Mark Wah, 5 June 2023

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.

LAST UPDATED:

April 17, 2024

Don't miss these stories:

EKS Role Unchaining: Tracing AWS Events Back to Pods for Enhanced Security

Learn two approaches for EKS unchaining that allow teams to associate AWS events with the pods that triggered them.

5 Common Threat Actor Tactics Used in Cloud, Identity, and SaaS Attacks

Explore five common tactics used in cloud attacks and recommendations on how to defend against them.

Tactical Guide to Threat Hunting in Snowflake Environments

It was brought to our attention that a threat actor has been observed using stolen customer credentials to target organizations utilizing Snowflake databases.

Unlocking Cloud Security with Managed Detection and Response

See how Mitiga’s Cloud Managed Detection and Response tackles complex cyber threats with proactive threat management and advanced automation at scale.

Rethinking Crown Jewels Analysis: Mitigating Cybersecurity Bias

Uncover the risks of bias in Crown Jewels Analysis (CJA) and learn strategies to protect your organization's most valuable assets with a comprehensive approach.

Microsoft Breach by Midnight Blizzard (APT29): What Happened?

Understand the Midnight Blizzard Microsoft breach by APT29, what happened, and key steps organizations should take to strengthen their defenses.