We’re proud to report that at the open of today’s RSAC24, Mitiga was awarded the Publisher's Choice, Cloud Threat Detection Investigation & Response (TDIR) from Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine. This news closely follows Mitiga being named a 2024 RSA Innovation Sandbox finalist.  

“We are incredibly honored to receive the Publisher's Choice for Cloud Threat Detection, Investigation & Response at the 12th Annual Global InfoSec Awards,” stated Tal Mozes, CEO and co-founder of Mitiga. “This prestigious award from Cyber Defense Magazine validates our mission to redefine how enterprises can achieve better control over their cloud environment's security and resilience. By equipping SOC teams with the most advanced tools for visibility, detection, investigation, and response, Mitiga is setting a new standard in cloud security, ensuring rapid and effective threat management for enterprises worldwide.”

It’s been an exciting journey to reach this point, because while Mitiga’s start was in cloud incident response (IR), it quickly became apparent that SecOps teams not only needed tooling for cloud IR capabilities, but also to enable detection in their complex cloud ecosystems. We distilled our expertise into a platform that empowers SecOps professionals with rich, fast context to detect cloud threats, cutting down the alert noise and replacing it with the insights that help analysts spend their limited time wisely on the most critical threats.

We also created our Investigation Workbench to help those same teams to automatically construct detailed timelines across their cloud footprints—whether they have cloud and IR expertise, or not. It’s advancements like these that help us supercharge investigation for the cloud era. Our leading-edge solutions empower enterprises to act against cloud threats, decreasing the time it takes to detect, investigate, and respond, end-to–end, from 200 days to minutes.

“Mitiga stands out for embodying the key qualities we judges seek in award winners: a proactive stance in understanding and addressing tomorrow’s threats today, delivering cost-effective solutions that fit our current economic climate, and driving innovation in unexpected ways. I believe Mitiga’s approach not only mitigates cyber risks but also strategically positions organizations to anticipate and counteract the next breach. Their commitment to these principles is what sets them apart in the cybersecurity landscape,” said Gary S. Miliefsky, Publisher of Cyber Defense Magazine.

To learn more about our detection, investigation, and response capabilities and where they fit into today’s tech stack, check out this recent report from ESG, or reach out to our team for a demonstration.

LAST UPDATED:

September 24, 2024

Don't miss these stories:

From Breach Response to Platform Powerhouse: Ofer Maor on Building Mitiga for Cloud, SaaS, and Identity Security

Solutions Platform Helios AI Cloud Security Data Lake Cloud Threat Detection Investigation and Response Readiness (TDIR) Cloud Detection and Response (CDR) Cloud Investigation and Response Automation (CIRA) Investigation Workbench Managed Services Managed Cloud Detection and Response (C-MDR) Cloud Managed Threat Hunting Cloud and SaaS Incident Response Resources Blog Mitiga Labs Resource Library Incident Response Glossary Company About Us Team Careers Contact Us In the News Home » Blog Main BLOG From Breach Response to Platform Powerhouse: Ofer Maor on Building Mitiga for Cloud, SaaS, and Identity Security In this premiere episode of Mitiga Mic, Mitiga’s Co-founder and CTO Ofer Maor joins host Brian Contos to share the journey behind Mitiga’s creation—and how it became the first purpose-built platform for cloud, SaaS, and identity detection and response. Ofer discusses why traditional incident response falls short in modern environments, how Mitiga built its platform from real-world service experience, and the crucial role of automation and AI in modern SOC operations.

Helios AI: Why Cloud Security Needs Intelligent Automation Now

Mitiga launches Helios AI, an intelligent cloud security solution that automates threat detection and response. Its first feature, AI Insights, cuts through noise, speeds up analysis, and boosts SecOps efficiency.

Hackers in Aisle 5: What DragonForce Taught Us About Zero Trust

In a chilling reminder that humans remain the weakest component in cybersecurity, multiple UK retailers have fallen victim to a sophisticated orchestrated cyber-attack by the hacking group known as DragonForce. But this breach was not successful using a zero-day application vulnerability or a complex attack chain. It was built on trust, manipulation, and a cleverly deceptive phone call.

No One Mourns the Wicked: Your Guide to a Successful Salesforce Threat Hunt

Salesforce is a cloud-based platform widely used by organizations to manage customer relationships, sales pipelines, and core business processes.

Tag Your Way In: New Privilege Escalation Technique in GCP

GCP offers fine-grained access control using Identity and access management (IAM) Conditions, allowing organizations to restrict permissions based on context like request time, resource type and resource tags.

Who Touched My GCP Project? Understanding the Principal Part in Cloud Audit Logs – Part 2

This second part of the blog series continues the path to understanding principals and identities in Google Cloud Platform (GCP) Audit Logs. Part one introduced core concepts around GCP logging, the different identity types, service accounts, authentication methods, and impersonation.