Mitiga IR2 Platform

Our Platform enables us to offer our customers Unlimited IR support, with the world's best cloud forensics investigators at no additional cost.

Forensics Data Lake

Analyzing cloud forensics data for investigation

Storing forensics data from various clouds and SaaS

Breach Response Readiness

Breach response maturity assessment

Forensics data readiness and validation of its completeness

Proactive forensics data acquisition

Automated Threat hunt

Leveraging our Cloud Attack Scenario Library to hunt for attacks in your cloud forensics data constantly

Cloud Incident Response Management & Orchestration

Managing and orchestrating the breach response over our platform enables a near-real-time view of events to different stakeholders to bring situational awareness

Resilience for your cloud infrastructure and SaaS

Mitiga’s platform connects to all your cloud environments to enable you to enjoy the benefits of our solution.

Amazon Web Services
Google Cloud Platform
Azure
Google Workspace
Office 365
Confluence
Box
Okta
1Password
LastPass
Slack
Salesforce
Kubernetes
VMware Carbon Black
GitHub
GitLab
Jira
BigQuery
Splunk
MongoDB Atlas
Snowflake
AlertLogic
Atlassian
CrowdStrike
Amazon GuardDuty

Cloud Incident
Readiness & Response

Cloud Incident Response starts before the compromise is detected

The Cloud Incident
Response Company

Cloud Incident Response starts before the compromise is detected

Resources

Insight and analysis into cloud incidents, threat research, and cybersecurity trends
Ransomware Heads-Up: Family Isn’t the Only Holiday Gang In Town

In this blog, Mitiga Vice President of Consulting Services Rob Floodeen provides several recommendations on how cybersecurity teams can make it through the upcoming holiday season with reduced ransomware visitors.

Oops, I Leaked It Again — How Mitiga Found PII in Exposed Amazon RDS Snapshots

A recent Mitiga Research Team investigation found the well-regarded Amazon Relational Database Service is leaking PII via exposed RDS Snapshots.

Uber Cybersecurity Incident: Which Logs Do IR Teams Need to Focus On?

On September the 16th, Uber announced they experienced a major breach in their organization in which malicious actor was able to log in and take over multiple services and internal tools used at Uber. What are some of the logs that IR teams should be focusing on in their investigation?