We’re proud to release Investigation Workbench, a first-of-its-kind cyber solution that provides instant clarity on all multi-cloud and Software-as-a-Service (SaaS) activities through a single pane of glass. This innovative capability further enhances Mitiga's IR2 Platform, the industry’s only complete cloud investigation and response automation (CIRA) solution.

At a moment when the Securities and Exchange Commission (SEC) is requiring public U.S. companies to report material cybersecurity incidents within 4 days, enterprises are also facing prevalent, damaging, and sophisticated cloud and SaaS incidents. An advancement like Investigation Workbench is invaluable to ensure enterprises have the capabilities required to respond.

“Incident response readiness is a critical step in achieving cyber resilience,” said Dave Gruber, Principal Analyst, Enterprise Strategy Group. “Our research ranks cloud as the top priority for detection and response, which indicates that many organizations still lack the visibility and data needed to rapidly investigate, understand, and respond to attacks within cloud and SaaS applications and infrastructure. Mitiga is helping organizations close this gap with tools like Investigation Workbench and its IR2 Platform that continuously capture, organize, and query forensics-grade cloud data at scale, augmented further by insights from Mitiga's cloud and SaaS IR experts. Incident response can be a slow arduous process in the cloud, and Mitiga is helping simplify and accelerate it.”

Using Mitiga’s Investigation Workbench, Security Operations Center (SOC) teams can see chains of events across vast cloud and SaaS estates to understand the extent of the activities and impact without possessing deep cloud and SaaS investigation expertise. Determining materiality in a short span becomes not only viable but remarkably simpler, empowering internal Incident Response (IR) and SOC teams in a whole new way. They can now quickly decide which cloud and SaaS incidents they can effectively manage in-house, and which larger incidents demand both disclosure and additional support and expertise to contain.

"Since inception, Mitiga has been dedicated to helping organizations proactively prepare for cloud and SaaS attacks so they can respond immediately and get back to business as usual,” stated Tal Mozes, co-founder and CEO, Mitiga. “We enable a level of resilience for modern enterprises that traditional methods can’t. The majority of the industry is playing catch-up, only now understanding that incident response in the cloud and SaaS requires new capabilities to deliver faster response times, reduced investigation overhead, and continuous breach detection. Investigation Workbench builds off our important industry research, helping companies combat today’s sophisticated threats. Not only does it take the market to a new level by removing complexity for internal IR and SOC teams—enabling them to quickly understand an incident and take immediate action to minimize downtime—but it also furthers our leadership position in this emerging CIRA space.”

Investigation Workbench can be used in any situation where there is a need to investigate cloud or SaaS activities, including a security alert, suspected phishing incident, or unusual user behavior, to understand exactly what happened. For example, if a user has been phished, Investigation Workbench can be used to see what actions the user took after the phishing incident. It provides an automated timeline of activities, allowing security teams to assess whether the user downloaded files, read certain emails, or performed other actions that could indicate a security breach. With Investigation Workbench, organizations can swiftly determine whether an incident is minor and can be managed internally or if it's substantial and necessitates further expert intervention.

“2023 has been a tremendous year for Mitiga,” said Mozes, “and we’re so pleased to end the year with the availability of this innovative solution.”

LAST UPDATED:

May 4, 2024

See cloud and SaaS activities clearly. Learn more about Investigation Workbench.

Don't miss these stories:

Inside Mitiga’s Forensic Data Lake: Built for Real-World Cloud Investigations

Most security tools weren’t designed for the scale or complexity of cloud investigations. Mitiga’s Forensic Data Lake was.

Measurements That Matter: What 80% MITRE Cloud ATT&CK Coverage Looks Like

Security vendors often promote “100% MITRE ATT&CK coverage.” The reality is most of those claims reflect endpoint-centric testing, not the attack surfaces organizations rely on most today: Cloud, SaaS, AI, and Identity.

How Threat Actors Used Salesforce Data Loader for Covert API Exfiltration

In recent weeks, a sophisticated threat group has targeted companies using Salesforce’s SaaS platform with a campaign focused on abusing legitimate tools for illicit data theft. Mitiga’s Threat Hunting & Incident Response team, part of Mitiga Labs, investigated one such case and discovered that a compromised Salesforce account was used in conjunction with a “Salesforce Data Loader” application, a legitimate bulk data tool, to facilitate large-scale data exfiltration of sensitive customer data.

Why Visibility Drives Everything in Modern Cybersecurity with Sevco’s Greg Fitzgerald

In this episode of Mitiga Mic, Brian Contos sits down with Greg Fitzgerald, co-founder of Sevco Security, for a candid conversation on the real state of asset visibility, prioritization, and the evolving challenges facing security teams. With nearly three decades in the industry, Fitzgerald brings perspective on how cybersecurity has shifted from endpoint tools to orchestration-wide awareness. And why that shift is critical for cloud, SaaS, AI, and identity defense. Watch the episode or read the full transcript below.

God-Mode in the Shadows: When Security Tools and Excessive Permissions Become Cloud Security Risks

By the time the alarms go off, it’s often too late. A trusted third-party security tool, one that promised to protect your cloud and SaaS environments, has been operating with unchecked ‘god-mode’ privileges. These tools, usually classified as SaaS Security Posture Management (SSPM) or Data Security Posture Management (DSPM), have been granted near-unrestricted access to your data, configurations, and secrets.

How AI Is Transforming Cybersecurity: Detection, Response & Threat Evolution with Mitiga’s Ofer Maor

In this episode of Mitiga Mic, Brian Contos, Field CISO at Mitiga, sits down once again with Ofer Maor, CTO and Co-founder, to break down one of today’s most urgent cybersecurity challenges: the intersection of Artificial Intelligence (AI) and Detection & Response. From the Automated SOC to AI-powered attackers and cloud-based AI infrastructure threats, Ofer outlines the three pillars of AI-DR (AI Detection and Response) and what organizations need to know now and in the near future.