Mitiga is proud to announce our strategic partnership with Kroll, the leading independent provider of global risk and financial advisory solutions. This collaboration enhances Mitiga’s Cloud and Incident Response Automation (CIRA) capabilities with Kroll’s incident response (IR) and litigation services, providing today’s hybrid enterprises with a complete IR solution. The combination of Mitiga’s leading CIRA offering and Kroll’s global cyber incident response and litigation support ensures today’s hybrid enterprises have access to unmatched resources during critical moments.

At Mitiga, we've been at the forefront of a new wave in cloud investigation and response, providing modern enterprises with the technology and expertise required to root out and respond to breaches across cloud and Software-as-a-Service (SaaS) environments an average of 70x faster than traditional methods. The seamless integration with Kroll enables Mitiga to offer the industry’s most comprehensive IR service while remaining steadfast in its dedication to providing cutting-edge expertise and value in Cloud and SaaS investigations.

“Today’s enterprises are facing an endlessly evolving threat landscape with threats becoming more damaging and sophisticated, both on-prem and in the cloud,” stated Ariel Parnes, co-founder and COO of Mitiga. “The combination of our CIRA platform with Kroll’s renowned global incident response and litigation solution ensures our customers can combat these incidents fast, regardless of where they exist. This has become especially important as the Securities and Exchange Commission (SEC) is requiring public U.S. companies to report material cybersecurity incidents within four days. As threats continue to change and new regulations are put into place, we are committed to providing our customers with the industry’s only extensive IR platform.”

In addition to offering a complete IR solution, organizations will also have the exclusive opportunity to obtain a broad range of services from Kroll at a special discounted price, including red-team exercises, penetration testing, virtual CISO (V-CISO) services, and more.

LAST UPDATED:

April 17, 2024

Learn more about what makes Mitiga, the industry’s most complete cloud threat solution for today’s enterprises.

Don't miss these stories:

ShinyHunters and UNC6395: Inside the Salesforce and Salesloft Breaches

Mitiga Labs began investigating a series of suspicious activities targeting Salesforce environments well before the news broke publicly. It all started with traffic from Tor exit nodes interacting with Salesforce via an app called Drift. Is this normal behavior? What is Drift? And how do we assess its legitimacy? This is where the challenge of shadow IT surfaces – security operations teams are often left scrambling to determine whether such activity is authorized or a sign of compromise.

Inside Mitiga’s Forensic Data Lake: Built for Real-World Cloud Investigations

Most security tools weren’t designed for the scale or complexity of cloud investigations. Mitiga’s Forensic Data Lake was.

Breaking Down the Microsoft Entra ID Actor Token Vulnerability: The Perfect Crime in the Cloud

When we think about catastrophic vulnerabilities in the cloud, we usually imagine complex exploits that require advanced techniques, persistence, or luck. Sometimes a single flaw breaks the trust we put in our identity providers.

Invisible Threats: Wireless Exploits in the Enterprise with Brett Walkenhorst

In this episode of Mitiga Mic, Field CISO Brian Contos talks with Brett Walkenhorst, CTO of Bastille, about how wireless attack techniques like Evil Twin and Nearest Neighbor are used to gain access to protected environments. They discuss how these threats show up inside data halls, executive spaces, and high-security facilities, often bypassing traditional network defenses

From Rogue OAuth App to Cloud Infrastructure Takeover

How a rogue OAuth app led to a full AWS environment takeover. And the key steps security leaders can take to prevent similar cloud breaches.

CORSLeak: Abusing IAP for Stealthy Data Exfiltration

When people talk about “highly restricted” cloud environments, they usually mean environments with no public IPs, no outbound internet, and strict VPC Service Controls locking everything down.