Mitiga, the cloud and SaaS incident response leader, today announced that Cisco Investments has made a strategic investment in the company. The funding will help support significant market adoption among the many transforming enterprises seeking modern security solutions for their cloud and SaaS environments. Mitiga is at the forefront of a new wave in cloud investigation and response capabilities, providing the industry’s only complete Cloud Investigation and Response Automation (CIRA) solution: IR2. This proactive approach to incident response delivers the capabilities required to shut down breaches across cloud and SaaS environments.

“We are thrilled to add Cisco Investments to our group of investors and see it as a huge opportunity to have a larger influence on the CIRA market,” stated Tal Mozes, co-founder and CEO of Mitiga. “I’ve been in the cybersecurity industry for over 25 years, and during that time there have been few advancements in the ways companies handle incident response (IR). Prior to Mitiga entering the market, IR was only offered as a professional service which is not compatible with a modern architecture that includes cloud and SaaS applications. Today, incident response needs to deliver faster response times, reduced investigation overhead and continuous attack detection. We look forward to working with Cisco to continue delivering modern solutions that help companies minimize the impact of inevitable cloud and SaaS related breaches.”

Recognizing the need for a new set of solutions, Gartner® recently defined CIRA as “an emerging technology that forensically collects, analyzes and applies analytics and machine learning on cloud and various forensic data sources. The defining goal of these offerings is to forensically analyze incidents, find and collect related files, and correlate log events in support of comprehensive investigations of confirmed threats. These tools are also leveraged for human resource violations, legal cases, and data breach events for legal cases or law enforcement.”1

Mitiga provides the industry’s only complete CIRA solution, to simplify and dramatically accelerate cloud and SaaS breach investigations, offering cloud-driven companies a new level of cyber and organizational resilience.

Mitiga's IR2 platform performs continuous hunts for emerging attacks based on the company’s constantly growing cloud attack scenario library (CASL), the industry’s first and only database dedicated to cloud and SaaS multi-vector hunts. When a breach occurs, IR2 provides instant answers by proactively gathering, organizing, and analyzing forensic-level data, and delivering insights in a single pane of glass. By enabling ongoing readiness and compressing the investigation time from weeks or months to hours, Mitiga's solution reduces recovery time and incident-related damage—getting customers back to business fast.

  1. Gartner, Emerging Tech: Security — Cloud Investigation and Response Automation Offers Transformation Opportunities, Lawrence Pingree, Mark Wah, 5 June 2023

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.

LAST UPDATED:

April 17, 2024

Don't miss these stories:

Why Visibility Drives Everything in Modern Cybersecurity with Sevco’s Greg Fitzgerald

In this episode of Mitiga Mic, Brian Contos sits down with Greg Fitzgerald, co-founder of Sevco Security, for a candid conversation on the real state of asset visibility, prioritization, and the evolving challenges facing security teams. With nearly three decades in the industry, Fitzgerald brings perspective on how cybersecurity has shifted from endpoint tools to orchestration-wide awareness. And why that shift is critical for cloud, SaaS, AI, and identity defense. Watch the episode or read the full transcript below.

How Threat Actors Used Salesforce Data Loader for Covert API Exfiltration

In recent weeks, a sophisticated threat group has targeted companies using Salesforce’s SaaS platform with a campaign focused on abusing legitimate tools for illicit data theft. Mitiga’s Threat Hunting & Incident Response team, part of Mitiga Labs, investigated one such case and discovered that a compromised Salesforce account was used in conjunction with a “Salesforce Data Loader” application, a legitimate bulk data tool, to facilitate large-scale data exfiltration of sensitive customer data.

God-Mode in the Shadows: When Security Tools and Excessive Permissions Become Cloud Security Risks

By the time the alarms go off, it’s often too late. A trusted third-party security tool, one that promised to protect your cloud and SaaS environments, has been operating with unchecked ‘god-mode’ privileges. These tools, usually classified as SaaS Security Posture Management (SSPM) or Data Security Posture Management (DSPM), have been granted near-unrestricted access to your data, configurations, and secrets.

How AI Is Transforming Cybersecurity: Detection, Response & Threat Evolution with Mitiga’s Ofer Maor

In this episode of Mitiga Mic, Brian Contos, Field CISO at Mitiga, sits down once again with Ofer Maor, CTO and Co-founder, to break down one of today’s most urgent cybersecurity challenges: the intersection of Artificial Intelligence (AI) and Detection & Response. From the Automated SOC to AI-powered attackers and cloud-based AI infrastructure threats, Ofer outlines the three pillars of AI-DR (AI Detection and Response) and what organizations need to know now and in the near future.

Meet Mitiga in Las Vegas at Black Hat, DEF CON, and BSides

From August 4 to 11, Mitiga will be on the ground in Las Vegas for Black Hat USA, DEF CON, and BSides Las Vegas. If you’re responsible for cloud security, SaaS threat detection, or incident response, this is your opportunity to connect directly with our team.

Why Wi-Fi Isn’t Enough: Joseph Salazar on Wireless Airspace Security

In this episode of Mitiga Mic, we sit down with cybersecurity veteran Joseph Salazar, now with Bastille Networks, to uncover the vast and often invisible world of wireless attack surfaces. From Bluetooth-enabled coffee mugs and smart thermostats to malicious USB cables that launch attacks from parking lots, Joseph walks us through real-world threats that operate outside your firewall and beyond traditional security tools.