Mitiga Announces $30M Series B Led by SYN Ventures READ THE NEWS

Mitiga, the cloud and SaaS incident response leader, today announced that Cisco Investments has made a strategic investment in the company. The funding will help support significant market adoption among the many transforming enterprises seeking modern security solutions for their cloud and SaaS environments. Mitiga is at the forefront of a new wave in cloud investigation and response capabilities, providing the industry’s only complete Cloud Investigation and Response Automation (CIRA) solution: IR2. This proactive approach to incident response delivers the capabilities required to shut down breaches across cloud and SaaS environments.

“We are thrilled to add Cisco Investments to our group of investors and see it as a huge opportunity to have a larger influence on the CIRA market,” stated Tal Mozes, co-founder and CEO of Mitiga. “I’ve been in the cybersecurity industry for over 25 years, and during that time there have been few advancements in the ways companies handle incident response (IR). Prior to Mitiga entering the market, IR was only offered as a professional service which is not compatible with a modern architecture that includes cloud and SaaS applications. Today, incident response needs to deliver faster response times, reduced investigation overhead and continuous attack detection. We look forward to working with Cisco to continue delivering modern solutions that help companies minimize the impact of inevitable cloud and SaaS related breaches.”

Recognizing the need for a new set of solutions, Gartner® recently defined CIRA as “an emerging technology that forensically collects, analyzes and applies analytics and machine learning on cloud and various forensic data sources. The defining goal of these offerings is to forensically analyze incidents, find and collect related files, and correlate log events in support of comprehensive investigations of confirmed threats. These tools are also leveraged for human resource violations, legal cases, and data breach events for legal cases or law enforcement.”1

Mitiga provides the industry’s only complete CIRA solution, to simplify and dramatically accelerate cloud and SaaS breach investigations, offering cloud-driven companies a new level of cyber and organizational resilience.

Mitiga's IR2 platform performs continuous hunts for emerging attacks based on the company’s constantly growing cloud attack scenario library (CASL), the industry’s first and only database dedicated to cloud and SaaS multi-vector hunts. When a breach occurs, IR2 provides instant answers by proactively gathering, organizing, and analyzing forensic-level data, and delivering insights in a single pane of glass. By enabling ongoing readiness and compressing the investigation time from weeks or months to hours, Mitiga's solution reduces recovery time and incident-related damage—getting customers back to business fast.

  1. Gartner, Emerging Tech: Security — Cloud Investigation and Response Automation Offers Transformation Opportunities, Lawrence Pingree, Mark Wah, 5 June 2023

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.

LAST UPDATED:

April 17, 2024

Don't miss these stories:

Cyber Trends for 2024: What Security Leaders Should be Executing Next

As we hurtle into this new year, it’s already clear that there is an evolving set of cyber risks that organizations will need to contend with successfully to manage threats and grow their organizational resilience in 2024. Below, I’ll outline three of the biggest ones, sharing recommendations and execution checklists that can help enterprises enhance their threat readiness and elevate security postures as the threat landscape continues to evolve.

How to Protect Your Business From the Most Dangerous Cyberthreats

Ransomware attacks are on the rise, and it now more important then ever to be prepared. Be prepared by having an up-to-date incident response plan. Learn more.

Stop Ransomware Attackers From Getting Paid to Play Double-Extortionware Games

In the past, many companies relied on backups to get back to business quickly if they were attacked. Reliable, secure backups separated from the primary environment made it much more difficult for an attacker to access and encrypt them. That long-standing process no longer deters double-extortionware actors — instead, today’s attackers not only encrypt the data but also exfiltrate it.

SEC Cyber Disclosure Rule FAQ: What Leaders are Asking Us

The U.S. Securities and Exchange Commission (SEC) recently implemented a new rule mandating stringent cybersecurity incident reporting and disclosure requirements for public companies.

Log4Shell - identify vulnerable external-facing workloads in AWS

Cloud-based systems should be thoroughly searched for the new Log4j vulnerability (CVE-2021-44228). But this is a daunting task, since you need to search each and every compute instance, from the biggest EC2 instance to the smallest Lambda function. This is where Mitiga can help.

For Incident Response, Give Peacetime Value a Chance

As an IR vendor, it is important to keep your customers up to date and prepared between breach attempts. Learn how to increase your peacetime value now.