IR2 Managed Threat Hunting:
When attackers evade cloud protections, you don’t simply need another tool. You need a complete, managed solution to root out attacks and support security teams. Mitiga’s IR2 has it.
Four types of hunts.
One complete cloud threat hunting program.
Continuous
Always on offense, IR2 performs daily, proactive hunts to surface hidden attacks and breaches in your cloud and SaaS.
Event-Driven
As significant new risks emerge, IR2 hunts based on global attack scenarios that may threaten your enterprise.
Strategic
IR2 conducts specific attack scenario hunts from our library, selected, planned and coordinated with your team.
Tailored
Customize unique hunts with indicators of attack (IoAs) defined to fit your enterprise’s specific detection needs.

Delivering the intelligence your cloud IR requires
Mitiga’s Cloud Attack Scenario Library (CASL) is the industry’s only database dedicated to cloud and SaaS multi-vector hunts, continually updated with the latest attack scenarios, real world incidents and proprietary research from our analysts.