Emerging threats require innovative responses. Funded by his $7.5 million seed round led by YL Ventures, Miggo introduces a new concept of application detection and response to address the growing challenge of application attacks that are often overlooked by current security tools. We aim to do so.
Understand ADR
Application detection and response is a unique approach in the cybersecurity space and is different from existing solutions such as endpoint detection and response and network detection and response. While traditional methods focus on monitoring endpoints and network traffic, ADR digs deeper and analyzes activity within the application itself. This shift is critical given that applications are increasingly at the center of cyber-attacks.
Miggo's ADR system works by establishing baseline behavior for application components and monitoring for deviations. This approach allows you to detect anomalies that may indicate a potential security breach. Miggo's platform plans your application's architecture, monitors interactions and data flows, and identifies unexpected activity that could signal an attack.
Comparative analysis with existing DR solutions
AJ Ledwin, a senior researcher at ReliaQuest, recently wrote, “Measuring detection coverage involves assessing the level of visibility in your environment, including the types of attacks that are accurately detected and the types of attacks that go unnoticed. ”
It was the things that seemed to have been overlooked that drove Migo. The need for ADR stems from the limitations of traditional security tools such as EDR, WAF, and CNAPP, which may not fully capture the dynamics of modern distributed applications. These applications often contain complex interactions between components that, if manipulated by an attacker, may be undetectable by traditional perimeter-based tools.
I had the opportunity to speak with Daniel Schechter, CEO and co-founder of Miggo. He emphasized the fundamental idea behind their platform, saying, “We truly believe that this approach of thoroughly understanding the application is the right direction for the problem.” Ta.
Daniel also let us in on a little secret. Migo means “from the inside out” in Aramaic. He pointed out that while traditional tools focus on perimeter defense, ADR provides the micro-level view that is increasingly needed.
Market needs and Miggo solutions
The launch of Miggo's ADR platform responds to a growing market need that traditional security measures cannot protect against, highlighted by recent high-profile breaches affecting MOVEit and Microsoft SharePoint. These incidents demonstrate significant blind spots that exist within many current security frameworks regarding application behavior at runtime.
Miggo claims its ADR platform can detect threats by analyzing interactions within applications, identifying and responding to attacks in real-time. This capability is said to enhance the ability to more effectively contain breaches by identifying the exact location and nature of attacks, potentially reducing the time between detection and response.
play nicely with others
The effectiveness of ADR, like any cybersecurity solution, depends on its integration with existing security protocols and its ability to adapt to new threats. The cybersecurity community will closely monitor whether ADR consistently performs as claimed under real-world conditions.
Daniel shared a conversation he had with a CISO early in the development of the Miggo platform. “We asked him, 'Do you think your application understands what it's doing in production?' He told us, 'Look, I'm good at application security. I'm here,” he said. We have a great DR. But I know that's a blind spot I'm missing. It's probably the only real blind spot we're missing. ”
Next, he stressed to Miggo that they need to make sure the platform they build works well with all their existing tools.
Application detection and response
As cybersecurity threats evolve, so must the tools and strategies employed to combat them.
Miggo's introduction of ADR represents a potentially transformative approach to application security. However, its long-term success and adoption will depend on empirical results and integration with comprehensive security measures.
CISOs and industry experts agree that application layer visibility is critical. However, it also cautions against relying solely on new tools without thorough evaluation. Only time will tell whether ADR can fill critical gaps in current cybersecurity defenses and provide a much-needed shield against advanced application-level attacks.