We prove if your cloud security mechanisms work; before attackers do !

Most organizations don't know if their security controls will stop real attacks until it's too late. Mitigant closes this gap as the most sophisticated, cloud-focused platform in Gartner's Adversarial Exposure Validation (AEV) category.  Mitigant validates cloud security effectiveness by safely emulating real adversarial techniques across AWS, Azure, and Kubernetes, demonstrating which security measures work and revealing critical blind spots.
Our story

How It Started

Kennedy Torkura, Nils Karn, and Muhammad Sukmana met at Hasso Plattner Institute, Potsdam, Germany. Kennedy and Muhammad were doing their Ph.D. studies in the cloud security area while Nils was conducting research related to design thinking. In 2020, the three came to the idea of starting an enterprise cloud security solution after they could not find a suitable solution that addresses the challenges of rapidly evolving cloud attacks. Dr. Thomas Fricke, one of the cloud security and Kubernetes experts in Germany, joined the team giving his expertise as well as connections in the German cybersecurity and startup scenes.

Resility GmbH was founded in June 2021 by the team that marked the start of their journey to develop Mitigant, a cloud security solution aiming to make enterprise cloud infrastructure secure and resilient from possible cloud attacks. In December 2021, Resility received the initial funding of seven figures from three German venture capitals: HighTech-Gründerfonds, Brandenburg Kapital, and adesso Ventures.

Why Mitigant?

Traditional cloud security tools scan for misconfigurations but never validate if they're exploitable. Consequently, security teams are left guessing which of thousands of alerts actually matter, and they eventually make decisions based on assumptions rather than proof. Mitigant solves this by safely emulating real adversarial techniques in cloud-native environments to identify exploitable security issues, with evidence.

Mitigant leverages AI to analyze the cloud environment and recommend the most impactful attacks, enabling organizations to run contextual attack emulations. Attacks are mapped to MITRE ATT&CK and ATLAS techniques, and aligned with Cyber Threat Intelligence, helping teams prioritize defenses in alignment with the evolving threat landscape.

Meet The Team

We are a passionate team with over 20 years of total cloud security experience in industry and academia.
Smiling man wearing glasses and a dark blazer posed in a modern office setting.
Nils Karn
CEO and Co-Founder
Kennedy Torkura
CTO and Co-Founder
Man wearing glasses with short dark hair, dressed in a black blazer and gray shirt, standing indoors near a window.
Dr. Muhammad Sukmana
CPO and Co-Founder
Smiling middle-aged man wearing glasses and a blue Mitigant hoodie standing in a bright room.
Dr. Thomas Fricke
Advisor and Co-Founder

Advisory Board

Jon Shende
Board Member, MyVayda
Nir Yizhak
CISO, Firebolt
Pranav Vattaparambil
CISO, SoSafe
Man in a dark suit and white shirt standing indoors in front of large windows with a neutral smile.
Markus Becker
Former CEO of Quentic
Man in a gray suit with white shirt standing with arms crossed in front of the U.S. Capitol building at dusk.
Aaron Rinehart
Global Cyber Safety Leader | CO-Founder/CTO Verica

Our Core Values

Black checkmark icon inside a rounded blue square background.
Evidence-Based Security
No assumptions, only proof through adversarial validation and real attack emulation
Blue icon of a person silhouette with a light bulb above the head symbolizing innovation or ideas.
Continuous Innovation
Born from research, driven by real-world threats and evolving attack techniques
Icon of two abstract human figures representing users or a group.
Customer-Focused
Security teams validate defenses on their terms, with full control and flexibility
Blue gradient icon of three overlapping books standing upright.
Open Research
Contributing to the security community's knowledge base and advancing the field

Join The Cloud Security Revolution Today!

Take control of your cloud security in minutes. No credit card required.