Swimlane unveils its low-code security automation platform

Swimlane Cloud is available as an on-premises, air-gapped, cloud, or hybrid solution

A hand reaching out to a screen which displays automation options

Swimlane has announced its new low-code platform for security automation: Swimlane Cloud.

Available as software-as-a-service (SaaS), Swimlane Cloud enables security teams to create sophisticated automation use cases in addition to centralizing operational data as a system of record.

“Security teams today are challenged to keep up with the deluge of tasks associated with security processes across the entire organization and to keep top security talent highly engaged,” explained Swimlane.

Commenting on its new solution, Swimlane said its automation platform as a cloud service will help security teams overcome tedious processes and data overload.

Clients will also benefit from Swimlane's on-premises offering, which provides customers insights into their security strategy’s performance, capacity, and value through self-service dashboards, granular reporting, and extensive visualisation capabilities.

Additionally, Swimlane Cloud includes robust security features, including SAML/SSO,  two-factor authentication, role-based access control, and more. Cloud, on-premises, air-gapped, and hybrid deployment options are available with the platform.

The new Swimlane Cloud was released today in conjunction with the firm’s Medley Partner Program.

Related Resource

How to secure workloads in hybrid clouds

Cloud workload protection

Whitepaper front coverFree download

“Today every company is a technology company and at the same time, security is having an unprecedented impact on businesses and their bottom line, making cybersecurity a company-wide issue,'' said Cody Cornell, co-founder and chief strategy officer at Swimlane. 

Cornell added, “With this launch, we enable anyone at any organization to contribute their knowledge and expertise to the protection of the organization, all while reducing the level of effort and total cost of ownership in achieving what was previously impossible security goals.”

Featured Resources

The ultimate law enforcement agency guide to going mobile

Best practices for implementing a mobile device program

Free download

The business value of Red Hat OpenShift

Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShift

Free download

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Free download

Digital remote monitoring and dispatch services’ impact on edge computing and data centres

Seven trends redefining remote monitoring and field service dispatch service requirements

Free download

Recommended

A quarter of all malicious JavaScript is obfuscated
hacking

A quarter of all malicious JavaScript is obfuscated

20 Oct 2021
Almost 70% of CISOs expect a ransomware attack
ransomware

Almost 70% of CISOs expect a ransomware attack

19 Oct 2021
Acer Taiwan falls victim to cyber attack
hacking

Acer Taiwan falls victim to cyber attack

18 Oct 2021
Marsh McLennan reveals its cyber risk analytics center
risk management

Marsh McLennan reveals its cyber risk analytics center

15 Oct 2021

Most Popular

Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans
Laptops

Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans

11 Oct 2021
Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
HPE wins networking contract with Birmingham 2022 Commonwealth Games
Network & Internet

HPE wins networking contract with Birmingham 2022 Commonwealth Games

15 Oct 2021