IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Swimlane unveils its low-code security automation platform

Swimlane Cloud is available as an on-premises, air-gapped, cloud, or hybrid solution

A hand reaching out to a screen which displays automation options

Swimlane has announced its new low-code platform for security automation: Swimlane Cloud.

Available as software-as-a-service (SaaS), Swimlane Cloud enables security teams to create sophisticated automation use cases in addition to centralizing operational data as a system of record.

“Security teams today are challenged to keep up with the deluge of tasks associated with security processes across the entire organization and to keep top security talent highly engaged,” explained Swimlane.

Commenting on its new solution, Swimlane said its automation platform as a cloud service will help security teams overcome tedious processes and data overload.

Clients will also benefit from Swimlane's on-premises offering, which provides customers insights into their security strategy’s performance, capacity, and value through self-service dashboards, granular reporting, and extensive visualisation capabilities.

Additionally, Swimlane Cloud includes robust security features, including SAML/SSO,  two-factor authentication, role-based access control, and more. Cloud, on-premises, air-gapped, and hybrid deployment options are available with the platform.

The new Swimlane Cloud was released today in conjunction with the firm’s Medley Partner Program.

Related Resource

How to secure workloads in hybrid clouds

Cloud workload protection

Whitepaper front coverFree download

“Today every company is a technology company and at the same time, security is having an unprecedented impact on businesses and their bottom line, making cybersecurity a company-wide issue,'' said Cody Cornell, co-founder and chief strategy officer at Swimlane. 

Cornell added, “With this launch, we enable anyone at any organization to contribute their knowledge and expertise to the protection of the organization, all while reducing the level of effort and total cost of ownership in achieving what was previously impossible security goals.”

Featured Resources

Four strategies for building a hybrid workplace that works

All indications are that the future of work is hybrid, if it's not here already

Free webinar

The digital marketer’s guide to contextual insights and trends

How to use contextual intelligence to uncover new insights and inform strategies

Free Download

Ransomware and Microsoft 365 for business

What you need to know about reducing ransomware risk

Free Download

Building a modern strategy for analytics and machine learning success

Turning into business value

Free Download

Recommended

Mastering endpoint security implementation
Security

Mastering endpoint security implementation

18 May 2022
The Total Economic Impact™ of Apple Mac in Enterprise: M1 update
Whitepaper

The Total Economic Impact™ of Apple Mac in Enterprise: M1 update

12 May 2022
Dell Technologies World 2022: Dell unveils fastest storage architecture in company history
Server & storage

Dell Technologies World 2022: Dell unveils fastest storage architecture in company history

4 May 2022
Dell Technologies World 2022: Dell unveils security offerings for major cloud providers
public cloud

Dell Technologies World 2022: Dell unveils security offerings for major cloud providers

3 May 2022

Most Popular

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack
hacking

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack

16 May 2022
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

13 May 2022
Google Russia files for bankruptcy, ends operations in the country
Business operations

Google Russia files for bankruptcy, ends operations in the country

19 May 2022