Swimlane unveils its low-code security automation platform

Swimlane Cloud is available as an on-premises, air-gapped, cloud, or hybrid solution

A hand reaching out to a screen which displays automation options

Swimlane has announced its new low-code platform for security automation: Swimlane Cloud.

Available as software-as-a-service (SaaS), Swimlane Cloud enables security teams to create sophisticated automation use cases in addition to centralizing operational data as a system of record.

“Security teams today are challenged to keep up with the deluge of tasks associated with security processes across the entire organization and to keep top security talent highly engaged,” explained Swimlane.

Commenting on its new solution, Swimlane said its automation platform as a cloud service will help security teams overcome tedious processes and data overload.

Clients will also benefit from Swimlane's on-premises offering, which provides customers insights into their security strategy’s performance, capacity, and value through self-service dashboards, granular reporting, and extensive visualisation capabilities.

Additionally, Swimlane Cloud includes robust security features, including SAML/SSO,  two-factor authentication, role-based access control, and more. Cloud, on-premises, air-gapped, and hybrid deployment options are available with the platform.

The new Swimlane Cloud was released today in conjunction with the firm’s Medley Partner Program.

Related Resource

How to secure workloads in hybrid clouds

Cloud workload protection

Whitepaper front coverFree download

“Today every company is a technology company and at the same time, security is having an unprecedented impact on businesses and their bottom line, making cybersecurity a company-wide issue,'' said Cody Cornell, co-founder and chief strategy officer at Swimlane. 

Cornell added, “With this launch, we enable anyone at any organization to contribute their knowledge and expertise to the protection of the organization, all while reducing the level of effort and total cost of ownership in achieving what was previously impossible security goals.”

Featured Resources

Shining light on new 'cool' cloud technologies and their drawbacks

IONOS Cloud Up! Summit, Cloud Technology Session with Russell Barley

Watch now

Build mobile and web apps faster

Three proven tips to accelerate modern app development

Free download

Reduce the carbon footprint of IT operations up to 88%

A carbon reduction opportunity

Free Download

Comparing serverless and server-based technologies

Determining the total cost of ownership

Free download

Recommended

Bridging the DevSecOps divide: Spotlight on key relationships
Whitepaper

Bridging the DevSecOps divide: Spotlight on key relationships

3 Dec 2021
Planned Parenthood cyber attack exposes data of 400,000 patients
cyber attacks

Planned Parenthood cyber attack exposes data of 400,000 patients

3 Dec 2021
Bridging the DevSecOps divide: Spotlight on zero trust
Whitepaper

Bridging the DevSecOps divide: Spotlight on zero trust

3 Dec 2021
Bridging the developer and security divide
Whitepaper

Bridging the developer and security divide

3 Dec 2021

Most Popular

What should you really be asking about your remote access software?
Sponsored

What should you really be asking about your remote access software?

17 Nov 2021
What are the pros and cons of AI?
machine learning

What are the pros and cons of AI?

30 Nov 2021
What is single sign-on (SSO)?
single sign-on (SSO)

What is single sign-on (SSO)?

2 Dec 2021