Swimlane Named Most Innovative Security Investigation Platform in 2021 CDM Global Infosec Awards

| | News and Events
This week, Cyber Defense Magazine announced the winners of their 2021 Global Infosec Awards, focusing on companies with the potential to stop breaches in a new and innovative way. Swimlane is proud to share that we have been recognized as the “Most Innovative” winner for the Security Investigation Platform category ... Read More

Swimlane Named Most Innovative Security Investigation Platform in 2021 CDM Global Infosec Awards

| | News and Events
This week, Cyber Defense Magazine announced the winners of their 2021 Global Infosec Awards, focusing on companies with the potential to stop breaches in a new and innovative way. Swimlane is proud to share that we have been recognized as the “Most Innovative” winner for the Security Investigation Platform category ... Read More

The Pitfalls of Choosing a “Good Enough” SOAR Solution

| | Best Practices
"Good enough" may check the box, but it's probably not going to solve the problem. CISOs are scrambling to keep up with an expanding attack surface, limited resources, and increasing compliance mandates, which makes "good enough" an attractive, check-the-box option. Unfortunately, while the intention of implementing a “good enough” security ... Read More

The Pitfalls of Choosing a “Good Enough” SOAR Solution

| | Best Practices
"Good enough" may check the box, but it's probably not going to solve the problem. CISOs are scrambling to keep up with an expanding attack surface, limited resources, and increasing compliance mandates, which makes "good enough" an attractive, check-the-box option. Unfortunately, while the intention of implementing a “good enough” security ... Read More

What to Look For in a Threat Intelligence Solution

| | security operations
Threat intelligence or cyber threat intelligence is the result of gathering, processing and analyzing data on threats and threat actors. This intelligence can be used to identify and investigate threats to your organization with the aim toward a more resilient organization. The field of threat intelligence (TI) providers and solutions ... Read More

What to Look For in a Threat Intelligence Solution

| | security operations
Threat intelligence or cyber threat intelligence is the result of gathering, processing and analyzing data on threats and threat actors. This intelligence can be used to identify and investigate threats to your organization with the aim toward a more resilient organization. The field of threat intelligence (TI) providers and solutions ... Read More

What to Look For in a Threat Intelligence Solution

| | security operations
Threat intelligence or cyber threat intelligence is the result of gathering, processing and analyzing data on threats and threat actors. This intelligence can be used to identify and investigate threats to your organization with the aim toward a more resilient organization. The field of threat intelligence (TI) providers and solutions ... Read More
SOAR Faster and Smoother with Swimlane 10.2

SOAR Faster and Smoother with Swimlane 10.2

| | News and Events
The Swimlane team is proud to announce the release of Swimlane 10.2. With this release, we continue to make big strides in our journey towards simpler, better and faster security orchestration, automation and response (SOAR). For example, our revamped Integrations page design and a new plugin installation and upgrade experience ... Read More
SOAR Faster and Smoother with Swimlane 10.2

SOAR Faster and Smoother with Swimlane 10.2

| | News and Events
The Swimlane team is proud to announce the release of Swimlane 10.2. With this release, we continue to make big strides in our journey towards simpler, better and faster security orchestration, automation and response (SOAR). For example, our revamped Integrations page design and a new plugin installation and upgrade experience ... Read More

Key Takeaways from Gartner’s 2020 Market Guide for SOAR Solutions

| | News and Events
The release of a Gartner Market Guide or Gartner Magic Quadrant is always eagerly anticipated by security vendors as well as organizations looking to purchase security solutions. We all look forward to reading how Gartner’s analysts synthesize the information they are hearing from both clients and vendors and pull it ... Read More
Loading...