Pages
Resources
- XDR vs SIEM vs SOAR: Choosing The Best Security Solution
- ChatGPT in Security Automation
- The Road to Excellence: Elevating Service Provider Performance with Security Automation
- Types of Cyber Security Attacks & How to Prevent Them
- Enriched Visibility: Understand Level 2 of the ARMOR Assessment
- Comment automatiser la réponse à incidents avec Elastic et Swimlane
- Gartner: 2023 Market Guide for Security Orchestration, Automation and Response Solutions
- A Day In the Life with Content Marketing Manager, Maycie Belmore
- Unveiling Security Automation: Perception Vs. Reality
- Quadrant Knowledge Solutions Names Swimlane a Leader in the 2023 SPARK Matrix for SOAR
- What is ARMOR Foundational Visibility? Level 1 of The ARMOR Assessment Explained
- ARMOR Matrix
- 5 Essential Steps For Stronger Cloud Security Using MITRE ATT&CK And D3FEND
- Quadrant Knowledge Solutions SPARK Matrix™: Security Orchestration, Automation and Response (SOAR), 2023
- The Zero Trust Clock is Ticking: Are Your SecOps Teams Ready?
- The Value of Security Automation for Federal Agencies
- 2023 Security Automation Report for Federal Agencies
- Swimlane and Vectra AI Platform
- The Future of SOAR
- Toshiba Case Study Video
- Toshiba Corporation - Customer Case Study
- A Day In the Life with Senior Marketing Program Manager, James Therrien
- What Is Hyperautomation? What It Means For Security Teams.
- Discovering Your Cybersecurity ARMOR: Do You Have What It Takes?
- 2023 Cyber Threat Readiness Report
- Cyber Threat Readiness: Should We Sound The Alarms?
- The Swimlane ARMOR Framework
- Introducing the Swimlane ARMOR Assessment
- Key Findings and Misconceptions from the 2023 Cyber Threat Readiness Report
- 2023 Cyber Threat Readiness Report
- SEC Proposes Cybersecurity Rules
- Why Weedmaps Chose Swimlane for DevSecOps Automation
- The Impact of Culture & Morale on Security ROI
- A Day In the Life with Head of GRC, Jack Rumsey
- The Impact of Culture & Morale on Security ROI
- Swimlane and AWS Security Lake
- Unit 221B: Realizing Value in a Flash with Swimlane Security Automation
- ガートナー®社: SOAR (セキュリティオーケストレーション、自動化、対応ソリューション)マーケット・ガイド2023 年版
- Gartner : Guide 2023 sur le Marché SOAR
- Gartner: 2023 Market Guide zu Security, Orchestration, Automation and Response-Lösungen
- Swimlane Turbine Value-Based Licensing for Enterprises
- How MSSPs Can Leverage Security Automation
- Navigating the Phishing "Golden Hour" with Mimecast and Swimlane
- The Top Challenges for MSSPs
- Toshiba Case Study Video
- Toshiba Corporation - Customer Case Study - 日本語
- The Benefits of Security Automation for MSSPs
- Threat Detected: The Challenges of an MSSP
- Value-Based Pricing for MSSPs
- Life in the Swimlane with Technical Writer, Lee Griffin
- The Automation Imperative: Supercharging Efficacy and Scale for MSSPs and MDRs
- What is Incident Response? Plans, Templates and Tools
- What is Data Loss Prevention (DLP)? And How Low-Code Security Automation Can Help
- 4 Low-Code Security Automation Benefits For Your SecOps
- Empowering Security Operations in Japan: Swimlane's New Tokyo Office
- Low-Code Security Automation: Everything You Need to Know
- How to Maximize Your Security Automation Investment
- Security Automation: Five Things You Should Consider
- The Three Scariest Breach Consequences for CISOs
- ChatGPT is a Security Risk, But We’ll Still Use it.
- Automated Malware Analysis with Low-Code Security Automation
- Swimlane and AWS: Accelerating Incident Response with Automation
- How to Leverage Open Source Threat Intel Against Cobalt Strike Attacks
- Swimlane & Phoenix Cyber, Partnering to Deliver Custom SOAR Use Cases
- A Day In the Life with Senior SDR, Matthew Bilsland
- Swimlane and Kount: Fraud Prevention, Risk Management and Big Banking Thresholds
- Swimlane CSO & Co-Founder, Cody Cornell, Recognized as a 2023 Colorado Titan 100
- The Next Great Resignation? Security Leaders & CISOs.
- The Game Changer for Cybersecurity Challenges in META
- Where's the SOAR Magic Quadrant for 2023?
- A Day In the Life with Software Engineer, Pablo Araya
- XCION 10TH CONFERENCE
- Here’s What a SOAR Platform’s Case Management Should Include
- Gartner: 2023 Market Guide for Security Orchestration, Automation and Response Solutions
- Gartner: 2023 Market Guide for Security Orchestration, Automation and Response Solutions
- Gartner: 2023 Market Guide for Security Orchestration, Automation and Response Solutions
- Ingalls & Swimlane: How SOAR delivers value for your security operations center (45:53)
- Swimlane Quick Facts
- SOAR Use Case: Proactive Credential Dump Hunting
- How SOAR Delivers Real Value with Mission Critical and Swimlane
- Gartner: Market Guide for Security Threat Intelligence Products and Services, 2020
- Gartner: Create a SOC Target Operating Model to Drive Success
- Gartner: Create a SOC Target Operating Model to Drive Success
- Gartner: 2020 Market Guide for Security Orchestration, Automation and Response Solutions
- Gartner: 2020 Market Guide for Security Orchestration, Automation and Response Solutions
- Gartner: 2020 Market Guide for Security Orchestration, Automation and Response Solutions
- Gartner: Tips for Selecting the Right Tools for Your Security Operations Center
- Gartner: Tips for Selecting the Right Tools for Your Security Operations Center
- Gartner: Hype Cycle for Security Operations, 2020
- 451 Research: Security Operations Market Insight Report
- The Past, Present and Future of Security Orchestration, Automation and Response
- Fortifying Your Security Operations with Modern SOAR
- The Great Bali Seaside Cybersecurity Chat - APJ Webinar
- Replay past present future of soar - TEST
- Overcoming the cybersecurity skills shortage
- Gartner: 2022 Market Guide for Security Orchestration, Automation and Response Solutions
- SOAR Buyer's Guide
- SOAR Buyer's Guide
- Gartner: SOC Model Guide
- Gartner: SOC Model Guide
- A Buyer's Guide for Modern Security Automation
- A Day In the Life with Senior Product Manager, Joy Bishop
- What is Security Orchestration?
- Top Four Causes of Unsustainable Security Operations
- The Top Cybersecurity Frameworks You Should Know
- Five Incident Response Metrics you Should be Recording
- Why InComm Payments Chose Swimlane to Unite Its Tech Stack
- 6 Key SOC Team Roles & Responsibilities
- 2022 Wrap-Up: A Winning Year for Swimlane
- Gartner: SOC Model Guide
- Gartner: SOC Model Guide
- Gartner: SOC Model Guide
- Everything You Need to Know About Automating DFIR
- What is SOAR? A Complete Guide to SOAR Platforms
- Warning Signs of Security Analyst Burnout & Ways to Reduce it.
- Automating Threat Intelligence Enrichment
- What is a SOC? Your Guide to the Security Operations Center
- Swimlane Turbine + Elastic JSB
- 11 Questions to Ask When Evaluating a SOAR Platform
- A Security Guide to TDIR: Threat Detection and Incident Response
- Swimlane and CrowdStrike: Enabling Collaboration and Automation to Reduce MTTR
- ガートナー®社: 組織を成功に導くためのSOCターゲットオペレーティングモデルを構築
- Swimlane Turbine Named Best SOAR Solution in 'ASTORS' Homeland Security Awards
- 5 Threats to Your Enterprise Mobile Device Security and How to Prevent Them
- The Past, Present and Future of Security Orchestration, Automation and Response
- What it’s Like to be an Engineer at Swimlane
- The Top SOC Analyst Challenges
- 가트너 : 보안 운영 센터 목표 운영 모델 (Security Operations Center Target Operating Model)을 만들어 성공을 주도하세요.
- 가트너 : 2023 보안 오케스트레이션, 자동화 대응(SOAR) 솔루션 시장 가이드
- ガートナー®社: SOAR (セキュリティオーケストレーション、自動化、対応ソリューション)マーケット・ガイド2023 年版
- IT and OT Automation – The Art of the Possible
- Nozomi Networks + Swimlane Joint Solution Brief
- Swimlane and Nozomi Networks, Vulnerability Management Automation for Critical Infrastructure
- Vulnerability Management Automation: Here’s Why You Need it.
- The Top Data Breaches of 2022 so far
- QuickStart Implementation Service
- 2022 Modern SOAR Buyer's Guide
- A Buyer's Guide for Modern Security Automation
- A Buyer's Guide for Modern Security Automation
- A Buyer's Guide for Modern Security Automation
- Why Low-Code Security Automation
- The Reality of Security Automation ROI: Calculations & Considerations
- Return on Investment (ROI) Analysis of Swimlane Security Automation
- Return on Investment (ROI) Analysis of Swimlane Security Automation
- Return on Investment (ROI) Analysis of Swimlane Security Automation
- Automated Incident Response: Everything You Need to Know
- Your Security Guide to Insider Threats: Detection, Best Practices, Solutions
- Swimlane Earns 2022 Tech Cares Award From TrustRadius
- Mimecast + Swimlane Joint Solution Brief
- A Deep Dive into the 0ktapus Phishing Attacks
- Don’t Take the Bait: Automated Phishing Investigation and Response
- Swimlane Turbine + Dataminr Pulse Integration Demo
- Swimlane and Dataminr Pulse, Automated Response for Real-time Remediation
- Life in the Swimlane with Sales Development Manager, Neal Belshoff
- What is Cyber Threat Hunting? Methods, Tools, and Tips
- Managing Security Alerts with an Incident Response Platform
- Swimlane Turbine: Using the Playbook Condition Builder
- Ten Hard-hitting Cybersecurity Statistics for 2022
- The Rise of Mobile Phishing and How to Handle It
- Technical Account Manager Service
- Swimlane Cloud Migration
- Gartner: 2022 Market Guide for Security Orchestration, Automation and Response Solutions
- Why The DIG Chose Swimlane to Transform Its Phishing Defense
- Why You Need to Automate Your Onboarding & Offboarding Process
- Building a Defense Against Cybersecurity Fraud and Brand Impersonation
- The Importance of SOC 2 Type II Compliance
- How to Build an Incident Response Playbook
- Top 3 Benefits of Low-Code Security Automation Playbooks
- A Day In the Life with Quality Analyst, Jorge Montero
- Webhooks Explained: What Are Webhooks? How Do They Work?
- What is Security Automation? A Beginner’s Guide
- 4 Ways to Improve Integrations for Better Security Performance
- A Day In the Life with Technical Alliances Manager, Greg Sherman
- Why Security Automation is the Future of SOAR
- ProCircular Turns to Swimlane as the Brain for Security Automation and Orchestration (2:26)
- A Day In the Life with Tier 3 SOC Analyst, Vin Munk
- ProCircular Maximizes Security Operations with Flexible Low-Code Automation
- A Day In the Life with Software Developer Team Lead, Nelson Gutierrez
- How to Respond to Threats Faster with Active Sensing Fabric
- A Day In the Life with Product Manager, Melissa Espinal
- A System of Record for Security: Everything You Need to Know
- Swimlane Report by 451 Research
- The Secret to Maximizing Security ROI
- Meet Swimlane Turbine, The Future of Security Automation
- Swimlane Turbine Platform Overview
- The Force Multiplier for XDR
- Introducing Swimlane Turbine
- QuickStart Demo Video
- Power & Flexibility: Two Major Benefits of Low-Code Security Automation
- 6 Things to Consider Before Automating Your Security Processes
- A Day In the Life with Regional Sales Director, Ed Sawkins
- Why NTT DATA Chose Swimlane for Security Automation
- A Day In the Life with Product Designer, Madeline Horvath
- Softcat Selects Swimlane as Hub for Managed Cybersecurity Services (3:35)
- Swimlane Support Overview
- A Day In the Life with Office Manager, Xiaomei Grier
- Swimlane 101 – Getting Started, part 1 (13:06)
- Swimlane Named Best Security Solution
- Swimlane Awarded Gold Medal in the 2022 SOAR Data Quadrant Report
- A Day In the Life with Sr. Security Solutions Architect, Josh Rickard
- Fraud Case Management: What It Is, How It Works, & Why You Need It
- A Day In the Life with Sr. Product Designer, Kate Hasz
- Gartner: 2023 Market Guide zu Security, Orchestration, Automation and Response-Lösungen
- Gartner: 2022 Market Guide for Security Orchestration, Automation and Response Solutions
- Gartner: 2022 Market Guide for Security Orchestration, Automation and Response Solutions
- Gartner : Guide 2023 sur le Marché SOAR
- Outside of the SOC: Use Cases not to Underestimate
- A Day In the Life with Engineering Manager, Tyler McClure
- Does Automation Remove the Need for People? The Security Automation Oxymoron
- A Day In the Life with Senior Product Manager, Christopher Fox
- What Security Metrics Should I Be Looking At?
- A Day In the Life with Organizational Development Director, Kelly Dougherty
- Low-Code vs. No-Code Security Automation: What’s the Difference?
- Swimlane Partners with CyberSecurity Malaysia to Address the Global Cybersecurity Skills Gap
- 1898 & Co. and Swimlane Partner to Secure the Future of Critical Infrastructure
- Swimlane Corporate Overview
- Unexpected Low-Code Security Automation Use Cases
- How to Build a System of Record with Low-Code Security Automation
- How to Build a System of Record with Low-Code Security Automation
- A Day In the Life with Product Marketing Director, Katie Bykowski
- The Most Common SOAR Use Cases
- Top Low-Code Security Automation Use Cases
- The Benefits of SOAR for your SOC Team
- Lumen Taps Into Low-Code Automation Across Security Operation Centers (Video)
- Harness of the power of industry low-code security-automation best practices
- 11 time saving tricks to try with Swimlane ChatBot for Slack
- Executive Order Issued for Security Orchestration, Automation and Response (SOAR)
- Low-Code Security Automation Report
- Softcat Realizes 30% Business Growth Powered by Low-Code Security Automation (Video)
- Swimlane and Recorded Future Joint Solution Brief
- The Swimlane Automation Platform Then, Now, and a Hint of What’s Next
- How to Build and Leverage a Security System of Record
- SOARing with Low-Code Security Automation
- How to Automate Response to Credential Compromises
- Fortune 500 Financial Service Company Leverages Swimlane’s Low-Code Security Automation to Solve Cross-Departmental Security Use Cases
- Automation and Intelligence: Key Ingredients for Modern Security Strategies
- Automate and Augment Case Management, Threat Intelligence and Enrichment
- Improving Incident Response with Low-Code Automation
- Google Acquires Siemplify: Smart Money Bets on Security Automation
- Ready to SOAR? Unlock the Potential with Low-Code Security Automation
- SOAR vs SIEM: Security Solutions Differences Explained
- Atomic Red Team Testing With Swimlane
- Incident Response Use Case (3:44)
- Integrating Swimlane and VirusTotal (3:01)
- Swimlane Becomes Fastest Growing SOAR Company with 700%+ Revenue Growth in Less Than Four Years
- Automating Incident Response Playbooks with Low-Code Security Automation
- Swimlane and Dataminr Pulse
- Swimlane Cloud
- Integration Spotlight: Recorded Future Identity Intelligence Module
- Cybersecurity Beyond Black Friday: Retail Security Automation Use Case
- Understanding High-Impact, Low-Code Security Automation
- Swimlane Partnership Brings Low-Code Automation to VMware EDR
- Building Best-of-Both-Worlds Automation and Threat Intel With Swimlane and VirusTotal - Part Two
- Building Best-of-Both-Worlds Automation and Threat Intel With Swimlane and VirusTotal - Part One
- Low Code Security Automation with Swimlane at Field Security Day 6
- Retail Security Use Case (8:39)
- 2021 SANS Automation and Integration Survey
- Low-Code Security Automation Makes Its Debut
- Swimlane Wins Cybersecurity Breakthrough Award for ‘Overall SOAR Platform of the Year’
- Gartner®: Erstellen Sie Ihr SOC Operating Model zur Steigerung Ihres Erfolgs
- Gartner : créer un modèle d'exploitation cible SOC pour favoriser la réussite de vos processus
- Swimlane named to Colorado Startup's fastest growing leaderboard
- 2021 SOAR Report
- 2021 SOAR Report
- The Security Automation Train is Coming Fast - Will you be on board?
- 2021 SOAR Report
- Swimlane Senior Engineer, Chau Tran, Named Google Developers Expert
- Hear From Your Peers: How One Organisation Embraced Automation in Their Cyber Resiliency Journey
- Hear From Your Peers: How One Organisation Embraced Automation in Their Cyber Resiliency Journey
- Recorded Future and Swimlane Deliver Intelligent Security Automation
- Why You Need a True SOAR Solution for Your Business Needs, Not Just SecOps
- McAfee/Swimlane Workshop: Building an Efficient and Effective SOC Through Automation
- McAfee/Swimlane Workshop: Building an Efficient and Effective SOC Through Automation
- Swimlane Named Most Innovative Security Investigation Platform in 2021 CDM Global Infosec Awards
- Continually Decrease Cyber Risks with Vulnerability Management and Security Automation
- Elastic and Swimlane partner to deliver an extensible framework for the modern SOC
- Continually Decrease Cyber Risks with Vulnerability Management and Security Automation
- Integrating Netskope and Swimlane (2:19)
- Common REST API Authentication Methods Explained
- Automated Static Malware Analysis
- The Pitfalls of Choosing a “Good Enough” SOAR Solution
- Integrating Venafi Trust Protection Platform and Swimlane (2:45)
- Swimlane Platform Demonstration
- Integrating CrowdStrike Falcon and Swimlane (2:36)
- Achieving Public-Private Coordination and Collaboration on a National Scale
- Physical Security Monitoring and Response (5:49)
- Automated Static Malware Analysis
- Swimlane and AWS
- How Do We Measure The New Administration’s Success in Cybersecurity?
- Swimlane Demonstration - Automating Triage of SIEM Alerts
- SOAR Use Case: Insider Threats
- Ask Not What Union Types Can Do For You; Ask What You Can Do to Union Types
- EMEA Swimlane User Group Q4 2021
- EMEA Swimlane User Group
- Meeting Executive Order M-21-31 for Security Orchestration, Automation and Response
- Swimlane Ask Me Anything (AMA): Cutting Edge SOAR Use Cases
- Swimlane Demonstration - A Use Case in Action
- Phishing Use Case Demonstration
- Swimlane Demonstration: Automating
Triage of SIEM Alerts
- Your First SOAR Use Case: Phishing Triage
- SOAR Use Case: Insider Threats (N. America & APAC)
- Swimlane Platform Demonstration
- SOAR Use Cases to Boost Your SOC
- Introducing James Brear, Our New CEO
- Swimlane Platform Demonstration
- The Legal Digital Transformation Dilemma - Why Legal Automation is so Difficult, and How To Transform It
- The Legal Digital Transformation Dilemma - Why Legal Automation is so Difficult, and How To Transform It
- The Legal Digital Transformation Dilemma - Why Legal Automation is so Difficult, and How To Transform It
- Reducing Response Times with SOAR-Integrated Threat Intelligence
- SOAR Use Cases to Boost Your SOC (N. America & APAC)
- Swimlane Ask Me Anything (AMA): All Things Security Automation
- SOAR Use Cases to Boost Your SOC
- Expert Focus: Automation Drives Changes in SOCs Post-Pandemic
- What to Look For in a Threat Intelligence Solution
- Swimlane and Claroty
- Expert Panel Discussion: Protecting Your Organization in Interesting Times
- Expert Panel Discussion: Protecting Your Organization in Interesting Times
- Close It Down - Automated Security with McAfee & Swimlane
- Close It Down - Automated Security with McAfee & Swimlane
- Swimlane and Attivo Networks Solution Brief
- How SOAR Can Revolutionize Fraud Detection and Investigation
- Using SOAR to Automate ATT&CK Testing
- Automating NERC-CIP Incident Response and Reporting Demo (7:33)
- Using SOAR to Automate ATT&CK Testing (1:00:23)
- Swimlane & Pareto Cyber: Advantages of SOAR-as-a-Service (33:18)
- Swimlane Releases elk-tls-docker to Simplify the Testing and Deployment of Elastic Stack
- Swimlane & Pareto Cyber: Advantages of SOAR-as-a-Service
- Automating Security Functions in Your Enterprise
- Dark Reading: Automating Security Functions in Your Enterprise (57:33)
- Swimlane Trial Launches with McAfee's MVISION Marketplace Opening
- Swimlane and McAfee MVISION Solution Brief
- Dark Reading: Get Your Security Tools Talking for More Effective Incident Response (57:30)
- Get Your Security Tools Talking for More Effective Incident Response
- How SOAR Makes Threat Detection and Remediation More Effective
- Automating Event Triage in the Cloud (46:29)
- Swimlane and Stellar Cyber
- Swimlane and Tenable: Improving Incident Response with Security Orchestration, Automation and Response (49:39)
- Improving Incident Response with SOAR with Swimlane and Tenable
- How to Reduce Response Times with SOAR-Integrated Threat Intelligence (45:51)
- Hazards to Avoid When Implementing SOAR
- SOAR Faster and Smoother with Swimlane 10.2
- Optimising your SOAR investment with implementation best practices
- How to Reduce Response Times with SOAR-Integrated Threat Intelligence
- How to Reduce Response Times with SOAR-Integrated Threat Intelligence
- How to Reduce Response Times with SOAR-Integrated Threat Intelligence
- Key Takeaways from Gartner’s 2020 Market Guide for SOAR Solutions
- Introducing Swimlane: Proven Low-Code SOAR Security
- Understanding Data Privacy Regulation in the US and how SOAR can Help
- Swimlane and Tenable: Improving Incident Response with Security Orchestration, Automation and Response
- What Is SOAR and How It Makes Threat Detection and Remediation More Effective
- Arming your Security Operations Center with SOAR
- Streamline your OT Security Operations Center with SOAR
- Arming your SOC
- Streamline your OT Security Operations Center with SOAR (52:19)
- Staying ahead of pandemic-related cybersecurity threats with automation
- The life of a security analyst before and after SOAR (6:18)
- How Automation and Orchestration can Help Bridge the IT Security Skills Gap
- How Automation and Orchestration can Help Bridge the IT Security Skills Gap
- Swimlane and IRONSCALES
- Getting Started with DFIR for the Cloud
- Lost Laptop Triage (5:11)
- How to Detect and Eliminate Cloud Attacks with Swimlane and Vectra
- How to Detect and Eliminate Cloud Attacks with Swimlane and Vectra (53:28)
- Automating Digital Forensics and Incident Response (DFIR) Plans (2:40)
- The Digital Forensics and Incident Response (DFIR) Lessons Learned Phase (3:27)
- The Digital Forensics and Incident Response (DFIR) Recovery Phase (1:38)
- The Digital Forensics and Incident Response (DFIR) Eradication Phase (1:31)
- The Digital Forensics and Incident Response (DFIR) Containment Phase (1:43)
- The Digital Forensics and Incident Response (DFIR) Detection Phase (3:54)
- The Digital Forensics and Incident Response (DFIR) Preparation Phase (2:09)
- The Digital Forensics and Incident Response (DFIR) Plan (1:19)
- What is Digital Forensics and Incident Response (DFIR) and Why Do I Care? (1:49)
- SOAR Beyond Endpoint Security
- How MSSPs Can SOAR Beyond Alerts
- Understanding the Fundamental Rights of the Data Subject and establishing your Data Privacy Program with SOAR
- Streamlining Incident Response & Reporting Requirements in Compliance
- How MSSPs Can SOAR Beyond Alerts
- Streamlining Incident Response and Reporting Requirements in Compliance (46:15)
- Solving MSSP challenges with SOAR
- Swimlane Product Overview (6:38)
- SANS survey highlights pandemic-influenced hiring plans
- Better Together: Cybersecurity Solutions for the New Normal (48:31)
- SANS Closing the Critical Skills Gap for a Modern and Effective SOC
- Okta and Swimlane
- Better Together: Cybersecurity Solutions for the New Normal
- SANS SOC & Cybersecurity Skills Gap Survey 2020
- How MSSPs Can SOAR Beyond Alerts
- How MSSPs Can SOAR Beyond Alerts (40:25)
- Diving in with SOAR (1:27)
- Swimlane Turbine for MSSPs
- How to Detect and Eliminate Cloud Attacks with Swimlane and Vectra
- Arming Your SOC with SOAR in Today's Threat Landscape
- SecOps Made Easier with Automation
- Automating Attack Testing with SOAR and Atomic Red Team
- Automating ATT&CK Testing with SOAR and Atomic Red Team
- SecOps Made Easier with Automation (34:30)
- How MSSPs Can SOAR Beyond Alerts
- Automating Attack Testing with SOAR and Atomic Red Team (46:31)
- Arming Your SOC with SOAR in Today's Threat Landscape (45:30)
- Swimlane and Darktrace
- Making MITRE ATT&CK Actionable
- The Life of a Security Analyst Before & After SOAR
- Dark Reading Virtual Panel: What Every Enterprise Should Know About SOCs and Incident Response
- Dark Reading Virtual Panel: What Every Enterprise Should Know About SOCs and Incident Response (45:57)
- 2020 SOAR Report
- 2020 SOAR Report
- Five benefits to implementing security automation using SOAR
- How to do Incident Response Triage Right
- How to Recognize and Maximize Your SOAR Solution ROI
- How to Recognize & Maximize Your SOAR Solution ROI (42:59)
- 2020 SOAR Report Highlights Key Drivers and Impacts
- 2020 SOAR Report
- Automating Attack Testing with SOAR and Atomic Red Team
- How to Combat Phishing Emails with SOAR - Live Demo
- Swimlane Financial Services Datasheet
- The Role of Preparation and Process in Incident Response
- Swimlane and FireMon
- Optimizing the MITRE ATT&CK Framework with SOAR
- How to Combat Phishing Emails with SOAR On-Demand Demo
- How to Combat Phishing Emails with SOAR - On-Demand Demo (31:06)
- Swimlane Professional Services
- Automating NERC CIP Compliance
- Swimlane Customer Experience Lifecycle
- 8 Real-World SOAR Use Cases for Energy and Utilities
- How to Maximize Your SOAR Investment (43:16)
- How to Maximise Your SOAR Investment
- How to Maximise Your SOAR Investment
- The Current State of Security Automation and Integration
- The 2020 SANS Automation and Integration Survey results are in!
- Swimlane and LogPoint
- 2020 SANS Automation and Integration Survey
- SOAR to New Security Efficiency with Swimlane & Recorded Future (41:38)
- SOAR to New Security Efficiency with Swimlane & Recorded Future
- Swimlane and Recorded Future
- How SOAR Delivers Real Value with Swimlane and CyberRisk
- Swimlane and CrowdStrike
- Swimlane Customer Experience
- How SOAR Helps Organizations Achieve More with Less
- SOAR Use Case: Insider Threats
- How SOAR Delivers Real Value with Swimlane and NGT Global
- SOAR Use Case: Insider Threats (46:07)
- VPN Status Monitoring & Workflow Automation with SOAR
- Swimlane for Energy & Utilities
- Common SOAR Use Cases to Boost Your SOC
- Responding to Insider Threats with SOAR
- Swimlane Acquires Syncurity
- Cyber Threats, Cybersecurity and COVID-19 with Recorded Future and Swimlane (46:12)
- How SOAR Uses Cases Can Suit Any Organization
- SOAR Beyond Endpoint Security with
CrowdStrike & Swimlane
- Common SOAR Use Cases to Boost Your SOC (41:53)
- SOAR Beyond Endpoint Security with CrowdStrike & Swimlane (54:06)
- VPN Status Monitoring (4:12)
- How to Maximize Your SOAR Investment
- Common SOAR Use Cases to Boost Your SOC
- Vulnerability Management with SOAR
- Identify Malicious Domains using SOAR
- The Past, Present and Future of SOAR Use Cases
- The Past, Present and Future of SOAR Use Cases (43:58)
- Elastic Alert Triage and SOAR (2:52)
- Common SOAR Use Cases to Boost Your SOC
- 5 Best Practices for Safe and Secure Remote Work
- Swimlane and Tenable
- One team two team red team blue team
- How SOAR Improves Efficiency and Productivity
- SOAR Use Case: Hunting Phish Kits
- The Future of SOAR
- State of SOAR
- Swimlane SOAR Platform Gets Big Performance Boost Reducing MTTD and MTTR
- SOAR Use Case: Hunting Phish Kits
- You don’t have Windows 7 in your environment, do you?
- State of the SOC and Using SIEM
- The Past, Present and Future of Security Orchestration, Automation and Response (56:25)
- How to investigate alerts in Microsoft Azure with SOAR
- Swimlane and Zscaler
- Swimlane and Netskope
- SOARing beyond aggregation: How to achieve meaningful prioritization of security alerts (60:28)
- Swimlane and BlackBerry Cylance
- Swimlane and Carbon Black
- The State of SOAR 2019: How using SOAR tools makes life easier
- How SOAR tools make life easier for your SOC
- New Level-Up Initiative supports security analyst training
- How using SOAR tools makes life easier
- How using SOAR tools makes life easier
- Swimlane gives thanks by giving back
- How to expedite security investigations with Microsoft Azure and Swimlane
- How to expedite security investigations with Microsoft Azure and Swimlane (42:32)
- Hey InfoSec, what are you doing to protect your DevOps Team?
- Cloudy with a Chance of DFIR: How Our Traditional Methodologies Need to Change (53:05)
- Cloudy with a Chance of DFIR: How Our Traditional Methodologies Need to Change
- How to boost your SOC with automated EDR
- How to boost your SOC with automated EDR (27:43)
- Understanding APIs: SOAP
- Winning Formula for Cyber Threats = SOAR + Endpoint Security (42:15)
- Swimlane & Cylance PROTECT: Endpoint Threat Response
- Understanding APIs: REST
- Winning Formula for Cyber Threats = SOAR + Endpoint Security
- How to Achieve SOC Efficiency with Graylog and Swimlane
- How to achieve SOC efficiency with Graylog and Swimlane (31:25)
- 3 SOAR solution pitfalls to avoid when implementing
- Swimlane Certification Program
- Automated Malware Analysis (7:09)
- Optimize SecOps by pairing SIEM with SOAR
- SOAR Use Case: Domain Squatting, Typosquatting and Homograph Detection
- SOAR Use Case: Domain Squatting, Typosquatting and Homograph Detection (30:05)
- Integrating Swimlane and Splunk (3:06)
- How do you know if you’re ready for SOAR?
- 2019 SANS Incident Response Survey
- Domain squatting, typosquatting and homograph attacks
- Best practices for your Vulnerability Management Program
- What to expect at Black Hat USA 2019
- SOAR Use Case: Amazon Web Services (37:21)
- SOAR Use Case: Amazon Web Services
- Every security team is a software team now: Why you should attend the Black Hat keynote
- Automating Malware Analysis and Response with Intezer and Swimlane
- Automating Malware Analysis and Response with Swimlane and Intezer (38:40)
- Black Hat 2019: Best sessions for SecOps
- Gartner SOAR Market Guide Insights from CEO Cody Cornell
- Microsoft Defender Advanced Threat Protection Queries
- Swimlane's pyattack works with Mitre ATT&CK Framework
- 11 questions to ask when evaluating SOAR
- Get to the bottom of phishing: How to stay on top of malicious emails with threat intelligence and SOAR
- Staying on top of phishing emails with threat intelligence and SOAR (50:01)
- How SOAR helps overwhelmed security operations teams
- Integrating Swimlane and Symantec DeepSight Intelligence (2:36)
- Swimlane open-sources graphish to help SecOps Teams
- SOAR Use Case: Proactive Credential Dump Hunting
- Integrating Swimlane and ServiceNow (2:38)
- Swimlane raises $23M of series B funding
- Integrating Swimlane and CylancePROTECT (3:28)
- The life of a security analyst before and after SOAR (6:18)
- Swimlane research team open sources py-ews
- How to automate the employee off-boarding IT process with SOAR (35:44)
- Customer Story: CipherTechs (4:34)
- Windows patch released after critical RDP vulnerability
- Data Breach Statistics from the Verizon DBIR 2019
- Automate employee off-boarding processes with Swimlane
- Automated Threat Hunting with SOAR (5:46)
- SOAR Use Case: Automated EDR
- SOAR Use Case: Employee Off-Boarding
- SOAR Use Case: Automated EDR with Swimlane (38:18)
- General availability of Swimlane 4.1
- Integrating Swimlane and Microsoft Graph Security (1:50)
- Swimlane and Lastline
- Microsoft's OAuth2 implementation: Using Microsoft Graph API
- EDR in the Fast Lane: Automating Endpoint Alerts
- Automating Endpoint Alerts with Swimlane, Carbon Black & VMRay (45:16)
- Microsoft's OAuth2 implementation: Registering an app
- 2019 SANS Automation and Integration Survey
- 2019 SANS Automation and Integration Survey
- How Swimlane shaped the company culture
- Endpoint Detection and Response with SOAR (5:47)
- SIEM Alert Triage with SOAR
- Using Swimlane for endpoint detection and response
- Swimlane runner-up in Microsoft Graph Security Hackathon
- Microsoft's OAuth2 endpoints and application types
- Integrating Swimlane and Recorded Future (2:39)
- SOAR Use Case: Automated Malware Analysis (42:23)
- Integrating Swimlane and Palo Alto Panorama (2:27)
- The Norsk Hydro LockerGoga ransomware cyber attack
- Automate Threat Detection and Response NOW with Lastline and Swimlane (37:14)
- Swimlane makes a splash at RSA Conference 2019
- Swimlane and McAfee Products
- Investigate and remediate endpoint-related alerts with SOAR
- What to expect at RSA Conference 2019
- Integrating Swimlane and VMRay Analyzer Cloud (2:21)
- A call for collaboration in cybersecurity
- Integrating Swimlane and Carbon Black Defense (2:09)
- RSA Conference 2019: Best sessions for SecOps
- What's new at Swimlane? Find out at RSA 2019
- Swimlane and Tufin SecureTrack
- Partnerships aid your security operations center ecosystem
- SOAR Use Case: Automated Malware Analysis
- How sharing content improves incident response
- Threat intelligence and SOAR: An integrated approach with Swimlane and Recorded Future (42:13)
- New year, new security - Part 2: Cloud computing use cases
- Swimlane is making a splash at RSA 2019
- New year, new security - Part 1: IoT use cases
- Swimlane Case Management (3:57)
- Efficient Alert Processing and Response - A SANS Review of Swimlane (1:01:26)
- Efficient Alert Processing and Response: A SANS Review of Swimlane
- SOAR Buyer's Guide
- SOAR Buyer's Guide
- SANS Review: Automating Detection and Response with Swimlane
- Why we’ve built Swimlane the way we have
- Measuring ROI in SOAR (3:50)
- From Risk to Action: Security Automation and Orchestration (39:53)
- Key takeaways from MPOWER 2018
- SOARing beyond aggregation: How to achieve meaningful correlation and prioritization of security alerts and actions
- From Risk to Action - Security Automation and Orchestration
- Threat intelligence and SOAR: An integrated approach with Swimlane and Recorded Future
- Ingalls & Swimlane: How SOAR delivers value for your security operations center (SOC)
- Why organizations should use a SOAR solution for ROI and MTTR tracking
- Measuring ROI in SOAR
- MPOWER 2018: How can SOAR help you measure ROI for your SOC?
- Cloud-Native Automation Architecture
- Swimlane for the Security Engineer (3:13)
- Modular Security in the Age of Automated SecOps e-book
- SOAR Capabilities e-book
- Automating Incident Response e-book
- Swimlane for the Security Manager (1:50)
- Swimlane for the CISO (1:56)
- Swimlane Product Overview
- Endpoint protection: How to improve endpoint security with SOAR
- Swimlane for the Security Analyst (2:18)
- How to streamline cyber forensic investigations
- Swimlane Workflow (7:00)
- 8 Real World Use Cases for SOAR e-book
- Security Automation and Orchestration (2:40)
- Proven Threat Hunting Techniques and the Role of SAO (57:42)
- Integrating Swimlane and McAfee products (6:28)
- On the Radar: Swimlane Provides Security Automation and Orchestration
- Farewell, Summer Interns
- Swimlane Applets (3:46)
- Automating SIEM Alert Triage Demo (5:26)
- Automating Phishing Alert Triage Demo (4:32)
- Automating Splunk Alert Triage Demo (4:11)
- Threat Intelligence and SOAR (1:00:24)
- Business Intelligence for Security Operations (3:59)
- SOAPA and SAO: Adapting SecOps Strategies for Today’s Cyber Threats (51:30)
- Proven Threat Hunting Techniques and the Role of SAO with Vector 8
- SOAPA and SAO: Adapting SecOps Strategies to Keep Up with Today’s Cyber Threats
- Threat Intelligence and Security Orchestration, Automation and Response with Lastline
- Security Automation and Orchestration with Swimlane and Forrester
- SecOps Hub: New security operations community
- Gartner SOAR report: "Innovation Insight for Security Orchestration, Automation and Response"
- Using security automation and orchestration for SIEM triage
- Improving IT resiliency with SOAR
- Improving incident response with the NIST Cybersecurity Framework and security automation and orchestration (SAO)
- Security automation and orchestration: Real-world use cases
- Improve security operations management
- Supply chain security
- Building an IT incident response plan
- Achieving cyber resilience through situational awareness
- Poison the well: Offensive ops for defenders
- Security operations strategy webinar | SOAPA and SAO: Adapting SecOps strategies to keep up with today’s cyberthreats
- RSA NetWitness alerts managed with security automation and orchestration (SAO)
- Using security automation and orchestration for incident alert management
- Using a threat intelligence platform for stronger cybersecurity
- Utilizing the McAfee product suite and Swimlane to automate incident response
- Automating cybersecurity incident response plans
- Threat intelligence tools: Identify, prioritize and act
- The need to integrate cybersecurity tools
- Cybersecurity statistics 2017: A hard look at the facts and future
- Realizing an information security risk management framework
- Security Orchestration | What is Security Orchestration?
- Meet us at Black Hat 2017!
- Cybersecurity staffing shortage | Maximize MSSP efficiency with SAO
- Are too many SIEM alerts overwhelming your staff? Use SAO.
- Security alert management: Simplified with automation
- Cybersecurity staffing shortage? Security automation and orchestration can help
- Security operations efficiency: Do more with your existing staff
- Using situational awareness to improve threat response effectiveness
- Automated incident response: Respond to every alert
- Improving SecOps communications with your board of directors
- Don’t be an asymptote! Understanding the cost of delayed threat response
- Automate ThreatGrid investigation and response with out-of-the-box Swimlane integrations
- Reducing security operations MTTD and MTTR
- Security consolidation vs. security orchestration
- The challenges facing security operations teams
- Two 2017 cybersecurity trends every security operations professional should know
- Best practices to fortify your cybersecurity strategy
- Top four causes of unsustainable security operations
- Three major security operations mistakes
- Student hacking: A threat, but a bigger opportunity
- Three burning questions about automating vulnerability lifecycle management—Part 1
- Cyberattacks are, most likely, an inside job
- Automated security operations for managed security service providers (MSSP)
- Cybersecurity and incident response for your car?
- Create hurdles for hackers with an automated incident response strategy
- Ashley Madison breach shows ugly side of hacking
- Recent data breach exposes millions of medical records
- How to get more out of existing cybersecurity tools instead of replacing them
- How automated security operations relates to morale and retention
- Fallout continues in OPM breach as damage proves worse than originally thought
- Examining education’s role in cybersecurity’s future
- Seven startling stats on the cybersecurity skills shortage
- New report shows dire cybersecurity talent gap extends to state governments
- Bringing security operations automation to processes with no name
- The latest government data breach looks like a nightmare
- Cyber espionage hits the baseball diamond
- The top five long-term effects of the Target breach
- Three tasks you should be automating in your SOC
- Gartner insight on incident response management
- How the cybersecurity talent shortage impacts us all
- Stop pushing security analytics reporting to the back burner
- Stop pushing security analysis reporting to the back burner
- Why staffing up alone isn’t a sustainable cybersecurity solution
- Why managing information security as a business risk is critical, part 3: Intellectual property
- Why even 99 percent isn't good enough for incident response
- Why managing information security as a business risk is critical, part 2: Reputational harm
- Ten facts every cybersecurity professional should know
- Why managing information security as a business risk is critical, part 1: Financial impact
- Completing the information security lifecycle
- Three essentials your employee cybersecurity training must cover
- Why aligning your SOC and C-suite on cybersecurity is critical
- Three crucial questions to ask before adopting a cybersecurity solution
- Cybersecurity drivers part 4: Security information overload
- Are you leveraging threat intelligence for incident response?
- Cybersecurity drivers part 3: The threat landscape
- Creating a new generation of cybersecurity professionals
- Cybersecurity drivers part 2: The talent shortage
- IT security professionals: Stop hemorrhaging time
- Cybersecurity drivers part 1: The Internet of Things
- Five metrics you should be recording for incident response
- No security alert left behind: Swimlane launches automated security operations management platform
- Protecting the capital investments in your SOC
- SOC employee turnover: Retaining institutional knowledge
- Automation: The natural next step in security operations management
- Filling the gap in cybersecurity
Leadership
News
Events