Swimlane company logo

The profile is currenly unclaimed by the seller. All information is provided by CB Insights.

swimlane.com

Founded Year

2014

Stage

Series C - II | Alive

Total Raised

$78.32M

Last Raised

$220K | 10 mos ago

About Swimlane

Swimlane centralizes an organization's security alerts, automates resolution, and produces metrics-based dashboards and reports. Swimlane automatically responds to alerts, automates the implementation of security controls, and protects the organization from future attacks.

Swimlane Headquarter Location

363 Centennial Parkway Suite 210

Louisville, Colorado, 80027,

United States

844-794-65263

Predict your next investment

The CB Insights tech market intelligence platform analyzes millions of data points on venture capital, startups, patents , partnerships and news mentions to help you see tomorrow's opportunities, today.

Expert Collections containing Swimlane

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

Swimlane is included in 1 Expert Collection, including Cybersecurity.

C

Cybersecurity

4,902 items

Swimlane Patents

Swimlane has filed 2 patents.

The 3 most popular patent topics include:

  • Computer security
  • Computer network security
  • Computer security exploits
patents chart

Application Date

Grant Date

Title

Related Topics

Status

7/30/2017

12/22/2020

Computer security, Web frameworks, Computer network security, Metadata, Data management

Grant

Application Date

7/30/2017

Grant Date

12/22/2020

Title

Related Topics

Computer security, Web frameworks, Computer network security, Metadata, Data management

Status

Grant

Latest Swimlane News

At Swimlane, Security Analysts Are Creative Thinkers

May 17, 2022

Three high-ranking Swimlane employees, including its chief information security officer and two security automation architects, discuss the challenges of their industry and explain why low-code automation is its future. Improvise, adapt and overcome. That’s what the United States Marine Corps taught Michael Lyborg, and it’s a mantra that still drives him today. At automated security operations platform Swimlane , where he serves as senior vice president of global security and enterprise IT, Lyborg gets the job done using all the tools at his disposal. “If you’re part of a security organization, whether it’s human or physical or information or cyber, it doesn’t really matter,” he said. “You’re going to be given a budget. You’re going to be given tools to succeed, hopefully. But you can’t just say, ‘Well, I don’t have this tool, so that’s it.’” In the field of modern cybersecurity, where Swimlane has emerged as a leader in cloud-based low-code security automation, creativity is key. Phishing emails and malware remain common and can still devastate an organization if not intercepted or contained, but cybercriminals find new methods of attack all the time, meaning security teams must stay vigilant and ready to tackle potential threats from every angle. Augmenting the traditional security orchestration, automation and response (SOAR) and extended detection and response (XDR) solutions used by security analysts to face these challenges, Swimlane is distinguished by its focus on automation beyond the security operations center (SOC), where information security has been historically concentrated. Instead, Swimlane’s low-code platform — so called because it uses visual interfaces with drag-and-drop capabilities and basic logic, rather than relying on complex programming languages — serves as the system-of-record across an entire security organization, allowing anyone within said organization to play a key role in responding to threats. “I take more of a sledgehammer approach, but we need scalpels as well,” said Lyborg. That’s where security automation architects Nick Tausek and Josh Rickard come in. Part of Swimlane’s cross-functional research team, both also work in the “DeepDive” division that follows emerging trends in the security space, working to address new potential challenges and threats as they arise. “There’s never going to be a time when every security tool you have has every feature you need, and it’s perfect,” Tausek said. You’re always going to be working around gaps. You’re always going to be trying to find ways to improve your organization’s security posture.” That word, “improve,” is another guiding tenet at Swimlane. By automating workflows and use cases that have historically been time-consuming and labor-intensive, the company aims to free up security analysts’ time and reduce the security alert fatigue that’s long plagued its industry — and that has been especially vexing amid a growing skilled labor shortage. Below, Lyborg, Tausek, and Rickard discuss their experiences in security and the need for companies to combat security team fatigue by turning to low-code automation. As I understand it, low-code security automation harnesses the knowledge of an entire security organization to centralize operational data as a system of record. Why is this your preferred approach at Swimlane? Josh Rickard: Our competitors use no-code and low-code terminology, but we’re truly low-code in that we have dedicated integrations with 300+ security products. We provide building blocks through which a client can build up automation based on their business processes. We try not to force anyone into a box they’re not comfortable with, but our solution builds playbooks and workflows around automating traditional, security-related processes, whether that’s defending against phishing or taking the business logic behind a workflow — perhaps you need to contact someone, speak to another department or get approval — and adding in steps around that instead of just providing automation you never look at. It’s a design with which you could do that, but we’re more about making analysts’ jobs more proficient and providing feedback without them just being blind robots. We give them feedback, and they can feed that information back into their processes. In general, any condition or action that you want to perform, or any decision point that you want to make, you can automate with Swimlane. Michael Lyborg: If you have no-code, you’ll be constrained to doing it in a systematic way or process that has often been predefined. You may be able to tweak and tune certain aspects of it, but the sweet spot in the market, especially in orchestration and automation, is low-code, so you also have the ability to provide a customizable UI. Swimlane has an extensible, contextual application builder that allows you to move, drag and drop fields and values you want to see. What’s important to the analyst is the user experience. Nick Tausek: The key portion of low-code is having those building blocks plus the flexibility to do whatever you need to do in your custom environment. Everybody’s environment is different. There’s no one-size-fits-all solution to security. There’s no one-size-fits-all solution to automation. And there’s certainly no one-size-fits-all solution to security automation. You’re always going to need to build out different processes and take the stakeholders’ needs into account. Low-code combines flexibility with that pre-built content. In the face of modern cybercrimes such as phishing schemes, which continually find new methods of attack, even the best security teams risk being overwhelmed and are frequently overtasked, which in turn prevents them from bringing the full measure of their knowledge to more strategic initiatives. How does Swimlane address the fatigue this brings about? Tausek: I was a SOC analyst for eight years before I came to Swimlane. I worked for a couple of governmental organizations, then for a managed security service provider (MSSP). And the amount of tools, expertise, and knowledge that analysts are not just expected but required to have to be able to do their jobs — without utilizing some kind of automation platform or centralized aggregation platform that allows you to actually perform incident response as well — is immense. Without a product like Swimlane, you still have to facilitate all the ingestion, research and enrichment you have to do on your alerts in addition to then pivoting and keeping track of metrics, actually performing that Incident Response (IR) action and also engaging external stakeholders if you have a department that you need to get ahold of or IT needs to do some kind of remediation on a system. In addition to the business processes, there’s also a huge amount of technology knowledge that people have to have, and it’s ever-evolving. Working for an MSSP, sometimes we’d get a new customer, and it’s like, “Alright, everyone: learn QRadar, or another enterprise security information and event management (SIEM) product. We’ve got a week until this customer onboards and asks for their QRadar instance. We don’t have one? Do your best.” That’s the norm. You’re constantly behind and trying to catch up. Once you can take all these business, human and incident response processes, and turn them into a simple interface where an analyst can log in, see what cases are assigned to them, look at those cases, make human determinations based on available evidence, have metrics tracked automatically, take notes, engage external stakeholders — and to do all that from one page instead of 15 pages, it’s not just about saving time. The amount of things that the analyst has to know how to do on day one when they get into the job is cut into a very small fraction of what it would have been. Rickard: I previously worked in higher education, and there were five security analysts for 18,000 staff and 40,000+ students. You couldn’t even keep up with what you had to get done, let alone improve your defenses against your critical data. You were completely overwhelmed by the amount of alerts. Even just the amount of data coming through your network was quite large. If, back then, we’d had an automation tool, we would have been able to have five staff. Without that, people were burned out and working 12-hour days. Automation helps burnout; it augments people without replacing them. It gives analysts more to do besides point and click. If you’re just sitting at a computer doing the same thing over and over, like an assembly-line worker, it gets really taxing. We’re tinkerers by nature, and we’re hackers. We like to understand how things work. When you have a mundane job, it burns you out quickly. Those point-and-click processes can be automated, and at least through that process you’re engaging people who are creative thinkers. Lyborg: I’ve been with Swimlane for almost five years. Previously, I worked for the U.S. government, then built a SOC for a private company. That was very structured. We were almost all-code; everything was PowerShell or Bash. One person in that organization, if something broke, could actually fix it. Cody Cornell, the founder of Swimlane, built our platform to be more flexible, more intuitive and easier to work with. I’m onboarding an SOC analyst currently, who’ll be assisting with incident response and triage and investigations and research. Rather than having to teach this individual all these tools in-depth, upfront, I’ll only have to teach them Swimlane, which I can do quickly. They don’t have to be a full-blown expert by week two, but we get them used to the user interface then focus on getting them engaged with additional tools. To get someone quickly onboarded and ramped is extremely valuable. This gives analysts the time to focus on what’s next, to lean forward. We reduce our attack surfaces by staying proactive rather than reactive. From the picture you’re painting, security often runs the risk of anonymizing analysts and treating them as manual laborers rather than creative thinkers. How does the culture at Swimlane differ for not just analysts, but all of its employees? Lyborg: We have always talked about the skills gap. You can go out and find that perfect candidate, but who is the perfect candidate? Is it someone who’s been sitting in a SOC for 10 years? Or is it someone just coming out of school, who really wants to learn how to do these things better? There isn’t a perfect candidate, in my mind. We generally hire on aptitude, drive and will. Other companies might make people feel cornered, or they might have boundaries they need to stay within. Here, it’s about being creative, taking everything you know and those lessons learned, then see how we can implement them. Rickard: Swimlane’s flexibility is unique. It’s an organization where they encourage experimentation, creativity and thinking outside of the box, because we’re trying to solve complex problems. We need people that have unique ideas. One of the biggest draws of Swimlane is the encouragement around creativity, giving back and trying to solve problems for our users and security in general.

Swimlane Web Traffic

Rank
Page Views per User (PVPU)
Page Views per Million (PVPM)
Reach per Million (RPM)
CBI Logo

Swimlane Rank

  • When was Swimlane founded?

    Swimlane was founded in 2014.

  • Where is Swimlane's headquarters?

    Swimlane's headquarters is located at 363 Centennial Parkway, Louisville.

  • What is Swimlane's latest funding round?

    Swimlane's latest funding round is Series C - II.

  • How much did Swimlane raise?

    Swimlane raised a total of $78.32M.

  • Who are the investors of Swimlane?

    Investors of Swimlane include Auction Mobility, Pear VC, Founder Collective and Y Combinator.

  • Who are Swimlane's competitors?

    Competitors of Swimlane include SeeMetrics and 2 more.

You May Also Like

Security Vitals Logo
Security Vitals

Security Vitals covers the risk spectrum, by delivering actionable security metrics while securing computing resources and medical devices. It is based in Pontiac, Michigan.

R
Revelstoke

Revelstoke is a low-code, high-speed Security Orchestration, Automation & Response Platform built on a Unified Data Layer designed to automate analysis tasks within Security Operations Centers (SOCs).

Panther Labs Logo
Panther Labs

Panther Labs is a security information and event management (SIEM) platform for identifying threats, misconfigurations, and suspicious activity in corporate and production environments.

SeeMetrics Logo
SeeMetrics

SeeMetrics is an automated cybersecurity performance management platform that integrates security data and business objectives into a simple interface. Fed directly with data from the stack, the metrics give precise and comprehensive insights, allowing security leaders to connect the dots and understand the bigger picture while being able to drill down to the specifics, make data-driven decisions, and explain them quickly and simply. SeeMetrics was founded in 2021 and is based in Tel Aviv, Israel.

Siemplify Logo
Siemplify

The Siemplify platform combines security orchestration, automation, and response (SOAR) with end-to-end security operations management to make analysts more productive, security engineers more effective, and managers more informed about the SOC.On January 4th, 2022, Siemplify was acquired by Google at a valuation of $500M.

Demisto Logo
Demisto

Demisto is a provider of Security Automation and Orchestration technology. Demisto's orchestration engine automates security product tasks and weaves in the human analyst tasks and workflows. Demisto enables security teams to reduce MTTR, create consistent incident management process and increase analyst productivity.On February 19th, 2019, Demisto was acquired by Palo Alto Networks at a valuation of $560M.

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Request a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.