Swimlane Launches First Comprehensive Security Automation Ecosystem for OT Environments

Swimlane | November 15, 2022 | Read time : 03:00 min

Swimlane Launches First Comprehensive Security Automation Ecosystem
Swimlane, the low-code security automation company, today announced the formation of the first operational technology (OT) security automation solution ecosystem tailored to meet the combined OT and IT security requirements within critical infrastructure environments.

The Biden Administration designated November as Critical Infrastructure Security and Resilience Month, drawing attention to the need for “fortifying our information technology and cybersecurity across sectors.” As cyber threats grow in frequency and severity, security operations teams within industrial organizations are regularly targeted due to the importance of their systems and infrastructure.

Given the limited resources at their disposal, security teams within these organizations are struggling to keep up with rapidly evolving threats. The cybersecurity skills gap poses a particularly difficult challenge for organizations with OT environments due to the unique skill set required to navigate the convergence of OT and IT technologies. This is where modern Security Orchestration, Automation and Response (SOAR) plays an instrumental role.

“Our public utilities and critical infrastructure face unique cybersecurity challenges to detect and respond to the convergence of threats targeting their combined OT and IT environments, and cyber-physical systems. “Swimlane is bringing together the best of OT security with our extensible security automation platform to create a robust system of record and control for security operations teams to more quickly process large amounts of security telemetry without needing more resources to defend against breaches.”

Cody Cornell Co-founder and Chief Strategy Officer of Swimlane

Swimlane’s security automation ecosystem for OT environments currently includes the following:

  • Nozomi Networks for OT and IoT Security: Swimlane and Nozomi Networks, the leader in OT and IoT security, also announced today a technology integration that combines low-code security automation with OT and Internet of Things (IoT) security. The combined solution makes it possible for industrial and critical infrastructure security operations to maintain continuous asset compliance and mitigate the risks of attacks from combined OT and IT entry points.
  • Dataminr Tackles Physical Risk: Swimlane’s integration with Dataminr leverages automated processes to mitigate risks and warn at-risk employees as soon as possible to ensure their safety. The cyber-physical threat response solution saves organizations crucial minutes when connecting with staff members who might be affected by a natural disaster, accident, or social unrest, or other types of physical risk.
  • 1898 & Co. for Managed Threat Detection: 1898 & Co., a preeminent industrial control system (ICS) cybersecurity solutions provider, has selected Swimlane as the core automation platform for their managed threat detection services. These services include the detection of both OT and IT-born threats, machine-speed threat validation and scoring, and rapid remediation of threats using OT response methods.

“Security teams chartered with protecting OT environments are struggling to keep pace with emerging threats given their limited resources,” said Joshua Magady, Practice Technical Lead at 1898 & Co. “As cyberattacks on critical infrastructure continue to rise and the cybersecurity skills shortage prevails, we are excited to be working with Swimlane to provide automation solutions that give these important organizations the tools to defend against rising cyber threats effectively.”

Working with each technology partner, Swimlane will develop a portfolio of pre-integrated solutions that customers can quickly deploy either through managed services or add to their existing environment.

About Swimlane
Swimlane is the leader in cloud-scale, low-code security automation. Swimlane unifies security operations in-and-beyond the SOC into a single system of record that helps overcome process and data fatigue, chronic staffing shortages, and quantifying business value. The Swimlane Turbine platform combines human and machine data into actionable intelligence for security leaders.


Businesses must leverage operating systems (OSs) that meet their unique needs. Many consider using unpaid solutions to save money—but there’s another option. This infographic reveals 5 benefits your company can expect from a move to Red Hat® Enterprise Linux®, including: Greater cost savings over time than unpaid options Streaml


Businesses must leverage operating systems (OSs) that meet their unique needs. Many consider using unpaid solutions to save money—but there’s another option. This infographic reveals 5 benefits your company can expect from a move to Red Hat® Enterprise Linux®, including: Greater cost savings over time than unpaid options Streaml

Related News


Skyhigh Security Announces Achieving Amazon Web Services Security

Skyhigh Security | December 28, 2022

Skyhigh security, a leading data security solutions provider, recently announced receiving Amazon Web Services (AWS) Security Competency accreditation in the infrastructure security industry. This distinction recognizes Skyhigh Security's extensive technical expertise in AWS and proven success in its ability to assist customers in achieving their cloud security objectives. Achieving AWS Security Competency distinguishes Skyhigh Security as a member of the AWS Partner Network (APN) that offers specialized software to assist organizations in adopting, developing, and deploying complex security projects on AWS. To achieve the distinction, APN Partners must have in-depth knowledge of AWS and provide solutions on AWS effortlessly. AWS delivers scalable, versatile, and cost-effective solutions to startups and large-sized organizations. To enable the seamless integration and implementation of these solutions, AWS launched the AWS Competency Program to assist customers in identifying consulting and technology APN Partners with extensive industry knowledge and expertise. AWS users can buy the entire Security Service Edge (SSE) portfolio of Skyhigh Security through the AWS Marketplace, which enhances the efficiency of the procurement process and provides flexible licensing options. The company's SSE portfolio is cloud-native, designed from the bottom up with Zero Trust principles, and includes a unified data loss prevention and policy engine. Skyhigh SSE contains, Skyhigh Cloud Access Security Broker, Skyhigh Secure Web Gateway, and Skyhigh Private Access, among other products, offering one of the most extensive portfolios in the market. About Skyhigh Security Based in California, U.S., Skyhigh Security, a provider of a complete, market-leading data security platform built on a modern cloud stack, focuses on helping customers protect the world's data. It protects businesses with data-aware and user-friendly cloud-native security solutions. Its industry-leading Security Service Edge (SSE) portfolio extends beyond data access and focuses on data use, enabling enterprises to communicate from any device and location without compromising security.

Read More


SANS Institute Introduces New Cybersecurity Training for IT Administrators

SANS Security Awareness | February 21, 2023

On February 20, 2023, SANS Security Awareness, a subsidiary of the SANS Institute, announced the release of "Security Essentials for IT Administrators," a new short-form technical training program. This series offers a comprehensive overview of cybersecurity fundamentals, aimed primarily at those with a foundational grasp of network administration and/or IT systems to keep them updated and informed in the ever-changing cybersecurity space. As more IT professionals, like network/system administrators and engineers, take on security responsibilities, it is important for an organization's overall security to have relevant training for this group. This series is intended to raise IT professionals' knowledge of the distinct threat landscape they face by drawing on the objectives of such popular SANS training courses as SEC301, SEC388, SEC401, and SEC504. The product line is available to enterprises seeking to improve their security preparedness and awareness by purchasing directly from SANS Security Awareness or via Microsoft's 'Defender for Office 365' bundle. John Byrne, General Manager of SANS Security Awareness, said, "The launch of the Security Essentials for IT Administrators course marks an exciting chapter in our mission to deliver high-quality security training to professionals in the industry, especially to these users who carry unique risk because of their privileged access and advanced skill set." (Source – Cision PR Newswire) He added, "We are thrilled Microsoft identified SANS to provide this comprehensive technical content series to provide the necessary knowledge and skills to help protect against the most pressing security threats facing organizations across the globe. These modules offer a powerful solution to organizations seeking to bolster their security posture and streamline workforce management for technical teams." (Source – Cision PR Newswire) AboutSANS Security Awareness Established in 1989, the SANS Institute is a cooperative research and education organization. It is the most trusted and, by far, the biggest supplier of cybersecurity certification and training for professionals in business and government institutions around the world. Reputed SANS instructors teach over 60 courses at cybersecurity events in person, online, and on demand. SANS Security Awareness, a division of SANS, gives organizations a complete and thorough security awareness solution that makes it easy and effective for them to manage their "human" cybersecurity risk. SANS also provides the InfoSec community with a wide range of free resources, such as consensus projects, webcasts, podcasts, research reports, and newsletters. It also runs the Internet Storm Center, which is the Internet's early warning system.

Read More


Netwrix Privilege Secure Now Reduces Attack Surface

Netwrix Corporation | February 27, 2023

Netwrix, a leading cybersecurity provider, has recently launched a new version of Netwrix Privilege Secure (formerly Netwrix SbPAM) that extends its zero-standing privileges (ZSP) approach to databases, ensuring privileged accounts only exist for necessary time periods. The rebranded product now includes additional features, such as integrated discovery capabilities to identify all privileged accounts across the IT ecosystem. Improved metadata and keystroke search capabilities for faster threat identification and investigation across live and recorded privileged sessions. Additionally, the product offers a wider range of out-of-the-box reports, customization options, and favorites for generating reports for internal and external auditors. The new version also includes expanded controls for managing service accounts, allowing users to pause, resume, undo, and roll back changes. Netwrix's Senior VP of Products, Jeff Warren, commented, "Netwrix Privilege Secure now eliminates standing privileged accounts across on-premises databases, further reducing the attack surface for both external and internal threats." He further emphasized, "Our innovative ZSP approach replaces risky privileged accounts with ephemeral accounts that grant the minimum access required and that exist only as long as needed — thwarting adversaries seeking elevated access to move laterally and complete their attacks." (Source – PR Newswire) About Netwrix Corporation Netwrix is a leading provider of data security solutions that help security professionals reduce the risk of a breach and limit the impact of attacks. It has been simplifying the process of identifying and protecting sensitive data, as well as detecting, responding to, and recovering from attacks, since its inception in 2006. Over 13,000 organizations worldwide trust Netwrix solutions to enhance their security and compliance posture by addressing all three primary attack vectors: identity, data and infrastructure.

Read More