Skip to main content
banner image
venafi logo

Now Machine Identity Management Can SOAR [Thanks Swimlane]

Now Machine Identity Management Can SOAR [Thanks Swimlane]

machine identity management development fund and swim lane
July 16, 2020 | Bridget Hildebrand


Most security operations teams are burdened by overwhelming operational tempo and imperfect implementations of technology, people and process. Organizations face ever evolving and disruptive threats, a shortage of qualified security personnel and the need to manage and monitor growing IT estates. In response, security orchestration, automation and response (SOAR) is helping businesses of all sizes to improve their ability to swiftly detect and respond to attacks.
 

As we have learned from recent high-profile breaches at Equifax and NordVPN, machine identities are at great risk of compromise when not protected. They require visibility, intelligence and automation. But that vigilance requires effort some feel they don’t have. Not so!
 

Recently I had the opportunity to meet with Swimlane, who is a leader in SOAR technology. As part of the Machine Identity Management Development Fund, Swimlane has built a Machine Identity Management Plugin that integrates with their SOAR solution. In this continuing interview series with developers, I am speaking with Josh Rickard who is a Security Research Engineer at Swimlane.



 




Bridget: Tell me about Swimlane and the mission for your customers.

Josh: Swimlane was founded to deliver scalable, innovative and flexible security solutions to organizations struggling with alert fatigue, vendor proliferation and chronic staffing shortages. Swimlane is at the forefront of the growing market for security automation and orchestration solutions that automate and organize security processes in repeatable ways to get the most out of available resources and accelerate incident response. Swimlane offers a broad array of features aimed at helping organizations to address both simple and complex security activities, from prioritizing alerts to remediating threats and improving performance across the entire operation.
 

Bridget: Describe for me the machine identity management challenge you were aiming to solve as part of the Development Fund.

Josh: The Global 5000 is using SOAR to drive and coordinate rapid response to incidents. SOAR combines proven, cross-functional workflows with automation to quickly reduce risk and recover from an incident. However, there have been no SOAR response use cases for machine identities (even though some SOAR platforms do support the Venafi Platform for scripting lifecycle functions). This Development Fund project delivers standard, responsible workflows for automated response to machine identity incidents.
 

Bridget: What has Swimlane created for Venafi customers?

Josh: Venafi customers can now confidently respond to incidents where machine identities could be compromised. Swimlane Machine Identity Management plugin drives coordinated and automated response for TLS, SSH and code signing machine identities. It’s now available on Swimlane AppHub.
 

Bridget: How will organizations benefit from using the Swimlane integration with Venafi?

Josh: Swimlane applications and workflows tie automation and orchestration capabilities together with analyst activity. This allows the analyst to access all relevant case data from within the app, review evidence, and initiate additional investigation and enforcement actions. Applications and workflows can be fully customized, enabling the analyst experience and orchestration actions to be tailored to any environment. Reports and dashboards can be quickly created from any datapoint in an application, providing deep insight and metrics across both analyst and automated system activity. By developing automated response actions and workflows, Swimlane enables security teams to quickly reduce risk and recover from breaches. With the Venafi plugin, customers can:
 

  • Document response actions across functions
  • Automate response through the Venafi Platform, using REST APIs to replace/rotate TLS, SSH and code signing machine identities
  • Confirm and report on completion of incident response for machine identities

 

Learn more about Swimlane’s Machine Identity Management plugin today from the Venafi Marketplace. And stay tuned for future interviews with Machine Identity Management Development Fund recipients.



 

Related posts

Like this blog? We think you will love this.
opencredo-venafi-vault-wizard
Featured Blog

OpenCredo Venafi-Vault Wizard: Bringing InfoSec and Developers One Step Closer

Increasing visibility without slowing down developers

Read More
Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

See Popular Tags

You might also like

TLS Machine Identity Management for Dummies
eBook

TLS Machine Identity Management for Dummies

Certificate-Related Outages Continue to Plague Organizations
White Paper

CIO Study: Certificate-Related Outages Continue to Plague Organizations

About the author

Bridget Hildebrand
Bridget Hildebrand

Bridget is Sr. Manager, Ecosystem Marketing at Venafi. She has over 20 years of experience managing technology partnerships and global channel programs for a broad range of technology organizations.

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud


Venafi Cloud manages and protects certificates



* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
(@%+^!#$?:,(){}[]~`-_)
* Please fill in this field
* Please fill in this field
* Please fill in this field
*

End User License Agreement needs to be viewed and accepted



Already have an account? Login Here

×
get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more