Security Experts:

Connect with us

Hi, what are you looking for?


Cybersecurity Funding

Swimlane Raises $40 Million to Expand SOAR Business

Swimlane, a provider of security orchestration, automation and response (SOAR) solutions, announced today that it has raised $40 million in growth funding.

Swimlane, a provider of security orchestration, automation and response (SOAR) solutions, announced today that it has raised $40 million in growth funding.

Denver, Colorado-based Swimlane is a player in the hot market of security orchestration, automation and response (SOAR) solutions, and helps security operations teams struggling with alert fatigue and staffing shortages. 

Swimlane logoAccording to the company, the additional cash injection will be used to accelerate partnerships and alliances, expand research and development, and fuel global expansion. The total amount raised by the cmpany is now $75 million.

As the company explains, its solution helps organizations address security operations needs, including prioritizing alerts, orchestrating tools and automating the remediation of threats.

In addition to announcing the funding, Swimlane appointed James Brear as its new Chief Executive Officer.

The funding round was led by private equity firm Energy Impact Partners (EIP), with Senior Operating Partner Niloofar Howe being named as the company’s newest board member.

“Organizations realize that increased staffing is no longer sufficient to effectively safeguard against the growing amount of security and intelligence data that is generated on a daily basis,” Howe said. “To protect rapidly expanding attack surfaces, automation must be broadly applied across every security use case. The EIP team is excited to continue our collaborative engagement with Swimlane as the company helps solve inefficiencies and streamline the way industries respond to incidents and mitigate risk.” 

In addition to its headquarters in Denver, Swimlane has operations throughout North America, Central America, Europe, the Middle East and Australia. 

Related: Fighting Alert Fatigue With Security Orchestration, Automation and Response

Related: Security Operations: What is Your Signal-to-Noise Ratio?

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybersecurity Funding

SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet


Twenty-one cybersecurity-related M&A deals were announced in December 2022.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...


More than 450 cybersecurity-related mergers and acquisitions were announced in 2022, according to an analysis conducted by SecurityWeek

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...