Softcat Achieves 30% Growth with Low-Code Security Automation

Softcat is a leading provider of IT solutions and managed services. Their success and customer-focused mindset have recently earned them recognition as Channel Reseller News’ (CRN) Number 1 Value Added Reseller in the UK! From a technology perspective, automation has played an important role in the recent growth of their business.

Like a managed service provider (MSP), Softcat is responsible for infrastructure oversight, management and alert response for multiple customers. Softcat and its analysts were not immune to the skills shortage in the cybersecurity industry or the burnout that comes from monotonous work, such as triaging low-fidelity alerts.

“As customers continue to evolve their cybersecurity practices internally, they need to adopt more platforms,” said Matt Helling, cyber services manager at SoftCat. To run these platforms, they need more staff. To grow their workforce, they need to find and recruit qualified people, then nurture and develop them continuously. »

Softcat recognizes how difficult this is for customers. “We’ve built our services to try to eradicate some of those issues, to basically take the platform issue and the people issue out of our customers and take care of them ourselves,” Helling added.

Building a business case for security automation

Helling and the Softcat team knew that to grow their business, they needed to hire, train, develop and retain a core group of security analysts who would support their customers. As they evaluated solutions, the value of security automation (SOAR) was apparent. This was easy to justify because the security automation allowed them to take on more clients without needing to hire additional analysts. Plus, it frees up existing analysts’ time for more strategic work, which improves job satisfaction.

To select a security automation solution, Softcat first identified its priority use casesthen sent out an RFP to five SOAR vendors, then narrowed the list down to three finalists and finally selected Swimlane’s low-code security automation platform.

Why Swimlane stood out

Swimlane’s low-code security automation platform stood out for its powerful automation engine. Compared to SOAR solutions, Swimlane’s engine has proven to be more scalable and capable of extending automation beyond SOC use cases. Cybersecurity chief Matt Helling and his team also favored Swimlane because:

  1. Independent workflow and technology“With Swimlane, we didn’t have to try to fit our result into a pre-designed box that had already been developed. Swimlane allowed us to build something that worked for us and how we operate,” Helling said.

  2. Security automation beyond the SOC – “What we like about Swimlane is the fact that it also allows our internal IT department to automate certain processes like JML (joiners, movers, leavers). Additionally, we have other departments within the company that are interested in how they can use the platform. »

How Safety Automation Is Fueling Softcat’s Growth

Softcat has been a Swimlane customer for almost two years now. During this time, they have achieved many tangible results that have helped them mature their security posture, grow their business, and retain security talent. Read the Softcat case study for all the other details, but here are the highlights:

  • 30% growth in customer acquisition – Swimlane’s automation, intuitive dashboards and reporting helped Softcat reduce the cost of acquiring a new customer. They were able to grow their business by 30% without increasing their workforce.

  • Obtaining a recording system for security – Swimlane became Softcats primary interface for interacting with all security solutions, serving as a check-in system for all customers.

  • Security talents retained and developed: Swimlane enabled Softcat to invest in and promote its staff by reducing the time spent manually triaging alerts.

See for yourself

Find out how Swimlane can adapt and scale your security automation processes. Schedule your own live demo at

*** This is a syndicated blog from the Security Bloggers Network of Swimlane (en-US) written by Katie Bykowski. Read the original post at:

Source link