Automation
AmiViz Strengthens Relationship with Swimlane

AmiViz has announced that it has strengthened its relationship with Swimlane, a leading provider of low-code security automation solutions. Swimlane is at the forefront of innovation thanks to its breakthrough low-code security automation solution that transcends traditional SOAR by capturing hard-to-reach telemetry and expanding actionability closer to the point of threat inception.
Expressing his happiness on the successful relationship with Swimlane, the COO at AmiViz, Ilyas Mohammed said, “The demand for SOAR solutions has been on the rise, and with Swimlane’s unique low-code approach to security automation, we are witnessing a lot of traction across the region. AmiViz and Swimlane are mutually committed to take our level of cooperation to next level, which will help us to tap into the immense potential the market has to offer in the Middle East.”
“We will further accelerate our efforts to build greater momentum and undertake several new joint initiatives to address the growing market needs, conduct frequent workshops, roadshows, webinars, impart training and skill sets, and other growth-related activities to enable channel partners across the Middle East and Africa region,” Ilyas added.
“The complexity and sophistication of attacks continue to grow, overburdening security teams with manual, repetitive, and time-consuming tasks that are required to track, mitigate and respond to security events,” said Mike Kay, Senior Vice President of Business Development at Swimlane. “Our unique low-code security automation approach is a game-changer for the region, offering security teams a solution that meets the region’s most demanding and constantly evolving security operations requirements. Our partnership with AmiViz makes automation even more approachable via the enterprise marketplace.”
Automation
Four Steps to Ensure Robotic Process Automation Security

Written by Naved Rashid, Analyst (Research & Advisory) RPA at Gartner
Robotic process automation (RPA) is a new favorite among IT leaders. It can be quickly deployed to automate repetitive tasks, and it saves organizations time and money.
That said, RPA is risky. RPA bots handle sensitive data, moving it across systems from one process to another. If the data is not secured, it can be exposed and can cost organizations millions of dollars.
There are two main risks associated with RPA — data leakage and fraud. Without proper security measures in place, the sensitive data, such as RPA bot credentials or customer data that RPA handles, can be exposed to attackers. Proper governance and security frameworks are essential to mitigating these risks.
To address security failures in RPA projects, security and risk management leaders need to follow a four-step action plan.
- Ensure accountability for bot actions
During the COVID-19 pandemic, as organizations rushed to deploy RPA projects to minimize costs by automating menial tasks, one of the most common mistakes they made was not differentiating between bot operators and bot identities. Ensure dedicated identification credentials and identity naming standards by assigning a unique identity to each RPA bot and process. Additionally, can implement two-factor human-to-system authentication along with the username and password authentication. - Avoid abuse and fraud from breaks in security on demand
RPA implementation can lead to an increase in account privileges, therefore increasing the risk of fraud. Security leaders need to restrict RPA access to what each bot strictly needs to conduct the assigned task. For example, an RPA script with a bot that copies certain values from a database and pastes them into an email should only have read access to the database, rather than write access. Employ session management capabilities such as screenshots or video surveillance to dissuade fraudsters and conduct forensic investigations. - Protect log integrity
In a case where RPA security fails, the security team will need to review logs. Enterprises typically feed RPA logging to a separate system where the logs are stored securely and are forensically sound. Security and risk management leaders need to ensure that the RPA tool provides a complete, system-generated log without any gaps that may impact investigation. - Enable secure RPA development
RPA development is an ongoing process. It cannot be a one-time activity and needs to evolve to tackle the vulnerabilities and threats. To speed up deployment, enterprises tend to postpone security considerations until RPA scripts are ready to run.
Establish proactive dialogues and regular cadences between the security team and the line-of-business team that leads the RPA initiative. This includes creating a risk framework that evaluates RPA implementation, as well as the individual scripts. Periodically review and test RPA scripts with a special focus on business logic vulnerabilities.
-
Cyber Security1 week ago
Dubai Hosts GISEC 2025, Driving Billion-Dollar Cyber Growth
-
Cyber Security6 days ago
GISEC 2025 Launches OT Security Conference Amid 49% Infrastructure Attack Surge
-
Cyber Security1 week ago
DESC to Highlight Dubai’s Cyber Defense Strategies as GISEC 2025 Government Partner
-
Cyber Security1 week ago
GISEC Global 2025: A Vital Platform to Connect With Customers and Partners in the Region
-
Artificial Intelligence6 days ago
CyberKnight Partners with Ridge Security for AI-Powered Security Validation
-
Cyber Security1 week ago
Inside the Shadowy World of Investment Scams: How Fraudsters Use Facebook and Fake News
-
Cyber Security1 week ago
Rising Cyber Insurance Pressures Push UAE Firms to Fix Identity Silos and AI Vulnerabilities
-
Cyber Security6 days ago
Huawei Experts Reiterate the Importance of a Unified Cybersecurity Foundation at GISEC Global 2025