{"id":24836,"date":"2023-02-17T18:46:57","date_gmt":"2023-02-17T18:46:57","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=24836"},"modified":"2024-06-28T09:13:38","modified_gmt":"2024-06-28T15:13:38","slug":"gartner-soc-modellleitfaden","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/de\/resources\/reports\/gartner-soc-model-guide\/","title":{"rendered":"Gartner: SOC-Modellleitfaden"},"content":{"rendered":"<section class=\"bs-section bs-section-0ace0c84eaa888bce49c4f2de89bf8347ace13a6 bs-section---default bs-section--common-header-with-form\"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-12   bs-column-5f6574ebb29ac8d58ab608d2aff5b1bbe4f96332 bs-column---default\"><div class=\"bs-lottie-animator bs-lottie-animator---default\" id=\"lottie-c7d5ff8e-a115-40ae-aecb-0a84b90fe739\" data-settings=\"{&quot;desktop&quot;:{&quot;settings&quot;:{&quot;animateViewPort&quot;:0.5,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;Contact_lines1.json&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:1,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Contact_lines1.json&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}},&quot;mobile&quot;:{&quot;breakpoint&quot;:576,&quot;settings&quot;:{&quot;animateViewPort&quot;:50,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:0,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}}}\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column  col-md-7 col-sm-0   bs-column-3d962b00decd4fef444449c96db45c42599741ec bs-column---default\">\n<p class=\"common-header__blue-text has-blue-color has-text-color\" style=\"font-size:18px;text-transform:uppercase\"><span>Berichte<\/span><\/p>\n\n\n<h1 style=\"font-style:normal;font-weight:400;\" class=\"common-header__gated-page wp-block-post-title has-text-color has-black-color\">Gartner: SOC-Modellleitfaden<\/h1>\n\n\n<p><img decoding=\"async\" src=\"https:\/\/swimlane.com\/assets\/uploads\/images\/Gartner_logo-20px.png\" alt=\"Gartner_logo-20px.png\" data-image=\"3b2z72swikat\"><\/p>\n<p>F\u00fchrungskr\u00e4fte im Bereich Sicherheit und Risikomanagement haben oft Schwierigkeiten, den gesch\u00e4ftlichen Nutzen ihrer Sicherheitszentren gegen\u00fcber Nicht-Sicherheitsverantwortlichen zu vermitteln, was zu geringeren Investitionen, schlechter Zusammenarbeit und schwindender Unterst\u00fctzung f\u00fchrt.<\/p>\n<p>Ohne operative Abstimmung und klar definierte Vereinbarungen f\u00fcr ein SOC sto\u00dfen SRM-Verantwortliche auf Widerstand und Vermeidung seitens anderer Gesch\u00e4ftsbereiche, was das Risiko von Sicherheitsvorf\u00e4llen mit direkten finanziellen Auswirkungen auf das Unternehmen erh\u00f6ht.<\/p>\n<p>Die Verantwortlichen im Bereich SRM (Sicherheitsrisikomanagement) vers\u00e4umen es, relevante Bedrohungen und Risiken f\u00fcr die Organisation zu erkennen und zu verstehen, was die Wahrscheinlichkeit verheerender Sicherheitsvorf\u00e4lle erh\u00f6ht.<\/p>\n<\/p>\n<p>Laden Sie diesen Gartner-Bericht herunter, um mehr zu erfahren:<\/p>\n<ul>\n<li>Wie Sie das beste SOC-Modell f\u00fcr Ihre Organisation ausw\u00e4hlen<\/li>\n<li>Die wichtigsten Komponenten des Gartner SOC-Frameworks.<\/li>\n<li>Wie man eine organisatorische Abstimmung erreicht, wenn man unternehmensweit mit F\u00fchrungskr\u00e4ften zusammenarbeitet, um deren Anforderungen und Bed\u00fcrfnisse an das SOC zu verstehen.<\/li>\n<\/ul>\n<p>Greifen Sie auf diesen Gartner SOC-Bericht zu, mit freundlicher Genehmigung von Swimlane.<\/p>\n<\/p>\n\n\n\n<div class=\"bs-div bs-div-55fcd1d264d5e2b220b95765fe5f62e2fba6086e bs-div---default bs-div--footnotes\"><div class=\"bs-div__inner\">\n<p><br><\/p>\n<p>Gartner, SOC Model Guide, John Collins, Mitchell Schneider, Pete Shoard, Ver\u00f6ffentlicht am 19. Oktober 2021.<\/p>\n<p>GARTNER ist eine eingetragene Marke und Dienstleistungsmarke von Gartner, Inc. und\/oder deren verbundenen Unternehmen in den USA und international und wird hier mit Genehmigung verwendet. Alle Rechte vorbehalten.<\/p>\n<p><em>Gartner empfiehlt keine der in seinen Forschungspublikationen dargestellten Anbieter, Produkte oder Dienstleistungen und r\u00e4t Technologieanwendern nicht, sich ausschlie\u00dflich f\u00fcr Anbieter mit den h\u00f6chsten Bewertungen oder anderen Auszeichnungen zu entscheiden. Die Forschungspublikationen von Gartner geben die Meinungen der Gartner-Forschungsorganisation wieder und sind nicht als Tatsachenbehauptungen zu verstehen. Gartner schlie\u00dft jegliche ausdr\u00fcckliche oder stillschweigende Gew\u00e4hrleistung in Bezug auf diese Forschung aus, einschlie\u00dflich der Gew\u00e4hrleistung der Marktg\u00e4ngigkeit oder Eignung f\u00fcr einen bestimmten Zweck.<\/em><\/p>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-column  col-md-5 col-sm-0   bs-column-4e7708ec1047c5de435a1fcaa9bd912b51781ebd bs-column---default bs-column--form\">\n<div class=\"bs-div bs-div-55656b638c23030759cda980e61836fb7b124b39 bs-div---default bs-div--form-wrapper\"><div class=\"bs-div__inner\">\n<iframe loading=\"lazy\" src=\"https:\/\/go.swimlane.com\/l\/288742\/2024-02-14\/2cysbkw?FFSP=Gartner%20SOC%20Model%20Guide&#038;LFSP=Gartner%20SOC%20Model%20Guide\" width=\"100%\" height=\"500\" type=\"text\/html\" frameborder=\"0\" allowtransparency=\"true\" style=\"border: 0\" id=\"myiframe\"><\/iframe>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-14ca56fdc3be4b5f0a8616120c8005c221b5c55b bs-section---default bs-section--related-items\"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-12   bs-column-5f6574ebb29ac8d58ab608d2aff5b1bbe4f96332 bs-column---default\">\n<h2 class=\"wp-block-heading has-deep-color has-text-color\" id=\"h-you-might-also-be-interested-in\">Das k\u00f6nnte Sie auch interessieren<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-12   bs-column-33aba5295b76f4052fb226277a0b4e1e4747889c bs-column---default\">\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69ef7ed1b21cf bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/resources\/reports\/soar-quadrant-software-reviews\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/SoftwareReviews-2024-Security-Automation-SOAR-Data-Quadrant.png' class='img-fluid' alt='SoftwareReviews 2024 SOAR Data Quadrant Report Magic Quadrant Grafik ' title='SoftwareReviews 2024 Security Automation (SOAR) Datenquadrant'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Bericht<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Swimlane f\u00fchrt den SOAR-Datenquadranten (Security Orchestration Automation Response) an.<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Mehr lesen<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69ef7ed1b4506 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/resources\/reports\/soar-quadrant\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/SPARK_Matrix_SOAR_20241-3.jpg' class='img-fluid' alt='SoftwareReviews 2024 SOAR Data Quadrant Report Magic Quadrant Grafik ' title='SPARK_Matrix_SOAR_2024(1)'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Bericht<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Quadrant Knowledge Solutions SPARK Matrix\u2122: Security Orchestration, Automation and Response (SOAR), 2024\u00a0<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Mehr lesen<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\"><\/div>\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"<p>&#8220;Selecting the appropriate security operation center model is challenging, choosing the wrong SOC model can lead to a poor security posture, increased risk, and overextended security teams. Security and risk management leaders [can] use this guide to identify which model aligns to their needs.&#8221;<\/p>\n","protected":false},"author":43,"featured_media":10566,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"on","_relevanssi_hide_content":"on","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"Yoast SEO Relevanssi index exclude","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[92],"resource-topic":[133],"resource-industry":[93,94,95,96,97],"blog-category":[],"class_list":["post-24836","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-reports","resource-topic-research","resource-industry-automation","resource-industry-incident-response","resource-industry-threat-intelligence","resource-industry-edr","resource-industry-siem"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Gartner: Create a SOC Target Operating Model to Drive<\/title>\n<meta name=\"description\" content=\"Selecting the appropriate security operation center model is challenging, choosing the wrong SOC model has to be avoided. Download.\" \/>\n<meta name=\"robots\" content=\"index, nofollow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/de\/ressourcen\/berichte\/gartner-soc-modellleitfaden\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gartner: SOC Model Guide\" \/>\n<meta property=\"og:description\" content=\"Selecting the appropriate security operation center model is challenging, choosing the wrong SOC model has to be avoided. Download.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/de\/ressourcen\/berichte\/gartner-soc-modellleitfaden\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-28T15:13:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/Gartner-SOC-Target-Operating-Model2_2021-08-27-151353_cmkx-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"792\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/resources\\\/reports\\\/gartner-soc-model-guide\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/de\\\/resources\\\/reports\\\/gartner-soc-model-guide\\\/\",\"name\":\"Gartner: Create a SOC Target Operating Model to Drive\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/resources\\\/reports\\\/gartner-soc-model-guide\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/resources\\\/reports\\\/gartner-soc-model-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/Gartner-SOC-Target-Operating-Model2_2021-08-27-151353_cmkx-1.jpg\",\"datePublished\":\"2023-02-17T18:46:57+00:00\",\"dateModified\":\"2024-06-28T15:13:38+00:00\",\"description\":\"Selecting the appropriate security operation center model is challenging, choosing the wrong SOC model has to be avoided. Download.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/resources\\\/reports\\\/gartner-soc-model-guide\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/swimlane.com\\\/de\\\/resources\\\/reports\\\/gartner-soc-model-guide\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/resources\\\/reports\\\/gartner-soc-model-guide\\\/#primaryimage\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/Gartner-SOC-Target-Operating-Model2_2021-08-27-151353_cmkx-1.jpg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/Gartner-SOC-Target-Operating-Model2_2021-08-27-151353_cmkx-1.jpg\",\"width\":612,\"height\":792},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/resources\\\/reports\\\/gartner-soc-model-guide\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/swimlane.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gartner: SOC Model Guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/swimlane.com\\\/de\\\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/swimlane.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\\\/\\\/swimlane.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/swimlane\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/swimlane\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Gartner: Ein SOC-Zielbetriebsmodell erstellen, um \u2026","description":"Die Auswahl des passenden Security Operation Center-Modells ist anspruchsvoll; die Wahl des falschen SOC-Modells muss unbedingt vermieden werden. Download.","robots":{"index":"index","follow":"nofollow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/de\/ressourcen\/berichte\/gartner-soc-modellleitfaden\/","og_locale":"de_DE","og_type":"article","og_title":"Gartner: SOC Model Guide","og_description":"Selecting the appropriate security operation center model is challenging, choosing the wrong SOC model has to be avoided. Download.","og_url":"https:\/\/swimlane.com\/de\/ressourcen\/berichte\/gartner-soc-modellleitfaden\/","og_site_name":"AI Security Automation","article_modified_time":"2024-06-28T15:13:38+00:00","og_image":[{"width":612,"height":792,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/Gartner-SOC-Target-Operating-Model2_2021-08-27-151353_cmkx-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Est. reading time":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/de\/resources\/reports\/gartner-soc-model-guide\/","url":"https:\/\/swimlane.com\/de\/resources\/reports\/gartner-soc-model-guide\/","name":"Gartner: Ein SOC-Zielbetriebsmodell erstellen, um \u2026","isPartOf":{"@id":"https:\/\/swimlane.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/de\/resources\/reports\/gartner-soc-model-guide\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/de\/resources\/reports\/gartner-soc-model-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Gartner-SOC-Target-Operating-Model2_2021-08-27-151353_cmkx-1.jpg","datePublished":"2023-02-17T18:46:57+00:00","dateModified":"2024-06-28T15:13:38+00:00","description":"Die Auswahl des passenden Security Operation Center-Modells ist anspruchsvoll; die Wahl des falschen SOC-Modells muss unbedingt vermieden werden. Download.","breadcrumb":{"@id":"https:\/\/swimlane.com\/de\/resources\/reports\/gartner-soc-model-guide\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/de\/resources\/reports\/gartner-soc-model-guide\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/swimlane.com\/de\/resources\/reports\/gartner-soc-model-guide\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/Gartner-SOC-Target-Operating-Model2_2021-08-27-151353_cmkx-1.jpg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Gartner-SOC-Target-Operating-Model2_2021-08-27-151353_cmkx-1.jpg","width":612,"height":792},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/de\/resources\/reports\/gartner-soc-model-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Gartner: SOC Model Guide"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/de\/#website","url":"https:\/\/swimlane.com\/de\/","name":"Low-Code Sicherheitsautomatisierung &amp; SOAR-Plattform | Swimlane","description":"Agentische KI-Automatisierung f\u00fcr jede Sicherheitsfunktion","publisher":{"@id":"https:\/\/swimlane.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/de\/#organization","name":"Low-Code Sicherheitsautomatisierung &amp; SOAR-Plattform | Swimlane","url":"https:\/\/swimlane.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/24836","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/users\/43"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/24836\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/media\/10566"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/media?parent=24836"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/tags?post=24836"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-type?post=24836"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-topic?post=24836"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-industry?post=24836"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/blog-category?post=24836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}