{"id":25010,"date":"2023-02-14T08:45:00","date_gmt":"2023-02-14T08:45:00","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=25010"},"modified":"2023-10-09T11:58:52","modified_gmt":"2023-10-09T17:58:52","slug":"sicherheitsorchestrierung-2","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/de\/blog\/security-orchestration-2\/","title":{"rendered":"Was ist Sicherheitsorchestrierung?"},"content":{"rendered":"\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/sec_or__2masthead-1.webp\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Understanding High-Impact, Low-Code Security Automation\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/sec_or__2masthead-1.webp 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/sec_or__2masthead-1-300x178.webp 300w, https:\/\/swimlane.com\/wp-content\/uploads\/sec_or__2masthead-1-1024x609.webp 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/sec_or__2masthead-1-768x457.webp 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2023-02-14T08:45:00-07:00\">Feb. 14, 2023<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">What is Security Orchestration?<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/de\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">3 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/de\/blog\/security-orchestration-2\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/de\/blog\/security-orchestration-2\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('What%20is%20Security%20Orchestration%3F').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Fsecurity-orchestration-2%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=What%20is%20Security%20Orchestration%3F&url=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Fsecurity-orchestration-2%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Fsecurity-orchestration-2%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Fsecurity-orchestration-2%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<p>As the cyber threat landscape continues to evolve, organizations must put new systems and processes in place to combat threats. Over the last few years, security automation orchestration \u2013&nbsp;combined with automation and response \u2013 has become a successful solution. Security orchestration helps organizations increase security operations efficiency with improved incident response processes.<\/p>\n\n\n\n<p>Most people understand what&nbsp;<a href=\"https:\/\/swimlane.com\/blog\/security-automation\/\">security automation<\/a>&nbsp;is, but what about security orchestration?<\/p>\n\n\n\n<p>Orchestration is defined as \u201charmonious organization\u201d or \u201cthe planning and coordination of the elements of a situation to produce a desired effect.\u201d That sounds important, but how does this relate to cybersecurity?<\/p>\n\n\n\n<p>In cyber security, orchestration involves the connection and integration of various security tools and systems to power automation and streamline processes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-security-orchestration\">What is Security Orchestration?<\/h2>\n\n\n\n<p>Essentially, security orchestration brings together the tools and systems you already have and makes them work together to better serve your security operations. When you leverage technological integrations with your existing tools in this way, you can implement sophisticated security defenses using both internal and external resources.<\/p>\n\n\n\n<p>Some of the ways security orchestration works include:<\/p>\n\n\n\n<div class=\"bs-div bs-div-faa2050c28180b142b56b13f3df1f9c1d62c9aa8 bs-div---default bs-div--custom-list-style\"><div class=\"bs-div__inner     \">\n<ul class=\"wp-block-list\">\n<li>Gathers comprehensive data<\/li>\n\n\n\n<li>Standardizes security processes<\/li>\n\n\n\n<li>Provides information to power automation<\/li>\n\n\n\n<li>Provides security analysts with complete alert context<\/li>\n\n\n\n<li>Uses all available tools and resources together to better defend against threats<br><\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-benefits-of-security-orchestration\">Benefits of Security Orchestration<\/h3>\n\n\n\n<p><strong>Improve SecOps Efficiency<\/strong>&nbsp;<\/p>\n\n\n\n<p>Given the increase in data breaches and cyberattacks that occur worldwide, automation is a \u201cmust-have\u201d element in your&nbsp;<a href=\"\/blog\/what-is-a-security-operations-center-soc\/\">SOC<\/a>. However, enterprises can\u2019t rely solely on automation. This is because security orchestration makes automation possible.<\/p>\n\n\n\n<p>Orchestration connects your tools to improve your organization\u2019s security intelligence. Informed security intelligence improves your operation\u2019s efficiency by using automation for repetitive tasks and human decision-making for higher-level threats. When orchestration and automation work harmoniously, security analysts can be more efficient at triaging alerts.<\/p>\n\n\n\n<p><strong>Enhance Context<\/strong><\/p>\n\n\n\n<p>By centralizing operations into a single interface, SecOps teams better understand the state of security throughout the organization. Orchestration enhances context and enables better and faster decision-making by bringing information together. Organizations may also reduce MTTR by enabling analysts to view breaches and threats that occur in real-time. The ability to quickly catch and shut down attacks can stop data breaches in their tracks before they impact the organization.<\/p>\n\n\n\n<p>Automation supported by orchestration can also be used to perform tasks like comparing files to signatures of known threats and reviewing previous incidents. Additional context sheds like on where threats are coming from, which can help your team better prepare for and defend against threats.<\/p>\n\n\n\n<p><strong>Handle More Alerts with Your Existing Staff<\/strong><\/p>\n\n\n\n<p>SecOps efficiency improves with automation supported by orchestration. SecOps teams can eliminate tedious and manual tasks to successfully handle all of their security alerts. Nearly 90% of all SecOps incident response tasks can be automated to some extent. Every step automated in the investigation process allows your team to handle more alerts and reduce MTTR.<\/p>\n\n\n\n<p>It\u2019s important to note, though \u2013 no matter how hard we try, it\u2019s impossible to rely on a solely automated solution. It\u2019s necessary to keep humans in the loop to investigate and understand new threats as they emerge. Replacing your team with a fully-automated solution isn\u2019t possible, so security orchestration extends the abilities of your existing team.<\/p>\n\n\n\n<p><strong>Reduce Management Complexity<\/strong><\/p>\n\n\n\n<p>Enterprises need an intricate network of tools and systems to manage advanced threats. Gone are the days when organizations rely on one security solution. Instead, SecOps teams must now handle dozens of security vendors and numerous security touchpoints.<\/p>\n\n\n\n<p>Orchestration works with your existing security infrastructure to make the management of security operations a breeze, regardless of how many systems or vendors you use. Plus, coordinating your tools actually increases their value and allows you to leverage all of their capabilities fully.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-security-orchestration-automation-and-response\">Security Orchestration, Automation and Response<\/h3>\n\n\n\n<p>Security orchestration is typically adopted by SOC teams with a&nbsp;<a href=\"\/blog\/what-is-soar\/\">Security Orchestration, Automation, and Response (SOAR) platform<\/a>. SOAR platforms provide a centralized location for security teams to manage security incidents and automate security processes across different security technologies.&nbsp;<\/p>\n\n\n\n<p>When you integrate different security tools and technologies and automate security processes, security orchestration can help organizations improve their security posture, reduce the risk of security incidents and protect their critical assets.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-security-orchestration-in-modern-soar\">Security Orchestration in Modern SOAR<\/h3>\n\n\n\n<p>Modern SOAR platforms take it a step further. To make security orchestration more approachable for overworked SOC teams, low-code options have been introduced.&nbsp;<a href=\"https:\/\/www.swimlane.com\/swimlane-turbine?_ga=2.224914778.178832218.1676865474-3672332.1673513225\">Low-code SOAR platforms<\/a>&nbsp;allow SecOps teams to automate and orchestrate beyond conventional security use cases. Security teams can use security orchestration and security automation together to improve incident response processes through streamlined workflows and prioritized alert management.&nbsp;<\/p>\n\n\n\n<p>These tools make it possible for your team to:<\/p>\n\n\n\n<div class=\"bs-div bs-div-faa2050c28180b142b56b13f3df1f9c1d62c9aa8 bs-div---default bs-div--custom-list-style\"><div class=\"bs-div__inner     \">\n<ul class=\"wp-block-list\">\n<li>Centralize security operations<\/li>\n\n\n\n<li>Reduce MTTD and MTTR<\/li>\n\n\n\n<li>Standardize and scale processes<\/li>\n\n\n\n<li>Deliver insightful security metrics<\/li>\n\n\n\n<li>Gain insights into threats in real-time<\/li>\n\n\n\n<li>Do more with your existing staff<br><\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<p>Security orchestration plays a critical role in the security operations center. Analysts need visibility across the entire tech stack and consistent support for countless processes. Security orchestration, via a low-code SOAR platform, can ingest and enrich security alerts at machine speeds.&nbsp;<\/p>\n\n\n\n<div class=\"bs-div bs-div-a1fffc3e915dedc6468360d95364d7f1c28a1a64 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-a1fffc3e915dedc6468360d95364d7f1c28a1a64 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/gartner-marketguide-cover@2x.webp' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-2aebcd1b2c11849d7c87d8462be32842b8c42b50 bs-div---default\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-gartner-2022-market-guide-for-soar\">Gartner 2022 Market Guide for SOAR<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color\">Low-code security automation is the future of SOAR. Unlock free access to the Gartner: 2022 Market Guide for Security Orchestration, Automation and Response Solutions, compliments of Swimlane.<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-fe098277b964f7f4a75880ae48cb7231548833e3\"><style>.bs-pro-button-p-btn-fe098277b964f7f4a75880ae48cb7231548833e3 .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"\/resources\/reports\/gartner-2022-market-guide-for-security-orchestration-automation-and-response-solutions\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Download<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d1292122886 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/security-orchestration\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Aug. 16, 2017<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Security Orchestration | What is Security Orchestration?<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d129212415a bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/security-consolidation-vs-security-orchestration\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Dez. 9, 2016<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Security consolidation vs. security orchestration<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d12921257b4 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/incident-alert-management\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Okt. 11, 2017<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Using security automation and orchestration for incident alert management<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":25023,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[70],"class_list":["post-25010","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What the heck is Security Orchestration?<\/title>\n<meta name=\"description\" content=\"SecOps teams rely on security orchestration to improve efficiency, but what is security orchestration?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/de\/blog\/sicherheitsorchestrierung-2\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Security Orchestration?\" \/>\n<meta property=\"og:description\" content=\"SecOps teams rely on security orchestration to improve efficiency, but what is security orchestration?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/de\/blog\/sicherheitsorchestrierung-2\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-09T17:58:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/sec_or__2masthead-1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"666\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/de\/blog\/security-orchestration-2\/\",\"url\":\"https:\/\/swimlane.com\/de\/blog\/security-orchestration-2\/\",\"name\":\"What the heck is Security Orchestration?\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/de\/blog\/security-orchestration-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/de\/blog\/security-orchestration-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sec_or__2masthead-1.webp\",\"datePublished\":\"2023-02-14T08:45:00+00:00\",\"dateModified\":\"2023-10-09T17:58:52+00:00\",\"description\":\"SecOps teams rely on security orchestration to improve efficiency, but what is security orchestration?\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/de\/blog\/security-orchestration-2\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/de\/blog\/security-orchestration-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/swimlane.com\/de\/blog\/security-orchestration-2\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sec_or__2masthead-1.webp\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sec_or__2masthead-1.webp\",\"width\":1120,\"height\":666,\"caption\":\"Understanding High-Impact, Low-Code Security Automation\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/de\/blog\/security-orchestration-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Security Orchestration?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/de\/#website\",\"url\":\"https:\/\/swimlane.com\/de\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/de\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Was zum Teufel ist Sicherheitsorchestrierung?","description":"SecOps-Teams setzen auf Sicherheitsorchestrierung, um die Effizienz zu steigern, aber was genau ist Sicherheitsorchestrierung?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/de\/blog\/sicherheitsorchestrierung-2\/","og_locale":"de_DE","og_type":"article","og_title":"What is Security Orchestration?","og_description":"SecOps teams rely on security orchestration to improve efficiency, but what is security orchestration?","og_url":"https:\/\/swimlane.com\/de\/blog\/sicherheitsorchestrierung-2\/","og_site_name":"AI Security Automation","article_modified_time":"2023-10-09T17:58:52+00:00","og_image":[{"width":1120,"height":666,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/sec_or__2masthead-1.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Est. reading time":"4\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/de\/blog\/security-orchestration-2\/","url":"https:\/\/swimlane.com\/de\/blog\/security-orchestration-2\/","name":"Was zum Teufel ist Sicherheitsorchestrierung?","isPartOf":{"@id":"https:\/\/swimlane.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/de\/blog\/security-orchestration-2\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/de\/blog\/security-orchestration-2\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sec_or__2masthead-1.webp","datePublished":"2023-02-14T08:45:00+00:00","dateModified":"2023-10-09T17:58:52+00:00","description":"SecOps-Teams setzen auf Sicherheitsorchestrierung, um die Effizienz zu steigern, aber was genau ist Sicherheitsorchestrierung?","breadcrumb":{"@id":"https:\/\/swimlane.com\/de\/blog\/security-orchestration-2\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/de\/blog\/security-orchestration-2\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/swimlane.com\/de\/blog\/security-orchestration-2\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sec_or__2masthead-1.webp","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sec_or__2masthead-1.webp","width":1120,"height":666,"caption":"Understanding High-Impact, Low-Code Security Automation"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/de\/blog\/security-orchestration-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"What is Security Orchestration?"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/de\/#website","url":"https:\/\/swimlane.com\/de\/","name":"Low-Code Sicherheitsautomatisierung &amp; SOAR-Plattform | Swimlane","description":"Agentische KI-Automatisierung f\u00fcr jede Sicherheitsfunktion","publisher":{"@id":"https:\/\/swimlane.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/de\/#organization","name":"Low-Code Sicherheitsautomatisierung &amp; SOAR-Plattform | Swimlane","url":"https:\/\/swimlane.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/25010","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/25010\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/media\/25023"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/media?parent=25010"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/tags?post=25010"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-type?post=25010"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-topic?post=25010"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-industry?post=25010"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/blog-category?post=25010"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}