{"id":35735,"date":"2024-02-26T14:52:17","date_gmt":"2024-02-26T21:52:17","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=35735"},"modified":"2025-03-31T23:05:17","modified_gmt":"2025-04-01T05:05:17","slug":"entdecken-sie-die-feinheiten-der-ki-gestutzten-low-code-automatisierungsplattform-swimlanes","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/de\/resources\/videos\/nuances-of-swimlane-ai-enabled-lowcode-automation-platform\/","title":{"rendered":"Interview auf dem Cybersecurity Summit: Der Wert von Swimlanes"},"content":{"rendered":"<section class=\"bs-section bs-section-0ace0c84eaa888bce49c4f2de89bf8347ace13a6 bs-section---default bs-section--common-header-with-form\"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-12   bs-column-5f6574ebb29ac8d58ab608d2aff5b1bbe4f96332 bs-column---default\"><div class=\"bs-lottie-animator bs-lottie-animator---default\" id=\"lottie-c7d5ff8e-a115-40ae-aecb-0a84b90fe739\" data-settings=\"{&quot;desktop&quot;:{&quot;settings&quot;:{&quot;animateViewPort&quot;:0.5,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;Contact_lines1.json&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:1,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Contact_lines1.json&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}},&quot;mobile&quot;:{&quot;breakpoint&quot;:576,&quot;settings&quot;:{&quot;animateViewPort&quot;:50,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:0,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}}}\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column  col-sm-0 col-md-10   bs-column-e324ba46e668efb8a167f6c6f82d98452b10172b bs-column---default\">\n<p class=\"common-header__blue-text has-blue-color has-text-color\" style=\"font-size:18px;text-transform:uppercase\"><span>Videos<\/span><\/p>\n\n\n<h1 style=\"font-style:normal;font-weight:400;\" class=\"common-header__gated-page wp-block-post-title has-text-color has-black-color\">Interview auf dem Cybersecurity Summit: Der Wert von Swimlanes<\/h1>\n\n\n<table>\n<tbody>\n<tr>\n<td>\n<p><span style=\"font-weight: 400;\">Schlie\u00dfen Sie sich unserem Team an! <\/span><a href=\"https:\/\/swimlane.com\/de\/blog\/sicherheitsautomatisierung\/\"><span style=\"font-weight: 400;\">Sicherheitsautomatisierung<\/span><\/a><span style=\"font-weight: 400;\"> Evangelist Jay Spann, der tief in die KI-gest\u00fctzten Funktionen von Swimlane eintaucht. <\/span><a href=\"https:\/\/swimlane.com\/de\/blog\/vorteile-der-low-code-sicherheitsautomatisierung-fur-secops\/+https%3a\/\/swimlane.com\/blog\/was-ist-datenverlustpravention\/+https%3a\/\/swimlane.com\/blog\/einfachheit-der-low-code-sicherheitsautomatisierung\/\"><span style=\"font-weight: 400;\">Sicherheitsautomatisierung mit geringem Code<\/span><\/a><span style=\"font-weight: 400;\"> Plattform. Entdecken Sie die Feinheiten unserer Automatisierungsplattform und die entscheidenden Alleinstellungsmerkmale, die uns von unseren Mitbewerbern abheben. Schalten Sie ein, um wertvolle Einblicke zu gewinnen und im Bereich der Sicherheitsautomatisierung immer einen Schritt voraus zu sein.\u00a0<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n\n\n<div class=\"wistia_responsive_padding\" style=\"padding:56.25% 0 0 0;position:relative;\"><div class=\"wistia_responsive_wrapper\" style=\"height:100%;left:0;position:absolute;top:0;width:100%;\"><iframe loading=\"lazy\" src=\"https:\/\/fast.wistia.net\/embed\/iframe\/bid7eqq7gz?seo=true&#038;videoFoam=true\" title=\"Entdecken Sie die Feinheiten der KI-gest\u00fctzten Low-Code-Automatisierungsplattform von Swimlane (Video)\" allow=\"autoplay; fullscreen\" allowtransparency=\"true\" frameborder=\"0\" scrolling=\"no\" class=\"wistia_embed\" name=\"wistia_embed\" msallowfullscreen width=\"100%\" height=\"100%\"><\/iframe><\/div><\/div>\n<script src=\"https:\/\/fast.wistia.net\/assets\/external\/E-v1.js\" async><\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-14ca56fdc3be4b5f0a8616120c8005c221b5c55b bs-section---default bs-section--related-items\"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-12   bs-column-5f6574ebb29ac8d58ab608d2aff5b1bbe4f96332 bs-column---default\">\n<h2 class=\"wp-block-heading has-deep-color has-text-color\" id=\"h-you-might-also-be-interested-in\">Das k\u00f6nnte Sie auch interessieren<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-12   bs-column-33aba5295b76f4052fb226277a0b4e1e4747889c bs-column---default\">\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-6a0924a8ee478 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/resources\/videos\/procircular-ai-automation-black-hat\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/ProcircularBlackhatInterview.png' class='img-fluid' alt='' title='ProcircularBlackhatInterview'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Video<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>CyberRisk TV-Interview: Der Wert von KI, Automatisierung und Low-Code f\u00fcr MSSPs<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Mehr lesen<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-6a0924a90e7ab bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/resources\/videos\/tag-cyber-automation-value-ciso\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/TAG-3-The-Value-of-Automation-for-the-CISO.png' class='img-fluid' alt='Experten von Swimlane und TAG Cyber diskutieren den Wert der Automatisierung f\u00fcr moderne CISOs. ' title='TAG 3 Der Wert der Automatisierung f\u00fcr den CISO'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Video<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>TAG Cyber-Interview: Der Wert der Automatisierung f\u00fcr den CISO<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Mehr lesen<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-6a0924a90feb0 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/resources\/videos\/tag-cyber-ciso-ai-soc-automation-interview\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/OG-CISO-Interview-TAG.png' class='img-fluid' alt='' title='OG CISO Interview TAG'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Video<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>TAG Cyber &amp; Swimlane CISO-Interview: SOC-KI-Automatisierung<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Mehr lesen<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"<p>Watch this demo to learn how data received from McAfee ESM can be triaged through an automated process via McAfee ePO, Tufin, VirusTotal and Palo Alto Networks Firewall integrations to greatly increase your SecOps efficiency.<\/p>","protected":false},"author":43,"featured_media":35736,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":35736,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":true,"event_start_date":"2024-02-26T21:29:32.407Z","event_end_date":"2024-02-26T21:29:32.407Z","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[105],"resource-topic":[219,136],"resource-industry":[108,99],"blog-category":[],"class_list":["post-35735","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-videos","resource-topic-company-culture","resource-topic-soar","resource-industry-use-case","resource-industry-alert-triage"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Nuances of AI-Enabled Low-code Automation | Swimlane<\/title>\n<meta name=\"description\" content=\"Dive into Swimlane&#039;s AI-driven security automation platform with Jay Spann. Explore key differentiators for valuable insights and stay ahead in security automation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/de\/ressourcen\/videos\/nuancen-der-swimlane-ki-gestutzten-low-code-automatisierungsplattform\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Summit Interview: The Value of Swimlane\" \/>\n<meta property=\"og:description\" content=\"Dive into Swimlane&#039;s AI-driven security automation platform with Jay Spann. Explore key differentiators for valuable insights and stay ahead in security automation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/de\/ressourcen\/videos\/nuancen-der-swimlane-ki-gestutzten-low-code-automatisierungsplattform\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-01T05:05:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/OG-Webpage.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/resources\\\/videos\\\/nuances-of-swimlane-ai-enabled-lowcode-automation-platform\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/de\\\/resources\\\/videos\\\/nuances-of-swimlane-ai-enabled-lowcode-automation-platform\\\/\",\"name\":\"Nuances of AI-Enabled Low-code Automation | Swimlane\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/resources\\\/videos\\\/nuances-of-swimlane-ai-enabled-lowcode-automation-platform\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/resources\\\/videos\\\/nuances-of-swimlane-ai-enabled-lowcode-automation-platform\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/OG-Webpage.jpg\",\"datePublished\":\"2024-02-26T21:52:17+00:00\",\"dateModified\":\"2025-04-01T05:05:17+00:00\",\"description\":\"Dive into Swimlane's AI-driven security automation platform with Jay Spann. Explore key differentiators for valuable insights and stay ahead in security automation.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/resources\\\/videos\\\/nuances-of-swimlane-ai-enabled-lowcode-automation-platform\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/swimlane.com\\\/de\\\/resources\\\/videos\\\/nuances-of-swimlane-ai-enabled-lowcode-automation-platform\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/resources\\\/videos\\\/nuances-of-swimlane-ai-enabled-lowcode-automation-platform\\\/#primaryimage\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/OG-Webpage.jpg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/OG-Webpage.jpg\",\"width\":1200,\"height\":630,\"caption\":\"Cybersecurity Summit Boston banner representing strategic event participation and industry keynote speaking.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/resources\\\/videos\\\/nuances-of-swimlane-ai-enabled-lowcode-automation-platform\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/swimlane.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Summit Interview: The Value of Swimlane\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/swimlane.com\\\/de\\\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/swimlane.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\\\/\\\/swimlane.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/swimlane\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/swimlane\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Nuancen der KI-gest\u00fctzten Low-Code-Automatisierung | Swimlane","description":"Tauchen Sie mit Jay Spann in die KI-gest\u00fctzte Sicherheitsautomatisierungsplattform von Swimlane ein. Entdecken Sie die wichtigsten Alleinstellungsmerkmale, gewinnen Sie wertvolle Einblicke und bleiben Sie in der Sicherheitsautomatisierung immer einen Schritt voraus.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/de\/ressourcen\/videos\/nuancen-der-swimlane-ki-gestutzten-low-code-automatisierungsplattform\/","og_locale":"de_DE","og_type":"article","og_title":"Cybersecurity Summit Interview: The Value of Swimlane","og_description":"Dive into Swimlane's AI-driven security automation platform with Jay Spann. Explore key differentiators for valuable insights and stay ahead in security automation.","og_url":"https:\/\/swimlane.com\/de\/ressourcen\/videos\/nuancen-der-swimlane-ki-gestutzten-low-code-automatisierungsplattform\/","og_site_name":"AI Security Automation","article_modified_time":"2025-04-01T05:05:17+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/OG-Webpage.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Est. reading time":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/de\/resources\/videos\/nuances-of-swimlane-ai-enabled-lowcode-automation-platform\/","url":"https:\/\/swimlane.com\/de\/resources\/videos\/nuances-of-swimlane-ai-enabled-lowcode-automation-platform\/","name":"Nuancen der KI-gest\u00fctzten Low-Code-Automatisierung | Swimlane","isPartOf":{"@id":"https:\/\/swimlane.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/de\/resources\/videos\/nuances-of-swimlane-ai-enabled-lowcode-automation-platform\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/de\/resources\/videos\/nuances-of-swimlane-ai-enabled-lowcode-automation-platform\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/OG-Webpage.jpg","datePublished":"2024-02-26T21:52:17+00:00","dateModified":"2025-04-01T05:05:17+00:00","description":"Tauchen Sie mit Jay Spann in die KI-gest\u00fctzte Sicherheitsautomatisierungsplattform von Swimlane ein. Entdecken Sie die wichtigsten Alleinstellungsmerkmale, gewinnen Sie wertvolle Einblicke und bleiben Sie in der Sicherheitsautomatisierung immer einen Schritt voraus.","breadcrumb":{"@id":"https:\/\/swimlane.com\/de\/resources\/videos\/nuances-of-swimlane-ai-enabled-lowcode-automation-platform\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/de\/resources\/videos\/nuances-of-swimlane-ai-enabled-lowcode-automation-platform\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/swimlane.com\/de\/resources\/videos\/nuances-of-swimlane-ai-enabled-lowcode-automation-platform\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/OG-Webpage.jpg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/OG-Webpage.jpg","width":1200,"height":630,"caption":"Cybersecurity Summit Boston banner representing strategic event participation and industry keynote speaking."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/de\/resources\/videos\/nuances-of-swimlane-ai-enabled-lowcode-automation-platform\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Summit Interview: The Value of Swimlane"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/de\/#website","url":"https:\/\/swimlane.com\/de\/","name":"Low-Code Sicherheitsautomatisierung &amp; SOAR-Plattform | Swimlane","description":"Agentische KI-Automatisierung f\u00fcr jede Sicherheitsfunktion","publisher":{"@id":"https:\/\/swimlane.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/de\/#organization","name":"Low-Code Sicherheitsautomatisierung &amp; SOAR-Plattform | Swimlane","url":"https:\/\/swimlane.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/35735","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/users\/43"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/35735\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/media\/35736"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/media?parent=35735"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/tags?post=35735"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-type?post=35735"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-topic?post=35735"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-industry?post=35735"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/blog-category?post=35735"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}