{"id":9880,"date":"2017-02-09T13:10:00","date_gmt":"2017-02-09T20:10:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/cost-delayed-threat-response\/"},"modified":"2025-01-10T08:40:24","modified_gmt":"2025-01-10T15:40:24","slug":"kosten-verzogerte-bedrohungsreaktion","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/de\/blog\/cost-delayed-threat-response\/","title":{"rendered":"Verfalle nicht in eine Asymptote! Verstehe die Kosten verz\u00f6gerter Bedrohungsreaktionen"},"content":{"rendered":"<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner\"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end\"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/02.09.17-cost-of-delay.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Nahaufnahme eines Anzugtr\u00e4gers, der seine Armbanduhr in strengem Schwarz-Wei\u00df umklammert, das tickende Zifferblatt in angespannter Stille erstarrt, w\u00e4hrend die Zeit unter Druck in einem risikoreichen Unternehmenssicherheitsumfeld verrinnt.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/02.09.17-cost-of-delay.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/02.09.17-cost-of-delay-300x186.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/02.09.17-cost-of-delay-1024x636.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/02.09.17-cost-of-delay-768x477.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column\"><div class=\"wp-block-post-date\"><time datetime=\"2017-02-09T13:10:00-07:00\">9. Februar 2017<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Verfalle nicht in eine Asymptote! Verstehe die Kosten verz\u00f6gerter Bedrohungsreaktionen<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center\">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/de\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"Benutzeravatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">3 <\/span> Leseminute\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents\"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default\"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/de\/blog\/cost-delayed-threat-response\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"E-Mail\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/de\/blog\/cost-delayed-threat-response\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Don%E2%80%99t%20be%20an%20asymptote%21%20Understanding%20the%20cost%20of%20delayed%20threat%20response').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Fcost-delayed-threat-response%2F', '_blank')\" title=\"E-Mail\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Don%E2%80%99t%20be%20an%20asymptote%21%20Understanding%20the%20cost%20of%20delayed%20threat%20response&url=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Fcost-delayed-threat-response%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Fcost-delayed-threat-response%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"LinkedIn\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Fcost-delayed-threat-response%2F\" title=\"LinkedIn\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents\">\n<h2 class=\"wp-block-heading\" id=\"h-nbsp\">&nbsp;<\/h2>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/assets\/uploads\/images\/wp\/2017\/02\/asymptote.png\" alt=\"Asymptote\" class=\"wp-image-1268\" title=\"Asymptote\"\/><figcaption class=\"wp-element-caption\">Abbildung 1 \u2013 Beispiel einer Asymptote einer Funktion, die gegen Unendlich strebt<\/figcaption><\/figure>\n\n\n\n<p>Es sollte eine ungeschriebene Regel der Cybersicherheit sein: Schaffe kein asymptotisches Gleichgewicht f\u00fcr dich selbst oder deine Teammitglieder.<\/p>\n\n\n\n<p>Wie Sie sich vielleicht aus dem Mathematikunterricht der Oberstufe erinnern, ein <em>Asymptote<\/em> ist eine grafische Darstellung einer Funktion, die endlos entweder gegen Null oder gegen Unendlich strebt. Im Falle der Bedrohungsabwehr k\u00f6nnen die potenziellen Kosten einer Verz\u00f6gerung dem Letzteren \u00e4hneln \u2013 sie belasten das Unternehmensbudget in immer schnellerem Tempo. F\u00fcr diejenigen unter Ihnen, die Algebra II vermissen: Abbildung 1 veranschaulicht dies.<\/p>\n\n\n\n<p><strong>Wie kann Cybersicherheit asymptotisch werden?<\/strong> (Und um gleich noch etwas SAT-Vorbereitung und AP-Englisch einzustreuen\u2026) Das Problem r\u00fchrt von den zunehmenden Auswirkungen einer unkontrollierten Bedrohung auf Unternehmen her. Wie das Modell in der Tabelle zeigt, steigen die Kosten mit jedem Tag, an dem sich die Reaktion auf die Bedrohung verz\u00f6gert.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><th>Tag<\/th><th>Sicherheitsteam<\/th><th>IT-F\u00fchrungskr\u00e4fte<\/th><th>F\u00fchrungsebene<\/th><th>Rechtliches<\/th><th>\u00d6ffentlichkeitsarbeit<\/th><th>Externe Sicherheitsberater<\/th><th>Vergleiche und Geldstrafen<\/th><th>Reputationsschaden<\/th><th>Kumulierte Gesamtkosten<\/th><\/tr><tr><th>1<\/th><td>$50<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><td>$50<\/td><\/tr><tr><th>2<\/th><td>$500<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><td>$550<\/td><\/tr><tr><th>3<\/th><td>$1,000<\/td><td>$2,500<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><td>$4,050<\/td><\/tr><tr><th>4<\/th><td>$5,000<\/td><td>$5,000<\/td><td>$5,000<\/td><td>$5,000<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><td>$24,050<\/td><\/tr><tr><th>5<\/th><td>$5,000<\/td><td>$5,000<\/td><td>$5,000<\/td><td>$5,000<\/td><td>$5,000<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><td>$49,050<\/td><\/tr><tr><th>6<\/th><td>$5,000<\/td><td>$5,000<\/td><td>$5,000<\/td><td>$5,000<\/td><td>$5,000<\/td><td>$10,000<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><td>$84,050<\/td><\/tr><tr><th>7<\/th><td>$5,000<\/td><td>$5,000<\/td><td>$5,000<\/td><td>$5,000<\/td><td>$5,000<\/td><td>$10,000<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><td>$119,050<\/td><\/tr><tr><th>8<\/th><td>$5,000<\/td><td>$5,000<\/td><td>$5,000<\/td><td>$25,000<\/td><td>$20,000<\/td><td>$10,000<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><td>$189,050<\/td><\/tr><tr><th>9<\/th><td>$5,000<\/td><td>$5,000<\/td><td>$5,000<\/td><td>$25,000<\/td><td>$20,000<\/td><td>$10,000<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><td>$259,050<\/td><\/tr><tr><th>10+<\/th><td>$5,000<\/td><td>$5,000<\/td><td>$5,000<\/td><td>$20,000<\/td><td>$100,000<\/td><td>$10,000<\/td><td>$1,000,000<\/td><td>$1,000,000<\/td><td>$2,484,050<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-how-threat-handling-costs-grow-quickly\">Wie die Kosten f\u00fcr die Bedrohungsabwehr schnell steigen<\/h3>\n\n\n\n<p>Das in der Tabelle dargestellte Modell ist ein stark vereinfachtes Beispiel. Entscheidend sind das Muster und der Trend, die realistisch sind. Bedrohungen werden in der Regel nicht g\u00fcnstiger, je l\u00e4nger sie ignoriert oder unbemerkt bleiben. Ein b\u00f6swilliger Einbruch kann, wenn er sofort erkannt wird, mit geringen Kosten f\u00fcr die Behebung verbunden sein. Entwickelt sich der Einbruch jedoch zu einem Sicherheitsversto\u00df, muss das Sicherheitsteam viele Arbeitsstunden aufwenden, um die Ursache zu ermitteln, die betroffenen Bereiche zu identifizieren und die Situation zu beheben.<\/p>\n\n\n\n<p>Wenn das Problem den Gesch\u00e4ftsbetrieb selbst beeintr\u00e4chtigt, beispielsweise durch Verlangsamung oder Besch\u00e4digung kritischer Systeme, wird die Gesch\u00e4ftsleitung eingeschaltet. Zeit ist kostbar. Wenn sich der CEO mit einem Sicherheitsvorfall auseinandersetzt, fehlt ihm diese Zeit f\u00fcr das Unternehmenswachstum. Wenn sich die Bedrohung zu einer echten Katastrophe ausweitet, werden m\u00f6glicherweise weitere Personen, darunter teure externe Dienstleister wie Anw\u00e4lte, PR-Agenturen und Sicherheitsberater, hinzugezogen. Was als harmlose Bedrohung begann, kann zu millionenschweren Bu\u00dfgeldern und Vergleichen sowie zu Reputationssch\u00e4den f\u00fchren. Abbildung 2 veranschaulicht die kumulativen Kosten einer verz\u00f6gerten Reaktion auf eine Bedrohung anhand der Tabelle. Wie ersichtlich, verl\u00e4uft die Kostenkurve asymptotisch.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/assets\/uploads\/images\/wp\/2017\/02\/cost-diagram.png\" alt=\"Kostendiagramm.png\" class=\"wp-image-1269\"\/><figcaption class=\"wp-element-caption\">Abbildung 2 \u2013 Kumulierte Kosten einer verz\u00f6gerten Bedrohungsabwehr \u00fcber einen Zeitraum von 10 Tagen (Nur zur Veranschaulichung.)<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-speeding-up-threat-response\">Beschleunigung der Bedrohungsreaktion<\/h3>\n\n\n\n<p>Neue Fortschritte im Bereich des Sicherheitsbetriebsmanagements und der Automatisierung erm\u00f6glichen eine schnellere Erkennung und Reaktion auf Bedrohungen. Automatisierte Tools f\u00fcr die Reaktion auf Sicherheitsvorf\u00e4lle und die Sicherheitsorchestrierung bieten Sicherheitsteams eine integrierte Sammlung von Prozessen und Werkzeugen, die zusammenwirken, um ansonsten m\u00fchsame und zeitaufw\u00e4ndige Aufgaben im Sicherheitsmanagement zu automatisieren.<\/p>\n\n\n\n<p><a href=\"https:\/\/swimlane.com\/de\/losungen\/security-automation-and-orchestration\/sicherheitsorchestrierung\/\">Sicherheitsorchestrierung<\/a> Es basiert auf standardbasierter Software und offenen Programmierschnittstellen (APIs), um eine umfassende und einfache Vernetzung von Sicherheitssystemen zu erm\u00f6glichen. Dank der Flexibilit\u00e4t offener Standards und RESTful APIs kann das Sicherheitsteam SIEM-, IDS-, Endpoint-, Threat-Intelligence- und andere Sicherheitstools einfach und schnell mit den Automatisierungs- und Orchestrierungsfunktionen verbinden.<\/p>\n\n\n\n<p>Eine automatisierte L\u00f6sung f\u00fcr Incident Response und Security Orchestration erm\u00f6glicht es dem Sicherheitsteam, seine Alarmreaktionsprozesse zu modellieren und zu automatisieren. Sie kann Alarme priorisieren und anreichern, Tickets erstellen und schlie\u00dfen, Regels\u00e4tze aktualisieren, E-Mails an wichtige Stakeholder senden usw. und reduziert so den zeitaufw\u00e4ndigen manuellen Prozess der Bedrohungsabwehr drastisch. Das Team kann alle Bedrohungen in Echtzeit bewerten. Im Gegensatz dazu ergab eine Studie des Ponemon Institute, dass <a href=\"http:\/\/go.cyphort.com\/rs\/181-NTN-682\/images\/Cyphort-Ponemon-Report.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Die meisten Teams sind darauf beschr\u00e4nkt, weniger als 30 Prozent der Bedrohungen zu untersuchen und den Rest zu priorisieren.<\/a>. Mit dieser Herangehensweise kann eine Bedrohung leicht \u00fcbersehen werden, die sich sp\u00e4ter zu einem kostspieligen Vorfall entwickelt.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-automated-incident-response-with-swimlane\">Automatisierte Vorfallsreaktion mit Swimlane<\/h3>\n\n\n\n<p>Swimlane bietet eine <a href=\"https:\/\/swimlane.com\/de\/losungen\/security-automation-and-orchestration\/automatisierte-vorfallsreaktion\/\">automatisierte Vorfallsreaktion<\/a> und ein <a href=\"https:\/\/swimlane.com\/de\/losungen\/security-automation-and-orchestration\/\">Sicherheitsautomatisierungs-, Orchestrierungs- und Reaktionsl\u00f6sung<\/a> Swimlane zentralisiert die Sicherheitsoperationen. Es verwaltet und automatisiert die Reaktion auf Sicherheitswarnungen und -vorf\u00e4lle, die von bestehenden \u00dcberwachungs- und Erkennungssystemen identifiziert werden. Swimlane ersetzt zudem langsame, manuelle Bedrohungsreaktionsprozesse durch blitzschnelle Entscheidungsfindung und Behebung.<\/p>\n\n\n\n<p>Swimlane erfasst alle Sicherheitsaufgaben im Unternehmen und bietet zentralen Zugriff auf F\u00e4lle, Berichte, Dashboards und Kennzahlen f\u00fcr Einzelpersonen und Teams. Es standardisiert Reaktions- und Benachrichtigungsprozesse, um Risiken zu minimieren, die Probleml\u00f6sung zu beschleunigen und die Kommunikation zu optimieren. Die Automatisierung nutzt Hersteller-APIs und SDSec-Methoden (Software Defined Security), um schnell zu reagieren und Angriffe fr\u00fchzeitig in der Angriffskette zu verhindern.<\/p>\n\n\n\n<p>Durch die Zusammenarbeit mit Swimlane kann das Sicherheitsteam die Reaktionsgeschwindigkeit auf Bedrohungen beschleunigen und den Anteil der untersuchten Bedrohungen erh\u00f6hen. Beide Verbesserungen im Umgang mit Sicherheitsbedrohungen reduzieren das Risiko einer kostspieligen, verz\u00f6gerten Reaktion.<\/p>\n\n\n\n<p>Um eine Demo der Swimlane-L\u00f6sung zu vereinbaren oder mit einem unserer Sicherheitsarchitekten zu sprechen, um herauszufinden, ob Sicherheitsautomatisierung und -orchestrierung f\u00fcr Ihr Unternehmen hilfreich w\u00e4ren, kontaktieren Sie uns bitte unter 1.844.SWIMLANE.<\/p>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default\">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">\u00c4hnliche Beitr\u00e4ge<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69e2d94ede27d bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/soar-automated-phishing-investigation-and-response\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>26. September 2022<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Nicht darauf hereinfallen: Automatisierte Phishing-Ermittlungen und -Reaktionen<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Mehr lesen<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69e2d94edf309 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/you-dont-have-windows-7-in-your-environment-do-you\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>14. Januar 2020<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Sie haben in Ihrer Umgebung nicht Windows 7 im Einsatz, oder?<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Mehr lesen<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69e2d94ee0923 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/understanding-apis-rest\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>17. Oktober 2019<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>APIs verstehen: REST<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Mehr lesen<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns\"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-interested-in-learning-more\">M\u00f6chten Sie mehr erfahren?<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<p class=\"has-white-color has-text-color\">Abonnieren Sie noch heute, um auf dem Laufenden zu bleiben und regelm\u00e4\u00dfig Updates von Swimlane zu erhalten.<\/p>\n\n\n\n\n<div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/2022\/11\/newsletter-bg.svg' class='img-fluid'   alt='Moderner SecOps-Hintergrund: Eine geometrische Gradientengrafik, die einen fl\u00fcssigen Datenfluss und Cloud-native Agilit\u00e4t darstellt.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1042\" action=\"\"><input type=\"hidden\" name=\"trp-form-language\" value=\"de\"\/><\/form>\n<script>\n    var embeddedFormId = '5b371f4d0405e451c20535f8f66c5f8427779d2a';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1042';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1042\"><\/div>\n<!-- Incluing form response options -->\n<\/div>\n<\/div>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":9881,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[70],"class_list":["post-9880","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Don\u2019t be an asymptote! Understanding the cost of delayed threat\u2026<\/title>\n<meta name=\"description\" content=\"The longer it takes to respond to a threat, the more expensive it can be to remediate.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/de\/blog\/kosten-verzogerte-bedrohungsreaktion\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Don\u2019t be an asymptote! Understanding the cost of delayed threat response\" \/>\n<meta property=\"og:description\" content=\"The longer it takes to respond to a threat, the more expensive it can be to remediate.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/de\/blog\/kosten-verzogerte-bedrohungsreaktion\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-10T15:40:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/02.09.17-cost-of-delay.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"696\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/de\/blog\/cost-delayed-threat-response\/\",\"url\":\"https:\/\/swimlane.com\/de\/blog\/cost-delayed-threat-response\/\",\"name\":\"Don\u2019t be an asymptote! Understanding the cost of delayed threat\u2026\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/de\/blog\/cost-delayed-threat-response\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/de\/blog\/cost-delayed-threat-response\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/02.09.17-cost-of-delay.png\",\"datePublished\":\"2017-02-09T20:10:00+00:00\",\"dateModified\":\"2025-01-10T15:40:24+00:00\",\"description\":\"The longer it takes to respond to a threat, the more expensive it can be to remediate.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/de\/blog\/cost-delayed-threat-response\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/de\/blog\/cost-delayed-threat-response\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/swimlane.com\/de\/blog\/cost-delayed-threat-response\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/02.09.17-cost-of-delay.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/02.09.17-cost-of-delay.png\",\"width\":1120,\"height\":696,\"caption\":\"Close-up of a suited executive gripping his wristwatch in stark monochrome, the ticking dial frozen in tense stillness as time slips under pressure in a high-stakes corporate security environment.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/de\/blog\/cost-delayed-threat-response\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Don\u2019t be an asymptote! Understanding the cost of delayed threat response\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/de\/#website\",\"url\":\"https:\/\/swimlane.com\/de\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/de\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Verfalle nicht in eine Asymptote! Verstehe die Kosten verz\u00f6gerter Bedrohungen\u2026","description":"Je l\u00e4nger die Reaktion auf eine Bedrohung dauert, desto teurer kann die Behebung werden.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/de\/blog\/kosten-verzogerte-bedrohungsreaktion\/","og_locale":"de_DE","og_type":"article","og_title":"Don\u2019t be an asymptote! Understanding the cost of delayed threat response","og_description":"The longer it takes to respond to a threat, the more expensive it can be to remediate.","og_url":"https:\/\/swimlane.com\/de\/blog\/kosten-verzogerte-bedrohungsreaktion\/","og_site_name":"AI Security Automation","article_modified_time":"2025-01-10T15:40:24+00:00","og_image":[{"width":1120,"height":696,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/02.09.17-cost-of-delay.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Est. reading time":"5\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/de\/blog\/cost-delayed-threat-response\/","url":"https:\/\/swimlane.com\/de\/blog\/cost-delayed-threat-response\/","name":"Verfalle nicht in eine Asymptote! Verstehe die Kosten verz\u00f6gerter Bedrohungen\u2026","isPartOf":{"@id":"https:\/\/swimlane.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/de\/blog\/cost-delayed-threat-response\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/de\/blog\/cost-delayed-threat-response\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/02.09.17-cost-of-delay.png","datePublished":"2017-02-09T20:10:00+00:00","dateModified":"2025-01-10T15:40:24+00:00","description":"Je l\u00e4nger die Reaktion auf eine Bedrohung dauert, desto teurer kann die Behebung werden.","breadcrumb":{"@id":"https:\/\/swimlane.com\/de\/blog\/cost-delayed-threat-response\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/de\/blog\/cost-delayed-threat-response\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/swimlane.com\/de\/blog\/cost-delayed-threat-response\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/02.09.17-cost-of-delay.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/02.09.17-cost-of-delay.png","width":1120,"height":696,"caption":"Close-up of a suited executive gripping his wristwatch in stark monochrome, the ticking dial frozen in tense stillness as time slips under pressure in a high-stakes corporate security environment."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/de\/blog\/cost-delayed-threat-response\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Don\u2019t be an asymptote! Understanding the cost of delayed threat response"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/de\/#website","url":"https:\/\/swimlane.com\/de\/","name":"Low-Code Sicherheitsautomatisierung &amp; SOAR-Plattform | Swimlane","description":"Agentische KI-Automatisierung f\u00fcr jede Sicherheitsfunktion","publisher":{"@id":"https:\/\/swimlane.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/de\/#organization","name":"Low-Code Sicherheitsautomatisierung &amp; SOAR-Plattform | Swimlane","url":"https:\/\/swimlane.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/9880","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/9880\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/media\/9881"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/media?parent=9880"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/tags?post=9880"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-type?post=9880"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-topic?post=9880"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-industry?post=9880"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/blog-category?post=9880"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}