{"id":11121,"date":"2023-12-12T10:49:00","date_gmt":"2023-12-12T17:49:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/automating-phishing-alert-triage-demo\/"},"modified":"2025-03-31T03:06:43","modified_gmt":"2025-03-31T09:06:43","slug":"demostracion-de-automatizacion-de-la-clasificacion-de-alertas-de-phishing","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/es\/resources\/videos\/automating-phishing-alert-triage-demo\/","title":{"rendered":"C\u00f3mo automatizar la detecci\u00f3n y respuesta al phishing"},"content":{"rendered":"<section class=\"bs-section bs-section-0ace0c84eaa888bce49c4f2de89bf8347ace13a6 bs-section---default bs-section--common-header-with-form\"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-12   bs-column-5f6574ebb29ac8d58ab608d2aff5b1bbe4f96332 bs-column---default\"><div class=\"bs-lottie-animator bs-lottie-animator---default\" id=\"lottie-c7d5ff8e-a115-40ae-aecb-0a84b90fe739\" data-settings=\"{&quot;desktop&quot;:{&quot;settings&quot;:{&quot;animateViewPort&quot;:0.5,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;Contact_lines1.json&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:1,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Contact_lines1.json&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}},&quot;mobile&quot;:{&quot;breakpoint&quot;:576,&quot;settings&quot;:{&quot;animateViewPort&quot;:50,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:0,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}}}\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column  col-sm-0 col-md-10   bs-column-e324ba46e668efb8a167f6c6f82d98452b10172b bs-column---default\">\n<p class=\"common-header__blue-text has-blue-color has-text-color\" style=\"font-size:18px;text-transform:uppercase\"><span>V\u00eddeos<\/span><\/p>\n\n\n<h1 style=\"font-style:normal;font-weight:400;\" class=\"common-header__gated-page wp-block-post-title has-text-color has-black-color\">C\u00f3mo automatizar la detecci\u00f3n y respuesta al phishing<\/h1>\n\n\n<table>\n<tbody>\n<tr>\n<td>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/swimlane.com\/es\/turbina-de-carril\/\">Turbina de carriles de nataci\u00f3n<\/a>\u2019La soluci\u00f3n de clasificaci\u00f3n de phishing predise\u00f1ada combina manuales de poco c\u00f3digo, <a href=\"https:\/\/swimlane.com\/es\/blog\/inteligencia-sobre-amenazas-ciberneticas\/\">inteligencia de amenazas<\/a> informaci\u00f3n y aplicaciones de gesti\u00f3n de casos en una soluci\u00f3n completa de extremo a extremo, lo que le permite <a href=\"https:\/\/swimlane.com\/es\/soluciones\/casos-de-uso\/phishing\/\">automatizar la detecci\u00f3n de phishing<\/a> y respuesta. Vea esta demostraci\u00f3n para ver c\u00f3mo funciona.\u00a0<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n\n\n<script src=\"https:\/\/fast.wistia.com\/embed\/medias\/bkofteehgo.jsonp\" async><\/script><script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script><div class=\"wistia_responsive_padding\" style=\"padding:59.38% 0 0 0;position:relative;\"><div class=\"wistia_responsive_wrapper\" style=\"height:100%;left:0;position:absolute;top:0;width:100%;\"><div class=\"wistia_embed wistia_async_bkofteehgo seo=true videoFoam=true\" style=\"height:100%;position:relative;width:100%\"><div class=\"wistia_swatch\" style=\"height:100%;left:0;opacity:0;overflow:hidden;position:absolute;top:0;transition:opacity 200ms;width:100%;\"><img decoding=\"async\" src=\"https:\/\/fast.wistia.com\/embed\/medias\/bkofteehgo\/swatch\" style=\"filter:blur(5px);height:100%;object-fit:contain;width:100%;\" alt=\"\" aria-hidden=\"true\" onload=\"this.parentNode.style.opacity=1;\" \/><\/div><\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-14ca56fdc3be4b5f0a8616120c8005c221b5c55b bs-section---default bs-section--related-items\"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-12   bs-column-5f6574ebb29ac8d58ab608d2aff5b1bbe4f96332 bs-column---default\">\n<h2 class=\"wp-block-heading has-deep-color has-text-color\" id=\"h-you-might-also-be-interested-in\">Tambi\u00e9n te podr\u00eda interesar<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-12   bs-column-33aba5295b76f4052fb226277a0b4e1e4747889c bs-column---default\">\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69d03f26b3bb0 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/resources\/videos\/case-management-for-phishing\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/CaseManagementPhishing.png' class='img-fluid' alt='' title='Gesti\u00f3n de casosPhishing'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Manifestaci\u00f3n<\/span><span>Video<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Caso de uso de gesti\u00f3n de casos para la clasificaci\u00f3n de phishing<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Leer m\u00e1s<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69d03f26b5745 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/digital-investigative-group-customer-story\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/THE-DIG.webp' class='img-fluid' alt='' title='LA EXCAVACI\u00d3N' loading=\"lazy\"  \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Blog<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Por qu\u00e9 el DIG eligi\u00f3 Swimlane para transformar su defensa contra el phishing<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Leer m\u00e1s<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69d03f26b6ff2 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/soar-automated-phishing-investigation-and-response\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/PHISHINGII-2.png' class='img-fluid' alt='' title='1' loading=\"lazy\"  \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Blog<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>No muerda el anzuelo: investigaci\u00f3n y respuesta automatizadas contra el phishing<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Leer m\u00e1s<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"<p>When a suspected phishing email is received, what should happen? Watch this use case demo which highlights how to automate the process from the initial alert through resolution with Lastline, McAfee ATD and Carbon Black integrations.<\/p>","protected":false},"author":5,"featured_media":34038,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":34038,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[206,105],"resource-topic":[220,132],"resource-industry":[108,117,99],"blog-category":[],"class_list":["post-11121","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-demo","resource-type-videos","resource-topic-phishing","resource-topic-platform","resource-industry-use-case","resource-industry-phishing","resource-industry-alert-triage"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Demo Video Phishing Triage Solution | Swimlane<\/title>\n<meta name=\"description\" content=\"Watch the demo video: Automate Phishing Detection and Response with Swimlane Turbine\u2019s complete end to end phishing triage solution.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/es\/recursos\/videos\/demostracion-de-automatizacion-de-la-clasificacion-de-alertas-de-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Automate Phishing Detection and Response\" \/>\n<meta property=\"og:description\" content=\"Watch the demo video: Automate Phishing Detection and Response with Swimlane Turbine\u2019s complete end to end phishing triage solution.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/es\/recursos\/videos\/demostracion-de-automatizacion-de-la-clasificacion-de-alertas-de-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-31T09:06:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/Copy-of-YouTube-video-Thumbnails.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/es\/resources\/videos\/automating-phishing-alert-triage-demo\/\",\"url\":\"https:\/\/swimlane.com\/es\/resources\/videos\/automating-phishing-alert-triage-demo\/\",\"name\":\"Demo Video Phishing Triage Solution | Swimlane\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/es\/resources\/videos\/automating-phishing-alert-triage-demo\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/es\/resources\/videos\/automating-phishing-alert-triage-demo\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Copy-of-YouTube-video-Thumbnails.png\",\"datePublished\":\"2023-12-12T17:49:00+00:00\",\"dateModified\":\"2025-03-31T09:06:43+00:00\",\"description\":\"Watch the demo video: Automate Phishing Detection and Response with Swimlane Turbine\u2019s complete end to end phishing triage solution.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/es\/resources\/videos\/automating-phishing-alert-triage-demo\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/es\/resources\/videos\/automating-phishing-alert-triage-demo\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/swimlane.com\/es\/resources\/videos\/automating-phishing-alert-triage-demo\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Copy-of-YouTube-video-Thumbnails.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Copy-of-YouTube-video-Thumbnails.png\",\"width\":1280,\"height\":720,\"caption\":\"Case study banner: How global enterprises scale SecOps efficiency using Swimlane security automation.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/es\/resources\/videos\/automating-phishing-alert-triage-demo\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Automate Phishing Detection and Response\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/es\/#website\",\"url\":\"https:\/\/swimlane.com\/es\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/es\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"V\u00eddeo de demostraci\u00f3n de la soluci\u00f3n de triaje de phishing | Swimlane","description":"Vea el video de demostraci\u00f3n: Automatice la detecci\u00f3n y respuesta ante phishing con la soluci\u00f3n completa de clasificaci\u00f3n de phishing de extremo a extremo de Swimlane Turbine.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/es\/recursos\/videos\/demostracion-de-automatizacion-de-la-clasificacion-de-alertas-de-phishing\/","og_locale":"es_ES","og_type":"article","og_title":"How to Automate Phishing Detection and Response","og_description":"Watch the demo video: Automate Phishing Detection and Response with Swimlane Turbine\u2019s complete end to end phishing triage solution.","og_url":"https:\/\/swimlane.com\/es\/recursos\/videos\/demostracion-de-automatizacion-de-la-clasificacion-de-alertas-de-phishing\/","og_site_name":"AI Security Automation","article_modified_time":"2025-03-31T09:06:43+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/Copy-of-YouTube-video-Thumbnails.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/es\/resources\/videos\/automating-phishing-alert-triage-demo\/","url":"https:\/\/swimlane.com\/es\/resources\/videos\/automating-phishing-alert-triage-demo\/","name":"V\u00eddeo de demostraci\u00f3n de la soluci\u00f3n de triaje de phishing | Swimlane","isPartOf":{"@id":"https:\/\/swimlane.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/es\/resources\/videos\/automating-phishing-alert-triage-demo\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/es\/resources\/videos\/automating-phishing-alert-triage-demo\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Copy-of-YouTube-video-Thumbnails.png","datePublished":"2023-12-12T17:49:00+00:00","dateModified":"2025-03-31T09:06:43+00:00","description":"Vea el video de demostraci\u00f3n: Automatice la detecci\u00f3n y respuesta ante phishing con la soluci\u00f3n completa de clasificaci\u00f3n de phishing de extremo a extremo de Swimlane Turbine.","breadcrumb":{"@id":"https:\/\/swimlane.com\/es\/resources\/videos\/automating-phishing-alert-triage-demo\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/es\/resources\/videos\/automating-phishing-alert-triage-demo\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/resources\/videos\/automating-phishing-alert-triage-demo\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/Copy-of-YouTube-video-Thumbnails.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Copy-of-YouTube-video-Thumbnails.png","width":1280,"height":720,"caption":"Case study banner: How global enterprises scale SecOps efficiency using Swimlane security automation."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/es\/resources\/videos\/automating-phishing-alert-triage-demo\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"How to Automate Phishing Detection and Response"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/es\/#website","url":"https:\/\/swimlane.com\/es\/","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","description":"Automatizaci\u00f3n de la inteligencia artificial para todas las funciones de seguridad","publisher":{"@id":"https:\/\/swimlane.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/es\/#organization","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","url":"https:\/\/swimlane.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/11121","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/11121\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media\/34038"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media?parent=11121"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/tags?post=11121"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-type?post=11121"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-topic?post=11121"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-industry?post=11121"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/blog-category?post=11121"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}