{"id":35243,"date":"2024-01-29T08:30:00","date_gmt":"2024-01-29T15:30:00","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=35243"},"modified":"2025-12-09T03:28:05","modified_gmt":"2025-12-09T10:28:05","slug":"el-papel-de-la-automatizacion-para-cumplir-con-la-normativa-nis2","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/es\/blog\/the-role-of-automation-to-meet-nis2-compliance\/","title":{"rendered":"El papel esencial de la automatizaci\u00f3n para cumplir con la normativa NIS2"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/EURO_REG_CHANGES_MAsthead.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Abstract illustration of security analyst at laptop with charts, gear and shield icons representing cybersecurity automation.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/\/EURO_REG_CHANGES_MAsthead.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/\/EURO_REG_CHANGES_MAsthead-300x178.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/\/EURO_REG_CHANGES_MAsthead-1024x609.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/\/EURO_REG_CHANGES_MAsthead-768x457.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2024-01-29T08:30:00-07:00\">Ene 29, 2024<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">The Essential Role of Automation to Meet NIS2 Compliance<\/h1>\n\n\n<div class=\"bs-div bs-div-1c02a909fcd723a1ec953772586290c0df1291b1 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/es\/author\/Dan_Blackwell\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Screenshot-2024-01-29-at-11.33.08\u202fPM.png\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tDan Blackwell\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">4 <\/span> Minute Read\n<\/div>\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\"><\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/es\/blog\/the-role-of-automation-to-meet-nis2-compliance\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/es\/blog\/the-role-of-automation-to-meet-nis2-compliance\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('The%20Essential%20Role%20of%20Automation%20to%20Meet%20NIS2%20Compliance').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fthe-role-of-automation-to-meet-nis2-compliance%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=The%20Essential%20Role%20of%20Automation%20to%20Meet%20NIS2%20Compliance%20%7C%20Swimlane&url=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fthe-role-of-automation-to-meet-nis2-compliance%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fthe-role-of-automation-to-meet-nis2-compliance%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fthe-role-of-automation-to-meet-nis2-compliance%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<p>Operational Technology (OT) security has gained prominence across the majority of business verticals. Equipment initially designed solely for manufacturing a product is now required to be a connected device, forming part of the Internet of Things (IoT). This connectivity and the potential vulnerabilities it introduces pose a challenge for traditional OT. These critical infrastructure environments rely heavily on physical equipment, devices, and environments to maintain 100% uptime.<\/p>\n\n\n\n<p>The European Union (EU) has introduced new legislation, <a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/nis2-directive\">NIS2<\/a>, to underscore the importance of securing OT environments. NIS2 aims to enhance the cyber resilience and incident response capabilities of public and private entities, competent authorities, and the EU as a whole. The success of NIS2 will depend on vital collaboration across member states.<\/p>\n\n\n\n<p>Keep reading to learn more about who is impacted by NIS2, the requirements necessary for the directive and how <a href=\"https:\/\/swimlane.com\/\">AI enabled low-code security automation<\/a> is paramount in ensuring seamless compliance by October 2024.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-who-does-nis2-apply-to\">Who Does NIS2 Apply To?<\/h2>\n\n\n\n<p>The NIS2 regulation in Europe applies to a wide array of sectors and industries. Primarily targeting operators of essential services (OES) and digital service providers (DSPs), NIS2 casts a broad net over critical sectors such as energy, transport, healthcare, finance, and digital infrastructures. OES and DSPs within these domains are mandated to implement robust cybersecurity measures to ensure the resilience and security of their network and information systems. See below: <\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"606\" data-id=\"35245\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Chart_A@6x-1024x606.png\" alt=\"\" class=\"wp-image-35245\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/\/Chart_A@6x-1024x606.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/\/Chart_A@6x-300x177.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/\/Chart_A@6x-768x454.png 768w, https:\/\/swimlane.com\/wp-content\/uploads\/\/Chart_A@6x-1536x909.png 1536w, https:\/\/swimlane.com\/wp-content\/uploads\/\/Chart_A@6x-2048x1211.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">The Significance of Critical Infrastructure and Application Security&nbsp;<\/h2>\n\n\n\n<p>Amidst the current geopolitical landscape, this directive aims to counter the rising threat of cyber-attacks on businesses providing crucial services. This impacts various facets of security infrastructure, emphasizing network security, secure development practices, and identity management. The directive necessitates the adoption of policies related to cryptography and encryption, ensuring enhanced security for communications and critical information. NIS2 compels companies to fortify HR security, implementing measures for data storage, employee onboarding\/offboarding, and emphasizing cybersecurity in HR operations and asset management. Multi-factor authentication (MFA) is also a key component of the directive.<\/p>\n\n\n\n<p>Why NIS2 Compliance is Important<\/p>\n\n\n\n<p>Failure to comply with the directive could result in:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Fines of up to 10 million EUR or 2% of their global annual turnover.<\/li>\n\n\n\n<li>Management liability for any breaches of the directive.<\/li>\n\n\n\n<li>Senior management may be subject to temporary bans.<\/li>\n\n\n\n<li>Services could be temporarily suspended as a consequence of non-compliance.<\/li>\n<\/ul>\n\n\n\n<p>Greater emphasis is placed on management\u2019s insight into the prevention and handling of cyber alerts and incidents. According to a survey from <a href=\"https:\/\/www.bluevoyant.com\/resources\/managing-cyber-risk-across-the-extended-vendor-ecosystem\">BlueVoyant<\/a> that interviewed 1,200 CIOs, CISOs, and Chief Procurement Officers on cybersecurity issues, 97% of companies have been \u201cnegatively impacted\u201d by a cyber incident.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Embrace the NIST Framework for Robust Governance and Risk Management<\/h2>\n\n\n\n<p>NIS2 defines cybersecurity as a coherent strategy that will help provide objectives and priorities in cybersecurity and governance. This includes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cybersecurity frameworks<\/li>\n\n\n\n<li>Awareness and training<\/li>\n\n\n\n<li>Cyber risk management and compliance<\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/www.nist.gov\/cyberframework\">The National Institute of Standards and Technology (NIST) Framework<\/a> is commonly known as one of the most commonly adopted cybersecurity frameworks by organizations, addressing both IT and OT security. NIST Framework is a structured approach to help organizations manage and improve their cybersecurity practices. The framework encompasses five key areas:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Identify:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Understand and prioritize assets, data, and systems.<\/li>\n\n\n\n<li>Assess and manage risks to the organization.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Protect:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Develop and implement safeguards to ensure the delivery of critical services.<\/li>\n\n\n\n<li>Manage access controls and secure data.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Detect:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Put measures in place to identify and detect cybersecurity events promptly.<\/li>\n\n\n\n<li>Establish continuous monitoring for potential security incidents.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Respond:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Develop and implement an effective response plan for dealing with a cybersecurity incident.<\/li>\n\n\n\n<li>Mitigate the impact of incidents and learn from them to improve future responses.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Recover:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Establish and implement plans to restore capabilities affected during a cybersecurity incident.<\/li>\n\n\n\n<li>Improve resilience and recover quickly from disruptions.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p>Organizations can use the NIST framework as a guide to assess and enhance their cybersecurity posture. It&#8217;s a flexible and adaptable tool designed to apply to a wide range of industries and business sizes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Automate NIST Detection and Response<\/h2>\n\n\n\n<p>NIST Framework underscores detection and response, with key elements including people, process, and technology, incident reporting, and business continuity. Cyber resilience hinges on effectively combining these factors. To tackle the cybersecurity skills shortage, many outsource operations, sacrificing control. The winning strategy is simply defining your process and mapping it with security automation for a structured approach.&nbsp;<\/p>\n\n\n\n<p>NIS2 emphasizes collaboration and incident reporting, with three stages: &#8216;early warning,&#8217; &#8216;incident notification,&#8217; and a &#8216;final report.&#8217; Real-time visibility and reduced dwell time are vital, two areas where an automation platform excels. NIS2 also stresses the importance of a strategy for maintaining system availability during a major cyber incident, encouraging cloud backup solutions.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Security Mandates: Similar Urgencies in Europe and the United States<\/h2>\n\n\n\n<p>While NIS2 does not apply to the United States, similar security-centric mandates apply to the US Federal Government agencies and public sector. In early 2022, the Biden Administration issued <a href=\"https:\/\/swimlane.com\/blog\/executive-order-security-orchestration-automation-response-soar\/\">M-22-09<\/a> and <a href=\"https:\/\/swimlane.com\/resources\/white-papers\/executive-order-m-21-31\/\">M-21-31<\/a> which required that all federal agencies in the United States comply with <a href=\"https:\/\/swimlane.com\/blog\/zero-trust-mandate-for-security-automation\/\">Zero Trust<\/a> standards by the end of fiscal year 2024. This similar urgency is echoing throughout Europe with NIS2 regulations. What do both have in common? Both call for robust security measures. A security automation platform like <a href=\"https:\/\/swimlane.com\/swimlane-turbine\/\">Swimlane Turbine<\/a>, an <a href=\"https:\/\/swimlane.com\/\">AI enabled low-code automation<\/a> platform, serves as a vital facilitator, enhancing operational flexibility and breaking down the barriers between security teams enhancing transparency and visibility, and ultimately boosting efficiency and effectiveness.<\/p>\n\n\n\n<p>Although cybersecurity awareness and training are imperative to protecting organizations, so is security automation. Co-Founder and Chief Strategy Officer of Swimlane said, \u201cI have so much conviction in the fact that security automation is required for effective SecOps. Security automation capabilities are considered a \u201cpractical necessity\u201d for enhancing overall cybersecurity effectiveness.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">SecOps First Ever Automation-Centric Framework&nbsp;<\/h2>\n\n\n\n<p>Although cybersecurity is rich with frameworks like NIST, there was a noticeable gap when it comesame to a universally adapted standard for automation. Enter Swimlane\u2019s <a href=\"https:\/\/swimlane.com\/armor\/\">Automation Readiness &amp; Maturity of Orchestrated Resources (ARMOR) Framework<\/a>. This approach mirrors industry best practices observed in NIST, providing a robust framework for integrating automation seamlessly. The ARMOR framework features a <a href=\"https:\/\/swimlane.com\/resources\/reports\/armor-matrix\/\">maturity matrix<\/a> that empowers security professionals to establish their organization\u2019s maturity baseline, evaluate security operations (<a href=\"https:\/\/swimlane.com\/solutions\/assess-secops-efficacy\/\">SecOps<\/a>) capabilities on a five-level scale, and determine the next steps in the automation readiness process.<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"656\" data-id=\"35246\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Screenshot-2024-01-29-at-11.00.02\u202fPM-1024x656.png\" alt=\"\" class=\"wp-image-35246\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/\/Screenshot-2024-01-29-at-11.00.02\u202fPM-1024x656.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/\/Screenshot-2024-01-29-at-11.00.02\u202fPM-300x192.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/\/Screenshot-2024-01-29-at-11.00.02\u202fPM-768x492.png 768w, https:\/\/swimlane.com\/wp-content\/uploads\/\/Screenshot-2024-01-29-at-11.00.02\u202fPM-1536x984.png 1536w, https:\/\/swimlane.com\/wp-content\/uploads\/\/Screenshot-2024-01-29-at-11.00.02\u202fPM-2048x1311.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">AI-Enabled Low-Code Automation for Continuous Compliance<\/h2>\n\n\n\n<p>Automation is an important contributor to how organizations can boost their compliance. By automating GRC, detection and response, infrastructure, and application security, teams will meet stringent compliance levels, become proactive, and free up time for analysts. To achieve effective protection and defense, an organization requires a thoughtful combination of human judgment and state-of-the-art automation strategies. <a href=\"https:\/\/swimlane.com\/platform\/adaptable-playbooks\/\">Turbine Canvas<\/a>, the industry&#8217;s inaugural ultra-simple<a href=\"https:\/\/swimlane.com\/blog\/low-code-security-automation-simplicity\/\"> low-code automation<\/a> studio is designed to facilitate an uncomplicated creation of concise, logical playbooks. Learn more about Turbine Canvas today to help achieve compliance by October 2024.&nbsp;<\/p>\n\n\n\n<div class=\"bs-div bs-div-91103da672f431009115c2b4dd3e89284290a37b bs-div---default\"><div class=\"bs-div__inner     \">\n<div class=\"bs-div bs-div-1ecaf6e2e6ff2e6680710842f6213f40725d98e1 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-1ecaf6e2e6ff2e6680710842f6213f40725d98e1 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/CONNECTORS_2024_Masthead.png' class='img-fluid'   alt='roi report swimlane security automation' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-2aebcd1b2c11849d7c87d8462be32842b8c42b50 bs-div---default\"><div class=\"bs-div__inner     \">\n<h3 class=\"wp-block-heading\" id=\"h-request-a-demo\">Request a demo<\/h3>\n\n\n\n<p>If you haven&#8217;t had the chance to explore Swimlane Turbine yet, request a demo.&nbsp;<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-644b861a108c1afb5bc4810598dc6885843a6e8c\"><style>.bs-pro-button-p-btn-644b861a108c1afb5bc4810598dc6885843a6e8c .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/demo\/\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Request a demo<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/es\/tag\/automation\/'><span class='tag-content'>Automation<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d134f14e3d1 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/resource\/automation-readiness-maturity-orchestrated-resources-framework\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Jul 24, 2023<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>The Swimlane ARMOR Framework<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d134f14f8e3 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/cyber-threat-readiness-should-we-sound-the-alarms\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Jul 25, 2023<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Cyber Threat Readiness: Should We Sound The Alarms?<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":76,"featured_media":35244,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":35247,"learn_more_label":"","image_alt_text":"Automation to Meet NIS2 Compliance","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[236],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[75,70,71],"class_list":["post-35243","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-automation","resource-type-blogs","blog-category-security-automation","blog-category-secops","blog-category-soar"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Essential Role of Automation to Meet NIS2 Compliance | Swimlane<\/title>\n<meta name=\"description\" content=\"Learn more about who is impacted by NIS2 and how AI enabled low-code security automation is paramount in ensuring seamless compliance by October 2024.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/es\/blog\/el-papel-de-la-automatizacion-para-cumplir-con-la-normativa-nis2\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Essential Role of Automation to Meet NIS2 Compliance | Swimlane\" \/>\n<meta property=\"og:description\" content=\"Learn more about who is impacted by NIS2 and how AI enabled low-code security automation is paramount in ensuring seamless compliance by October 2024.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/es\/blog\/el-papel-de-la-automatizacion-para-cumplir-con-la-normativa-nis2\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-09T10:28:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/EURO_REG_CHANGES_MAsthead-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"666\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"The Essential Role of Automation to Meet NIS2 Compliance | Swimlane\" \/>\n<meta name=\"twitter:description\" content=\"Learn more about who is impacted by NIS2 and how AI enabled low-code security automation is paramount in ensuring seamless compliance by October 2024.\u00a0\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/es\/blog\/the-role-of-automation-to-meet-nis2-compliance\/\",\"url\":\"https:\/\/swimlane.com\/es\/blog\/the-role-of-automation-to-meet-nis2-compliance\/\",\"name\":\"The Essential Role of Automation to Meet NIS2 Compliance | Swimlane\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/es\/blog\/the-role-of-automation-to-meet-nis2-compliance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/es\/blog\/the-role-of-automation-to-meet-nis2-compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/EURO_REG_CHANGES_MAsthead.png\",\"datePublished\":\"2024-01-29T15:30:00+00:00\",\"dateModified\":\"2025-12-09T10:28:05+00:00\",\"description\":\"Learn more about who is impacted by NIS2 and how AI enabled low-code security automation is paramount in ensuring seamless compliance by October 2024.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/es\/blog\/the-role-of-automation-to-meet-nis2-compliance\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/es\/blog\/the-role-of-automation-to-meet-nis2-compliance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/swimlane.com\/es\/blog\/the-role-of-automation-to-meet-nis2-compliance\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/EURO_REG_CHANGES_MAsthead.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/EURO_REG_CHANGES_MAsthead.png\",\"width\":1120,\"height\":666,\"caption\":\"Abstract illustration of security analyst at laptop with charts, gear and shield icons representing cybersecurity automation.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/es\/blog\/the-role-of-automation-to-meet-nis2-compliance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Essential Role of Automation to Meet NIS2 Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/es\/#website\",\"url\":\"https:\/\/swimlane.com\/es\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/es\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"El papel esencial de la automatizaci\u00f3n para cumplir con la norma NIS2 | Swimlane","description":"Obtenga m\u00e1s informaci\u00f3n sobre qui\u00e9nes se ven afectados por NIS2 y c\u00f3mo la automatizaci\u00f3n de seguridad de c\u00f3digo bajo habilitada por IA es fundamental para garantizar un cumplimiento perfecto para octubre de 2024.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/es\/blog\/el-papel-de-la-automatizacion-para-cumplir-con-la-normativa-nis2\/","og_locale":"es_ES","og_type":"article","og_title":"The Essential Role of Automation to Meet NIS2 Compliance | Swimlane","og_description":"Learn more about who is impacted by NIS2 and how AI enabled low-code security automation is paramount in ensuring seamless compliance by October 2024.\u00a0","og_url":"https:\/\/swimlane.com\/es\/blog\/el-papel-de-la-automatizacion-para-cumplir-con-la-normativa-nis2\/","og_site_name":"AI Security Automation","article_modified_time":"2025-12-09T10:28:05+00:00","og_image":[{"width":1120,"height":666,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/EURO_REG_CHANGES_MAsthead-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_title":"The Essential Role of Automation to Meet NIS2 Compliance | Swimlane","twitter_description":"Learn more about who is impacted by NIS2 and how AI enabled low-code security automation is paramount in ensuring seamless compliance by October 2024.\u00a0","twitter_site":"@swimlane","twitter_misc":{"Tiempo de lectura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/es\/blog\/the-role-of-automation-to-meet-nis2-compliance\/","url":"https:\/\/swimlane.com\/es\/blog\/the-role-of-automation-to-meet-nis2-compliance\/","name":"El papel esencial de la automatizaci\u00f3n para cumplir con la norma NIS2 | Swimlane","isPartOf":{"@id":"https:\/\/swimlane.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/es\/blog\/the-role-of-automation-to-meet-nis2-compliance\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/es\/blog\/the-role-of-automation-to-meet-nis2-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/EURO_REG_CHANGES_MAsthead.png","datePublished":"2024-01-29T15:30:00+00:00","dateModified":"2025-12-09T10:28:05+00:00","description":"Obtenga m\u00e1s informaci\u00f3n sobre qui\u00e9nes se ven afectados por NIS2 y c\u00f3mo la automatizaci\u00f3n de seguridad de c\u00f3digo bajo habilitada por IA es fundamental para garantizar un cumplimiento perfecto para octubre de 2024.\u00a0","breadcrumb":{"@id":"https:\/\/swimlane.com\/es\/blog\/the-role-of-automation-to-meet-nis2-compliance\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/es\/blog\/the-role-of-automation-to-meet-nis2-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/blog\/the-role-of-automation-to-meet-nis2-compliance\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/EURO_REG_CHANGES_MAsthead.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/EURO_REG_CHANGES_MAsthead.png","width":1120,"height":666,"caption":"Abstract illustration of security analyst at laptop with charts, gear and shield icons representing cybersecurity automation."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/es\/blog\/the-role-of-automation-to-meet-nis2-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"The Essential Role of Automation to Meet NIS2 Compliance"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/es\/#website","url":"https:\/\/swimlane.com\/es\/","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","description":"Automatizaci\u00f3n de la inteligencia artificial para todas las funciones de seguridad","publisher":{"@id":"https:\/\/swimlane.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/es\/#organization","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","url":"https:\/\/swimlane.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/35243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/users\/76"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/35243\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media\/35244"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media?parent=35243"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/tags?post=35243"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-type?post=35243"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-topic?post=35243"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-industry?post=35243"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/blog-category?post=35243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}