{"id":38065,"date":"2024-04-30T14:52:14","date_gmt":"2024-04-30T20:52:14","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=38065"},"modified":"2025-10-01T11:52:42","modified_gmt":"2025-10-01T17:52:42","slug":"caso-de-uso-de-busqueda-de-inteligencia-de-amenazas-coi","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/es\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/","title":{"rendered":"Caso de uso de inteligencia de amenazas y b\u00fasqueda de IOC"},"content":{"rendered":"<section class=\"bs-section bs-section-0ace0c84eaa888bce49c4f2de89bf8347ace13a6 bs-section---default bs-section--common-header-with-form\"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-12   bs-column-5f6574ebb29ac8d58ab608d2aff5b1bbe4f96332 bs-column---default\"><div class=\"bs-lottie-animator bs-lottie-animator---default\" id=\"lottie-c7d5ff8e-a115-40ae-aecb-0a84b90fe739\" data-settings=\"{&quot;desktop&quot;:{&quot;settings&quot;:{&quot;animateViewPort&quot;:0.5,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;Contact_lines1.json&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:1,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Contact_lines1.json&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}},&quot;mobile&quot;:{&quot;breakpoint&quot;:576,&quot;settings&quot;:{&quot;animateViewPort&quot;:50,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:0,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}}}\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column  col-sm-0 col-md-10   bs-column-e324ba46e668efb8a167f6c6f82d98452b10172b bs-column---default\">\n<p class=\"common-header__blue-text has-blue-color has-text-color\" style=\"font-size:18px;text-transform:uppercase\"><span>V\u00eddeos<\/span><\/p>\n\n\n<h1 style=\"font-style:normal;font-weight:400;\" class=\"common-header__gated-page wp-block-post-title has-text-color has-black-color\">Caso de uso de inteligencia de amenazas y b\u00fasqueda de IOC<\/h1>\n\n\n<p><span class=\"yt-core-attributed-string yt-core-attributed-string--white-space-pre-wrap\" role=\"text\"><span class=\"yt-core-attributed-string--link-inherit-color\">Cantidades masivas de datos fluyen a trav\u00e9s del Centro de Operaciones de Seguridad (SOC) a diario, provenientes de diversas fuentes y herramientas de seguridad. Puede resultar dif\u00edcil para su equipo de seguridad filtrar m\u00e1s de 10\u00a0000 alertas diarias para encontrar indicadores de compromiso (IOC) v\u00e1lidos. Observe c\u00f3mo Swimlane automatiza y orquesta el proceso de b\u00fasqueda de IOC y combina datos de m\u00e1quinas con decisiones humanas en una \u00fanica fuente de informaci\u00f3n.<\/span><\/span><\/p>\n\n\n\n<iframe loading=\"lazy\" width=\"100%\" height=\"auto\" style=\"min-height:520px\" src=\"https:\/\/www.youtube.com\/embed\/rMmGXAGeukM?si=dpQhZZV2NlyxGoGH\" title=\"Reproductor de v\u00eddeo de YouTube\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-14ca56fdc3be4b5f0a8616120c8005c221b5c55b bs-section---default bs-section--related-items\"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-12   bs-column-5f6574ebb29ac8d58ab608d2aff5b1bbe4f96332 bs-column---default\">\n<h2 class=\"wp-block-heading has-deep-color has-text-color\" id=\"h-you-might-also-be-interested-in\">Tambi\u00e9n te podr\u00eda interesar<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-12   bs-column-33aba5295b76f4052fb226277a0b4e1e4747889c bs-column---default\">\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69f4e6f16037a bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/cyber-threat-intelligence\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/THREATINTELLIGENCE-1.png' class='img-fluid' alt='' title='1'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Blog<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Automatizaci\u00f3n del enriquecimiento de la inteligencia de amenazas<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Leer m\u00e1s<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69f4e6f161c08 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/THREAT-INT-IOC-1.png' class='img-fluid' alt='' title='AMENAZA INT COI'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Manifestaci\u00f3n<\/span><span>Video<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Caso de uso de inteligencia de amenazas y b\u00fasqueda de IOC<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Leer m\u00e1s<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69f4e6f163358 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/hero-ai-model-updates\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-38.jpg' class='img-fluid' alt='Hero AI con tecnolog\u00eda Mistral 3.1: IA m\u00e1s inteligente para la automatizaci\u00f3n de SecOps' title='Cabecera'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Blog<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Inteligencia mejorada: la IA del h\u00e9roe ahora cuenta con un modelo tres veces m\u00e1s grande<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Leer m\u00e1s<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"<p>Are you looking to automate the triage of security alert data from Splunk? Watch this use case demo to learn how Swimlane can automate the alert triage process while integrating with Splunk, VirusTotal and Symantec Endpoint Protection.<\/p>","protected":false},"author":43,"featured_media":38067,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":38067,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[206,105],"resource-topic":[132,136],"resource-industry":[108,121,99],"blog-category":[],"class_list":["post-38065","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-demo","resource-type-videos","resource-topic-platform","resource-topic-soar","resource-industry-use-case","resource-industry-threat-hunting","resource-industry-alert-triage"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Automating Splunk Alert Triage Demo (4:11)<\/title>\n<meta name=\"description\" content=\"Splunk and Swimlane are shown as powerful combination for managing Alert Triage in this webinar.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/es\/recursos\/videos\/caso-de-uso-de-busqueda-de-inteligencia-de-amenazas-coi\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Threat Intelligence &amp; IOC Lookup Use Case\" \/>\n<meta property=\"og:description\" content=\"Splunk and Swimlane are shown as powerful combination for managing Alert Triage in this webinar.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/es\/recursos\/videos\/caso-de-uso-de-busqueda-de-inteligencia-de-amenazas-coi\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-01T17:52:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/THREAT-INT-IOC-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/resources\\\/videos\\\/threat-intelligence-ioc-lookup-use-case\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/es\\\/resources\\\/videos\\\/threat-intelligence-ioc-lookup-use-case\\\/\",\"name\":\"Automating Splunk Alert Triage Demo (4:11)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/resources\\\/videos\\\/threat-intelligence-ioc-lookup-use-case\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/resources\\\/videos\\\/threat-intelligence-ioc-lookup-use-case\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/THREAT-INT-IOC-1.png\",\"datePublished\":\"2024-04-30T20:52:14+00:00\",\"dateModified\":\"2025-10-01T17:52:42+00:00\",\"description\":\"Splunk and Swimlane are shown as powerful combination for managing Alert Triage in this webinar.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/resources\\\/videos\\\/threat-intelligence-ioc-lookup-use-case\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/swimlane.com\\\/es\\\/resources\\\/videos\\\/threat-intelligence-ioc-lookup-use-case\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/resources\\\/videos\\\/threat-intelligence-ioc-lookup-use-case\\\/#primaryimage\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/THREAT-INT-IOC-1.png\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/THREAT-INT-IOC-1.png\",\"width\":1280,\"height\":720,\"caption\":\"Technical interface displaying automated threat intelligence research and IOC analysis workflows.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/resources\\\/videos\\\/threat-intelligence-ioc-lookup-use-case\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/swimlane.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Threat Intelligence &amp; IOC Lookup Use Case\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/swimlane.com\\\/es\\\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/swimlane.com\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\\\/\\\/swimlane.com\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/swimlane\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/swimlane\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Demostraci\u00f3n de automatizaci\u00f3n de la clasificaci\u00f3n de alertas de Splunk (4:11)","description":"En este seminario web se muestra Splunk y Swimlane como una combinaci\u00f3n poderosa para gestionar el triaje de alertas.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/es\/recursos\/videos\/caso-de-uso-de-busqueda-de-inteligencia-de-amenazas-coi\/","og_locale":"es_ES","og_type":"article","og_title":"Threat Intelligence &amp; IOC Lookup Use Case","og_description":"Splunk and Swimlane are shown as powerful combination for managing Alert Triage in this webinar.","og_url":"https:\/\/swimlane.com\/es\/recursos\/videos\/caso-de-uso-de-busqueda-de-inteligencia-de-amenazas-coi\/","og_site_name":"AI Security Automation","article_modified_time":"2025-10-01T17:52:42+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/THREAT-INT-IOC-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/es\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/","url":"https:\/\/swimlane.com\/es\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/","name":"Demostraci\u00f3n de automatizaci\u00f3n de la clasificaci\u00f3n de alertas de Splunk (4:11)","isPartOf":{"@id":"https:\/\/swimlane.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/es\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/es\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/THREAT-INT-IOC-1.png","datePublished":"2024-04-30T20:52:14+00:00","dateModified":"2025-10-01T17:52:42+00:00","description":"En este seminario web se muestra Splunk y Swimlane como una combinaci\u00f3n poderosa para gestionar el triaje de alertas.","breadcrumb":{"@id":"https:\/\/swimlane.com\/es\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/es\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/THREAT-INT-IOC-1.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/THREAT-INT-IOC-1.png","width":1280,"height":720,"caption":"Technical interface displaying automated threat intelligence research and IOC analysis workflows."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/es\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Threat Intelligence &amp; IOC Lookup Use Case"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/es\/#website","url":"https:\/\/swimlane.com\/es\/","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","description":"Automatizaci\u00f3n de la inteligencia artificial para todas las funciones de seguridad","publisher":{"@id":"https:\/\/swimlane.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/es\/#organization","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","url":"https:\/\/swimlane.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/38065","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/users\/43"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/38065\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media\/38067"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media?parent=38065"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/tags?post=38065"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-type?post=38065"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-topic?post=38065"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-industry?post=38065"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/blog-category?post=38065"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}