{"id":38572,"date":"2024-05-29T18:35:49","date_gmt":"2024-05-30T00:35:49","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=38572"},"modified":"2025-12-17T02:52:08","modified_gmt":"2025-12-17T09:52:08","slug":"que-orquestacion-de-seguridad","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/es\/blog\/what-security-orchestration\/","title":{"rendered":"\u00bfQu\u00e9 es la orquestaci\u00f3n de seguridad?"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/MastheadWhatisOrchestration-1.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"what is security orchestration\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/MastheadWhatisOrchestration-1.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/MastheadWhatisOrchestration-1-300x178.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/MastheadWhatisOrchestration-1-1024x609.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/MastheadWhatisOrchestration-1-768x457.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2024-05-29T18:35:49-06:00\">May 29, 2024<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">What is Security Orchestration?<\/h1>\n\n\n<div class=\"bs-div bs-div-1c02a909fcd723a1ec953772586290c0df1291b1 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/es\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">5 <\/span> Minute Read\n<\/div>\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\"><\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/es\/blog\/what-security-orchestration\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/es\/blog\/what-security-orchestration\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('What%20is%20Security%20Orchestration%3F').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fwhat-security-orchestration%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=What%20is%20Security%20Orchestration%3F%20%7C%20Swimlane&url=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fwhat-security-orchestration%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fwhat-security-orchestration%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fwhat-security-orchestration%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-9c3b371f58624b5fad3f60fd5a30b2fa82b48a60 bs-column---default bs-column--contents bs-column--list-indent     \">\n<p>In today&#8217;s digital age, where cyber threats are becoming increasingly sophisticated and relentless, the need for robust cybersecurity measures has never been more critical. Enter <a href=\"https:\/\/swimlane.com\/solutions\/security-orchestration\/\">Security Orchestration<\/a>\u2014a dynamic approach designed to fortify organizations&#8217; defenses by streamlining and enhancing the efficiency of their <a href=\"https:\/\/swimlane.com\/blog\/what-is-a-security-operations-center-soc\/\">Security Operations Centers (SOC)<\/a>.&nbsp;<\/p>\n\n\n\n<p>But what exactly is security orchestration? What is the overall purpose of security orchestration? And what is the difference between security orchestration and security automation? Here, we delve into the nuances of Security Orchestration, explore its benefits, and offer insights into how you can transform your organization&#8217;s security posture.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What is Security Orchestration?<\/strong><\/h2>\n\n\n\n<p><a href=\"https:\/\/swimlane.com\/solutions\/security-orchestration\/\">Security orchestration<\/a>, according to the Infosec Institute, is \u201cthe act of integrating disparate technologies and connecting security tools, both security-specific and non-security specific, in order to make them capable of working together and improving incident response.\u201d<\/p>\n\n\n\n<p>More simply, security orchestration is a method used in cybersecurity that integrates and coordinates the various tools and processes involved in a security operation.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is the Overall Purpose of Security Orchestration?<\/h2>\n\n\n\n<p>Security orchestration&#8217;s overarching goal is to improve security operations&#8217; efficiency by automating the manual tasks performed by <a href=\"https:\/\/swimlane.com\/blog\/top-soc-analyst-challenges\/\">SOC analysts<\/a> and streamlining different tools, technologies, and <a href=\"https:\/\/swimlane.com\/blog\/soc-best-practices-2\/\">SOC processes<\/a>. This approach ensures that an organization&#8217;s defense mechanisms, including cloud and network systems, are more effectively aligned to allow for a swifter and more coordinated response to different <a href=\"https:\/\/swimlane.com\/blog\/types-of-cyber-security-attacks\/\">types of cybersecurity attacks<\/a> and threats.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Cloud Security Orchestration<\/strong><\/h3>\n\n\n\n<p>Cloud security orchestration refers to the coordination and management of various security processes and tools within a cloud computing environment. It aims to streamline and optimize the security posture of cloud-based systems by integrating different security solutions to work seamlessly together.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Network Security Orchestration<\/strong><\/h3>\n\n\n\n<p>Network security orchestration enhances the overall security infrastructure by coordinating actions across various network security components, such as firewalls, <a href=\"https:\/\/swimlane.com\/blog\/power-of-idps-in-cybersecurity\/\">intrusion detection and prevention systems (IDPs)<\/a>, and malware protection.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What Is the Difference Between Automation and Orchestration?<\/strong><\/h2>\n\n\n\n<p>The main difference between <a href=\"https:\/\/swimlane.com\/solutions\/security-orchestration\/\">security orchestration<\/a> and <a href=\"https:\/\/swimlane.com\/blog\/security-automation\/\">security automation<\/a> is that security orchestration involves coordinating a wide range of security tasks simultaneously across tech stacks, while security automation focuses specifically on the use of automated tools and processes to perform tasks.&nbsp; And these tasks can include automating the deployment of security patches, investigating security incidents, and implementing security controls.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The Benefits of Security Orchestration&nbsp;<\/strong><\/h2>\n\n\n\n<p>Now, there are many advantages of enriched security orchestration:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Efficiency:<\/strong> As mentioned, security orchestration streamlines <a href=\"https:\/\/swimlane.com\/blog\/real-challenges-facing-secops\/\">SecOps teams<\/a> by automating repetitive tasks, reducing manual effort, and enabling faster response to security incidents.<\/li>\n\n\n\n<li><strong>Improved Response Time: <\/strong>By integrating security tools and then automating incident response workflows, orchestration reduces the mean time to detect (<a href=\"https:\/\/swimlane.com\/blog\/reducing-security-operations-mttd-mttr\/\">MTTD<\/a>) and mean time to respond (<a href=\"https:\/\/swimlane.com\/blog\/reducing-security-operations-mttd-mttr\/\">MTTR<\/a>) to security incidents.<\/li>\n\n\n\n<li><strong>Enhanced Accuracy:<\/strong> Orchestration ensures consistent execution of response actions, minimizing the risk of human error and increasing the accuracy of incident handling.<\/li>\n\n\n\n<li><strong>Scalability: <\/strong>Security orchestration enables the handling of higher volumes of alerts and incidents without proportionally increasing resources, ensuring scalability to address growing security threats.<\/li>\n\n\n\n<li><strong>Centralized Management: <\/strong>Orchestration platforms provide a centralized dashboard for managing security alerts, incidents, and response activities, offering better visibility and control over <a href=\"https:\/\/swimlane.com\/solutions\/assess-secops-efficacy\/\">SecOps<\/a>.<\/li>\n\n\n\n<li><strong>Integration Flexibility: <\/strong>Orchestration solutions offer flexible integrations with a wide range of security platforms and tools, allowing organizations to leverage their existing investments and adapt to evolving security needs.<\/li>\n\n\n\n<li><strong>Compliance and Reporting: <\/strong>Security orchestration facilitates compliance management by automating repetitive compliance tasks, generating audit trails, and providing reporting capabilities to consistently adhere to regulatory requirements.<\/li>\n\n\n\n<li><strong>Threat Intelligence Integration: <\/strong>Orchestration platforms can integrate <a href=\"https:\/\/swimlane.com\/blog\/cyber-threat-intelligence\/\">threat intelligence<\/a> feeds to enrich alerts with real-time threat data, enabling more informed decision-making and proactive <a href=\"https:\/\/swimlane.com\/solutions\/use-cases\/threat-hunting\/\">threat hunting<\/a>.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How Security Orchestration Tools Works<\/strong><\/h2>\n\n\n\n<p>Rarely will you see <a href=\"https:\/\/swimlane.com\/solutions\/security-orchestration\/\">security orchestration<\/a> on its own &#8211; that\u2019s why <a href=\"https:\/\/swimlane.com\/blog\/what-is-soar\/\">SOAR<\/a> tools exist, as both orchestration and automation approaches together maximize the efficiency and effectiveness of security operations (<a href=\"https:\/\/swimlane.com\/solutions\/assess-secops-efficacy\/\">SecOps<\/a>). However, security orchestration takes a more holistic view of the security landscape with security orchestration tools working by:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Integrating Multiple Technologies:<\/strong> Security orchestration first connects various solutions, both internal and external, through built-in or custom integrations and <a href=\"https:\/\/swimlane.com\/blog\/understanding-apis-rest\/\">rest APIs<\/a> without hindering each other\u2019s processes.<\/li>\n\n\n\n<li><strong>Coordinating Workflows:<\/strong> It coordinates the actions and workflows of these interconnected tools to ensure seamless communication and collaboration, increasing the efficiency of each individual component.<\/li>\n\n\n\n<li><strong>Enabling Automation<\/strong>: Security orchestration then allows the automation of repetitive tasks and processes, reducing manual effort, reducing response times, and improving <a href=\"https:\/\/swimlane.com\/blog\/soar-security-metrics\/\">security metrics<\/a> and <a href=\"https:\/\/swimlane.com\/blog\/cyber-threat-intelligence\/\">threat intelligence<\/a>.<\/li>\n\n\n\n<li><strong>Enhancing Incident Response:<\/strong> These coordinated workflows facilitate improved <a href=\"https:\/\/swimlane.com\/blog\/what-is-threat-detection-incident-response-2\/\">threat detection and incident response<\/a> by making the data export easier and more organized, allowing for faster detection, analysis, and resolution of security incidents.&nbsp;<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Combining Security Orchestration and Automation<\/strong><\/h2>\n\n\n\n<p>So, we\u2019ve discussed the differences between <a href=\"https:\/\/swimlane.com\/solutions\/security-orchestration\/\">security orchestration<\/a> and automation; now, it&#8217;s time to explain the benefits of combining them.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>What is the purpose of automation <\/strong><strong><em>and<\/em><\/strong><strong> orchestration?<\/strong><\/h4>\n\n\n\n<h3 class=\"wp-block-heading list-indent\"><strong>1. Increased SOC Efficiencies<\/strong><\/h3>\n\n\n\n<p class=\"list-indent\">As mentioned, security orchestration and automation together allow security operations (<a href=\"https:\/\/swimlane.com\/solutions\/assess-secops-efficacy\/\">SecOps<\/a>) teams to automate many routine tasks, freeing up <a href=\"https:\/\/swimlane.com\/blog\/top-soc-analyst-challenges\/\">SOC analysts<\/a> to focus on more complex and high-priority tasks. With this, <a href=\"https:\/\/swimlane.com\/blog\/what-is-a-security-operations-center-soc\/\">SOC<\/a>s become more efficient in aggregating the vast amount of data, turning that data into actionable insights, and then automating a significant percentage of the incident response process. Reducing the workload of security staff is also crucial with the ongoing <a href=\"https:\/\/swimlane.com\/blog\/cybersecurity-skills-shortage\/\">cybersecurity skills shortage<\/a>.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading list-indent\"><strong>2. Improved Incident Response&nbsp;<\/strong><\/h3>\n\n\n\n<p class=\"list-indent\">With efficiency comes scalability. When orchestration and automation collaborate, security teams can analyze a larger volume of incidents without proportionally increasing resources. A robust <a href=\"https:\/\/swimlane.com\/blog\/what-is-soar\/\">SOAR platform<\/a> can provide a centralized platform for managing incident response. This can help organizations respond to the growing number of complex threats more quickly and effectively.<\/p>\n\n\n\n<h3 class=\"wp-block-heading list-indent\"><strong>3. Integration with Diverse Tech Stacks<\/strong><\/h3>\n\n\n\n<p class=\"list-indent\">Certain orchestration and automation solutions can integrate with a variety of different security tools and processes, allowing organizations to better manage their security infrastructure and gain a more comprehensive view of their security posture.<\/p>\n\n\n\n<h3 class=\"wp-block-heading list-indent\"><strong>4. Improved Security Risk Posture<\/strong><\/h3>\n\n\n\n<p class=\"list-indent\">By automating tasks and integrating different security tools and processes, a <a href=\"https:\/\/swimlane.com\/blog\/what-is-soar\/\">SOAR platform<\/a> can help organizations identify and mitigate potential security risks more effectively. This can help reduce the organization&#8217;s overall risk profile.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Using a SOAR Platform<\/strong><strong> in Today&#8217;s Digital Landscape&nbsp;<\/strong><\/h2>\n\n\n\n<p>In the past, one of the most valuable solutions in a SOC environment was a <a href=\"https:\/\/swimlane.com\/blog\/what-is-soar\/\">Security Orchestration, Automation and Response (SOAR<\/a>) platform. It was designed to add that missing layer of action needed to quickly and efficiently triage alerts, reduce the number of false positives, and provide analysts with the security intelligence they need.<\/p>\n\n\n\n<p>However, SOAR solutions have not kept up with the needs of a <a href=\"https:\/\/swimlane.com\/blog\/building-modern-soc-2\/\">modern SOC<\/a>, failed to address cloud security <a href=\"https:\/\/swimlane.com\/solutions\/use-cases\/\">use cases<\/a>, and remained at the basic end of that spectrum. <a href=\"https:\/\/swimlane.com\/product\/soc-automation-solution\/\">SOC automation<\/a> has come a long way since the release of SOAR platforms, and many organizations need more advanced solutions. But <a href=\"https:\/\/swimlane.com\/blog\/why-soc-automation\/\">what is SOC automation?<\/a>&nbsp;<strong>SOC automation<\/strong>&nbsp;is the use of AI and technology to streamline tasks in a SOC like alert triage, incident response, and reporting\u2014so teams can work faster, smarter, and with less manual effort. Security Orchestration, Automation, and Response vendors, like us here at <a href=\"https:\/\/swimlane.com\/\">Swimlane<\/a>, have had to keep up. And this is where <a href=\"https:\/\/swimlane.com\/swimlane-turbine\/\">Swimlane Turbine<\/a> comes in\u2026<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Automate Your SOC with Swimlane Turbine<\/strong><\/h2>\n\n\n\n<p>A new era of security orchestration and automation is here. <a href=\"https:\/\/swimlane.com\/swimlane-turbine\/\">Swimlane Turbine<\/a> is the world\u2019s fastest and most scalable security automation platform. With Swimlane Turbine, SecOps teams are able to leverage AI-enhanced automation to handle routine tasks and streamline integration processes, freeing security professionals to concentrate on complex issues that demand human expertise. This approach not only boosts operational efficiency but also helps organizations maintain compliance and fortify their resilience against the ever-evolving landscape of cyber threats.<\/p>\n\n\n\n<div class=\"bs-div bs-div-91103da672f431009115c2b4dd3e89284290a37b bs-div---default\"><div class=\"bs-div__inner     \">\n<div class=\"bs-div bs-div-249dbde07c5a48501968135083834c6db4d1e0df bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-249dbde07c5a48501968135083834c6db4d1e0df {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/2023-08-23_13-38-40.png' class='img-fluid'   alt='roi report swimlane security automation' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-2aebcd1b2c11849d7c87d8462be32842b8c42b50 bs-div---default\"><div class=\"bs-div__inner     \">\n<h3 class=\"wp-block-heading\" id=\"h-the-swimlane-armor-framework\">The Swimlane ARMOR Framework<\/h3>\n\n\n\n<p>SecOps teams who want to map their goals, tactics, and security automation use cases to industry standard frameworks like NIST, CMMC, CMMI or C2M2<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-3746e5144768949633efa7ba51da269c5516b93a\"><style>.bs-pro-button-p-btn-3746e5144768949633efa7ba51da269c5516b93a .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/resource\/automation-readiness-maturity-orchestrated-resources-framework\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Download<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e53e3833876 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/resource\/automation-readiness-maturity-orchestrated-resources-framework\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Jul 24, 2023<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>The Swimlane ARMOR Framework<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e53e3834b1e bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/cyber-threat-readiness-should-we-sound-the-alarms\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Jul 25, 2023<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Cyber Threat Readiness: Should We Sound The Alarms?<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":38575,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":38574,"learn_more_label":"","image_alt_text":"Dictionary Attacks: How They Decode Passwords","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[75,70,71],"class_list":["post-38572","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs","blog-category-security-automation","blog-category-secops","blog-category-soar"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is Security Orchestration? | Swimlane<\/title>\n<meta name=\"description\" content=\"What is security orchestration? What is the difference between security orchestration and security automation? Learn the security orchestration meaning with Swimlane\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/es\/blog\/que-orquestacion-de-seguridad\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Security Orchestration? | Swimlane\" \/>\n<meta property=\"og:description\" content=\"What is security orchestration? What is the difference between security orchestration and security automation? Learn the security orchestration meaning with Swimlane\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/es\/blog\/que-orquestacion-de-seguridad\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-17T09:52:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/MastheadWhatisOrchestration.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"666\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"What is Security Orchestration? | Swimlane\" \/>\n<meta name=\"twitter:description\" content=\"What is security orchestration? What is the difference between security orchestration and security automation? Learn the security orchestration meaning with Swimlane\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/es\/blog\/what-security-orchestration\/\",\"url\":\"https:\/\/swimlane.com\/es\/blog\/what-security-orchestration\/\",\"name\":\"What is Security Orchestration? | Swimlane\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/es\/blog\/what-security-orchestration\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/es\/blog\/what-security-orchestration\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/MastheadWhatisOrchestration-1.png\",\"datePublished\":\"2024-05-30T00:35:49+00:00\",\"dateModified\":\"2025-12-17T09:52:08+00:00\",\"description\":\"What is security orchestration? What is the difference between security orchestration and security automation? Learn the security orchestration meaning with Swimlane\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/es\/blog\/what-security-orchestration\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/es\/blog\/what-security-orchestration\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/swimlane.com\/es\/blog\/what-security-orchestration\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/MastheadWhatisOrchestration-1.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/MastheadWhatisOrchestration-1.png\",\"width\":1120,\"height\":666,\"caption\":\"what is security orchestration\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/es\/blog\/what-security-orchestration\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Security Orchestration?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/es\/#website\",\"url\":\"https:\/\/swimlane.com\/es\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/es\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u00bfQu\u00e9 es la orquestaci\u00f3n de seguridad? | Swimlane","description":"\u00bfQu\u00e9 es la orquestaci\u00f3n de seguridad? \u00bfCu\u00e1l es la diferencia entre orquestaci\u00f3n de seguridad y automatizaci\u00f3n de seguridad? Descubre el significado de orquestaci\u00f3n de seguridad con Swimlane.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/es\/blog\/que-orquestacion-de-seguridad\/","og_locale":"es_ES","og_type":"article","og_title":"What is Security Orchestration? | Swimlane","og_description":"What is security orchestration? What is the difference between security orchestration and security automation? Learn the security orchestration meaning with Swimlane","og_url":"https:\/\/swimlane.com\/es\/blog\/que-orquestacion-de-seguridad\/","og_site_name":"AI Security Automation","article_modified_time":"2025-12-17T09:52:08+00:00","og_image":[{"width":1120,"height":666,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/MastheadWhatisOrchestration.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_title":"What is Security Orchestration? | Swimlane","twitter_description":"What is security orchestration? What is the difference between security orchestration and security automation? Learn the security orchestration meaning with Swimlane","twitter_site":"@swimlane","twitter_misc":{"Tiempo de lectura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/es\/blog\/what-security-orchestration\/","url":"https:\/\/swimlane.com\/es\/blog\/what-security-orchestration\/","name":"\u00bfQu\u00e9 es la orquestaci\u00f3n de seguridad? | Swimlane","isPartOf":{"@id":"https:\/\/swimlane.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/es\/blog\/what-security-orchestration\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/es\/blog\/what-security-orchestration\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/MastheadWhatisOrchestration-1.png","datePublished":"2024-05-30T00:35:49+00:00","dateModified":"2025-12-17T09:52:08+00:00","description":"\u00bfQu\u00e9 es la orquestaci\u00f3n de seguridad? \u00bfCu\u00e1l es la diferencia entre orquestaci\u00f3n de seguridad y automatizaci\u00f3n de seguridad? Descubre el significado de orquestaci\u00f3n de seguridad con Swimlane.","breadcrumb":{"@id":"https:\/\/swimlane.com\/es\/blog\/what-security-orchestration\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/es\/blog\/what-security-orchestration\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/blog\/what-security-orchestration\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/MastheadWhatisOrchestration-1.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/MastheadWhatisOrchestration-1.png","width":1120,"height":666,"caption":"what is security orchestration"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/es\/blog\/what-security-orchestration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"What is Security Orchestration?"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/es\/#website","url":"https:\/\/swimlane.com\/es\/","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","description":"Automatizaci\u00f3n de la inteligencia artificial para todas las funciones de seguridad","publisher":{"@id":"https:\/\/swimlane.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/es\/#organization","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","url":"https:\/\/swimlane.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/38572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/38572\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media\/38575"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media?parent=38572"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/tags?post=38572"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-type?post=38572"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-topic?post=38572"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-industry?post=38572"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/blog-category?post=38572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}