{"id":9364,"date":"2022-09-26T17:33:00","date_gmt":"2022-09-26T23:33:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/soar-automated-phishing-investigation-and-response\/"},"modified":"2025-06-03T13:39:21","modified_gmt":"2025-06-03T19:39:21","slug":"investigacion-y-respuesta-automatizadas-de-phishing","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/es\/blog\/soar-automated-phishing-investigation-and-response\/","title":{"rendered":"No muerda el anzuelo: investigaci\u00f3n y respuesta automatizadas contra el phishing"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/PHISHINGII-2.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Technical icon representing automated phishing triage and email security orchestration.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/PHISHINGII-2.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/PHISHINGII-2-300x182.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/PHISHINGII-2-1024x621.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/PHISHINGII-2-768x466.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2022-09-26T17:33:00-06:00\">Sep 26, 2022<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Don\u2019t Take the Bait: Automated Phishing Investigation and Response<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/es\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">4 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-f08f74d0af2cf0ad40ac7f7e7ff47f7939ce6b43 bs-section---default bs-section--blog-inner-table-of-contents  \"><style>.bs-section.bs-section-f08f74d0af2cf0ad40ac7f7e7ff47f7939ce6b43{ background-color: #eef4fa;} <\/style><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-12   bs-column-5f6574ebb29ac8d58ab608d2aff5b1bbe4f96332 bs-column---default     \">\n<h2 class=\"wp-block-heading\">Table of Contents<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-6   bs-column-2119ec9d0f7bbcc95647d0ccaa955654ac2a575a bs-column---default     \">\n<ul class=\"wp-block-list\">\n<li><a href=\"#what-is-phishing\">WHAT IS PHISHING?<\/a><\/li>\n\n\n\n<li><a href=\"#the-problem-for-security-teams\">THE PROBLEM FOR SECURITY TEAMS: <\/a><\/li>\n\n\n\n<li><a href=\"#phishing-alert-triage-tools\">AUTOMATED PHISHING ALERT TRIAGE TOOLS<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-6   bs-column-2119ec9d0f7bbcc95647d0ccaa955654ac2a575a bs-column---default     \">\n<ul class=\"wp-block-list\">\n<li><a href=\"#investigation-with-soar\">AUTOMATED INVESTIGATION WITH SOAR<\/a><\/li>\n\n\n\n<li><a href=\"#the-benefits-of-low-code-security-automation\" rel=\"sponsored nofollow\">THE BENEFITS OF LOW-CODE SECURITY AUTOMATION<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/es\/blog\/soar-automated-phishing-investigation-and-response\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/es\/blog\/soar-automated-phishing-investigation-and-response\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Don%E2%80%99t%20Take%20the%20Bait%3A%20Automated%20Phishing%20Investigation%20and%20Response').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fsoar-automated-phishing-investigation-and-response%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Don%E2%80%99t%20Take%20the%20Bait%3A%20Automated%20Phishing%20Investigation%20and%20Response&url=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fsoar-automated-phishing-investigation-and-response%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fsoar-automated-phishing-investigation-and-response%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fsoar-automated-phishing-investigation-and-response%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<h2 class=\"wp-block-heading\">Find out how security automation helps triage phishing alerts for faster remediation.<\/h2>\n\n\n\n<p>Phishing continues to be a dangerously effective attack method. Roughly<a href=\"https:\/\/www.phishing.org\/phishing-resources\" target=\"_blank\" rel=\"noreferrer noopener\"> 91% of successful attacks start with phishing<\/a>. On average,<a href=\"https:\/\/retruster.com\/blog\/2019-phishing-and-email-fraud-statistics.html#:~:text=Phishing%20and%20the%20Final%20Word,get%20opened%20by%20targeted%20users.\" target=\"_blank\" rel=\"noreferrer noopener\"> 30% of the phishing emails sent get opened and viewed<\/a>. Considering the minuscule cost and effort involved to create and send an email, it is<a href=\"https:\/\/www.prnewswire.com\/news-releases\/webroot-report-nearly-half-of-employees-confess-to-clicking-links-in-potential-phishing-emails-at-work-300923877.html\" target=\"_blank\" rel=\"noreferrer noopener\"> no wonder this method continues to be so popular<\/a> for attackers.<\/p>\n\n\n\n<p>And it\u2019s becoming increasingly difficult to spot a phishing attempt. Attackers sending phishing emails can expect between 10% and 15% of the time that the malicious attachment or link will be accessed<a href=\"https:\/\/www.jmir.org\/2020\/1\/e16775\/\" target=\"_blank\" rel=\"noreferrer noopener\"> in some companies<\/a>.<\/p>\n\n\n\n<p>Without phishing automation, an analyst must manually receive a potentially malicious email through some system of detection or by notification from a user. The analyst must then inspect the email and manually extract details to validate them.<\/p>\n\n\n\n<p>This means looking at every part of the email in detail (headers, body, everything) and identifying anything that could potentially be an indicator of compromise (IOC). To determine the IOC\u2019s risk, analysts must then access various<a href=\"https:\/\/swimlane.com\/blog\/cyber-threat-hunting\"> threat intelligence<\/a> and enrichment sources. This usually requires copying and pasting information into additional windows or browser tabs to investigate the IOCs and determine their risk.<\/p>\n\n\n\n<p>These steps are tedious, time-consuming, monotonous, repetitive and easily messed up. Executing the response and any remediation actions adds even more steps and more time to the whole task of handling a single potential phishing message.<\/p>\n\n\n\n<p>In this article, you&#8217;ll learn:<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is-phishing\">What is Phishing?<\/h2>\n\n\n\n<p>Phishing is a type of social engineering cyber attack that uses various methods to trick victims into disclosing personal or business information. Malicious actors will use email, SMS messages, phone calls, voicemails and in-app messaging to target victims. Much like&nbsp;the bait on a fishhook, as phishing attempts are often disguised as messages from a legitimate business or organization.<\/p>\n\n\n\n<p>The most common types of phishing include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\n<p dir=\"ltr\"><strong>Email phishing<\/strong>: the most common type of phishing attack. Phishing emails can be sent from fake domains, and often include malicious links to fake domains.<\/p>\n<\/li>\n\n\n\n<li>\n<p dir=\"ltr\"><strong>Spear phishing<\/strong>: a personalized form of phishing. Malicious actors will use your name, job title, employer, email address and more to trick victims.<\/p>\n<\/li>\n\n\n\n<li>\n<p dir=\"ltr\"><strong>Whaling:<\/strong> an attack method that imitates senior-level employees at your enterprise. Often, this will look like an urgent email from the CEO asking you to transfer money or share private information.<\/p>\n<\/li>\n\n\n\n<li>\n<p dir=\"ltr\"><strong>Smishing and vishing<\/strong>: phishing attacks that target victims with text messages and voicemails. This style of phishing is especially hard for security teams to catch before damage is done.<\/p>\n<\/li>\n<\/ul>\n\n\n\n<p><span id=\"problem-for-security-teams\">Phishing scams can be<\/span> sent individually to an unsuspecting target, but they&#8217;re usually sent in large batches to increase the chances of catching someone at the right time \u2013 when they&#8217;re more likely to click on one of the links.<\/p>\n\n\n\n<p>It\u2019s easy to see how the frequency of phishing attacks has grown to be too much for security teams to manually triage.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"the-problem-for-security-teams\">The Problem for Security Teams: Too Many Alerts<\/h2>\n\n\n\n<p>Phishing, in particular, can produce more alerts than any other<a href=\"https:\/\/swimlane.com\/blog\/types-of-cyber-security-attacks\/\"> type of cyber attack<\/a> simply because it is such a rampant problem. It is one of the oldest types of cyber attacks and has become exceedingly sophisticated over the years. When managing potential phishing attacks, organizations face numerous problems:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\n<p dir=\"ltr\">Millions of phishing emails are sent every day<\/p>\n<\/li>\n\n\n\n<li>\n<p dir=\"ltr\">Investigations require analysis between multiple security platforms<\/p>\n<\/li>\n\n\n\n<li>\n<p dir=\"ltr\">It takes an average of 27 minutes to manually triage one phishing email<\/p>\n<\/li>\n\n\n\n<li>\n<p dir=\"ltr\">Many organizations lack the manpower necessary to investigate the high volume of daily phishing alerts<\/p>\n<\/li>\n\n\n\n<li>\n<p dir=\"ltr\"><span id=\"automated-phishing-alert-triage-tools\">Poo<\/span>r Mean Time to Resolution (MTTR) increases risk and potential damages<\/p>\n<\/li>\n<\/ul>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&nbsp;The number of organizations targeted by phishing attacks grew by 28% in 2021.<\/p>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"phishing-alert-triage-tools\">Automated Phishing Alert Triage Tools<\/h2>\n\n\n\n<p>There aren\u2019t enough hours in the day for SOC analysts to manually triage all phishing attempts. To combat this problem, security leaders <span id=\"automated-investigation-with-soar\">rely<\/span> on security tools to triage phishing alerts faster. Security automation tools can be used to automate a phishing attack investigation which will significantly improve security and ensure protection for your organization.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"investigation-with-soar\">Automated Investigation with SOAR<\/h2>\n\n\n\n<p><a href=\"https:\/\/swimlane.com\/blog\/what-is-soar\">Security orchestration, automation and response<\/a> (SOAR) platforms are commonly used to automate the investigation process and to quarantine suspected phishing emails. SOAR platforms remove the need for human intervention unless absolutely necessary. By automating the repetitive, mundane tasks around phishing, you can reduce the number of alerts SOC analysts receive, which allows them to focus on more serious threats.<\/p>\n\n\n\n<p>If a possible phishing email triggers an alert, SOAR technology can automatically pull suspected phishing emails from the inbox to prevent users from opening them. The IPs and URLs are then extracted and researched using threat intelligence tools.<\/p>\n\n\n\n<p>If the threat is a known malicious phishing attack, then an IT ticket is automatically opened, the endpoints quarantined, and all emails in the system containing the malicious file are deleted. If the threat is unknown, then the attachment is first submitted for sandbox inspection. If it is then found to be malicious then it follows the same protocol and will be quarantined and deleted.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=bzbdhhdOBR4\" target=\"_blank\" rel=\"noreferrer noopener\">See phishing automation in action with Swimlane, below.<\/a><\/p>\n\n\n\n<script src=\"https:\/\/fast.wistia.com\/embed\/medias\/bkofteehgo.jsonp\" async><\/script><script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script><div class=\"wistia_responsive_padding\" style=\"padding:59.38% 0 0 0;position:relative;\"><div class=\"wistia_responsive_wrapper\" style=\"height:100%;left:0;position:absolute;top:0;width:100%;\"><div class=\"wistia_embed wistia_async_bkofteehgo seo=true videoFoam=true\" style=\"height:100%;position:relative;width:100%\"><div class=\"wistia_swatch\" style=\"height:100%;left:0;opacity:0;overflow:hidden;position:absolute;top:0;transition:opacity 200ms;width:100%;\"><img decoding=\"async\" src=\"https:\/\/fast.wistia.com\/embed\/medias\/bkofteehgo\/swatch\" style=\"filter:blur(5px);height:100%;object-fit:contain;width:100%;\" alt=\"\" aria-hidden=\"true\" onload=\"this.parentNode.style.opacity=1;\" \/><\/div><\/div><\/div><\/div>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"the-benefits-of-low-code-security-automation\">The Benefits of Low-Code Security Automation<\/h2>\n\n\n\n<p><a href=\"https:\/\/swimlane.com\/blog\/low-code-security-automation-simplicity\">Low-code security automation<\/a> expands upon the capabilities of legacy SOAR solutions to provide faster, more adaptable phishing automation. By using low-code security automation to combat phishing attacks, security teams can reduce MTTR and handle any threat at machine speeds.<\/p>\n\n\n\n<p>Incident response processes throughout your organization are more clearly defined and executed consistently with automation. This reduces the possibility of human error, and workflows can be modified as new anti-phishing techniques are implemented within an organization. Plus, incident reports can be automatically generated so that analysts can understand the breadth of the phishing attack without spending too much time manually weeding through the systems and steps necessary to resolve it.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/assets\/uploads\/images\/Phishing-Alert-Triage-with-Swimlane.png\" alt=\"\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Low-Code Security Automation with Swimlane<\/h3>\n\n\n\n<p><a href=\"https:\/\/swimlane.com\/swimlane-turbine\/\">Swimlane Turbine<\/a> helps integrate your existing security solutions and tools into a centralized platform that streamlines incident response.&nbsp;Powerful data integration and user-friendly playbook building enable domain experts to become automation builders.&nbsp;It can automate the investigation and quarantine of suspected phishing emails, as well as help organizations:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\n<p dir=\"ltr\">Centralize all security data into dashboards for more accessible reporting<\/p>\n<\/li>\n\n\n\n<li>\n<p dir=\"ltr\">Standardize incident response processes<\/p>\n<\/li>\n\n\n\n<li>\n<p dir=\"ltr\">Track security tasks across the enterprise<\/p>\n<\/li>\n\n\n\n<li>\n<p dir=\"ltr\">Reduce MTTD and MTTR<\/p>\n<\/li>\n\n\n\n<li>\n<p dir=\"ltr\">Prioritize threats to ensure that all alerts are investigated thoroughly<\/p>\n<\/li>\n\n\n\n<li>\n<p dir=\"ltr\">Automate various processes and workflows<\/p>\n<\/li>\n\n\n\n<li>\n<p dir=\"ltr\">Improve security performance<\/p>\n<\/li>\n<\/ul>\n\n\n\n<p>Automated phishing investigation and response is only the beginning with low-code security automation.<\/p>\n\n\n\n<div class=\"bs-div bs-div-5df0f6eea7640597c6546c47b4ceb340b1c77dbc bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-5df0f6eea7640597c6546c47b4ceb340b1c77dbc {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/Screenshot-2024-06-26-at-4.33.27\u202fPM.png' class='img-fluid'   alt='Swimlane security automation workflow for user provisioning, enrichment, help desk, and HR system integration' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-2aebcd1b2c11849d7c87d8462be32842b8c42b50 bs-div---default\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\">A Buyer\u2019s Guide for Modern Security Automation<\/h2>\n\n\n\n<p>Enterprise SOC teams recognize the need for automation but often struggle with the automation solutions themselves. Security Orchestration, Automation and Response (SOAR) solutions commonly require extensive scripting. This guide analyzes the wide range of security automation platforms available today, so you can identify the type of solution that fits your needs the best.&nbsp;<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-737e59f3b68341b79add221306c38c2462aeec8b\"><style>.bs-pro-button-p-btn-737e59f3b68341b79add221306c38c2462aeec8b .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/resources\/e-books\/a-buyers-guide-for-modern-security-automation\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Download E-Book<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d0838e3adac bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/automate-threatgrid-investigation-response\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Ene 20, 2017<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Automate ThreatGrid investigation and response with out-of-the-box Swimlane integrations<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d0838e3c106 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/you-dont-have-windows-7-in-your-environment-do-you\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Ene 14, 2020<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>You don\u2019t have Windows 7 in your environment, do you?<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d0838e3d510 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/how-soar-can-revolutionize-fraud-detection-and-investigation\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Dic 8, 2020<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>How SOAR Can Revolutionize Fraud Detection and Investigation<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-5f1a05c47bd78d88ac3be0e745c2c126161649fe bs-div---default bs-div--table-of-contents-right\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\">Table of Contents<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"#what-is-phishing\">WHAT IS PHISHING?<\/a><\/li>\n\n\n\n<li><a href=\"#the-problem-for-security-teams\">THE PROBLEM FOR SECURITY TEAMS:<\/a><\/li>\n\n\n\n<li><a href=\"#phishing-alert-triage-tools\">AUTOMATED PHISHING ALERT TRIAGE TOOLS<\/a><\/li>\n\n\n\n<li><a href=\"#investigation-with-soar\">AUTOMATED INVESTIGATION WITH SOAR<\/a><\/li>\n\n\n\n<li><a href=\"#the-benefits-of-low-code-security-automation\">THE BENEFITS OF LOW-CODE SECURITY AUTOMATION<\/a><\/li>\n<\/ul>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>Descubra c\u00f3mo la automatizaci\u00f3n de la seguridad ayuda a clasificar las alertas de phishing para una soluci\u00f3n m\u00e1s r\u00e1pida.<\/p>","protected":false},"author":5,"featured_media":9365,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[69],"class_list":["post-9364","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs","blog-category-use-cases"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Automated Phishing Investigation and Response<\/title>\n<meta name=\"description\" content=\"91% of successful attacks start with phishing ?. Learn how low-code security automation platforms automate phishing investigation and response processes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/es\/blog\/investigacion-y-respuesta-automatizadas-de-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Don\u2019t Take the Bait: Automated Phishing Investigation and Response\" \/>\n<meta property=\"og:description\" content=\"91% of successful attacks start with phishing ?. Learn how low-code security automation platforms automate phishing investigation and response processes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/es\/blog\/investigacion-y-respuesta-automatizadas-de-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-03T19:39:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/PHISHINGII-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"679\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/es\/blog\/soar-automated-phishing-investigation-and-response\/\",\"url\":\"https:\/\/swimlane.com\/es\/blog\/soar-automated-phishing-investigation-and-response\/\",\"name\":\"Automated Phishing Investigation and Response\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/es\/blog\/soar-automated-phishing-investigation-and-response\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/es\/blog\/soar-automated-phishing-investigation-and-response\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/PHISHINGII-2.png\",\"datePublished\":\"2022-09-26T23:33:00+00:00\",\"dateModified\":\"2025-06-03T19:39:21+00:00\",\"description\":\"91% of successful attacks start with phishing ?. Learn how low-code security automation platforms automate phishing investigation and response processes.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/es\/blog\/soar-automated-phishing-investigation-and-response\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/es\/blog\/soar-automated-phishing-investigation-and-response\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/swimlane.com\/es\/blog\/soar-automated-phishing-investigation-and-response\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/PHISHINGII-2.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/PHISHINGII-2.png\",\"width\":1120,\"height\":679,\"caption\":\"Technical icon representing automated phishing triage and email security orchestration.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/es\/blog\/soar-automated-phishing-investigation-and-response\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Don\u2019t Take the Bait: Automated Phishing Investigation and Response\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/es\/#website\",\"url\":\"https:\/\/swimlane.com\/es\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/es\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Investigaci\u00f3n y respuesta automatizadas contra phishing","description":"\u00bfEl 91% de los ataques exitosos comienza con phishing? Descubra c\u00f3mo las plataformas de automatizaci\u00f3n de seguridad low-code automatizan los procesos de investigaci\u00f3n y respuesta ante phishing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/es\/blog\/investigacion-y-respuesta-automatizadas-de-phishing\/","og_locale":"es_ES","og_type":"article","og_title":"Don\u2019t Take the Bait: Automated Phishing Investigation and Response","og_description":"91% of successful attacks start with phishing ?. Learn how low-code security automation platforms automate phishing investigation and response processes.","og_url":"https:\/\/swimlane.com\/es\/blog\/investigacion-y-respuesta-automatizadas-de-phishing\/","og_site_name":"AI Security Automation","article_modified_time":"2025-06-03T19:39:21+00:00","og_image":[{"width":1120,"height":679,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/PHISHINGII-2.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Tiempo de lectura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/es\/blog\/soar-automated-phishing-investigation-and-response\/","url":"https:\/\/swimlane.com\/es\/blog\/soar-automated-phishing-investigation-and-response\/","name":"Investigaci\u00f3n y respuesta automatizadas contra phishing","isPartOf":{"@id":"https:\/\/swimlane.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/es\/blog\/soar-automated-phishing-investigation-and-response\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/es\/blog\/soar-automated-phishing-investigation-and-response\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/PHISHINGII-2.png","datePublished":"2022-09-26T23:33:00+00:00","dateModified":"2025-06-03T19:39:21+00:00","description":"\u00bfEl 91% de los ataques exitosos comienza con phishing? Descubra c\u00f3mo las plataformas de automatizaci\u00f3n de seguridad low-code automatizan los procesos de investigaci\u00f3n y respuesta ante phishing.","breadcrumb":{"@id":"https:\/\/swimlane.com\/es\/blog\/soar-automated-phishing-investigation-and-response\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/es\/blog\/soar-automated-phishing-investigation-and-response\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/blog\/soar-automated-phishing-investigation-and-response\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/PHISHINGII-2.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/PHISHINGII-2.png","width":1120,"height":679,"caption":"Technical icon representing automated phishing triage and email security orchestration."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/es\/blog\/soar-automated-phishing-investigation-and-response\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Don\u2019t Take the Bait: Automated Phishing Investigation and Response"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/es\/#website","url":"https:\/\/swimlane.com\/es\/","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","description":"Automatizaci\u00f3n de la inteligencia artificial para todas las funciones de seguridad","publisher":{"@id":"https:\/\/swimlane.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/es\/#organization","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","url":"https:\/\/swimlane.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/9364","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/9364\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media\/9365"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media?parent=9364"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/tags?post=9364"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-type?post=9364"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-topic?post=9364"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-industry?post=9364"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/blog-category?post=9364"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}