{"id":9374,"date":"2022-09-02T05:32:00","date_gmt":"2022-09-02T11:32:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/incident-response-platform\/"},"modified":"2025-12-09T22:35:43","modified_gmt":"2025-12-10T05:35:43","slug":"plataforma-de-respuesta-a-incidentes","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/es\/blog\/incident-response-platform\/","title":{"rendered":"Gesti\u00f3n de alertas de seguridad con una plataforma de respuesta a incidentes"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/MSA_ResponsePlatform_Masthead.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Cybersecurity analyst visualizing threats using AI-driven security data and monitoring insights\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/MSA_ResponsePlatform_Masthead.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/MSA_ResponsePlatform_Masthead-300x182.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/MSA_ResponsePlatform_Masthead-1024x621.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/MSA_ResponsePlatform_Masthead-768x466.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2022-09-02T05:32:00-06:00\">Sep 2, 2022<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Managing Security Alerts with an Incident Response Platform<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/es\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">5 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-f08f74d0af2cf0ad40ac7f7e7ff47f7939ce6b43 bs-section---default bs-section--blog-inner-table-of-contents  \"><style>.bs-section.bs-section-f08f74d0af2cf0ad40ac7f7e7ff47f7939ce6b43{ background-color: #eef4fa;} <\/style><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-12   bs-column-5f6574ebb29ac8d58ab608d2aff5b1bbe4f96332 bs-column---default     \">\n<h2 class=\"wp-block-heading\">Table of Contents<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-6   bs-column-2119ec9d0f7bbcc95647d0ccaa955654ac2a575a bs-column---default     \">\n<ul class=\"wp-block-list\">\n<li><a href=\"#incident-response-platform\">WHAT IS AN INCIDENT RESPONSE PLATFORM?<\/a><\/li>\n\n\n\n<li><a href=\"#key-features\">KEY FEATURES OF AN INCIDENT RESPONSE PLATFORM<\/a><\/li>\n\n\n\n<li><a href=\"#soar\">WHAT IS SOAR?<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-6   bs-column-2119ec9d0f7bbcc95647d0ccaa955654ac2a575a bs-column---default     \">\n<ul class=\"wp-block-list\">\n<li><a href=\"#incident-response-plan\">HOW TO CREATE AN INCIDENT RESPONSE PLAN<\/a><\/li>\n\n\n\n<li><a href=\"#coordinating-response-plan\">HOW TO COORDINATE AN IR PLAN AND PLATFORM<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/es\/blog\/incident-response-platform\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/es\/blog\/incident-response-platform\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Managing%20Security%20Alerts%20with%20an%20Incident%20Response%20Platform').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fincident-response-platform%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Managing%20Security%20Alerts%20with%20an%20Incident%20Response%20Platform&url=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fincident-response-platform%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fincident-response-platform%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fincident-response-platform%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<h2 class=\"wp-block-heading\">Automate incident response to stop threats faster and save SOC analysts more time.<\/h2>\n\n\n\n<p>The hard truth is that your organization will get breached. You need to have processes, procedures, and solutions in place to reduce the negative impacts.&nbsp;<\/p>\n\n\n\n<p>In most organizations, security operations (SecOps) teams are overwhelmed with such alerts. In fact, the average organization receives more than 11,000 security alerts per day. Nearly half of security teams have seen a <a href=\"https:\/\/www.helpnetsecurity.com\/2022\/06\/27\/security-increase-alerts-per-day\/\" target=\"_blank\" rel=\"noreferrer noopener\">3x increase in the past year alone<\/a> \u2013 way more than any team can effectively manage. As a result, up to 70 percent of alerts are uninvestigated, but even a single ignored alert could lead to major consequences. This is where an incident response platform comes into play.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>To protect your organization and prevent data breaches, you need to create an incident response plan and choose a way to triage alerts faster.&nbsp;<\/p>\n<\/blockquote>\n\n\n\n<p>Incident response platforms exist to streamline alert triage and execute your IR plan. Having this type of solution allows your team to investigate every alert and ensure that you\u2019re protected from the most advanced threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"incident-response-platform\">What is an Incident Response Platform?<\/h2>\n\n\n\n<p><span id=\"key-features-of-an-incident-response-platform\">An incident response <\/span>platform is security software that automates and supports your incident response processes.&nbsp;<\/p>\n\n\n\n<p>Automating your response to security threats enables your security operations team to triage alarms more effectively, respond to critical events faster, and seamlessly integrate your existing security solutions into a more efficient and comprehensive incident response program.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"key-features\">Key Features of an Incident Response Platform<\/h2>\n\n\n\n<p>There are 4 key duties of an incident response software:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li> <strong style=\"font-size: revert;\">Security Automation <\/strong><span style=\"font-size: revert;\">\u2013 Automates the manual, repetitive processes of incident response for faster response and resolution. This allows analysts to focus on more sophisticated threats, reduced time spent on false positives and improves response times.<\/span> <\/li>\n\n\n\n<li> <strong style=\"font-size: revert;\"><span id=\"what-is-soar\">Security Orchestration<\/span> <\/strong><span style=\"font-size: revert;\">\u2013 Centralizes security operations data from multiple sources into a single interface to enable faster decision-making. Seamless integration and orchestration of your disparate security tools let SOC analysts gain visibility across the security ecosystem.&nbsp;<\/span> <\/li>\n\n\n\n<li> <strong style=\"font-size: revert;\">Case Management <\/strong><span style=\"font-size: revert;\">\u2013 collects real-time enriched data into a dashboard for easy alert management. This removes the need for analysts to dig for data, and improves processes to enforce standardization and compliance.<\/span> <\/li>\n\n\n\n<li><p dir=\"ltr\"><strong>Reporting<\/strong> \u2013&nbsp;Measuring performance across your tech stack is critical to improving incident response processes. Reporting capabilities give you an in-depth view of staff and tool efficiency, which helps establish ROI.&nbsp;<\/p> <\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"soar\">What is Security Orchestration, Automation and Response (SOAR)?<\/h2>\n\n\n\n<p><a href=\"https:\/\/swimlane.com\/solutions\/security-automation-and-orchestration\/security-automation\/\">Security automation<\/a> is the act of automating portions of your response plan to eliminate tedious and time-consuming manual tasks while allowing your SecOps team to focus on the alerts that really matter. <a href=\"https:\/\/swimlane.com\/solutions\/security-automation-and-orchestration\/security-orchestration\">Security orchestration<\/a> is the coordination and integration of all of your existing security solutions and systems. An incident response platform that utilizes <a href=\"https:\/\/swimlane.com\/blog\/what-is-soar\/\">SOAR<\/a> significantly improves incident response by:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li> <span style=\"font-size: revert;\">Increasing efficiency<\/span> <\/li>\n\n\n\n<li> <span style=\"font-size: revert;\">Gathering comprehensive data for improved threat intelligence<\/span> <\/li>\n\n\n\n<li> <span style=\"font-size: revert;\">Centralizing security operations<\/span> <\/li>\n\n\n\n<li> <span style=\"font-size: revert;\">Automating time-consuming tasks<\/span> <\/li>\n\n\n\n<li> <span style=\"font-size: revert;\">Standardizing and scaling processes<\/span> <\/li>\n\n\n\n<li> <span style=\"font-size: revert;\">Improving mean time to resolution (MTTR)<\/span> <\/li>\n<\/ul>\n\n\n\n<p>An incident response platform backed by security automation and SOAR technology can significantly improve alert management.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"incident-response-plan\">How to Create an Incident Response Plan<\/h2>\n\n\n\n<p>Now that you\u2019ve identified how an incident response platform can help, it\u2019s essential to have a thorough incident response plan in place. With an ever-increasing number of threats, it\u2019s better to be safe than sorry when responding to cyberattacks.&nbsp;<\/p>\n\n\n\n<p>Organizations need to establish an incident response plan and then utilize an incident response platform that can execute portions of the plan automatically to increase efficiency.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Essential Elements in an Incident Response Plan<\/h3>\n\n\n\n<p>The <a href=\"http:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-61r2.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">National Institute of Standards and Technology (NIST)<\/a> provides a useful framework to help enterprises establish their own incident response plans.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/assets\/uploads\/images\/NIST-incident-response-framework.png\" alt=\"\"\/><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li> <strong style=\"font-size: revert;\">Coordination:<\/strong><span style=\"font-size: revert;\"> Regardless of the size of an organization, a successful incident response plan requires the coordination of people, processes, and technology.<\/span> <\/li>\n\n\n\n<li> <strong style=\"font-size: revert;\">Preparation:<\/strong><span style=\"font-size: revert;\"> Focus your plan on prevention tactics like anticipating threats and quickly mitigating them with effective countermeasures.<\/span> <\/li>\n\n\n\n<li> <strong style=\"font-size: revert;\">Detection and analysis: <\/strong><span style=\"font-size: revert;\">Unfortunately, in this complicated and evolving threat environment, breaches are pretty much guaranteed \u2013 no matter how prepared you are. You need technology in place to help you quickly detect incidents, evaluate the seriousness of them, begin incident documentation, and automatically notify the employees responsible for handling alerts.<\/span> <\/li>\n\n\n\n<li> <strong style=\"font-size: revert;\">Containment, eradication, and recovery<\/strong><span style=\"font-size: revert;\">: If you are impacted by a breach, you need to establish a protocol to contain the incident, remove it, recover impacted systems, and collect all relevant attack data.<\/span> <\/li>\n\n\n\n<li><p dir=\"ltr\"><strong><span id=\"how-to-coordinate-an-ir-plan\">Post-incident activity:<\/span><\/strong> Analyzing attack data can help organizations understand where their current security strategy is lacking and what they need to improve. Depending on the severity of the attack, post-incident activity may include cooperating with auditors, attorneys, security vendors, government officials, insurance agencies, and other stakeholders.<\/p> <\/li>\n<\/ul>\n\n\n\n<p>In addition, consider creating an <a href=\"https:\/\/swimlane.com\/blog\/incident-response-playbook\/\">incident response playbook<\/a> to better define your plan. But now that you\u2019ve established a solid incident response plan for your SOC, let\u2019s dive into how to coordinate your incident response plan and platform.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"coordinating-response-plan\">Coordinating your Incident Response Plan and Platform<\/h2>\n\n\n\n<p>Low-code security automation platforms, like Swimlane Turbine, offer automated incident response capabilities that utilize SOAR to improve SecOps and better protect your organization. Considering the recommended NIST framework, Swimlane Turbine\u2019s incident response platform can help by:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li> <strong style=\"font-size: revert;\">Coordinating people, processes, and technology<\/strong><span style=\"font-size: revert;\">: Low-code security automation allows you to integrate and orchestrate all the people and security tools you are using in your incident response processes.<\/span> <\/li>\n\n\n\n<li> <strong style=\"font-size: revert;\">Preventing incidents through adequate preparation<\/strong><span style=\"font-size: revert;\">: Security automation makes it easy to transfer all of your plans into actionable automated workflows. This streamlines alert investigation, requiring manual intervention when deemed necessary.<\/span> <\/li>\n\n\n\n<li> <strong style=\"font-size: revert;\">Streamlining detection and analysis:<\/strong><span style=\"font-size: revert;\"> SOAR solutions quickly gather all contextual data from security platforms, analyze it, and generate a course of action. What\u2019s more, they can automatically execute certain preventative actions to speed up analysis and mimic the practices of your security team.<\/span> <\/li>\n\n\n\n<li> <strong style=\"font-size: revert;\">Speeding up containment, eradication, and recovery<\/strong><span style=\"font-size: revert;\">: Speed and productivity are key when it comes to containing, eradicating, and recovering IT systems. SOAR helps increase efficiency by saving hours during incident response and threat detection by providing your SecOps team with all critical data in a centralized interface.<\/span> <\/li>\n\n\n\n<li><p dir=\"ltr\"><strong>Supporting strategic post-incident discussions:<\/strong> If a breach has occurred within your organization, it is crucial that you discuss what security steps need to be taken to prevent a similar incident in the future. SOAR solutions gather all the contextual data and create automated cybersecurity incident reports.<\/p> <\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Advanced Incident Response<\/h3>\n\n\n\n<p>Swimlane Turbine provides you with a robust incident response platform backed by low-code SOAR technology that is easy to use, manage, and scale. There is no need to replace the existing security solutions you have already invested in. Turbine\u2019s API allows you to integrate solutions and leverage their capabilities. You never have to worry again that a missed alert will cause a breach within your organization. Instead, you can <a href=\"https:\/\/swimlane.com\/blog\/automated-incident-response-respond-every-alert\/\">respond to every alert<\/a> and ensure that your enterprise is protected from internal and external threats.<\/p>\n\n\n\n<div class=\"bs-div bs-div-c4f6354ec34988a6986b4521ee59026f2a4af75c bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-c4f6354ec34988a6986b4521ee59026f2a4af75c {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/ROInaked.png' class='img-fluid'   alt='Data visualization representing quantifiable Security ROI and the financial impact of automated security operations.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-2aebcd1b2c11849d7c87d8462be32842b8c42b50 bs-div---default\"><div class=\"bs-div__inner     \">\n<h3 class=\"wp-block-heading\" id=\"h-swimlane-roi-calculator\">Swimlane ROI calculator<\/h3>\n\n\n\n<p>Estimate the savings you can achieve with Swimlane Turbine.<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-677831da551cab8aca460921b48ab73a9c25b3f0\"><style>.bs-pro-button-p-btn-677831da551cab8aca460921b48ab73a9c25b3f0 .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/roi-calculator\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Calculate Savings<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/es\/tag\/incident-response\/'><span class='tag-content'>Incident Response<\/span><\/a><a href='https:\/\/swimlane.com\/es\/tag\/soar\/'><span class='tag-content'>SOAR<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d10368d0c27 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk-part-3\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>May 12, 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Why managing information security as a business risk is critical, part 3: Intellectual property<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d10368d2327 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk-part-2\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Abr 26, 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Why managing information security as a business risk is critical, part 2: Reputational harm<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d10368d3530 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/managing-security-as-a-business-risk\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Abr 9, 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Why managing information security as a business risk is critical, part 1: Financial impact<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-5f1a05c47bd78d88ac3be0e745c2c126161649fe bs-div---default bs-div--table-of-contents-right\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\">Table of Contents<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"#incident-response-platform\">WHAT IS AN INCIDENT RESPONSE PLATFORM?<\/a><\/li>\n\n\n\n<li><a href=\"#key-features\">KEY FEATURES OF AN INCIDENT RESPONSE PLATFORM<\/a><\/li>\n\n\n\n<li><a href=\"#soar\">WHAT IS SOAR?<\/a><\/li>\n\n\n\n<li><a href=\"#incident-response-plan\">HOW TO CREATE AN INCIDENT RESPONSE PLAN<\/a><\/li>\n\n\n\n<li><a href=\"#coordinating-response-plan\">HOW TO COORDINATE AN IR PLAN AND PLATFORM<\/a><\/li>\n<\/ul>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>Automatice la respuesta a incidentes para detener las amenazas m\u00e1s r\u00e1pido y ahorrarles m\u00e1s tiempo a los analistas del SOC.<\/p>","protected":false},"author":5,"featured_media":9375,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[89,225],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[70],"class_list":["post-9374","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-soar","tag-incident-response","resource-type-blogs","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Manage Security Alerts with an Incident Response Platform<\/title>\n<meta name=\"description\" content=\"Learn how to improve security operations within your organization and respond to more threats with an incident response platform.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/es\/blog\/plataforma-de-respuesta-a-incidentes\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Managing Security Alerts with an Incident Response Platform\" \/>\n<meta property=\"og:description\" content=\"Learn how to improve security operations within your organization and respond to more threats with an incident response platform.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/es\/blog\/plataforma-de-respuesta-a-incidentes\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-10T05:35:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/MSA_ResponsePlatform_Masthead.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"679\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/es\/blog\/incident-response-platform\/\",\"url\":\"https:\/\/swimlane.com\/es\/blog\/incident-response-platform\/\",\"name\":\"How to Manage Security Alerts with an Incident Response Platform\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/es\/blog\/incident-response-platform\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/es\/blog\/incident-response-platform\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/MSA_ResponsePlatform_Masthead.png\",\"datePublished\":\"2022-09-02T11:32:00+00:00\",\"dateModified\":\"2025-12-10T05:35:43+00:00\",\"description\":\"Learn how to improve security operations within your organization and respond to more threats with an incident response platform.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/es\/blog\/incident-response-platform\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/es\/blog\/incident-response-platform\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/swimlane.com\/es\/blog\/incident-response-platform\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/MSA_ResponsePlatform_Masthead.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/MSA_ResponsePlatform_Masthead.png\",\"width\":1120,\"height\":679,\"caption\":\"Cybersecurity analyst visualizing threats using AI-driven security data and monitoring insights\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/es\/blog\/incident-response-platform\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Managing Security Alerts with an Incident Response Platform\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/es\/#website\",\"url\":\"https:\/\/swimlane.com\/es\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/es\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"C\u00f3mo gestionar alertas de seguridad con una plataforma de respuesta a incidentes","description":"Aprenda c\u00f3mo mejorar las operaciones de seguridad dentro de su organizaci\u00f3n y responder a m\u00e1s amenazas con una plataforma de respuesta a incidentes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/es\/blog\/plataforma-de-respuesta-a-incidentes\/","og_locale":"es_ES","og_type":"article","og_title":"Managing Security Alerts with an Incident Response Platform","og_description":"Learn how to improve security operations within your organization and respond to more threats with an incident response platform.","og_url":"https:\/\/swimlane.com\/es\/blog\/plataforma-de-respuesta-a-incidentes\/","og_site_name":"AI Security Automation","article_modified_time":"2025-12-10T05:35:43+00:00","og_image":[{"width":1120,"height":679,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/MSA_ResponsePlatform_Masthead.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Tiempo de lectura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/es\/blog\/incident-response-platform\/","url":"https:\/\/swimlane.com\/es\/blog\/incident-response-platform\/","name":"C\u00f3mo gestionar alertas de seguridad con una plataforma de respuesta a incidentes","isPartOf":{"@id":"https:\/\/swimlane.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/es\/blog\/incident-response-platform\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/es\/blog\/incident-response-platform\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/MSA_ResponsePlatform_Masthead.png","datePublished":"2022-09-02T11:32:00+00:00","dateModified":"2025-12-10T05:35:43+00:00","description":"Aprenda c\u00f3mo mejorar las operaciones de seguridad dentro de su organizaci\u00f3n y responder a m\u00e1s amenazas con una plataforma de respuesta a incidentes.","breadcrumb":{"@id":"https:\/\/swimlane.com\/es\/blog\/incident-response-platform\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/es\/blog\/incident-response-platform\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/blog\/incident-response-platform\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/MSA_ResponsePlatform_Masthead.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/MSA_ResponsePlatform_Masthead.png","width":1120,"height":679,"caption":"Cybersecurity analyst visualizing threats using AI-driven security data and monitoring insights"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/es\/blog\/incident-response-platform\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Managing Security Alerts with an Incident Response Platform"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/es\/#website","url":"https:\/\/swimlane.com\/es\/","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","description":"Automatizaci\u00f3n de la inteligencia artificial para todas las funciones de seguridad","publisher":{"@id":"https:\/\/swimlane.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/es\/#organization","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","url":"https:\/\/swimlane.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/9374","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/9374\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media\/9375"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media?parent=9374"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/tags?post=9374"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-type?post=9374"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-topic?post=9374"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-industry?post=9374"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/blog-category?post=9374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}