{"id":9604,"date":"2020-09-08T21:25:00","date_gmt":"2020-09-09T03:25:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/arming-your-soc-with-soar\/"},"modified":"2024-07-01T10:44:10","modified_gmt":"2024-07-01T16:44:10","slug":"armando-tu-soc-con-soar","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/es\/blog\/arming-your-soc-with-soar\/","title":{"rendered":"Equipando su Centro de Operaciones de Seguridad con SOAR"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Arming-your-SOC-with-SOAR.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Shadowed developers hunched over glowing monitors in a dim office, lines of code flickering in the dark like an unseen digital threat taking shape.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/Arming-your-SOC-with-SOAR.png 800w, https:\/\/swimlane.com\/wp-content\/uploads\/Arming-your-SOC-with-SOAR-300x200.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/Arming-your-SOC-with-SOAR-768x512.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2020-09-08T21:25:00-06:00\">Sep 8, 2020<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Arming your Security Operations Center with SOAR<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/es\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">3 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/es\/blog\/arming-your-soc-with-soar\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/es\/blog\/arming-your-soc-with-soar\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Arming%20your%20Security%20Operations%20Center%20with%20SOAR').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Farming-your-soc-with-soar%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Arming%20your%20Security%20Operations%20Center%20with%20SOAR&url=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Farming-your-soc-with-soar%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Farming-your-soc-with-soar%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Farming-your-soc-with-soar%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<h2>\u00a0<\/h2>\n<p>Covid-19 has only exacerbated an already challenging threat landscape for today&#8217;s security operations center (SOC), and bad actors are capitalizing on the chaos. Some related vulnerabilities include increased phishing attacks, questionable domain registration and the need for more VPN monitoring.<\/p>\n<p>A security orchestration, automation and response (SOAR) solution optimizes a SOC\u2019s capabilities by automating time-consuming incident response tasks while orchestrating the organization&#8217;s people, processes and technology. Three use for SOAR that have become increasingly important during this unprecedented time include phishing, domain monitoring and VPN monitoring. In the post that follows, we will explore each of these use cases in a bit more depth, and take a look at the <a href=\"https:\/\/swimlane.com\/resources\/arming-your-soc\/\">infographic<\/a> at the end!<\/p>\n<h3>Phishing<\/h3>\n<p>According to a <a href=\"https:\/\/www.ciodive.com\/news\/phishing-email-malware-coronavirus\/574888\/\" target=\"_blank\" rel=\"noopener\">recent report on CIO Dive<\/a>, between February and March 2020, there was a 667% increase in virus-themed phishing attacks. And a <a href=\"https:\/\/www.forbes.com\/sites\/jessedamiani\/2020\/03\/26\/google-data-reveals-350-surge-in-phishing-websites-during-coronavirus-pandemic\/#16bffd8919d5\" target=\"_blank\" rel=\"noopener\">recent report from Forbes<\/a> saw a surge of 350% in associated phishing websites.<\/p>\n<p>When automating phishing triage, organizations often follow a documented process like this:<\/p>\n<ol>\n<li>A SOAR solution is set up to monitor an organization\u2019s mailbox where users send suspected spam and phishing emails.<\/li>\n<li>When an email arrives, it is automatically parsed.<\/li>\n<li>Details like the header, subject, body and email addresses are placed into data fields in a case record.<\/li>\n<li>Other potential indicators like the IP address, URL and domain names are also parsed out of the email and added to the appropriate record fields.<\/li>\n<li>Using integrations with other tools engaged by the SOAR platform enriches the data and helps determine how the case should be handled.<\/li>\n<\/ol>\n<p>In a <a href=\"https:\/\/swimlane.com\/resources\/automating-phishing-alert-triage-demo\/\">phishing use case<\/a> where the email is determined to be malicious, an appropriate action might be applying a quarantine tag or isolating a host system using an endpoint detection and response tool or an endpoint policy management tool. The SOAR solution can immediately notify the SOC and the user who submitted the email using messaging tools like Slack, SMS or email. Users can be updated with the status of the automated workflow and thanked for the submission and their help in catching potential threats. Malicious emails could also be removed from all user mailboxes to head off any additional risk. Benign emails could trigger notifications to users to thank them for submitting the email and provide the result. Many other possible steps could also exist.<\/p>\n<h3>Domain Monitoring<\/h3>\n<p><a href=\"https:\/\/swimlane.com\/solutions\/use-cases\/domain-squatting\/\">Domain monitoring<\/a> can be used for detecting and blocking other domains that are related to a current urgent situation. As an example, names like \u201cCOVID\u201d or \u201cvaccine\u201d or any names that an organization wanted to evaluate.<\/p>\n<p>A <a href=\"https:\/\/www.cbronline.com\/news\/coronavirus-related-domains\" target=\"_blank\" rel=\"noopener\">recent report from Computer Business Review<\/a> showed out of 6,000 domains registered in a single week, more than one third were considered suspicious, and 93 of the domains already considered suspicious were confirmed to be malicious at the time of the report. It is important to remember that attackers don\u2019t always activate a domain or make it weaponized immediately. A domain may lay dormant for a period of time and then become malicious. Ultimately, quite a few more than 93 may have been used maliciously.<\/p>\n<p>Using SOAR, a SOC team can define a set of monitored domains to watch for potential squatting domains. On a customizable interval\u2014typically once per day\u2014the SOAR solution downloads the newly registered domains and compares them to the list of monitored domains for pattern similarities.<\/p>\n<p>SOC teams can review records and make determinations about whether or not they are true squatting attempts. For any domain that does not resolve, the record stays in the queue and the SOAR platform continues attempting to connect on a regular basis. If and when the site becomes active, it will be snapshotted and placed in the analyst queue. When analysts review each record, they can mark the domain as malicious, benign or unknown.<\/p>\n<h3>VPN Monitoring<\/h3>\n<p>From various IoT devices to employees with lacking cybersecurity awareness, SOC teams have had a lot of vulnerabilities to keep track of since most employees moved to remote environments. Additionally, organizations are attempting to provide secure remote access to office resources via VPNs.<\/p>\n<p><a href=\"https:\/\/swimlane.com\/resources\/vpn-status-monitoring\/\">VPN monitoring<\/a> with SOAR enables staff to ascertain VPN status quickly, identify outages that are occurring and perform basic troubleshooting, such as restarting services. In many instances, the SOAR platform will either be able to restore service automatically or enable users to identify VPN issues, attempt initial triage and escalate any remaining issues.<\/p>\n<p>The benefits of SOAR extend beyond these three use cases. SOAR allows the SOC to make effective use of existing resources. Personnel are not tied to manual, repetitive, time-consuming tasks with orchestration, automation and response occurring at machine speeds. Plus, a true SOAR solution integrates with existing tools to form a single cohesive armament for an optimized SOC.<\/p>\n\n\n\n<div class=\"bs-div bs-div-04948e27873290ae1fdf63e32885bbbe853bc5b6 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-04948e27873290ae1fdf63e32885bbbe853bc5b6 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/SEO-Arming-Your-SOC-Infographic-Social-LinkedIn-1200x628-1.jpg' class='img-fluid'   alt='Swimlane infographic titled \u201cArming Your SOC with Security Orchestration, Automation and Response (SOAR)\u201d showing a shadowed human silhouette formed from puzzle fragments, warning of attackers exploiting human vulnerability and a 350% surge in phishing websites reported by Google.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-2aebcd1b2c11849d7c87d8462be32842b8c42b50 bs-div---default\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-arming-your-soc-with-security-orchestration-automation-and-response\">Arming your SOC with Security Orchestration, Automation and Response<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color\">Attackers are taking advantage of the current situation and capitalizing on organizations\u2019 existing and new vulnerabilities. It is vital for security operations teams to optimize resources they already have. This is where a security orchestration, automation and response (SOAR) solution can help. Download this infographic to learn how!<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-521f677fa37a63bb5ffa777db32d4d3b83a4887d\"><style>.bs-pro-button-p-btn-521f677fa37a63bb5ffa777db32d4d3b83a4887d .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/resources\/arming-your-soc\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Download Now<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/es\/tag\/soar\/'><span class='tag-content'>SOAR<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d0d2cd7c5d7 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/soc-ecosystem-partnerships\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Feb 7, 2019<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Partnerships aid your security operations center ecosystem<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d0d2cd7d939 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/what-is-a-security-operations-center-soc\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Dic 14, 2022<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>What is a Security Operations Center (SOC)? SOC Guide<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d0d2cd7e9c3 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/building-modern-soc-2\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Mar 19, 2024<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>How to Build a Modern Security Operations Center (SOC)<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":9605,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[89],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[69,70],"class_list":["post-9604","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-soar","resource-type-blogs","blog-category-use-cases","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Arming your Security Operations Center (SOC) with SOAR<\/title>\n<meta name=\"description\" content=\"A SOAR solution optimizes a SOC\u2019s capabilities by automating time-consuming IR tasks while orchestrating the organization&#039;s people &amp; process.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/es\/blog\/armando-tu-soc-con-soar\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Arming your Security Operations Center with SOAR\" \/>\n<meta property=\"og:description\" content=\"A SOAR solution optimizes a SOC\u2019s capabilities by automating time-consuming IR tasks while orchestrating the organization&#039;s people &amp; process.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/es\/blog\/armando-tu-soc-con-soar\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-01T16:44:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/Arming-your-SOC-with-SOAR.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/es\/blog\/arming-your-soc-with-soar\/\",\"url\":\"https:\/\/swimlane.com\/es\/blog\/arming-your-soc-with-soar\/\",\"name\":\"Arming your Security Operations Center (SOC) with SOAR\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/es\/blog\/arming-your-soc-with-soar\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/es\/blog\/arming-your-soc-with-soar\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Arming-your-SOC-with-SOAR.png\",\"datePublished\":\"2020-09-09T03:25:00+00:00\",\"dateModified\":\"2024-07-01T16:44:10+00:00\",\"description\":\"A SOAR solution optimizes a SOC\u2019s capabilities by automating time-consuming IR tasks while orchestrating the organization's people & process.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/es\/blog\/arming-your-soc-with-soar\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/es\/blog\/arming-your-soc-with-soar\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/swimlane.com\/es\/blog\/arming-your-soc-with-soar\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Arming-your-SOC-with-SOAR.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Arming-your-SOC-with-SOAR.png\",\"width\":800,\"height\":533,\"caption\":\"Shadowed developers hunched over glowing monitors in a dim office, lines of code flickering in the dark like an unseen digital threat taking shape.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/es\/blog\/arming-your-soc-with-soar\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Arming your Security Operations Center with SOAR\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/es\/#website\",\"url\":\"https:\/\/swimlane.com\/es\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/es\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Equipando su Centro de Operaciones de Seguridad (SOC) con SOAR","description":"Una soluci\u00f3n SOAR optimiza las capacidades de un SOC al automatizar tareas de IR que consumen mucho tiempo y, al mismo tiempo, orquesta las personas y los procesos de la organizaci\u00f3n.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/es\/blog\/armando-tu-soc-con-soar\/","og_locale":"es_ES","og_type":"article","og_title":"Arming your Security Operations Center with SOAR","og_description":"A SOAR solution optimizes a SOC\u2019s capabilities by automating time-consuming IR tasks while orchestrating the organization's people & process.","og_url":"https:\/\/swimlane.com\/es\/blog\/armando-tu-soc-con-soar\/","og_site_name":"AI Security Automation","article_modified_time":"2024-07-01T16:44:10+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/Arming-your-SOC-with-SOAR.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/es\/blog\/arming-your-soc-with-soar\/","url":"https:\/\/swimlane.com\/es\/blog\/arming-your-soc-with-soar\/","name":"Equipando su Centro de Operaciones de Seguridad (SOC) con SOAR","isPartOf":{"@id":"https:\/\/swimlane.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/es\/blog\/arming-your-soc-with-soar\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/es\/blog\/arming-your-soc-with-soar\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Arming-your-SOC-with-SOAR.png","datePublished":"2020-09-09T03:25:00+00:00","dateModified":"2024-07-01T16:44:10+00:00","description":"Una soluci\u00f3n SOAR optimiza las capacidades de un SOC al automatizar tareas de IR que consumen mucho tiempo y, al mismo tiempo, orquesta las personas y los procesos de la organizaci\u00f3n.","breadcrumb":{"@id":"https:\/\/swimlane.com\/es\/blog\/arming-your-soc-with-soar\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/es\/blog\/arming-your-soc-with-soar\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/blog\/arming-your-soc-with-soar\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/Arming-your-SOC-with-SOAR.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Arming-your-SOC-with-SOAR.png","width":800,"height":533,"caption":"Shadowed developers hunched over glowing monitors in a dim office, lines of code flickering in the dark like an unseen digital threat taking shape."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/es\/blog\/arming-your-soc-with-soar\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Arming your Security Operations Center with SOAR"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/es\/#website","url":"https:\/\/swimlane.com\/es\/","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","description":"Automatizaci\u00f3n de la inteligencia artificial para todas las funciones de seguridad","publisher":{"@id":"https:\/\/swimlane.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/es\/#organization","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","url":"https:\/\/swimlane.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/9604","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/9604\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media\/9605"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media?parent=9604"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/tags?post=9604"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-type?post=9604"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-topic?post=9604"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-industry?post=9604"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/blog-category?post=9604"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}