{"id":9843,"date":"2017-09-27T07:38:00","date_gmt":"2017-09-27T13:38:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/threat-intelligence-platform\/"},"modified":"2024-06-27T16:40:30","modified_gmt":"2024-06-27T22:40:30","slug":"plataforma-de-inteligencia-de-amenazas","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/es\/blog\/threat-intelligence-platform\/","title":{"rendered":"Utilizando una plataforma de inteligencia de amenazas para una ciberseguridad m\u00e1s s\u00f3lida"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/09.27.17-Threat-Intelligence.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Cyber threat intelligence concept image with digital network connections and security data visualization.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/09.27.17-Threat-Intelligence.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/09.27.17-Threat-Intelligence-300x186.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/09.27.17-Threat-Intelligence-1024x636.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/09.27.17-Threat-Intelligence-768x477.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2017-09-27T07:38:00-06:00\">Sep 27, 2017<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Using a threat intelligence platform for stronger cybersecurity<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/es\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">4 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/es\/blog\/threat-intelligence-platform\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/es\/blog\/threat-intelligence-platform\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Using%20a%20threat%20intelligence%20platform%20for%20stronger%20cybersecurity').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fthreat-intelligence-platform%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Using%20a%20threat%20intelligence%20platform%20for%20stronger%20cybersecurity&url=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fthreat-intelligence-platform%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fthreat-intelligence-platform%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fthreat-intelligence-platform%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<h2>\u00a0<\/h2>\n<p>Large-scale data breaches and cybercrime continue to rise in the U.S. and across the globe. <a href=\"http:\/\/www.idtheftcenter.org\/2016databreaches.html\" target=\"_blank\" rel=\"noreferrer noopener\">The Identity Resource Center<\/a> reported that U.S. data breaches reached an all-time high in 2016, with 1,930 breaches. That\u2019s a 40 percent increase from 2015. More effective security operations, including the use of threat intelligence platforms, help combat this growing volume.<\/p>\n<blockquote>\n<p>There was a 40 percent increase in data breaches between 2015 and 2016.<\/p>\n<\/blockquote>\n<p>To identify and resolve data breaches and hacks faster, companies are spending more on security operations. According to <a href=\"http:\/\/www.gartner.com\/newsroom\/id\/3638017\" target=\"_blank\" rel=\"noreferrer noopener\">Gartner<\/a>, global spending on information security is expected to reach $90 billion in 2017, which is an increase of 7.6 percent over 2016. Even as more companies increase their investments in cybersecurity, many are still losing ground as cyberattacks become more sophisticated and voluminous. An <a href=\"https:\/\/www.helpnetsecurity.com\/2017\/07\/13\/security-analytics-oprations-difficult\/\" target=\"_blank\" rel=\"noreferrer noopener\">Enterprise Strategy Group<\/a> survey revealed that most respondents felt security operations and analytics are harder to manage than in the past due to the increasing volume of security issues.<\/p>\n<h3>Businesses needed a better security solution<\/h3>\n<p>Companies looking for new ways to improve incident response capabilities and risk management are considering threat intelligence as part of their integrated security operations strategy. Threat intelligence collects and analyzes internal and external data from multiple sources, turning it into actionable data. Gartner defines threat intelligence as \u201cevidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject&#8217;s response to that menace or hazard.\u201d<\/p>\n<p>Extending the capabilities from tracking suspicious events to anticipating risks, threat intelligence can potentially improve situational awareness to help businesses defend themselves against current and potentially new cyber attacks.<\/p>\n<blockquote>\n<p>However, even with greater intelligence, <a href=\"https:\/\/swimlane.com\/blog\/using-situational-awareness-improve-threat-response\/\">significant lags between discovery and remediation leave most organizations ill-equipped<\/a> to address increased threats.<\/p>\n<\/blockquote>\n<p>Massive amounts of data from different sources, manual methods, lack of IT resources (both staff and technology), and the wrong tools can delay and even halt the productive use of threat intelligence in making quick decisions that protect businesses from cyber attacks. To successfully utilize threat intelligence, companies need a security infrastructure that:<\/p>\n<ul>\n<li>Consolidates information in one platform<\/li>\n<li>Standardizes processes, so everyone is on the same page<\/li>\n<li>Automates operations and eliminates redundant manual work<\/li>\n<li>Supports collaboration, so cybersecurity and IT team members work together more effectively<\/li>\n<li>Incorporates user-friendly dashboards for easy data manipulation and reporting<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-medium wp-image-1881\" src=\"https:\/\/swimlane.com\/assets\/uploads\/images\/wp\/2017\/09\/threat-intelligence-platform-alerts-300x300.png\" alt=\"alerts\" width=\"300\" height=\"300\" \/><\/p>\n<h3>Enhancing SIEM<\/h3>\n<p>A threat intelligence platform that works in conjunction with a security information and event management (SIEM) system can provide a more complete solution to corporate security. While SIEMs do a good job collecting and analyzing security events to identify malicious activity, they are unable to detect future adverse behavior from different sources based on past activity. As companies shift more attention to detection and response, a SIEM falls short in supporting evolving needs.<\/p>\n<p>We all know that SIEMs are powerful but we also know that they simply generate too many false positives, causing security teams to be overwhelmed. Companies today receive as many as <a href=\"https:\/\/swimlane.com\/blog\/too-many-siem-alerts-use-sao\/\">150,000 alerts daily<\/a>, most originating from their SIEM. As a result, identifying a legitimate alert becomes cumbersome.<\/p>\n<blockquote>\n<p>Companies receive as many as 150,000 security alerts per day, most of which are coming from their SIEM system.<\/p>\n<\/blockquote>\n<p>A threat intelligence platform can take SIEMs to the next level by adding capabilities to collect security data from multiple formats that originate from disparate sources, correlating that data and then feeding relevant information back into the SIEM for faster remediation of threats.<\/p>\n<p>The faster a threat is identified, the faster it is resolved, saving a company time and money. In addition, a threat intelligence platform provides awareness into potential risks so companies can prepare for future attacks.<\/p>\n<p>An article on DarkReading reports that <a href=\"https:\/\/www.gartner.com\/doc\/2487216\/definition-threat-intelligence\" target=\"_blank\" rel=\"noreferrer noopener\">threat intelligence platforms also have the potential to become more strategic<\/a> by ranking threats by severity, data source and\/or the relevance of the threat to the organization. In the future, they may support the exchange of risk data among enterprises.<\/p>\n<p>But even after acknowledging the potential value of threat intelligence platforms, companies must decide what tools to use in their existing security infrastructures.<\/p>\n<h3>Threat intelligence + SAO = faster response to risks<\/h3>\n<p>Swimlane offers a <a href=\"https:\/\/swimlane.com\/security-automation-and-orchestration\/\">security automation and orchestration (SAO)<\/a> platform that leverages threat intelligence to support faster and more intelligent <a href=\"https:\/\/swimlane.com\/incident-response-automation\/\">incident response<\/a>. Identifying legitimate threats early in the kill chain is crucial to an active defense strategy.<\/p>\n<p>Swimlane\u2019s <a href=\"https:\/\/swimlane.com\/security-orchestration-platform\/\">security orchestration<\/a> and automation platform integrates threat intelligence as part of the incident and remediation process, consolidating all security events, incidents, alerts and other tasks into a single location for a more cohesive view of current and potential threats. In addition to automating routine security tasks, Swimlane provides centralized access to cases, reports, dashboards and metrics for authorized users.<\/p>\n<p>Using customized dashboards, security analysts can review data directly in Swimlane without the need to cut and paste data into other programs. At the same time, threat intelligence tables can be manipulated to look for new threats or find new associations that can help to develop preventative or responsive action.<\/p>\n<blockquote>\n<p>Automated workflows and the provision of context for every alert increases SecOps throughput by up to 5X.<\/p>\n<\/blockquote>\n<p>Using threat intelligence with Swimlane\u2019s SAO platform, companies can:<\/p>\n<ul>\n<li>Prioritize alerts<\/li>\n<li>Increase situational awareness<\/li>\n<li>Customize dashboards<\/li>\n<li>Optimize attack chain response<\/li>\n<li>Automate processes and workflows<\/li>\n<li>Increase efficiency and standardize processes<\/li>\n<li>Gain a broader understanding of threat intelligence<\/li>\n<li>Improve operational performance<\/li>\n<\/ul>\n<p><a href=\"https:\/\/swimlane.com\/contact\/\">Contact us<\/a> today to discuss how we can take your security infrastructure to the next level with a security automation and <a href=\"https:\/\/swimlane.com\/security-orchestration-platform\/\">orchestration platform<\/a> that integrates threat intelligence, or for more information on how your organization can use security automation and orchestration <a href=\"https:\/\/swimlane.com\/automating-incident-response-ebook\/\">download our Automating Incident Response e-book<\/a>.<\/p>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e75eb0d04d7 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/cloud-security-essential-using-mitre-attck-defend\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Ago 22, 2023<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>5 Essential Steps For Stronger Cloud Security Using MITRE ATT&#038;CK And D3FEND<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e75eb0d1c0b bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/cyber-threat-intelligence\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Dic 15, 2022<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Automating Threat Intelligence Enrichment<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e75eb0d2c90 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/threat-intelligence-tools\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Sep 13, 2017<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Threat intelligence tools: Identify, prioritize and act<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":9844,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[],"class_list":["post-9843","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Using a threat intelligence platform for stronger cybersecurity<\/title>\n<meta name=\"description\" content=\"Having a robust threat intelligence platform is the key to improving your security operations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/es\/blog\/plataforma-de-inteligencia-de-amenazas\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Using a threat intelligence platform for stronger cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Having a robust threat intelligence platform is the key to improving your security operations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/es\/blog\/plataforma-de-inteligencia-de-amenazas\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-27T22:40:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/09.27.17-Threat-Intelligence-1024x636.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"636\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/es\/blog\/threat-intelligence-platform\/\",\"url\":\"https:\/\/swimlane.com\/es\/blog\/threat-intelligence-platform\/\",\"name\":\"Using a threat intelligence platform for stronger cybersecurity\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/es\/blog\/threat-intelligence-platform\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/es\/blog\/threat-intelligence-platform\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/09.27.17-Threat-Intelligence.png\",\"datePublished\":\"2017-09-27T13:38:00+00:00\",\"dateModified\":\"2024-06-27T22:40:30+00:00\",\"description\":\"Having a robust threat intelligence platform is the key to improving your security operations.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/es\/blog\/threat-intelligence-platform\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/es\/blog\/threat-intelligence-platform\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/swimlane.com\/es\/blog\/threat-intelligence-platform\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/09.27.17-Threat-Intelligence.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/09.27.17-Threat-Intelligence.png\",\"width\":1120,\"height\":696,\"caption\":\"Cyber threat intelligence concept image with digital network connections and security data visualization.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/es\/blog\/threat-intelligence-platform\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Using a threat intelligence platform for stronger cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/es\/#website\",\"url\":\"https:\/\/swimlane.com\/es\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/es\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Utilizando una plataforma de inteligencia de amenazas para una ciberseguridad m\u00e1s s\u00f3lida","description":"Tener una plataforma de inteligencia de amenazas s\u00f3lida es la clave para mejorar sus operaciones de seguridad.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/es\/blog\/plataforma-de-inteligencia-de-amenazas\/","og_locale":"es_ES","og_type":"article","og_title":"Using a threat intelligence platform for stronger cybersecurity","og_description":"Having a robust threat intelligence platform is the key to improving your security operations.","og_url":"https:\/\/swimlane.com\/es\/blog\/plataforma-de-inteligencia-de-amenazas\/","og_site_name":"AI Security Automation","article_modified_time":"2024-06-27T22:40:30+00:00","og_image":[{"width":1024,"height":636,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/09.27.17-Threat-Intelligence-1024x636.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/es\/blog\/threat-intelligence-platform\/","url":"https:\/\/swimlane.com\/es\/blog\/threat-intelligence-platform\/","name":"Utilizando una plataforma de inteligencia de amenazas para una ciberseguridad m\u00e1s s\u00f3lida","isPartOf":{"@id":"https:\/\/swimlane.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/es\/blog\/threat-intelligence-platform\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/es\/blog\/threat-intelligence-platform\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/09.27.17-Threat-Intelligence.png","datePublished":"2017-09-27T13:38:00+00:00","dateModified":"2024-06-27T22:40:30+00:00","description":"Tener una plataforma de inteligencia de amenazas s\u00f3lida es la clave para mejorar sus operaciones de seguridad.","breadcrumb":{"@id":"https:\/\/swimlane.com\/es\/blog\/threat-intelligence-platform\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/es\/blog\/threat-intelligence-platform\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/blog\/threat-intelligence-platform\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/09.27.17-Threat-Intelligence.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/09.27.17-Threat-Intelligence.png","width":1120,"height":696,"caption":"Cyber threat intelligence concept image with digital network connections and security data visualization."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/es\/blog\/threat-intelligence-platform\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Using a threat intelligence platform for stronger cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/es\/#website","url":"https:\/\/swimlane.com\/es\/","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","description":"Automatizaci\u00f3n de la inteligencia artificial para todas las funciones de seguridad","publisher":{"@id":"https:\/\/swimlane.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/es\/#organization","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","url":"https:\/\/swimlane.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/9843","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/9843\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media\/9844"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media?parent=9843"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/tags?post=9843"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-type?post=9843"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-topic?post=9843"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-industry?post=9843"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/blog-category?post=9843"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}