{"id":24836,"date":"2023-02-17T18:46:57","date_gmt":"2023-02-17T18:46:57","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=24836"},"modified":"2024-06-28T09:13:38","modified_gmt":"2024-06-28T15:13:38","slug":"guide-des-modeles-soc-de-gartner","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/fr\/resources\/reports\/gartner-soc-model-guide\/","title":{"rendered":"Gartner\u00a0: Guide du mod\u00e8le SOC"},"content":{"rendered":"<section class=\"bs-section bs-section-0ace0c84eaa888bce49c4f2de89bf8347ace13a6 bs-section---default bs-section--common-header-with-form\"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-12   bs-column-5f6574ebb29ac8d58ab608d2aff5b1bbe4f96332 bs-column---default\"><div class=\"bs-lottie-animator bs-lottie-animator---default\" id=\"lottie-c7d5ff8e-a115-40ae-aecb-0a84b90fe739\" data-settings=\"{&quot;desktop&quot;:{&quot;settings&quot;:{&quot;animateViewPort&quot;:0.5,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;Contact_lines1.json&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:1,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Contact_lines1.json&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}},&quot;mobile&quot;:{&quot;breakpoint&quot;:576,&quot;settings&quot;:{&quot;animateViewPort&quot;:50,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:0,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}}}\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column  col-md-7 col-sm-0   bs-column-3d962b00decd4fef444449c96db45c42599741ec bs-column---default\">\n<p class=\"common-header__blue-text has-blue-color has-text-color\" style=\"font-size:18px;text-transform:uppercase\"><span>Rapports<\/span><\/p>\n\n\n<h1 style=\"font-style:normal;font-weight:400;\" class=\"common-header__gated-page wp-block-post-title has-text-color has-black-color\">Gartner\u00a0: Guide du mod\u00e8le SOC<\/h1>\n\n\n<p><img decoding=\"async\" src=\"https:\/\/swimlane.com\/assets\/uploads\/images\/Gartner_logo-20px.png\" alt=\"Gartner_logo-20px.png\" data-image=\"3b2z72swikat\"><\/p>\n<p>Les responsables de la s\u00e9curit\u00e9 et de la gestion des risques ont souvent du mal \u00e0 faire comprendre la valeur commerciale de leurs centres d&#039;op\u00e9rations de s\u00e9curit\u00e9 aux responsables non sp\u00e9cialis\u00e9s en s\u00e9curit\u00e9, ce qui entra\u00eene une r\u00e9duction des investissements, une mauvaise collaboration et une \u00e9rosion du soutien.<\/p>\n<p>Sans alignement op\u00e9rationnel et sans accords d\u00e9finis pour un SOC, les responsables SRM se heurtent \u00e0 la r\u00e9sistance et \u00e0 l&#039;\u00e9vitement des autres unit\u00e9s commerciales, ce qui augmente le risque d&#039;incidents de s\u00e9curit\u00e9 ayant un impact financier direct sur l&#039;entreprise.<\/p>\n<p>Les responsables de la gestion des risques de s\u00e9curit\u00e9 (SRM) ne parviennent pas \u00e0 identifier et \u00e0 comprendre les menaces et les risques pertinents pour l&#039;organisation, ce qui augmente les risques d&#039;incidents de s\u00e9curit\u00e9 d\u00e9vastateurs.<\/p>\n<\/p>\n<p>T\u00e9l\u00e9chargez ce rapport Gartner pour en savoir plus\u00a0:<\/p>\n<ul>\n<li>Comment choisir le meilleur mod\u00e8le SOC pour votre organisation<\/li>\n<li>Les composantes cl\u00e9s du cadre SOC de Gartner.<\/li>\n<li>Comment obtenir l&#039;adh\u00e9sion organisationnelle lors de l&#039;engagement des dirigeants \u00e0 l&#039;\u00e9chelle de l&#039;entreprise pour comprendre leurs exigences et leurs besoins en mati\u00e8re de SOC\u00a0?.<\/li>\n<\/ul>\n<p>Acc\u00e9dez \u00e0 ce rapport Gartner SOC, gracieusement offert par Swimlane.<\/p>\n<\/p>\n\n\n\n<div class=\"bs-div bs-div-55fcd1d264d5e2b220b95765fe5f62e2fba6086e bs-div---default bs-div--footnotes\"><div class=\"bs-div__inner\">\n<p><br><\/p>\n<p>Gartner, Guide du mod\u00e8le SOC, John Collins, Mitchell Schneider, Pete Shoard, Publi\u00e9 le 19 octobre 2021.<\/p>\n<p>GARTNER est une marque d\u00e9pos\u00e9e de Gartner, Inc. et\/ou de ses filiales aux \u00c9tats-Unis et \u00e0 l&#039;international, et est utilis\u00e9e ici avec leur autorisation. Tous droits r\u00e9serv\u00e9s.<\/p>\n<p><em>Gartner ne cautionne aucun fournisseur, produit ou service mentionn\u00e9 dans ses publications de recherche et ne recommande pas aux utilisateurs de technologies de choisir uniquement les fournisseurs les mieux not\u00e9s ou ayant re\u00e7u une autre distinction. Les publications de recherche de Gartner refl\u00e8tent les opinions de son organisation de recherche et ne doivent pas \u00eatre interpr\u00e9t\u00e9es comme des faits av\u00e9r\u00e9s. Gartner exclut toute garantie, expresse ou implicite, relative \u00e0 cette recherche, y compris toute garantie de qualit\u00e9 marchande ou d&#039;ad\u00e9quation \u00e0 un usage particulier.<\/em><\/p>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-column  col-md-5 col-sm-0   bs-column-4e7708ec1047c5de435a1fcaa9bd912b51781ebd bs-column---default bs-column--form\">\n<div class=\"bs-div bs-div-55656b638c23030759cda980e61836fb7b124b39 bs-div---default bs-div--form-wrapper\"><div class=\"bs-div__inner\">\n<iframe loading=\"lazy\" src=\"https:\/\/go.swimlane.com\/l\/288742\/2024-02-14\/2cysbkw?FFSP=Gartner%20SOC%20Model%20Guide&#038;LFSP=Gartner%20SOC%20Model%20Guide\" width=\"100%\" height=\"500\" type=\"text\/html\" frameborder=\"0\" allowtransparency=\"true\" style=\"border: 0\" id=\"myiframe\"><\/iframe>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-14ca56fdc3be4b5f0a8616120c8005c221b5c55b bs-section---default bs-section--related-items\"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-12   bs-column-5f6574ebb29ac8d58ab608d2aff5b1bbe4f96332 bs-column---default\">\n<h2 class=\"wp-block-heading has-deep-color has-text-color\" id=\"h-you-might-also-be-interested-in\">Vous pourriez \u00e9galement \u00eatre int\u00e9ress\u00e9 par<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-12   bs-column-33aba5295b76f4052fb226277a0b4e1e4747889c bs-column---default\">\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69ef6660b22fb bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/resources\/reports\/soar-quadrant-software-reviews\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/SoftwareReviews-2024-Security-Automation-SOAR-Data-Quadrant.png' class='img-fluid' alt='Rapport SOAR Data Quadrant 2024 de SoftwareReviews\u00a0: graphique du quadrant magique ' title='Quadrant de donn\u00e9es 2024 de SoftwareReviews sur l&#039;automatisation de la s\u00e9curit\u00e9 (SOAR)'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Rapport<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Swimlane est en t\u00eate du quadrant de donn\u00e9es SOAR (Security Orchestration Automation Response)<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>En savoir plus<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69ef6660b4871 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/resources\/reports\/soar-quadrant\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/SPARK_Matrix_SOAR_20241-3.jpg' class='img-fluid' alt='Rapport SOAR Data Quadrant 2024 de SoftwareReviews\u00a0: graphique du quadrant magique ' title='SPARK_Matrix_SOAR_2024(1)'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Rapport<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Matrice SPARK\u2122 de Quadrant Knowledge Solutions\u00a0: Orchestration, automatisation et r\u00e9ponse en mati\u00e8re de s\u00e9curit\u00e9 (SOAR), 2024\u00a0<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>En savoir plus<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\"><\/div>\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"<p>&#8220;Selecting the appropriate security operation center model is challenging, choosing the wrong SOC model can lead to a poor security posture, increased risk, and overextended security teams. Security and risk management leaders [can] use this guide to identify which model aligns to their needs.&#8221;<\/p>\n","protected":false},"author":43,"featured_media":10566,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"on","_relevanssi_hide_content":"on","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"Yoast SEO Relevanssi index exclude","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[92],"resource-topic":[133],"resource-industry":[93,94,95,96,97],"blog-category":[],"class_list":["post-24836","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-reports","resource-topic-research","resource-industry-automation","resource-industry-incident-response","resource-industry-threat-intelligence","resource-industry-edr","resource-industry-siem"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Gartner: Create a SOC Target Operating Model to Drive<\/title>\n<meta name=\"description\" content=\"Selecting the appropriate security operation center model is challenging, choosing the wrong SOC model has to be avoided. Download.\" \/>\n<meta name=\"robots\" content=\"index, nofollow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/fr\/ressources\/rapports\/guide-des-modeles-soc-de-gartner\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gartner: SOC Model Guide\" \/>\n<meta property=\"og:description\" content=\"Selecting the appropriate security operation center model is challenging, choosing the wrong SOC model has to be avoided. Download.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/fr\/ressources\/rapports\/guide-des-modeles-soc-de-gartner\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-28T15:13:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/Gartner-SOC-Target-Operating-Model2_2021-08-27-151353_cmkx-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"792\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/resources\\\/reports\\\/gartner-soc-model-guide\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/resources\\\/reports\\\/gartner-soc-model-guide\\\/\",\"name\":\"Gartner: Create a SOC Target Operating Model to Drive\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/resources\\\/reports\\\/gartner-soc-model-guide\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/resources\\\/reports\\\/gartner-soc-model-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/Gartner-SOC-Target-Operating-Model2_2021-08-27-151353_cmkx-1.jpg\",\"datePublished\":\"2023-02-17T18:46:57+00:00\",\"dateModified\":\"2024-06-28T15:13:38+00:00\",\"description\":\"Selecting the appropriate security operation center model is challenging, choosing the wrong SOC model has to be avoided. Download.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/resources\\\/reports\\\/gartner-soc-model-guide\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/swimlane.com\\\/fr\\\/resources\\\/reports\\\/gartner-soc-model-guide\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/resources\\\/reports\\\/gartner-soc-model-guide\\\/#primaryimage\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/Gartner-SOC-Target-Operating-Model2_2021-08-27-151353_cmkx-1.jpg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/Gartner-SOC-Target-Operating-Model2_2021-08-27-151353_cmkx-1.jpg\",\"width\":612,\"height\":792},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/resources\\\/reports\\\/gartner-soc-model-guide\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/swimlane.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gartner: SOC Model Guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/swimlane\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/swimlane\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Gartner\u00a0: Cr\u00e9er un mod\u00e8le op\u00e9rationnel cible SOC pour piloter","description":"Choisir le mod\u00e8le de centre d&#039;op\u00e9rations de s\u00e9curit\u00e9 (SOC) appropri\u00e9 est complexe\u00a0; il faut \u00e9viter de faire un mauvais choix. T\u00e9l\u00e9charger.","robots":{"index":"index","follow":"nofollow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/fr\/ressources\/rapports\/guide-des-modeles-soc-de-gartner\/","og_locale":"fr_FR","og_type":"article","og_title":"Gartner: SOC Model Guide","og_description":"Selecting the appropriate security operation center model is challenging, choosing the wrong SOC model has to be avoided. Download.","og_url":"https:\/\/swimlane.com\/fr\/ressources\/rapports\/guide-des-modeles-soc-de-gartner\/","og_site_name":"AI Security Automation","article_modified_time":"2024-06-28T15:13:38+00:00","og_image":[{"width":612,"height":792,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/Gartner-SOC-Target-Operating-Model2_2021-08-27-151353_cmkx-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/fr\/resources\/reports\/gartner-soc-model-guide\/","url":"https:\/\/swimlane.com\/fr\/resources\/reports\/gartner-soc-model-guide\/","name":"Gartner\u00a0: Cr\u00e9er un mod\u00e8le op\u00e9rationnel cible SOC pour piloter","isPartOf":{"@id":"https:\/\/swimlane.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/fr\/resources\/reports\/gartner-soc-model-guide\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/fr\/resources\/reports\/gartner-soc-model-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Gartner-SOC-Target-Operating-Model2_2021-08-27-151353_cmkx-1.jpg","datePublished":"2023-02-17T18:46:57+00:00","dateModified":"2024-06-28T15:13:38+00:00","description":"Choisir le mod\u00e8le de centre d&#039;op\u00e9rations de s\u00e9curit\u00e9 (SOC) appropri\u00e9 est complexe\u00a0; il faut \u00e9viter de faire un mauvais choix. T\u00e9l\u00e9charger.","breadcrumb":{"@id":"https:\/\/swimlane.com\/fr\/resources\/reports\/gartner-soc-model-guide\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/fr\/resources\/reports\/gartner-soc-model-guide\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/swimlane.com\/fr\/resources\/reports\/gartner-soc-model-guide\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/Gartner-SOC-Target-Operating-Model2_2021-08-27-151353_cmkx-1.jpg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Gartner-SOC-Target-Operating-Model2_2021-08-27-151353_cmkx-1.jpg","width":612,"height":792},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/fr\/resources\/reports\/gartner-soc-model-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Gartner: SOC Model Guide"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/fr\/#website","url":"https:\/\/swimlane.com\/fr\/","name":"Plateforme d&#039;automatisation de la s\u00e9curit\u00e9 low-code et SOAR | Swimlane","description":"Automatisation par IA agentique pour chaque fonction de s\u00e9curit\u00e9","publisher":{"@id":"https:\/\/swimlane.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/fr\/#organization","name":"Plateforme d&#039;automatisation de la s\u00e9curit\u00e9 low-code et SOAR | Swimlane","url":"https:\/\/swimlane.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource\/24836","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/users\/43"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource\/24836\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/media\/10566"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/media?parent=24836"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/tags?post=24836"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-type?post=24836"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-topic?post=24836"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-industry?post=24836"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/blog-category?post=24836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}