{"id":38065,"date":"2024-04-30T14:52:14","date_gmt":"2024-04-30T20:52:14","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=38065"},"modified":"2025-10-01T11:52:42","modified_gmt":"2025-10-01T17:52:42","slug":"cas-dutilisation-de-la-recherche-dindicateurs-de-compromission-ioc-de-renseignements-sur-les-menaces","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/fr\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/","title":{"rendered":"Cas d&#039;utilisation : Renseignements sur les menaces et recherche d&#039;indicateurs de compromission (IOC)"},"content":{"rendered":"<section class=\"bs-section bs-section-0ace0c84eaa888bce49c4f2de89bf8347ace13a6 bs-section---default bs-section--common-header-with-form\"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-12   bs-column-5f6574ebb29ac8d58ab608d2aff5b1bbe4f96332 bs-column---default\"><div class=\"bs-lottie-animator bs-lottie-animator---default\" id=\"lottie-c7d5ff8e-a115-40ae-aecb-0a84b90fe739\" data-settings=\"{&quot;desktop&quot;:{&quot;settings&quot;:{&quot;animateViewPort&quot;:0.5,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;Contact_lines1.json&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:1,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Contact_lines1.json&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}},&quot;mobile&quot;:{&quot;breakpoint&quot;:576,&quot;settings&quot;:{&quot;animateViewPort&quot;:50,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:0,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}}}\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column  col-sm-0 col-md-10   bs-column-e324ba46e668efb8a167f6c6f82d98452b10172b bs-column---default\">\n<p class=\"common-header__blue-text has-blue-color has-text-color\" style=\"font-size:18px;text-transform:uppercase\"><span>Vid\u00e9os<\/span><\/p>\n\n\n<h1 style=\"font-style:normal;font-weight:400;\" class=\"common-header__gated-page wp-block-post-title has-text-color has-black-color\">Cas d&#039;utilisation : Renseignements sur les menaces et recherche d&#039;indicateurs de compromission (IOC)<\/h1>\n\n\n<p><span class=\"yt-core-attributed-string yt-core-attributed-string--white-space-pre-wrap\" role=\"text\"><span class=\"yt-core-attributed-string--link-inherit-color\">Chaque jour, d&#039;\u00e9normes quantit\u00e9s de donn\u00e9es transitent par le centre des op\u00e9rations de s\u00e9curit\u00e9 (SOC), provenant de sources et d&#039;outils de s\u00e9curit\u00e9 vari\u00e9s. Il peut \u00eatre difficile pour votre \u00e9quipe de s\u00e9curit\u00e9 de filtrer plus de 10\u00a0000 alertes par jour pour identifier les indicateurs de compromission (IOC) pertinents. D\u00e9couvrez comment Swimlane automatise et orchestre le processus de recherche d&#039;IOC et combine les donn\u00e9es machine et les d\u00e9cisions humaines pour cr\u00e9er une source unique de v\u00e9rit\u00e9.<\/span><\/span><\/p>\n\n\n\n<iframe loading=\"lazy\" width=\"100%\" height=\"auto\" style=\"min-height:520px\" src=\"https:\/\/www.youtube.com\/embed\/rMmGXAGeukM?si=dpQhZZV2NlyxGoGH\" title=\"lecteur vid\u00e9o YouTube\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-14ca56fdc3be4b5f0a8616120c8005c221b5c55b bs-section---default bs-section--related-items\"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-12   bs-column-5f6574ebb29ac8d58ab608d2aff5b1bbe4f96332 bs-column---default\">\n<h2 class=\"wp-block-heading has-deep-color has-text-color\" id=\"h-you-might-also-be-interested-in\">Vous pourriez \u00e9galement \u00eatre int\u00e9ress\u00e9 par<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-12   bs-column-33aba5295b76f4052fb226277a0b4e1e4747889c bs-column---default\">\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69fa62e5f32c5 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/cyber-threat-intelligence\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/THREATINTELLIGENCE-1.png' class='img-fluid' alt='' title='1'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Blog<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Automatisation de l&#039;enrichissement du renseignement sur les menaces<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>En savoir plus<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69fa62e60064d bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/THREAT-INT-IOC-1.png' class='img-fluid' alt='' title='MENACE INT IOC'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>D\u00e9mo<\/span><span>Vid\u00e9o<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Cas d&#039;utilisation : Renseignements sur les menaces et recherche d&#039;indicateurs de compromission (IOC)<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>En savoir plus<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69fa62e601ec5 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/hero-ai-model-updates\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-38.jpg' class='img-fluid' alt='Hero AI optimis\u00e9 par Mistral 3.1\u00a0: Une IA plus intelligente pour l\u2019automatisation des op\u00e9rations de s\u00e9curit\u00e9' title='En-t\u00eate'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Blog<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Intelligence am\u00e9lior\u00e9e\u00a0: l\u2019IA des h\u00e9ros est d\u00e9sormais aliment\u00e9e par un mod\u00e8le 3 fois plus grand<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>En savoir plus<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"<p>Are you looking to automate the triage of security alert data from Splunk? Watch this use case demo to learn how Swimlane can automate the alert triage process while integrating with Splunk, VirusTotal and Symantec Endpoint Protection.<\/p>","protected":false},"author":43,"featured_media":38067,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":38067,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[206,105],"resource-topic":[132,136],"resource-industry":[108,121,99],"blog-category":[],"class_list":["post-38065","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-demo","resource-type-videos","resource-topic-platform","resource-topic-soar","resource-industry-use-case","resource-industry-threat-hunting","resource-industry-alert-triage"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Automating Splunk Alert Triage Demo (4:11)<\/title>\n<meta name=\"description\" content=\"Splunk and Swimlane are shown as powerful combination for managing Alert Triage in this webinar.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/fr\/ressources\/videos\/cas-dutilisation-de-la-recherche-dindicateurs-de-compromission-ioc-de-renseignements-sur-les-menaces\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Threat Intelligence &amp; IOC Lookup Use Case\" \/>\n<meta property=\"og:description\" content=\"Splunk and Swimlane are shown as powerful combination for managing Alert Triage in this webinar.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/fr\/ressources\/videos\/cas-dutilisation-de-la-recherche-dindicateurs-de-compromission-ioc-de-renseignements-sur-les-menaces\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-01T17:52:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/THREAT-INT-IOC-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/resources\\\/videos\\\/threat-intelligence-ioc-lookup-use-case\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/resources\\\/videos\\\/threat-intelligence-ioc-lookup-use-case\\\/\",\"name\":\"Automating Splunk Alert Triage Demo (4:11)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/resources\\\/videos\\\/threat-intelligence-ioc-lookup-use-case\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/resources\\\/videos\\\/threat-intelligence-ioc-lookup-use-case\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/THREAT-INT-IOC-1.png\",\"datePublished\":\"2024-04-30T20:52:14+00:00\",\"dateModified\":\"2025-10-01T17:52:42+00:00\",\"description\":\"Splunk and Swimlane are shown as powerful combination for managing Alert Triage in this webinar.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/resources\\\/videos\\\/threat-intelligence-ioc-lookup-use-case\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/swimlane.com\\\/fr\\\/resources\\\/videos\\\/threat-intelligence-ioc-lookup-use-case\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/resources\\\/videos\\\/threat-intelligence-ioc-lookup-use-case\\\/#primaryimage\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/THREAT-INT-IOC-1.png\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/THREAT-INT-IOC-1.png\",\"width\":1280,\"height\":720,\"caption\":\"Technical interface displaying automated threat intelligence research and IOC analysis workflows.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/resources\\\/videos\\\/threat-intelligence-ioc-lookup-use-case\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/swimlane.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Threat Intelligence &amp; IOC Lookup Use Case\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/swimlane\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/swimlane\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"D\u00e9monstration d&#039;automatisation du triage des alertes Splunk (4:11)","description":"Ce webinaire pr\u00e9sente Splunk et Swimlane comme une combinaison puissante pour la gestion du tri des alertes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/fr\/ressources\/videos\/cas-dutilisation-de-la-recherche-dindicateurs-de-compromission-ioc-de-renseignements-sur-les-menaces\/","og_locale":"fr_FR","og_type":"article","og_title":"Threat Intelligence &amp; IOC Lookup Use Case","og_description":"Splunk and Swimlane are shown as powerful combination for managing Alert Triage in this webinar.","og_url":"https:\/\/swimlane.com\/fr\/ressources\/videos\/cas-dutilisation-de-la-recherche-dindicateurs-de-compromission-ioc-de-renseignements-sur-les-menaces\/","og_site_name":"AI Security Automation","article_modified_time":"2025-10-01T17:52:42+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/THREAT-INT-IOC-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/fr\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/","url":"https:\/\/swimlane.com\/fr\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/","name":"D\u00e9monstration d&#039;automatisation du triage des alertes Splunk (4:11)","isPartOf":{"@id":"https:\/\/swimlane.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/fr\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/fr\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/THREAT-INT-IOC-1.png","datePublished":"2024-04-30T20:52:14+00:00","dateModified":"2025-10-01T17:52:42+00:00","description":"Ce webinaire pr\u00e9sente Splunk et Swimlane comme une combinaison puissante pour la gestion du tri des alertes.","breadcrumb":{"@id":"https:\/\/swimlane.com\/fr\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/fr\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/swimlane.com\/fr\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/THREAT-INT-IOC-1.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/THREAT-INT-IOC-1.png","width":1280,"height":720,"caption":"Technical interface displaying automated threat intelligence research and IOC analysis workflows."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/fr\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Threat Intelligence &amp; IOC Lookup Use Case"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/fr\/#website","url":"https:\/\/swimlane.com\/fr\/","name":"Plateforme d&#039;automatisation de la s\u00e9curit\u00e9 low-code et SOAR | Swimlane","description":"Automatisation par IA agentique pour chaque fonction de s\u00e9curit\u00e9","publisher":{"@id":"https:\/\/swimlane.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/fr\/#organization","name":"Plateforme d&#039;automatisation de la s\u00e9curit\u00e9 low-code et SOAR | Swimlane","url":"https:\/\/swimlane.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource\/38065","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/users\/43"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource\/38065\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/media\/38067"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/media?parent=38065"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/tags?post=38065"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-type?post=38065"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-topic?post=38065"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-industry?post=38065"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/blog-category?post=38065"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}