{"id":9607,"date":"2020-09-03T11:48:00","date_gmt":"2020-09-03T17:48:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation\/"},"modified":"2023-10-10T13:59:14","modified_gmt":"2023-10-10T19:59:14","slug":"garder-une-longueur-davance-sur-les-menaces-de-cybersecurite-liees-a-la-pandemie-grace-a-lautomatisation","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/fr\/blog\/staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation\/","title":{"rendered":"Garder une longueur d&#039;avance sur les menaces de cybers\u00e9curit\u00e9 li\u00e9es \u00e0 la pand\u00e9mie gr\u00e2ce \u00e0 l&#039;automatisation"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Professional working on laptop at desk, representing remote cybersecurity operations and analysis.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/Staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation.png 800w, https:\/\/swimlane.com\/wp-content\/uploads\/Staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation-300x197.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/Staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation-768x503.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2020-09-03T11:48:00-06:00\">Sep 3, 2020<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Staying ahead of pandemic-related cybersecurity threats with automation<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/fr\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">3 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/fr\/blog\/staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/fr\/blog\/staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Staying%20ahead%20of%20pandemic-related%20cybersecurity%20threats%20with%20automation').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Fstaying-ahead-of-pandemic-related-cybersecurity-threats-with-automation%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Staying%20ahead%20of%20pandemic-related%20cybersecurity%20threats%20with%20automation&url=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Fstaying-ahead-of-pandemic-related-cybersecurity-threats-with-automation%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Fstaying-ahead-of-pandemic-related-cybersecurity-threats-with-automation%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Fstaying-ahead-of-pandemic-related-cybersecurity-threats-with-automation%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<h2>\u00a0<\/h2>\n<p>The COVID-19 pandemic has impacted organizations worldwide. Many were forced to <a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2020\/08\/31\/could-working-from-home-help-close-the-cybersecurity-skills-gap\/#6f0633242fc2\" target=\"_blank\" rel=\"noopener\">transition their entire workforce to remote environments<\/a> seemingly overnight, while others had to scale down their workforces through furloughs or layoffs. These changes have led to numerous challenges for security operations centers (SOCs). It remains critical that SOCs have a full understanding of the environment that they are monitoring. But with such drastic changes in a short period of time, it has been exceedingly difficult to keep up with a remote workforce and the evolving threat landscape.<\/p>\n<p>Many security teams are unable to staff up to the levels necessary to monitor and respond to every threat because of the growing cybersecurity skills shortage, while others have been affected by budget cuts that have inhibited their ability to hire more workers. Introducing and\/or increasing the use of <a href=\"https:\/\/swimlane.com\/blog\/low-code-security-automation-simplicity\/\">security automation<\/a> in the SOC is one way to counter this growing problem.<\/p>\n<p>Many organizations have implemented a <a href=\"https:\/\/swimlane.com\/solutions\/security-automation-and-orchestration\/\">security orchestration, automation and response (SOAR) solution<\/a> to execute security-related tasks automatically as a way to free up staff to focus on more advanced threat defense. While it won\u2019t solve all of your problems, automation is one of the most efficient and effective ways to scale your team and decrease your organization\u2019s security risk during this unprecedented time.<\/p>\n<h3>Report Finds Increase in Automation Adoption with Remote Working<\/h3>\n<p>According to a recent Enterprise Management Associates (EMA) report, <a href=\"https:\/\/swimlane.com\/resources\/ema-it-security-skills-gap-summary-report\/\">How Automation and Orchestration can Help Bridge the IT Security Skills Gap<\/a>, \u201c&#8230;IT security teams are relying on the automation delivered through SOAR and other security technologies like never before&#8230; 94% [of respondents] reported that their <a href=\"https:\/\/swimlane.com\/blog\/what-is-soar\/\">SOAR platforms<\/a> were either very or extremely valuable in enabling security teams working remotely to coordinate security workflows.\u201d In fact, with the dramatic increase in remote working, this study highlighted the fact that it\u2019s taking SOC teams significantly longer and making it much more difficult to perform vulnerability scanning on endpoints and deploy patches and updates.<\/p>\n<blockquote>\n<p>\u201c94% [of respondents] reported that their SOAR platforms were either very or extremely valuable in enabling security teams working remotely to coordinate security workflows.\u201d<\/p>\n<\/blockquote>\n<p>With an increase in remote collaboration both among SOC employees and the organization as a whole, the study also reported a rise in the quantity and types of files being shared, which only increases the organization\u2019s security risk. These file types range from images and media to documents and emails, with the latter posing the greatest security risk to organizations, according to the report. It is becoming increasingly important for organizations to find ways to monitor and secure information sharing among their employees easier and more efficiently.<\/p>\n<h3>Popular Security Automation Use Cases<\/h3>\n<p>Although <a href=\"https:\/\/swimlane.com\/resources\/live-demo-combat-phishing-emails-with-soar\/\">phishing is one of the most common use cases for automation<\/a> and typically one of the first completed during a SOAR implementation, the report identified many other ways that automation is being used in organizations during the rise of remote work. EMA asked respondents to select the top three activities that offered the greatest value in productivity improvements made possible through automation. Although results varied depending on the organization\u2019s size, leading responses included automating vulnerability remediation and automating patch management.<\/p>\n<p>Our customers and partners have also indicated that these two use cases are increasingly popular right now as unpatched and misconfigured hardware, applications, security stacks, systems, endpoints and cloud services can result in massive security breaches via open ports, configuration settings and unpatched vulnerabilities. A SOAR solution can <a href=\"https:\/\/swimlane.com\/resources\/vulnerability-management-soar-swimlane\/\">automate vulnerability scans<\/a> and assist you in making sense of vulnerability reports, so information is more easily accessible and human usable. In fact, a SOAR solution like Swimlane can automatically add important contextual data by leveraging prior scan results, analysts\u2019 notes, and known and accepted risk elements. This provides your SOC with a more efficient way to proactively see, prioritize and remediate vulnerabilities across your IT ecosystem.<\/p>\n<p>We all know that the pandemic has and will continue to change how all organizations operate, but it is vital that the SOC continues to evolve. Threats are only increasing and changing in this new environment and automation is a critical component to stay on top of\u2014and hopefully ahead of\u2014bad actors. To learn more about how automation can enhance your SOC during these unpredictable times, download EMA\u2019s <a href=\"https:\/\/swimlane.com\/resources\/ema-it-security-skills-gap-summary-report\/\">How Automation and Orchestration can Help Bridge the IT Security Skills Gap<\/a> report today.<\/p>\n\n\n\n<div class=\"bs-div bs-div-15cf7d0186ad2560eb21550027f2a3306471a72c bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-15cf7d0186ad2560eb21550027f2a3306471a72c {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/Swimlane-Summary-EMA-Report-2020-1@2x.jpg' class='img-fluid'   alt='Swimlane and EMA report cover: \u201cHow Automation and Orchestration Can Help Bridge the IT Security Skills Gap.\u201d' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-2aebcd1b2c11849d7c87d8462be32842b8c42b50 bs-div---default\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-how-automation-and-orchestration-can-help-bridge-the-it-security-skills-gap\">How Automation and Orchestration can Help Bridge the IT Security Skills Gap<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color\">In this study, EMA reveals how automation is one of the most efficient and effective ways to scale your security team and decrease your organization\u2019s cybersecurity risk. Read the report to learn how automation can enhance your SOC during these unpredictable times.<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-5300571ea722a29c9ffa6d3adcdf97b0a779f7e6\"><style>.bs-pro-button-p-btn-5300571ea722a29c9ffa6d3adcdf97b0a779f7e6 .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/resources\/ema-it-security-skills-gap-summary-report\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Download Now<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69ea25ea78d25 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/sans-survey-highlights-pandemic-influenced-hiring-plans\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Ao\u00fbt 5, 2020<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>SANS survey highlights pandemic-influenced hiring plans<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69ea25ea7a1e2 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/5-enterprise-mobile-device-security-threats\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Nov 30, 2022<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>5 Threats to Your Enterprise Mobile Device Security and How to Prevent Them<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69ea25ea7b5cd bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/insider-threat-detection\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Oct 6, 2022<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Guide to Insider Threats: Definition, Detection, Best Practices &#038; Tools<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":9608,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[70],"class_list":["post-9607","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SOAR Adoption Rises with the Remote SOC<\/title>\n<meta name=\"description\" content=\"Many orgs have implemented SOAR solutions to execute security-related tasks automatically as a way to free up staff to focus on more advanced threat defense.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/fr\/blog\/garder-une-longueur-davance-sur-les-menaces-de-cybersecurite-liees-a-la-pandemie-grace-a-lautomatisation\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Staying ahead of pandemic-related cybersecurity threats with automation\" \/>\n<meta property=\"og:description\" content=\"Many orgs have implemented SOAR solutions to execute security-related tasks automatically as a way to free up staff to focus on more advanced threat defense.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/fr\/blog\/garder-une-longueur-davance-sur-les-menaces-de-cybersecurite-liees-a-la-pandemie-grace-a-lautomatisation\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-10T19:59:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/Staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"524\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation\\\/\",\"name\":\"SOAR Adoption Rises with the Remote SOC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/Staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation.png\",\"datePublished\":\"2020-09-03T17:48:00+00:00\",\"dateModified\":\"2023-10-10T19:59:14+00:00\",\"description\":\"Many orgs have implemented SOAR solutions to execute security-related tasks automatically as a way to free up staff to focus on more advanced threat defense.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation\\\/#primaryimage\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/Staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation.png\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/Staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation.png\",\"width\":800,\"height\":524,\"caption\":\"Professional working on laptop at desk, representing remote cybersecurity operations and analysis.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/blog\\\/staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/swimlane.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Staying ahead of pandemic-related cybersecurity threats with automation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/swimlane\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/swimlane\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"L&#039;adoption de SOAR augmente avec le SOC distant","description":"De nombreuses organisations ont mis en \u0153uvre des solutions SOAR pour ex\u00e9cuter automatiquement les t\u00e2ches li\u00e9es \u00e0 la s\u00e9curit\u00e9, afin de lib\u00e9rer du personnel pour qu&#039;il se concentre sur la d\u00e9fense contre les menaces plus avanc\u00e9es.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/fr\/blog\/garder-une-longueur-davance-sur-les-menaces-de-cybersecurite-liees-a-la-pandemie-grace-a-lautomatisation\/","og_locale":"fr_FR","og_type":"article","og_title":"Staying ahead of pandemic-related cybersecurity threats with automation","og_description":"Many orgs have implemented SOAR solutions to execute security-related tasks automatically as a way to free up staff to focus on more advanced threat defense.","og_url":"https:\/\/swimlane.com\/fr\/blog\/garder-une-longueur-davance-sur-les-menaces-de-cybersecurite-liees-a-la-pandemie-grace-a-lautomatisation\/","og_site_name":"AI Security Automation","article_modified_time":"2023-10-10T19:59:14+00:00","og_image":[{"width":800,"height":524,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/Staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/fr\/blog\/staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation\/","url":"https:\/\/swimlane.com\/fr\/blog\/staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation\/","name":"L&#039;adoption de SOAR augmente avec le SOC distant","isPartOf":{"@id":"https:\/\/swimlane.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/fr\/blog\/staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/fr\/blog\/staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation.png","datePublished":"2020-09-03T17:48:00+00:00","dateModified":"2023-10-10T19:59:14+00:00","description":"De nombreuses organisations ont mis en \u0153uvre des solutions SOAR pour ex\u00e9cuter automatiquement les t\u00e2ches li\u00e9es \u00e0 la s\u00e9curit\u00e9, afin de lib\u00e9rer du personnel pour qu&#039;il se concentre sur la d\u00e9fense contre les menaces plus avanc\u00e9es.","breadcrumb":{"@id":"https:\/\/swimlane.com\/fr\/blog\/staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/fr\/blog\/staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/swimlane.com\/fr\/blog\/staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/Staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation.png","width":800,"height":524,"caption":"Professional working on laptop at desk, representing remote cybersecurity operations and analysis."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/fr\/blog\/staying-ahead-of-pandemic-related-cybersecurity-threats-with-automation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Staying ahead of pandemic-related cybersecurity threats with automation"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/fr\/#website","url":"https:\/\/swimlane.com\/fr\/","name":"Plateforme d&#039;automatisation de la s\u00e9curit\u00e9 low-code et SOAR | Swimlane","description":"Automatisation par IA agentique pour chaque fonction de s\u00e9curit\u00e9","publisher":{"@id":"https:\/\/swimlane.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/fr\/#organization","name":"Plateforme d&#039;automatisation de la s\u00e9curit\u00e9 low-code et SOAR | Swimlane","url":"https:\/\/swimlane.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource\/9607","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource\/9607\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/media\/9608"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/media?parent=9607"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/tags?post=9607"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-type?post=9607"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-topic?post=9607"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-industry?post=9607"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/blog-category?post=9607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}