{"id":38065,"date":"2024-04-30T14:52:14","date_gmt":"2024-04-30T20:52:14","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=38065"},"modified":"2025-10-01T11:52:42","modified_gmt":"2025-10-01T17:52:42","slug":"%e8%84%85%e5%a8%81%e3%82%a4%e3%83%b3%e3%83%86%e3%83%aa%e3%82%b8%e3%82%a7%e3%83%b3%e3%82%b9ioc%e3%83%ab%e3%83%83%e3%82%af%e3%82%a2%e3%83%83%e3%83%97%e3%81%ae%e3%83%a6%e3%83%bc%e3%82%b9%e3%82%b1","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ja\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/","title":{"rendered":"\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u3068IOC\u691c\u7d22\u306e\u30e6\u30fc\u30b9\u30b1\u30fc\u30b9"},"content":{"rendered":"<section class=\"bs-section bs-section-0ace0c84eaa888bce49c4f2de89bf8347ace13a6 bs-section---default bs-section--common-header-with-form\"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-12   bs-column-5f6574ebb29ac8d58ab608d2aff5b1bbe4f96332 bs-column---default\"><div class=\"bs-lottie-animator bs-lottie-animator---default\" id=\"lottie-c7d5ff8e-a115-40ae-aecb-0a84b90fe739\" data-settings=\"{&quot;desktop&quot;:{&quot;settings&quot;:{&quot;animateViewPort&quot;:0.5,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;Contact_lines1.json&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:1,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Contact_lines1.json&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}},&quot;mobile&quot;:{&quot;breakpoint&quot;:576,&quot;settings&quot;:{&quot;animateViewPort&quot;:50,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:0,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}}}\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column  col-sm-0 col-md-10   bs-column-e324ba46e668efb8a167f6c6f82d98452b10172b bs-column---default\">\n<p class=\"common-header__blue-text has-blue-color has-text-color\" style=\"font-size:18px;text-transform:uppercase\"><span>\u30d3\u30c7\u30aa<\/span><\/p>\n\n\n<h1 style=\"font-style:normal;font-weight:400;\" class=\"common-header__gated-page wp-block-post-title has-text-color has-black-color\">\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u3068IOC\u691c\u7d22\u306e\u30e6\u30fc\u30b9\u30b1\u30fc\u30b9<\/h1>\n\n\n<p><span class=\"yt-core-attributed-string yt-core-attributed-string--white-space-pre-wrap\" role=\"text\"><span class=\"yt-core-attributed-string--link-inherit-color\">\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30aa\u30da\u30ec\u30fc\u30b7\u30e7\u30f3\u30bb\u30f3\u30bf\u30fc\uff08SOC\uff09\u306b\u306f\u3001\u69d8\u3005\u306a\u30bd\u30fc\u30b9\u3084\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c4\u30fc\u30eb\u304b\u3089\u6bce\u65e5\u81a8\u5927\u306a\u91cf\u306e\u30c7\u30fc\u30bf\u304c\u6d41\u308c\u8fbc\u3093\u3067\u3044\u307e\u3059\u3002\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c1\u30fc\u30e0\u306b\u3068\u3063\u3066\u30011\u65e5\u306b1\u4e07\u4ef6\u3092\u8d85\u3048\u308b\u30a2\u30e9\u30fc\u30c8\u3092\u7cbe\u67fb\u3057\u3001\u6709\u52b9\u306a\u4fb5\u5bb3\u6307\u6a19\uff08IOC\uff09\u3092\u898b\u3064\u3051\u308b\u306e\u306f\u5bb9\u6613\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u3002Swimlane\u304cIOC\u691c\u7d22\u30d7\u30ed\u30bb\u30b9\u3092\u81ea\u52d5\u5316\u30fb\u30aa\u30fc\u30b1\u30b9\u30c8\u30ec\u30fc\u30b7\u30e7\u30f3\u3057\u3001\u6a5f\u68b0\u30c7\u30fc\u30bf\u3068\u4eba\u9593\u306e\u5224\u65ad\u3092\u7d71\u5408\u3057\u3066\u3001\u4fe1\u983c\u3067\u304d\u308b\u552f\u4e00\u306e\u60c5\u5831\u6e90\u3092\u69cb\u7bc9\u3059\u308b\u69d8\u5b50\u3092\u3054\u89a7\u304f\u3060\u3055\u3044\u3002.<\/span><\/span><\/p>\n\n\n\n<iframe loading=\"lazy\" width=\"100%\" height=\"auto\" style=\"min-height:520px\" src=\"https:\/\/www.youtube.com\/embed\/rMmGXAGeukM?si=dpQhZZV2NlyxGoGH\" title=\"YouTube\u30d3\u30c7\u30aa\u30d7\u30ec\u30fc\u30e4\u30fc\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-14ca56fdc3be4b5f0a8616120c8005c221b5c55b bs-section---default bs-section--related-items\"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-12   bs-column-5f6574ebb29ac8d58ab608d2aff5b1bbe4f96332 bs-column---default\">\n<h2 class=\"wp-block-heading has-deep-color has-text-color\" id=\"h-you-might-also-be-interested-in\">\u3053\u3061\u3089\u3082\u3054\u8208\u5473\u304c\u3042\u308b\u304b\u3082\u3057\u308c\u307e\u305b\u3093<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-12   bs-column-33aba5295b76f4052fb226277a0b4e1e4747889c bs-column---default\">\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69f4bca853cf4 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/cyber-threat-intelligence\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/THREATINTELLIGENCE-1.png' class='img-fluid' alt='' title='1'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>\u30d6\u30ed\u30b0<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u306e\u5f37\u5316\u3092\u81ea\u52d5\u5316<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>\u7d9a\u304d\u3092\u8aad\u3080<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69f4bca8559e6 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/THREAT-INT-IOC-1.png' class='img-fluid' alt='' title='IOC\u3078\u306e\u8105\u5a01'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>\u30c7\u30e2<\/span><span>\u30d3\u30c7\u30aa<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u3068IOC\u691c\u7d22\u306e\u30e6\u30fc\u30b9\u30b1\u30fc\u30b9<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>\u7d9a\u304d\u3092\u8aad\u3080<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69f4bca8574fc bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/hero-ai-model-updates\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-38.jpg' class='img-fluid' alt='Mistral 3.1 \u642d\u8f09\u306e Hero AI: SecOps \u81ea\u52d5\u5316\u306e\u305f\u3081\u306e\u3088\u308a\u30b9\u30de\u30fc\u30c8\u306a AI' title='\u30de\u30b9\u30c8\u30d8\u30c3\u30c9'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>\u30d6\u30ed\u30b0<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>\u9ad8\u5ea6\u306a\u77e5\u80fd\uff1aHero AI \u304c 3 \u500d\u306e\u898f\u6a21\u3092\u6301\u3064\u30e2\u30c7\u30eb\u3092\u642d\u8f09<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>\u7d9a\u304d\u3092\u8aad\u3080<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"<p>Are you looking to automate the triage of security alert data from Splunk? Watch this use case demo to learn how Swimlane can automate the alert triage process while integrating with Splunk, VirusTotal and Symantec Endpoint Protection.<\/p>","protected":false},"author":43,"featured_media":38067,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":38067,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[206,105],"resource-topic":[132,136],"resource-industry":[108,121,99],"blog-category":[],"class_list":["post-38065","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-demo","resource-type-videos","resource-topic-platform","resource-topic-soar","resource-industry-use-case","resource-industry-threat-hunting","resource-industry-alert-triage"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Automating Splunk Alert Triage Demo (4:11)<\/title>\n<meta name=\"description\" content=\"Splunk and Swimlane are shown as powerful combination for managing Alert Triage in this webinar.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ja\/\u30ea\u30bd\u30fc\u30b9-2\/\u30d3\u30c7\u30aa\/\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9ioc\u30eb\u30c3\u30af\u30a2\u30c3\u30d7\u306e\u30e6\u30fc\u30b9\u30b1\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Threat Intelligence &amp; IOC Lookup Use Case\" \/>\n<meta property=\"og:description\" content=\"Splunk and Swimlane are shown as powerful combination for managing Alert Triage in this webinar.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ja\/\u30ea\u30bd\u30fc\u30b9-2\/\u30d3\u30c7\u30aa\/\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9ioc\u30eb\u30c3\u30af\u30a2\u30c3\u30d7\u306e\u30e6\u30fc\u30b9\u30b1\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-01T17:52:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/THREAT-INT-IOC-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"1\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/resources\\\/videos\\\/threat-intelligence-ioc-lookup-use-case\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/resources\\\/videos\\\/threat-intelligence-ioc-lookup-use-case\\\/\",\"name\":\"Automating Splunk Alert Triage Demo (4:11)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/resources\\\/videos\\\/threat-intelligence-ioc-lookup-use-case\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/resources\\\/videos\\\/threat-intelligence-ioc-lookup-use-case\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/THREAT-INT-IOC-1.png\",\"datePublished\":\"2024-04-30T20:52:14+00:00\",\"dateModified\":\"2025-10-01T17:52:42+00:00\",\"description\":\"Splunk and Swimlane are shown as powerful combination for managing Alert Triage in this webinar.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/resources\\\/videos\\\/threat-intelligence-ioc-lookup-use-case\\\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/swimlane.com\\\/ja\\\/resources\\\/videos\\\/threat-intelligence-ioc-lookup-use-case\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/resources\\\/videos\\\/threat-intelligence-ioc-lookup-use-case\\\/#primaryimage\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/THREAT-INT-IOC-1.png\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/THREAT-INT-IOC-1.png\",\"width\":1280,\"height\":720,\"caption\":\"Technical interface displaying automated threat intelligence research and IOC analysis workflows.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/resources\\\/videos\\\/threat-intelligence-ioc-lookup-use-case\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/swimlane.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Threat Intelligence &amp; IOC Lookup Use Case\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/#website\",\"url\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/swimlane\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/swimlane\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Splunk \u30a2\u30e9\u30fc\u30c8\u30c8\u30ea\u30a2\u30fc\u30b8\u306e\u81ea\u52d5\u5316\u30c7\u30e2 (4:11)","description":"\u3053\u306e\u30a6\u30a7\u30d3\u30ca\u30fc\u3067\u306f\u3001\u30a2\u30e9\u30fc\u30c8 \u30c8\u30ea\u30a2\u30fc\u30b8\u3092\u7ba1\u7406\u3059\u308b\u305f\u3081\u306e\u5f37\u529b\u306a\u7d44\u307f\u5408\u308f\u305b\u3068\u3057\u3066 Splunk \u3068 Swimlane \u3092\u7d39\u4ecb\u3057\u307e\u3059\u3002.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ja\/\u30ea\u30bd\u30fc\u30b9-2\/\u30d3\u30c7\u30aa\/\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9ioc\u30eb\u30c3\u30af\u30a2\u30c3\u30d7\u306e\u30e6\u30fc\u30b9\u30b1\/","og_locale":"ja_JP","og_type":"article","og_title":"Threat Intelligence &amp; IOC Lookup Use Case","og_description":"Splunk and Swimlane are shown as powerful combination for managing Alert Triage in this webinar.","og_url":"https:\/\/swimlane.com\/ja\/\u30ea\u30bd\u30fc\u30b9-2\/\u30d3\u30c7\u30aa\/\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9ioc\u30eb\u30c3\u30af\u30a2\u30c3\u30d7\u306e\u30e6\u30fc\u30b9\u30b1\/","og_site_name":"AI Security Automation","article_modified_time":"2025-10-01T17:52:42+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/THREAT-INT-IOC-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"1\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ja\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/","url":"https:\/\/swimlane.com\/ja\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/","name":"Splunk \u30a2\u30e9\u30fc\u30c8\u30c8\u30ea\u30a2\u30fc\u30b8\u306e\u81ea\u52d5\u5316\u30c7\u30e2 (4:11)","isPartOf":{"@id":"https:\/\/swimlane.com\/ja\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ja\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ja\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/THREAT-INT-IOC-1.png","datePublished":"2024-04-30T20:52:14+00:00","dateModified":"2025-10-01T17:52:42+00:00","description":"\u3053\u306e\u30a6\u30a7\u30d3\u30ca\u30fc\u3067\u306f\u3001\u30a2\u30e9\u30fc\u30c8 \u30c8\u30ea\u30a2\u30fc\u30b8\u3092\u7ba1\u7406\u3059\u308b\u305f\u3081\u306e\u5f37\u529b\u306a\u7d44\u307f\u5408\u308f\u305b\u3068\u3057\u3066 Splunk \u3068 Swimlane \u3092\u7d39\u4ecb\u3057\u307e\u3059\u3002.","breadcrumb":{"@id":"https:\/\/swimlane.com\/ja\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ja\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/swimlane.com\/ja\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/THREAT-INT-IOC-1.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/THREAT-INT-IOC-1.png","width":1280,"height":720,"caption":"Technical interface displaying automated threat intelligence research and IOC analysis workflows."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ja\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Threat Intelligence &amp; IOC Lookup Use Case"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ja\/#website","url":"https:\/\/swimlane.com\/ja\/","name":"\u30ed\u30fc\u30b3\u30fc\u30c9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\uff06SOAR\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\uff5c\u30b9\u30a4\u30e0\u30ec\u30fc\u30f3","description":"\u3042\u3089\u3086\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6a5f\u80fd\u3092\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u578bAI\u3067\u81ea\u52d5\u5316","publisher":{"@id":"https:\/\/swimlane.com\/ja\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ja\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ja\/#organization","name":"\u30ed\u30fc\u30b3\u30fc\u30c9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\uff06SOAR\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\uff5c\u30b9\u30a4\u30e0\u30ec\u30fc\u30f3","url":"https:\/\/swimlane.com\/ja\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/38065","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/users\/43"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/38065\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/media\/38067"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/media?parent=38065"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/tags?post=38065"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-type?post=38065"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-topic?post=38065"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-industry?post=38065"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/blog-category?post=38065"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}