{"id":42770,"date":"2024-10-29T18:08:01","date_gmt":"2024-10-30T00:08:01","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=42770"},"modified":"2026-03-09T02:10:23","modified_gmt":"2026-03-09T08:10:23","slug":"%e8%87%aa%e5%8b%95soc%e6%a4%9c%e5%87%ba%e3%82%a8%e3%83%b3%e3%82%b8%e3%83%8b%e3%82%a2%e3%83%aa%e3%83%b3%e3%82%b0","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ja\/blog\/automated-soc-detection-engineering\/","title":{"rendered":"\u81ea\u52d5\u5316\uff1a\u52b9\u679c\u7684\u306a\u8105\u5a01\u691c\u51fa\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u306e\u89e6\u5a92\u00a0"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-6770b3369b6c61539d3140cb52ed6bc5ec393625 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-16.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Automation: The Catalyst for Effective Threat Detection Engineering\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-16.jpg 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-16-300x178.jpg 300w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-16-1024x609.jpg 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-16-768x457.jpg 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-2ba18c9b6304620af4785b54fe900bf0ce0fc4d5 bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2024-10-29T18:08:01-06:00\">10\u6708 29, 2024<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Automation: The Catalyst for Effective Threat Detection Engineering\u00a0<\/h1>\n\n\n<div class=\"bs-div bs-div-4c0c357bf69b7e1367afb30b9d59be1945441399 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/ja\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">4 <\/span> Minute Read\n<\/div>\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\"><\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-205a03f93391472c82564395e3b5684e68c8ef7d bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-fa02c15a19a9c2952663733986e45d4eef708638 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/ja\/blog\/automated-soc-detection-engineering\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/ja\/blog\/automated-soc-detection-engineering\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Automation%3A%20The%20Catalyst%20for%20Effective%20Threat%20Detection%20Engineering%C2%A0').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fautomated-soc-detection-engineering%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Automation%3A%20The%20Catalyst%20for%20Effective%20Threat%20Detection%20Engineering&url=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fautomated-soc-detection-engineering%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fautomated-soc-detection-engineering%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fautomated-soc-detection-engineering%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-0d83d6d9863f92131cc95492d42e5b50c72f00bb bs-column---default bs-column--contents     \">\n<h2 class=\"wp-block-heading\">Automation: The Catalyst for Effective Threat Detection Engineering&nbsp;<\/h2>\n\n\n\n<p>It is no secret that <a href=\"https:\/\/swimlane.com\/blog\/soc-team-roles-responsibilities\/\">security operations center (SOC) teams<\/a> are inundated with more alerts than they can keep pace with. That&#8217;s why <a href=\"https:\/\/swimlane.com\/product\/soc-automation-solution\/\">SOC automation<\/a> is a necessity for common processes like alert triage, threat hunting, and incident response. But <a href=\"https:\/\/swimlane.com\/blog\/why-soc-automation\/\">what is SOC automation?<\/a>&nbsp;<strong>SOC automation<\/strong>&nbsp;is the use of AI and technology to streamline tasks in the SOC so teams can work faster, smarter, and with less manual effort.<\/p>\n\n\n\n<p>For effective security operations (SecOps) the collaboration between <a href=\"https:\/\/swimlane.com\/blog\/top-soc-analyst-challenges\/\">SOC Analysts<\/a> and Detection Engineers is more critical than ever. Automation emerges as a transformative force in this context, enhancing the synergy between these two vital roles. By streamlining repetitive tasks, reducing alert fatigue, and providing real-time insights, automation not only empowers SOC Analysts to focus on high-priority investigations but also enables Detection Engineers to refine and adapt their detection rules more effectively.&nbsp;<\/p>\n\n\n\n<p>This introduction of automated detection engineering workflows promotes a more collaborative environment, allowing both teams to work in harmony, share critical information seamlessly, and respond to incidents with greater agility. Ultimately, automation is the catalyst for more efficient and proactive security operations, ensuring that organizations can stay one step ahead of emerging threats.<\/p>\n\n\n\n<p>Before we dive into how<a href=\"https:\/\/swimlane.com\/swimlane-turbine\/\"> Swimlane Turbine<\/a> helps improve detection engineering, it\u2019s important to understand the role that detection engineers play in SecOps.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Basics of Threat Detection Engineering&nbsp;<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">What is the role of a Detection Engineer in a SOC?<\/h3>\n\n\n\n<p>A Detection Engineer specializes in creating and fine-tuning detection capabilities within a SOC. Their primary objective is to identify potential threats before they cause damage.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is the relationship between Detection Engineers and SOC Analysts?<\/h3>\n\n\n\n<p>While Detection Engineers are focused on building and fine-tuning detection capabilities, SOC Analysts are on the front lines, actively monitoring alerts, investigating incidents, and responding to threats. The relationship between these roles is collaborative and essential for a robust security posture.&nbsp; Here are the three typical scenarios in which these teams work together:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Alert Management:<\/strong> Detection Engineers typically focus on creating and fine-tuning detection rules based on known threats and vulnerabilities, while SOC Analysts use those rules to monitor, investigate, and respond to alerts generated by security systems. When an alert is triggered by a<a href=\"https:\/\/swimlane.com\/solutions\/use-cases\/siem-alert-triage\/\"> security information and event management (SIEM)<\/a> or an <a href=\"https:\/\/swimlane.com\/blog\/swimlane-edr\/\">endpoint detection and response (EDR<\/a>) tool to determine if it is a true threat or a false positive. Effective communication between the two roles helps refine alert tuning and reduce unnecessary false positives&nbsp;<\/li>\n\n\n\n<li><strong>Feedback Loop: <\/strong>SOC Analysts provide valuable feedback to Detection Engineers based on their experience with alerts. If certain alerts are frequently false positives or fail to catch real threats, analysts can communicate this information, enabling Detection Engineers to adjust detection rules accordingly. This feedback loop is crucial to continuous improvement in the detection process&nbsp;<\/li>\n\n\n\n<li><strong>Knowledge Sharing: <\/strong>Detection Engineers and SOC Analysts will participate in joint sessions where they share knowledge about new threats, detection techniques, and <a href=\"https:\/\/swimlane.com\/blog\/incident-response\/\">incident response <\/a>strategies. This collaboration helps to foster a broader understanding of both detections and real-world scenarios.&nbsp;<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Enter The Swimlane Turbine Detection Engineering Extension&nbsp;<\/h2>\n\n\n\n<p>Swimlane Turbine is an AI-enhanced security automation platform. The platform is complemented by an ever-expanding list of pre-built connectors, solutions, extensions, widgets, and components available in <a href=\"https:\/\/marketplace.swimlane.com\/\">Swimlane Marketplace. <\/a>Automation extensions are plug-and-play-ready enhancements that boost platform functionality. Keep reading to learn more about the new <a href=\"https:\/\/turbine-marketplace.swimlane.com\/en-US\/apps\/451768\/detection-engineering\">Detection Engineering Extension <\/a>that\u2019s available in Swimlane Marketplace today.&nbsp;<\/p>\n\n\n\n<p>The Swimlane Detection Engineering Extension is designed to give Detection Engineers and SOC Analysts the necessary tools and processes to effectively identify and iterate detections to ensure continuous improvement and optimal performance of SOC detection capabilities. Here is a high-level workflow diagram illustrating how it works.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"625\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Screenshot-2024-10-29-at-5.56.53\u202fPM-1024x625.png\" alt=\"Swimlane Detection Engineering Extension is designed to give Detection Engineers and SOC Analysts the necessary tools and processes to effectively identify and iterate detections to ensure continuous improvement and optimal performance of SOC detection capabilities. \n\nThis image is a high-level workflow diagram illustrating how it works. \n\n\" class=\"wp-image-42771\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/Screenshot-2024-10-29-at-5.56.53\u202fPM-1024x625.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/Screenshot-2024-10-29-at-5.56.53\u202fPM-300x183.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/Screenshot-2024-10-29-at-5.56.53\u202fPM-768x469.png 768w, https:\/\/swimlane.com\/wp-content\/uploads\/Screenshot-2024-10-29-at-5.56.53\u202fPM-1536x937.png 1536w, https:\/\/swimlane.com\/wp-content\/uploads\/Screenshot-2024-10-29-at-5.56.53\u202fPM-2048x1250.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">3 Key Features &amp; Capabilities of the Swimlane Turbine Detection Engineering Extension&nbsp;<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Threat Model Process Widget&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>Detection Engineers can build new detections using a best-in-class detection engineering process to ensure coverage of new and emerging threats. The extension offers a prescribed threat model workflow for a Detection Engineer to apply best practices to step through and log the detection.&nbsp;<\/p>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li>Security Incident Closure Codes&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>SOC Analysts will be able to identify and set relevant Detection Engineering closure codes. These codes are purpose-built templates designed to make it easier to measure detection efficacy. These closure codes help SOC Analysts and Detection Engineers collaborate seamlessly within Swimlane Turbine to facilitate knowledge sharing and promptly make improvements to detections.&nbsp;<\/p>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li>Detection Engineering Dashboard<\/li>\n<\/ol>\n\n\n\n<p>SOC Analysts and Detection Engineers can easily review their organization&#8217;s overall detection posture using an <a href=\"https:\/\/swimlane.com\/platform\/dashboards-reports\/\">out-of-the-box dashboard<\/a> in Turbine. The dashboard includes a detection status widget that makes it easy to see the total number of detections in common stages like backlog, scoping, designing, building, staging, and production. The dashboard Sankey Chart shows which network log sources feed into detection tools, aiding in prioritizing detections. <\/p>\n\n\n\n<p>View<a href=\"https:\/\/swimlane.com\/resources\/demo\/guided-tour\/detection-engineering-extension\/\"> this guided tour of the Turbine Detection Engineering Extension <\/a>to see how these features all come together.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">In Conclusion<\/h2>\n\n\n\n<p>As cybersecurity threats continue to evolve, Swimlane\u2019s Detection Engineering extension is front and center to help security organizations facilitate better communication and collaboration between teams. As Detection Engineers and SOC teams use the Swimlane Detection Engineering Extension, they can ensure that organizations swiftly adapt to the changing threat landscape, and safeguard their customers&#8217; digital assets and environments.&nbsp;<\/p>\n\n\n\n<p>To see how Swimlane Turbine can support your SOC team, <a href=\"https:\/\/swimlane.com\/demo\">request a demo.<\/a><\/p>\n\n\n\n<div class=\"bs-div bs-div-780504ec595335944e97a5b9e1877653f3fe2723 bs-div---default\"><div class=\"bs-div__inner     \">\n<div class=\"bs-div bs-div-26ee523e4f799dedbe8ec98e9f7099c403a91e65 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-26ee523e4f799dedbe8ec98e9f7099c403a91e65 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/DragDrop.gif' class='img-fluid'   alt='roi report swimlane security automation' title='' data-gif= \"https:\/\/swimlane.com\/wp-content\/uploads\/DragDrop.gif\" \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-773aef0a3852274bc6b23f7985e05efd194e399e bs-div---default\"><div class=\"bs-div__inner     \">\n<h3 class=\"wp-block-heading\" id=\"h-request-a-demo\">Request a demo<\/h3>\n\n\n\n<p>If you haven&#8217;t had the chance to explore Swimlane Turbine yet, request a demo.&nbsp;<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-078aa68c1c1a15a1c52da6836cdacef3d9f389d4\"><style>.bs-pro-button-p-btn-078aa68c1c1a15a1c52da6836cdacef3d9f389d4 .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/demo\/\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Request a Demo<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-0ad64702520e52820989c3b8a4a5574abd826112 bs-column---default     \">\n<div class=\"bs-div bs-div-f0851be86a4542da358c10ec17ccebffa17efe07 bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/ja\/tag\/automation\/'><span class='tag-content'>Automation<\/span><\/a><a href='https:\/\/swimlane.com\/ja\/tag\/soc\/'><span class='tag-content'>SOC<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-5e7267355d8caf36f5b5e0c86eef387b664b848d bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69eb4c3a1f308 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/vulnerability-and-patch-management\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>3\u6708 3, 2026<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Vulnerability Management vs. Patch Management Explained<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69eb4c3a20931 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/tips-to-simplify-security-automation-adoption\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>9\u6708 9, 2024<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>6 Tips to Simplify Security Automation Adoption<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69eb4c3a21e5a bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/soc-management-with-swimlane\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>8\u6708 22, 2024<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>How Swimlane Can Help SOC Management<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69eb4c3a231b6 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/rv-connex-customer-story\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>12\u6708 20, 2023<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Why RV Connex Chose Swimlane As \u201cThe Powerhouse\u201d Of Their SOC<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":42772,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":42773,"learn_more_label":"","image_alt_text":"Automation: The Catalyst for Effective Threat Detection Engineering\u00a0","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[199,236],"resource-type":[67],"resource-topic":[],"resource-industry":[93],"blog-category":[75],"class_list":["post-42770","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-soc","tag-automation","resource-type-blogs","resource-industry-automation","blog-category-security-automation"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Automation: The Catalyst for Effective Threat Detection Engineering<\/title>\n<meta name=\"description\" content=\"Explore how automation enhances threat detection engineering, boosting SOC collaboration, reducing alert fatigue, and enabling proactive security to outpace threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u81ea\u52d5soc\u691c\u51fa\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Automation: The Catalyst for Effective Threat Detection Engineering\" \/>\n<meta property=\"og:description\" content=\"Explore how automation enhances threat detection engineering, boosting SOC collaboration, reducing alert fatigue, and enabling proactive security to outpace threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u81ea\u52d5soc\u691c\u51fa\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-09T08:10:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/SocialTile-11.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Automation: The Catalyst for Effective Threat Detection Engineering\" \/>\n<meta name=\"twitter:description\" content=\"Explore how automation enhances threat detection engineering, boosting SOC collaboration, reducing alert fatigue, and enabling proactive security to outpace threats.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/SocialTile-11.jpg\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"5\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/blog\\\/automated-soc-detection-engineering\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/blog\\\/automated-soc-detection-engineering\\\/\",\"name\":\"Automation: The Catalyst for Effective Threat Detection Engineering\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/blog\\\/automated-soc-detection-engineering\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/blog\\\/automated-soc-detection-engineering\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/Masthead-16.jpg\",\"datePublished\":\"2024-10-30T00:08:01+00:00\",\"dateModified\":\"2026-03-09T08:10:23+00:00\",\"description\":\"Explore how automation enhances threat detection engineering, boosting SOC collaboration, reducing alert fatigue, and enabling proactive security to outpace threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/blog\\\/automated-soc-detection-engineering\\\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/swimlane.com\\\/ja\\\/blog\\\/automated-soc-detection-engineering\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/blog\\\/automated-soc-detection-engineering\\\/#primaryimage\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/Masthead-16.jpg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/Masthead-16.jpg\",\"width\":1120,\"height\":666,\"caption\":\"Automation: The Catalyst for Effective Threat Detection Engineering\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/blog\\\/automated-soc-detection-engineering\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/swimlane.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Automation: The Catalyst for Effective Threat Detection Engineering\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/#website\",\"url\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/swimlane\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/swimlane\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u81ea\u52d5\u5316\uff1a\u52b9\u679c\u7684\u306a\u8105\u5a01\u691c\u51fa\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u306e\u89e6\u5a92","description":"\u81ea\u52d5\u5316\u306b\u3088\u3063\u3066\u8105\u5a01\u691c\u51fa\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u304c\u5f37\u5316\u3055\u308c\u3001SOC \u306e\u9023\u643a\u304c\u4fc3\u9032\u3055\u308c\u3001\u30a2\u30e9\u30fc\u30c8\u75b2\u52b4\u304c\u8efd\u6e1b\u3055\u308c\u3001\u8105\u5a01\u306b\u5148\u3093\u3058\u308b\u30d7\u30ed\u30a2\u30af\u30c6\u30a3\u30d6\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u304c\u5b9f\u73fe\u3055\u308c\u308b\u4ed5\u7d44\u307f\u306b\u3064\u3044\u3066\u8aac\u660e\u3057\u307e\u3059\u3002.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u81ea\u52d5soc\u691c\u51fa\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\/","og_locale":"ja_JP","og_type":"article","og_title":"Automation: The Catalyst for Effective Threat Detection Engineering","og_description":"Explore how automation enhances threat detection engineering, boosting SOC collaboration, reducing alert fatigue, and enabling proactive security to outpace threats.","og_url":"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u81ea\u52d5soc\u691c\u51fa\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\/","og_site_name":"AI Security Automation","article_modified_time":"2026-03-09T08:10:23+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/SocialTile-11.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"Automation: The Catalyst for Effective Threat Detection Engineering","twitter_description":"Explore how automation enhances threat detection engineering, boosting SOC collaboration, reducing alert fatigue, and enabling proactive security to outpace threats.","twitter_image":"https:\/\/swimlane.com\/wp-content\/uploads\/SocialTile-11.jpg","twitter_site":"@swimlane","twitter_misc":{"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"5\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ja\/blog\/automated-soc-detection-engineering\/","url":"https:\/\/swimlane.com\/ja\/blog\/automated-soc-detection-engineering\/","name":"\u81ea\u52d5\u5316\uff1a\u52b9\u679c\u7684\u306a\u8105\u5a01\u691c\u51fa\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u306e\u89e6\u5a92","isPartOf":{"@id":"https:\/\/swimlane.com\/ja\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ja\/blog\/automated-soc-detection-engineering\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ja\/blog\/automated-soc-detection-engineering\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-16.jpg","datePublished":"2024-10-30T00:08:01+00:00","dateModified":"2026-03-09T08:10:23+00:00","description":"\u81ea\u52d5\u5316\u306b\u3088\u3063\u3066\u8105\u5a01\u691c\u51fa\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u304c\u5f37\u5316\u3055\u308c\u3001SOC \u306e\u9023\u643a\u304c\u4fc3\u9032\u3055\u308c\u3001\u30a2\u30e9\u30fc\u30c8\u75b2\u52b4\u304c\u8efd\u6e1b\u3055\u308c\u3001\u8105\u5a01\u306b\u5148\u3093\u3058\u308b\u30d7\u30ed\u30a2\u30af\u30c6\u30a3\u30d6\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u304c\u5b9f\u73fe\u3055\u308c\u308b\u4ed5\u7d44\u307f\u306b\u3064\u3044\u3066\u8aac\u660e\u3057\u307e\u3059\u3002.","breadcrumb":{"@id":"https:\/\/swimlane.com\/ja\/blog\/automated-soc-detection-engineering\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ja\/blog\/automated-soc-detection-engineering\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/swimlane.com\/ja\/blog\/automated-soc-detection-engineering\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-16.jpg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-16.jpg","width":1120,"height":666,"caption":"Automation: The Catalyst for Effective Threat Detection Engineering"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ja\/blog\/automated-soc-detection-engineering\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Automation: The Catalyst for Effective Threat Detection Engineering\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ja\/#website","url":"https:\/\/swimlane.com\/ja\/","name":"\u30ed\u30fc\u30b3\u30fc\u30c9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\uff06SOAR\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\uff5c\u30b9\u30a4\u30e0\u30ec\u30fc\u30f3","description":"\u3042\u3089\u3086\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6a5f\u80fd\u3092\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u578bAI\u3067\u81ea\u52d5\u5316","publisher":{"@id":"https:\/\/swimlane.com\/ja\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ja\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ja\/#organization","name":"\u30ed\u30fc\u30b3\u30fc\u30c9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\uff06SOAR\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\uff5c\u30b9\u30a4\u30e0\u30ec\u30fc\u30f3","url":"https:\/\/swimlane.com\/ja\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/42770","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":1,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/42770\/revisions"}],"predecessor-version":[{"id":54753,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/42770\/revisions\/54753"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/media\/42772"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/media?parent=42770"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/tags?post=42770"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-type?post=42770"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-topic?post=42770"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-industry?post=42770"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/blog-category?post=42770"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}