{"id":45499,"date":"2025-02-26T13:51:47","date_gmt":"2025-02-26T20:51:47","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=45499"},"modified":"2025-03-31T22:14:02","modified_gmt":"2025-04-01T04:14:02","slug":"%e8%84%86%e5%bc%b1%e6%80%a7%e7%ae%a1%e7%90%86%e3%81%ae%e7%b6%ad%e6%8c%81","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ja\/resources\/webinar-keeping-up-with-vulnerability-management\/","title":{"rendered":"\u8106\u5f31\u6027\u7ba1\u7406\u3092\u9806\u8abf\u306b\u884c\u3063\u3066\u3044\u307e\u3059\u304b?"},"content":{"rendered":"\n<section class=\"bs-section bs-section-0ace0c84eaa888bce49c4f2de89bf8347ace13a6 bs-section---default bs-section--common-header-with-form  \"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-12   bs-column-5f6574ebb29ac8d58ab608d2aff5b1bbe4f96332 bs-column---default     \"><div class=\"bs-lottie-animator bs-lottie-animator---default\" id=\"lottie-c7d5ff8e-a115-40ae-aecb-0a84b90fe739\" data-settings=\"{&quot;desktop&quot;:{&quot;settings&quot;:{&quot;animateViewPort&quot;:0.5,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;Contact_lines1.json&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:1,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Contact_lines1.json&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}},&quot;mobile&quot;:{&quot;breakpoint&quot;:576,&quot;settings&quot;:{&quot;animateViewPort&quot;:50,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:0,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}}}\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column  col-sm-0 col-md-10   bs-column-e324ba46e668efb8a167f6c6f82d98452b10172b bs-column---default     \"><h1 style=\"font-style:normal;font-weight:400;\" class=\"common-header__gated-page wp-block-post-title has-text-color has-black-color\">Are You Keeping Up with Vulnerability Management?<\/h1>\n\n\n<p><span style=\"font-weight: 400;\">Fragmented data, siloed risk scoring, and poor collaboration can leave your organization vulnerable. Watch this webinar to learn how Swimlane\u2019s hyperautomation can help you prioritize critical vulnerabilities, streamline workflows, reduce manual costs, and transform your vulnerability management processes with AI-driven efficiency.<\/span><\/p>\n\n\n\n<script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script><script src=\"https:\/\/fast.wistia.com\/embed\/0nhrhu82b3.js\" async type=\"module\"><\/script><style>wistia-player[media-id='0nhrhu82b3']:not(:defined) { background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/0nhrhu82b3\/swatch'); display: block; filter: blur(5px); padding-top:56.25%; }<\/style> <wistia-player media-id=\"0nhrhu82b3\" aspect=\"1.7777777777777777\"><\/wistia-player>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-14ca56fdc3be4b5f0a8616120c8005c221b5c55b bs-section---default bs-section--related-items  \"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-12   bs-column-5f6574ebb29ac8d58ab608d2aff5b1bbe4f96332 bs-column---default     \">\n<h2 class=\"wp-block-heading has-deep-color has-text-color\" id=\"h-you-might-also-be-interested-in\">You Might Also Be Interested in<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-12   bs-column-33aba5295b76f4052fb226277a0b4e1e4747889c bs-column---default     \">\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69ece4421c29c bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/automating-vulnerability-lifecycle-management\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-37.png' class='img-fluid' alt='How to Automate Vulnerability Management Processes ' title='Masthead'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Blog<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Vulnerability Management Automation: Here\u2019s Why You Need it<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69ece4421de8b bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/resources\/reports\/vulnerability-management\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/OG-VulMan.png' class='img-fluid' alt='' title='OG VulMan'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Report<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Under Pressure: Is Vulnerability Management Keeping Up?<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69ece4421f9a3 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/resources\/e-books\/ai-automation-beyond-soar\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/OG-Extend-Beyond-SOAR.png' class='img-fluid' alt='automation-readiness-matrix' title='OG Extend Beyond SOAR'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>E-book<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Extend Beyond SOAR: Step into the Future with AI Automation\u00a0<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":43,"featured_media":45500,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":true,"featured_image":43972,"learn_more_label":"Watch Now","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[116],"resource-topic":[223,132],"resource-industry":[],"blog-category":[],"class_list":["post-45499","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-webinars","resource-topic-vulnerability-management","resource-topic-platform"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Webinar: Are You Keeping Up with Vulnerability Management? | Swimlane<\/title>\n<meta name=\"description\" content=\"Discover how AI and hyperautomation can transform vulnerability management, prioritize risks, and streamline workflows to protect you against costly breaches and penalties.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ja\/\u30ea\u30bd\u30fc\u30b9-2\/\u8106\u5f31\u6027\u7ba1\u7406\u306e\u6700\u65b0\u60c5\u5831\u306b\u95a2\u3059\u308b\u30a6\u30a7\u30d3\u30ca\u30fc\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are You Keeping Up with Vulnerability Management?\" \/>\n<meta property=\"og:description\" content=\"Discover how AI and hyperautomation can transform vulnerability management, prioritize risks, and streamline workflows to protect you against costly breaches and penalties.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ja\/\u30ea\u30bd\u30fc\u30b9-2\/\u8106\u5f31\u6027\u7ba1\u7406\u306e\u6700\u65b0\u60c5\u5831\u306b\u95a2\u3059\u308b\u30a6\u30a7\u30d3\u30ca\u30fc\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-01T04:14:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/Vul2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"Discover how AI and hyperautomation can transform vulnerability management, prioritize risks, and streamline workflows to protect you against costly breaches and penalties.\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"1\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/resources\\\/webinar-keeping-up-with-vulnerability-management\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/resources\\\/webinar-keeping-up-with-vulnerability-management\\\/\",\"name\":\"Webinar: Are You Keeping Up with Vulnerability Management? | Swimlane\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/resources\\\/webinar-keeping-up-with-vulnerability-management\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/resources\\\/webinar-keeping-up-with-vulnerability-management\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/Vul2.png\",\"datePublished\":\"2025-02-26T20:51:47+00:00\",\"dateModified\":\"2025-04-01T04:14:02+00:00\",\"description\":\"Discover how AI and hyperautomation can transform vulnerability management, prioritize risks, and streamline workflows to protect you against costly breaches and penalties.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/resources\\\/webinar-keeping-up-with-vulnerability-management\\\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/swimlane.com\\\/ja\\\/resources\\\/webinar-keeping-up-with-vulnerability-management\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/resources\\\/webinar-keeping-up-with-vulnerability-management\\\/#primaryimage\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/Vul2.png\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/Vul2.png\",\"width\":640,\"height\":360},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/resources\\\/webinar-keeping-up-with-vulnerability-management\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/swimlane.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Are You Keeping Up with Vulnerability Management?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/#website\",\"url\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/swimlane\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/swimlane\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u30a6\u30a7\u30d3\u30ca\u30fc: \u8106\u5f31\u6027\u7ba1\u7406\u3092\u304d\u3061\u3093\u3068\u884c\u3063\u3066\u3044\u307e\u3059\u304b? | Swimlane","description":"AI \u3068\u30cf\u30a4\u30d1\u30fc\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\u306b\u3088\u3063\u3066\u8106\u5f31\u6027\u7ba1\u7406\u3092\u5909\u9769\u3057\u3001\u30ea\u30b9\u30af\u306e\u512a\u5148\u9806\u4f4d\u4ed8\u3051\u3092\u884c\u3044\u3001\u30ef\u30fc\u30af\u30d5\u30ed\u30fc\u3092\u5408\u7406\u5316\u3057\u3066\u3001\u30b3\u30b9\u30c8\u306e\u304b\u304b\u308b\u9055\u53cd\u3084\u7f70\u91d1\u304b\u3089\u4fdd\u8b77\u3059\u308b\u65b9\u6cd5\u3092\u3054\u89a7\u304f\u3060\u3055\u3044\u3002.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ja\/\u30ea\u30bd\u30fc\u30b9-2\/\u8106\u5f31\u6027\u7ba1\u7406\u306e\u6700\u65b0\u60c5\u5831\u306b\u95a2\u3059\u308b\u30a6\u30a7\u30d3\u30ca\u30fc\/","og_locale":"ja_JP","og_type":"article","og_title":"Are You Keeping Up with Vulnerability Management?","og_description":"Discover how AI and hyperautomation can transform vulnerability management, prioritize risks, and streamline workflows to protect you against costly breaches and penalties.","og_url":"https:\/\/swimlane.com\/ja\/\u30ea\u30bd\u30fc\u30b9-2\/\u8106\u5f31\u6027\u7ba1\u7406\u306e\u6700\u65b0\u60c5\u5831\u306b\u95a2\u3059\u308b\u30a6\u30a7\u30d3\u30ca\u30fc\/","og_site_name":"AI Security Automation","article_modified_time":"2025-04-01T04:14:02+00:00","og_image":[{"width":640,"height":360,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/Vul2.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_description":"Discover how AI and hyperautomation can transform vulnerability management, prioritize risks, and streamline workflows to protect you against costly breaches and penalties.","twitter_site":"@swimlane","twitter_misc":{"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"1\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ja\/resources\/webinar-keeping-up-with-vulnerability-management\/","url":"https:\/\/swimlane.com\/ja\/resources\/webinar-keeping-up-with-vulnerability-management\/","name":"\u30a6\u30a7\u30d3\u30ca\u30fc: \u8106\u5f31\u6027\u7ba1\u7406\u3092\u304d\u3061\u3093\u3068\u884c\u3063\u3066\u3044\u307e\u3059\u304b? | Swimlane","isPartOf":{"@id":"https:\/\/swimlane.com\/ja\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ja\/resources\/webinar-keeping-up-with-vulnerability-management\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ja\/resources\/webinar-keeping-up-with-vulnerability-management\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Vul2.png","datePublished":"2025-02-26T20:51:47+00:00","dateModified":"2025-04-01T04:14:02+00:00","description":"AI \u3068\u30cf\u30a4\u30d1\u30fc\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\u306b\u3088\u3063\u3066\u8106\u5f31\u6027\u7ba1\u7406\u3092\u5909\u9769\u3057\u3001\u30ea\u30b9\u30af\u306e\u512a\u5148\u9806\u4f4d\u4ed8\u3051\u3092\u884c\u3044\u3001\u30ef\u30fc\u30af\u30d5\u30ed\u30fc\u3092\u5408\u7406\u5316\u3057\u3066\u3001\u30b3\u30b9\u30c8\u306e\u304b\u304b\u308b\u9055\u53cd\u3084\u7f70\u91d1\u304b\u3089\u4fdd\u8b77\u3059\u308b\u65b9\u6cd5\u3092\u3054\u89a7\u304f\u3060\u3055\u3044\u3002.","breadcrumb":{"@id":"https:\/\/swimlane.com\/ja\/resources\/webinar-keeping-up-with-vulnerability-management\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ja\/resources\/webinar-keeping-up-with-vulnerability-management\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/swimlane.com\/ja\/resources\/webinar-keeping-up-with-vulnerability-management\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/Vul2.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Vul2.png","width":640,"height":360},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ja\/resources\/webinar-keeping-up-with-vulnerability-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Are You Keeping Up with Vulnerability Management?"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ja\/#website","url":"https:\/\/swimlane.com\/ja\/","name":"\u30ed\u30fc\u30b3\u30fc\u30c9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\uff06SOAR\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\uff5c\u30b9\u30a4\u30e0\u30ec\u30fc\u30f3","description":"\u3042\u3089\u3086\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6a5f\u80fd\u3092\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u578bAI\u3067\u81ea\u52d5\u5316","publisher":{"@id":"https:\/\/swimlane.com\/ja\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ja\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ja\/#organization","name":"\u30ed\u30fc\u30b3\u30fc\u30c9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\uff06SOAR\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\uff5c\u30b9\u30a4\u30e0\u30ec\u30fc\u30f3","url":"https:\/\/swimlane.com\/ja\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/45499","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/users\/43"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/45499\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/media\/45500"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/media?parent=45499"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/tags?post=45499"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-type?post=45499"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-topic?post=45499"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-industry?post=45499"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/blog-category?post=45499"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}