{"id":51148,"date":"2025-10-14T16:56:51","date_gmt":"2025-10-14T22:56:51","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=51148"},"modified":"2026-03-30T05:15:02","modified_gmt":"2026-03-30T11:15:02","slug":"%e3%83%aa%e3%82%b9%e3%82%af%e3%83%99%e3%83%bc%e3%82%b9%e3%81%ae%e8%84%86%e5%bc%b1%e6%80%a7%e7%ae%a1%e7%90%86","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ja\/blog\/risk-based-vulnerability-management\/","title":{"rendered":"\u30ea\u30b9\u30af\u30d9\u30fc\u30b9\u306e\u8106\u5f31\u6027\u7ba1\u7406\uff1a\u672c\u5f53\u306b\u91cd\u8981\u306a\u3053\u3068\u3092\u512a\u5148\u3059\u308b"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-6770b3369b6c61539d3140cb52ed6bc5ec393625 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-60.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Digital security shield with lock icon over microchip background representing data protection, encryption, and cyber defense automation.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-60.jpg 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-60-300x178.jpg 300w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-60-1024x609.jpg 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-60-768x457.jpg 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-2ba18c9b6304620af4785b54fe900bf0ce0fc4d5 bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2025-10-14T16:56:51-06:00\">10\u6708 14, 2025<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Risk-Based Vulnerability Management: Prioritize What Actually Matters<\/h1>\n\n\n<div class=\"bs-div bs-div-4c0c357bf69b7e1367afb30b9d59be1945441399 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/ja\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">5 <\/span> Minute Read\n<\/div>\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\"><\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-205a03f93391472c82564395e3b5684e68c8ef7d bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-fa02c15a19a9c2952663733986e45d4eef708638 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/ja\/blog\/risk-based-vulnerability-management\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/ja\/blog\/risk-based-vulnerability-management\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Risk-Based%20Vulnerability%20Management%3A%20Prioritize%20What%20Actually%20Matters').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Frisk-based-vulnerability-management%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Risk-Based%20Vulnerability%20Management%3A%20Prioritize%20What%20Actually%20Matters&url=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Frisk-based-vulnerability-management%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Frisk-based-vulnerability-management%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Frisk-based-vulnerability-management%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-0d83d6d9863f92131cc95492d42e5b50c72f00bb bs-column---default bs-column--contents     \">\n<h2 class=\"wp-block-heading\" id=\"h-risk-based-vulnerability-management-rbvm-prioritize-what-actually-matters\">Risk-Based Vulnerability Management (RBVM): Prioritize What Actually Matters<\/h2>\n\n\n\n<div class=\"bs-div bs-div-70fd4ce381ac7d61b6d19e47ead5cac084f1d797 bs-div---default bs-div--blog-inner-light\"><div class=\"bs-div__inner     \">\n<p>Threat Detection and Response in cybersecurity is a two-part process designed to protect an organization from cyber threats. Threat detection focuses on actively monitoring for and identifying malicious activity or vulnerabilities within a network. This is followed by incident response, a structured approach to containing the threat, mitigating its impact, and restoring systems to normal operation.<\/p>\n<\/div><\/div>\n\n\n\n<p>Security teams face a firehose of vulnerabilities, with thousands of new threats emerging every day. The outdated &#8220;patch everything&#8221; mentality leads to burnout and leaves critical risks exposed. This is where Risk-Based Vulnerability Management becomes essential.<\/p>\n\n\n\n<p>&nbsp;By shifting focus from the sheer number of vulnerabilities to those that pose the highest risk to your unique business, RBVM empowers your team to work smarter. This strategic approach ensures your time and resources are always focused on protecting what&#8217;s most valuable, dramatically improving your security posture and proactively defending against real-world attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is Risk-Based Vulnerability?<\/h2>\n\n\n\n<p>Risk-based vulnerability management is a <a href=\"https:\/\/swimlane.com\/blog\/cyber-security-strategy\/\">cybersecurity strategy<\/a> that moves beyond static severity scores. It&#8217;s about prioritizing vulnerabilities based on the actual, contextual risk they pose to your organization. To calculate this true risk, RBVM considers a dynamic set of factors:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Vulnerability Severity: The inherent technical rating of the vulnerability (e.g., CVSS score).<\/li>\n\n\n\n<li>Asset Criticality:How important the affected asset is to your business operations. Is it a mission-critical server, or a non-essential test machine?<\/li>\n\n\n\n<li>Threat Context: Is the vulnerability actively being exploited in the wild? Does it have a known exploit or is it being used by specific threat actors?<\/li>\n<\/ul>\n\n\n\n<p>By combining these three elements, RBVM provides a clear, data-driven picture of which vulnerabilities truly demand your immediate attention.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is the Difference Between Risk-Based and Traditional Vulnerability Management?<\/h2>\n\n\n\n<p>Traditional and risk-based vulnerability management have fundamentally different approaches. While traditional methods can be labor-intensive and reactive, an RBVM strategy is dynamic and proactive. The key differences can be summarized in this table:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Traditional VM<\/strong><\/td><td><strong>Risk-Based VM<\/strong><\/td><\/tr><tr><td><strong>Focus:<\/strong> Volume of vulnerabilities and static CVSS scores.<\/td><td><strong>Focus:<\/strong> The actual business risk posed by vulnerabilities.<\/td><\/tr><tr><td><strong>Prioritization:<\/strong> Based on a vulnerability&#8217;s severity rating (e.g., all &#8220;critical&#8221; issues are equal).<\/td><td><strong>Prioritization:<\/strong> Based on business impact, threat context, and asset criticality.<\/td><\/tr><tr><td><strong>Result:<\/strong> Alert fatigue, wasted effort on low-impact vulnerabilities, and a high likelihood of overlooking critical threats.<\/td><td><strong>Result:<\/strong> Reduced risk exposure, efficient resource allocation, and a proactive defense against the most pressing threats.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">How to Implement RBVM?<\/h2>\n\n\n\n<p>Implementing a successful RBVM program requires a strategic shift, not just a new tool. The following steps provide a practical, phased approach to building a robust and effective program that aligns security efforts with core business objectives.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Identify Your Key Assets and Their Business Criticality<\/h3>\n\n\n\n<p>You can&#8217;t protect what you don&#8217;t know you have. Start by creating a unified, real-time inventory of all your IT assets. This goes beyond a simple list; you need to assign a business criticality score to each asset. This is a crucial step that directly impacts your risk-based prioritization. Consider these factors:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Data Sensitivity:<\/strong> Does the asset store sensitive customer or proprietary data?<\/li>\n\n\n\n<li><strong>Business Function:<\/strong> Is the asset part of a mission-critical business operation?<\/li>\n\n\n\n<li><strong>Public Exposure:<\/strong> Is the asset accessible from the public internet? By classifying your assets in this way, you establish a foundational layer for accurate risk assessment and an effective vulnerability management program.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">2. Collect and Correlate Vulnerability and Threat Data<\/h3>\n\n\n\n<p>The core of an effective RBVM strategy is connecting the dots between your vulnerabilities and the real-world threats targeting them. Here\u2019s how to do it:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Aggregate Data:<\/strong> Pull vulnerability data from all your scanning tools (e.g., Nessus, Qualys, Tenable).<\/li>\n\n\n\n<li><strong>Integrate Threat Intelligence:<\/strong> Connect that data with real-time threat intelligence feeds to see which vulnerabilities are actively being exploited.<\/li>\n\n\n\n<li><strong>Map to Assets:<\/strong> Correlate this information with your asset inventory and their business criticality scores. This process transforms a raw list of vulnerabilities into a dynamic, intelligent view of your true risk, allowing you to focus on threats that matter, not just those with a high CVSS score.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">3. Prioritize Vulnerabilities Based on True Risk<\/h3>\n\n\n\n<p>This is where the power of RBVM comes to life. With all your data correlated, you can now generate a dynamic, contextual risk score for each vulnerability instance. This score is more than a number\u2014it\u2019s a data-backed recommendation on where to focus your efforts. The goal is to move from a massive backlog of &#8220;critical&#8221; vulnerabilities to a manageable list of the few that pose the most significant risk. By focusing on these high-risk items, you can dramatically reduce your overall risk exposure with minimal effort, ensuring that every <a href=\"https:\/\/swimlane.com\/blog\/auto-remediation\/\">remediation <\/a>action is a high-impact one.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Automate Remediation and Response<\/h3>\n\n\n\n<p>Manual vulnerability management is slow and prone to human error. To truly accelerate your defense, you must automate the remediation and response process. This includes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Automatic Ticketing:<\/strong> Instantly create and assign tickets for high-risk vulnerabilities to the correct teams.<\/li>\n\n\n\n<li><strong>Orchestrated Workflows:<\/strong> Use pre-built playbooks to automatically trigger actions like patching, quarantining an asset, or blocking a malicious IP.<\/li>\n\n\n\n<li><strong>Cross-Functional Collaboration:<\/strong> Automatically notify and coordinate with IT, DevOps, and other teams to ensure a rapid and consistent response. Automating these steps drastically reduces your <a href=\"https:\/\/swimlane.com\/blog\/reducing-security-operations-mttd-mttr\/\">mean time to remediate (MTTR)<\/a>, freeing up your security team to focus on proactive threat hunting and strategic planning.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">5. Continuously Monitor and Measure Your Progress<\/h3>\n\n\n\n<p>An effective RBVM program is a continuous, feedback-driven cycle. Once remediation actions are complete, you must verify their success and report on the results. Continuously monitor your environment for new vulnerabilities and emerging threats, and use the data to measure your progress. By tracking key metrics like &#8220;risk score reduction over time&#8221; and &#8220;remediation efficiency,&#8221; you can prove the value of your program and make data-driven decisions that ensure you are always one step ahead of potential attackers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Streamline RBVM with Swimlane<\/h2>\n\n\n\n<p>Manually implementing a complete RBVM program is a monumental task. Swimlane offers a dedicated <a href=\"https:\/\/swimlane.com\/platform\/vulnerability-response-management\/\">Vulnerability Response Management (VRM) solution<\/a> that automates and operationalizes every stage of the <a href=\"https:\/\/swimlane.com\/blog\/vulnerability-management-lifecycle\/\">vulnerability lifecycle<\/a>. Unlike point solutions, Swimlane provides a unified platform that:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Consolidates Data:<\/strong> Normalizes findings from multiple scanners and centralizes assets, threat intel, and vulnerability data into one view.<br><\/li>\n\n\n\n<li><strong>Risk-Based Prioritization:<\/strong> Calculates a dynamic <strong>Risk Score<\/strong> and <strong>VRM Prioritization Rank<\/strong> using CVSS, EPSS, exploit intel, and asset criticality.<br><\/li>\n\n\n\n<li><strong>AI-Driven Remediation:<\/strong> Leverages <strong>Hero AI<\/strong> and Turbine\u2019s automation engine to orchestrate remediation, from ticket creation to patch deployment, while enabling case management with ITSM integrations.<\/li>\n<\/ul>\n\n\n\n<p>With <a href=\"https:\/\/swimlane.com\/blog\/swimlanes-vulnerability-response-management-solution\/\">Swimlane VRM<\/a>, you can unify your vulnerability data, automate remediation workflows, and ensure your team focuses on the vulnerabilities that matter most.<\/p>\n\n\n\n<div class=\"bs-div bs-div-780504ec595335944e97a5b9e1877653f3fe2723 bs-div---default\"><div class=\"bs-div__inner     \">\n<div class=\"bs-div bs-div-4f253bf0c5705cd323b40299b6872e2efceba12b bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-4f253bf0c5705cd323b40299b6872e2efceba12b {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/OG-VulMan-1.png' class='img-fluid'   alt='roi report swimlane security automation' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-1a42cb9950b118094bb6fc4b024a7ac6c94cbeef bs-div---default\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\">Under Pressure: Is Vulnerability Management Keeping Up?<\/h2>\n\n\n\n<p>Our new research report, Under Pressure: Is Vulnerability Management Keeping Up, reveals data-driven takeaways about the reality of the problem.&nbsp;Check out the research to learn more about:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The confidence shortfall when it comes to regulatory compliance<\/li>\n\n\n\n<li>The hidden cost of manual effort and inefficiency<\/li>\n\n\n\n<li>How siloed vulnerability management processes fuel security risk<\/li>\n<\/ul>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-1e77f1156fec9419c23c380dd478396fa3cba8af\"><style>.bs-pro-button-p-btn-1e77f1156fec9419c23c380dd478396fa3cba8af .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/resources\/reports\/vulnerability-management\/\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Download Report<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-rbvm-faqs-nbsp\">RBVM FAQs&nbsp;<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">How does Risk-Based Vulnerability Management work?&nbsp;<\/h3>\n\n\n\n<p>RBVM is a continuous cycle that transforms vulnerability data into actionable security insights. The process involves four key steps: discovering all assets and vulnerabilities, enriching that data with <a href=\"https:\/\/swimlane.com\/blog\/cyber-threat-intelligence\/\">threat intelligence <\/a>and business context, using that information to prioritize threats by true risk, and then automating remediation and reporting to continuously reduce your risk exposure.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How is a true risk score calculated?&nbsp;<\/h3>\n\n\n\n<p>A true risk score goes beyond static CVSS ratings by incorporating business context (the value of the asset), and real-time threat intelligence (whether the vulnerability is actively being exploited) to determine its true risk to your organization.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How is a risk-based vulnerability management platform different from a vulnerability scanner?&nbsp;<\/h3>\n\n\n\n<p>A vulnerability scanner&#8217;s job is to find vulnerabilities. A risk-based <a href=\"https:\/\/swimlane.com\/blog\/automating-vulnerability-lifecycle-management\/\">vulnerability management <\/a>platform ingests that data from all your scanners, correlates it with threat intelligence, prioritizes the vulnerabilities based on risk, and automates the entire response and remediation process.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is the role of automation in an RBVM program?<\/h3>\n\n\n\n<p>Automation is the key to scaling an RBVM program. It streamlines and accelerates manual tasks like data collection, prioritization, ticketing, and cross-functional communication. This allows security teams to reduce their mean time to remediate and focus on more strategic work.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How do you integrate RBVM with existing tools?<\/h3>\n\n\n\n<p>&nbsp;Effective RBVM platforms are designed to be a central hub. They integrate with your existing security, IT, and business tools (scanners, ticketing systems, <a href=\"https:\/\/swimlane.com\/solutions\/use-cases\/siem-alert-triage\/\">SIEMs<\/a>, etc.) via APIs to provide a unified data view and orchestrated response.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">TL;DR: RBVM<\/h2>\n\n\n\n<div class=\"bs-div bs-div-d7dbc51c58b2df12303c0e537aa0d5000a7880a4 bs-div---default bs-div--blog-inner-dark\"><div class=\"bs-div__inner     \">\n<p>Traditional vulnerability management is an inefficient &#8220;patch everything&#8221; approach that leaves organizations exposed. Risk-Based Vulnerability Management is a proactive strategy that helps security teams prioritize the vulnerabilities that pose the most risk to the business by considering asset criticality and real-time threat intelligence. By implementing a continuous RBVM cycle and leveraging automation, organizations can dramatically reduce their risk exposure and focus on protecting what matters most.<\/p>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-0ad64702520e52820989c3b8a4a5574abd826112 bs-column---default     \">\n<div class=\"bs-div bs-div-f0851be86a4542da358c10ec17ccebffa17efe07 bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/ja\/tag\/vulnerability-management\/'><span class='tag-content'>Vulnerability Management<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-5e7267355d8caf36f5b5e0c86eef387b664b848d bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d1b59751b42 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/vulnerability-types\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>8\u6708 5, 2025<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>6 Critical Cybersecurity Vulnerability Types Your Organization Must Address<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d1b597533e3 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/vulnerability-management-lifecycle\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>3\u6708 20, 2025<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Guide to the 6 Steps of the Vulnerability Management Lifecycle<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d1b59755106 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/resources\/videos\/vulnerability-response-management-solution\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>2\u6708 3, 2025<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Introducing the Swimlane Vulnerability Response Management Solution<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":51149,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":51150,"learn_more_label":"","image_alt_text":"Risk-Based Vulnerability Management (RBVM): How to Prioritize","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[248],"resource-type":[67],"resource-topic":[223],"resource-industry":[107],"blog-category":[75],"class_list":["post-51148","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-vulnerability-management","resource-type-blogs","resource-topic-vulnerability-management","resource-industry-security-automation","blog-category-security-automation"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Risk-Based Vulnerability Management (RBVM): How to Prioritize<\/title>\n<meta name=\"description\" content=\"Learn how to prioritize and manage vulnerabilities with a risk-based approach. Discover key strategies to secure your systems. Read more now!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u30ea\u30b9\u30af\u30d9\u30fc\u30b9\u306e\u8106\u5f31\u6027\u7ba1\u7406\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Risk-Based Vulnerability Management: Prioritize What Actually Matters\" \/>\n<meta property=\"og:description\" content=\"Learn how to prioritize and manage vulnerabilities with a risk-based approach. Discover key strategies to secure your systems. Read more now!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u30ea\u30b9\u30af\u30d9\u30fc\u30b9\u306e\u8106\u5f31\u6027\u7ba1\u7406\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T11:15:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-41.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"Learn how to prioritize and manage vulnerabilities with a risk-based approach. Discover key strategies to secure your systems. Read more now!\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-41.jpg\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"7\u5206\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u30ea\u30b9\u30af\u30d9\u30fc\u30b9\u306e\u8106\u5f31\u6027\u7ba1\u7406\uff08RBVM\uff09\uff1a\u512a\u5148\u9806\u4f4d\u306e\u6c7a\u3081\u65b9","description":"\u30ea\u30b9\u30af\u30d9\u30fc\u30b9\u306e\u30a2\u30d7\u30ed\u30fc\u30c1\u3092\u7528\u3044\u3066\u8106\u5f31\u6027\u3092\u512a\u5148\u9806\u4f4d\u4ed8\u3051\u3057\u3001\u7ba1\u7406\u3059\u308b\u65b9\u6cd5\u3092\u5b66\u3073\u307e\u3057\u3087\u3046\u3002\u30b7\u30b9\u30c6\u30e0\u3092\u4fdd\u8b77\u3059\u308b\u305f\u3081\u306e\u91cd\u8981\u306a\u6226\u7565\u3092\u3054\u7d39\u4ecb\u3057\u307e\u3059\u3002\u4eca\u3059\u3050\u8a73\u7d30\u3092\u3054\u89a7\u304f\u3060\u3055\u3044\uff01","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u30ea\u30b9\u30af\u30d9\u30fc\u30b9\u306e\u8106\u5f31\u6027\u7ba1\u7406\/","og_locale":"ja_JP","og_type":"article","og_title":"Risk-Based Vulnerability Management: Prioritize What Actually Matters","og_description":"Learn how to prioritize and manage vulnerabilities with a risk-based approach. Discover key strategies to secure your systems. Read more now!","og_url":"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u30ea\u30b9\u30af\u30d9\u30fc\u30b9\u306e\u8106\u5f31\u6027\u7ba1\u7406\/","og_site_name":"AI Security Automation","article_modified_time":"2026-03-30T11:15:02+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-41.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_description":"Learn how to prioritize and manage vulnerabilities with a risk-based approach. Discover key strategies to secure your systems. Read more now!","twitter_image":"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-41.jpg","twitter_site":"@swimlane","twitter_misc":{"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"7\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ja\/blog\/risk-based-vulnerability-management\/","url":"https:\/\/swimlane.com\/ja\/blog\/risk-based-vulnerability-management\/","name":"\u30ea\u30b9\u30af\u30d9\u30fc\u30b9\u306e\u8106\u5f31\u6027\u7ba1\u7406\uff08RBVM\uff09\uff1a\u512a\u5148\u9806\u4f4d\u306e\u6c7a\u3081\u65b9","isPartOf":{"@id":"https:\/\/swimlane.com\/ja\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ja\/blog\/risk-based-vulnerability-management\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ja\/blog\/risk-based-vulnerability-management\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-60.jpg","datePublished":"2025-10-14T22:56:51+00:00","dateModified":"2026-03-30T11:15:02+00:00","description":"\u30ea\u30b9\u30af\u30d9\u30fc\u30b9\u306e\u30a2\u30d7\u30ed\u30fc\u30c1\u3092\u7528\u3044\u3066\u8106\u5f31\u6027\u3092\u512a\u5148\u9806\u4f4d\u4ed8\u3051\u3057\u3001\u7ba1\u7406\u3059\u308b\u65b9\u6cd5\u3092\u5b66\u3073\u307e\u3057\u3087\u3046\u3002\u30b7\u30b9\u30c6\u30e0\u3092\u4fdd\u8b77\u3059\u308b\u305f\u3081\u306e\u91cd\u8981\u306a\u6226\u7565\u3092\u3054\u7d39\u4ecb\u3057\u307e\u3059\u3002\u4eca\u3059\u3050\u8a73\u7d30\u3092\u3054\u89a7\u304f\u3060\u3055\u3044\uff01","breadcrumb":{"@id":"https:\/\/swimlane.com\/ja\/blog\/risk-based-vulnerability-management\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ja\/blog\/risk-based-vulnerability-management\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/swimlane.com\/ja\/blog\/risk-based-vulnerability-management\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-60.jpg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-60.jpg","width":1120,"height":666,"caption":"Digital security shield with lock icon over microchip background representing data protection, encryption, and cyber defense automation."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ja\/blog\/risk-based-vulnerability-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Risk-Based Vulnerability Management: Prioritize What Actually Matters"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ja\/#website","url":"https:\/\/swimlane.com\/ja\/","name":"\u30ed\u30fc\u30b3\u30fc\u30c9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\uff06SOAR\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\uff5c\u30b9\u30a4\u30e0\u30ec\u30fc\u30f3","description":"\u3042\u3089\u3086\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6a5f\u80fd\u3092\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u578bAI\u3067\u81ea\u52d5\u5316","publisher":{"@id":"https:\/\/swimlane.com\/ja\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ja\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ja\/#organization","name":"\u30ed\u30fc\u30b3\u30fc\u30c9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\uff06SOAR\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\uff5c\u30b9\u30a4\u30e0\u30ec\u30fc\u30f3","url":"https:\/\/swimlane.com\/ja\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/51148","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":1,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/51148\/revisions"}],"predecessor-version":[{"id":55346,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/51148\/revisions\/55346"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/media\/51149"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/media?parent=51148"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/tags?post=51148"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-type?post=51148"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-topic?post=51148"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-industry?post=51148"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/blog-category?post=51148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}