{"id":54059,"date":"2026-03-11T10:15:00","date_gmt":"2026-03-11T16:15:00","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=54059"},"modified":"2026-02-17T14:49:53","modified_gmt":"2026-02-17T21:49:53","slug":"ai%e3%81%8c%e7%b5%b1%e5%90%88%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa%e3%83%86%e3%82%a3%e3%82%92%e5%a4%89%e9%9d%a9","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ja\/blog\/ai-is-transforming-integrated-security\/","title":{"rendered":"AI\u304c\u7d71\u5408\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u3069\u3046\u5909\u9769\u3059\u308b\u304b"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-6770b3369b6c61539d3140cb52ed6bc5ec393625 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/How-AI-is-Transforming-Integrated-Security-Masthead.webp\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"How AI is Transforming Integrated Security\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/How-AI-is-Transforming-Integrated-Security-Masthead.webp 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/How-AI-is-Transforming-Integrated-Security-Masthead-300x178.webp 300w, https:\/\/swimlane.com\/wp-content\/uploads\/How-AI-is-Transforming-Integrated-Security-Masthead-1024x609.webp 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/How-AI-is-Transforming-Integrated-Security-Masthead-768x457.webp 768w, https:\/\/swimlane.com\/wp-content\/uploads\/How-AI-is-Transforming-Integrated-Security-Masthead-18x12.webp 18w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-2ba18c9b6304620af4785b54fe900bf0ce0fc4d5 bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2026-03-11T10:15:00-06:00\">3\u6708 11, 2026<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">How AI is Transforming Integrated Security<\/h1>\n\n\n<div class=\"bs-div bs-div-4c0c357bf69b7e1367afb30b9d59be1945441399 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/ja\/author\/Michael_Lyborg\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/lyborg.png\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tMichael Lyborg\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">4 <\/span> Minute Read\n<\/div>\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\"><\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-205a03f93391472c82564395e3b5684e68c8ef7d bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-fa02c15a19a9c2952663733986e45d4eef708638 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/ja\/blog\/ai-is-transforming-integrated-security\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/ja\/blog\/ai-is-transforming-integrated-security\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('How%20AI%20is%20Transforming%20Integrated%20Security').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fai-is-transforming-integrated-security%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=How%20AI%20is%20Transforming%20Integrated%20Security&url=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fai-is-transforming-integrated-security%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fai-is-transforming-integrated-security%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fai-is-transforming-integrated-security%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-0d83d6d9863f92131cc95492d42e5b50c72f00bb bs-column---default bs-column--contents     \">\n<h2 class=\"wp-block-heading\" id=\"h-how-ai-is-transforming-integrated-security\" style=\"font-size:34px\">How AI is Transforming Integrated Security<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"bs-div bs-div-70fd4ce381ac7d61b6d19e47ead5cac084f1d797 bs-div---default bs-div--blog-inner-light\"><div class=\"bs-div__inner     \">\n<p>AI is transforming integrated security by enabling real-time automation, unifying siloed systems, and delivering faster, more efficient <a href=\"https:\/\/swimlane.com\/solutions\/use-cases\/incident-response\/\">incident response<\/a>. With platforms like <a href=\"https:\/\/swimlane.com\/swimlane-turbine\/\">Swimlane Turbine<\/a>, organizations can ingest diverse telemetry, automate workflows across the enterprise, and gain centralized visibility, drastically reducing dwell time and improving operational efficiency.<\/p>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-shift-toward-integrated-security\">The Shift Toward Integrated Security<\/h2>\n\n\n\n<p>Security operations today are often fragmented across teams, tools, and environments. This lack of cohesion slows down response times, increases risk exposure, and makes it harder to scale operations effectively. Integrated security solves this by connecting data sources, automating workflows, and ensuring that teams work from a single source of truth.<\/p>\n\n\n\n<p>For example, when an endpoint protection tool flags a suspicious file, integrated security automatically correlates data from the endpoint, SIEM, and identity systems. A predefined response can then isolate the affected device, notify the security team, and open an investigation in real time. Integration matters because threats do not operate in isolation, and effective defenses require coordinated action.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-role-of-ai-in-integrated-security\">The Role of AI in Integrated Security<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Real-Time Decision-Making and Automation<\/h3>\n\n\n\n<p>In agentic environments, AI drives decision logic based on business rules, contextual telemetry, and historical patterns. When a threat is detected, such as lateral movement within a network, the system can trigger a coordinated response immediately. This may include isolating affected systems, updating case records, and initiating forensic data collection. Rather than waiting for human validation, decisions are executed in real time, accelerating containment and improving response outcomes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Ingesting and Acting on Diverse Telemetry<\/h3>\n\n\n\n<p>Modern security environments generate a constant flow of telemetry from endpoints, cloud services, email gateways, and identity platforms. <a href=\"https:\/\/swimlane.com\/blog\/agentic-ai\/\">Agentic AI<\/a> operations enable continuous ingestion of this data, application of business logic, and triggering of appropriate responses as soon as relevant signals appear. Swimlane Turbine performs this processing inline, allowing security teams to respond at the point of inception rather than waiting for data to pass through a central analytics engine.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Enhancing Visibility Across the Attack Surface<\/h3>\n\n\n\n<p>Visibility in integrated security goes beyond dashboards. Agentic systems correlate actions and telemetry across the entire environment to surface meaningful context for analysts. This provides clarity during investigations, improves situational awareness, and supports faster decision-making when threats span multiple tools, teams, or domains.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-4-benefits-of-ai-integrated-security\">4 Benefits of AI Integrated Security<\/h2>\n\n\n\n<p>Agentic AI security operations are not just faster, they are fundamentally more capable of addressing the complexity and scale of today\u2019s threat landscape. Integrated systems driven by AI logic deliver measurable improvements in speed, efficiency, and control that manual or loosely connected tools cannot match.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Reduced Dwell Time and Faster MTTR<\/h3>\n\n\n\n<p>AI accelerates every stage of the detection and response process by enabling decisions to be made and executed without delay. When threats are identified, the system can act immediately by isolating endpoints, triggering containment workflows, and recording the response. This significantly reduces the time an attacker has to move laterally or cause damage, thereby directly improving key performance metrics such as <a href=\"https:\/\/swimlane.com\/blog\/reducing-security-operations-mttd-mttr\/\">mean-time-to-detect and mean-time-to-respond<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Scalable Efficiency with Fewer Resources<\/h3>\n\n\n\n<p>Security teams continue to face staffing shortages while attack surfaces expand. AI supports operational scale by handling thousands of signals and actions in parallel, without overwhelming analysts. Instead of reviewing every alert manually, teams can trust that the system will take appropriate action based on risk level and context, allowing human resources to focus where they are most effective.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Better ROI Through AI Automation<\/h3>\n\n\n\n<p>Investments in <a href=\"https:\/\/swimlane.com\/blog\/cybersecurity-automation-tools\/\">security tools<\/a> often fail to deliver value when they operate in isolation. AI brings these tools into coordinated workflows that maximize their effectiveness and reduce redundant effort. By automating routine decisions and streamlining investigation paths, organizations can improve the return on both their technology and their people.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Unified Visibility Across Disconnected Environments<\/h3>\n\n\n\n<p>Enterprises rarely operate within a single environment. Cloud infrastructure, remote devices, and on-premises systems must be monitored and protected as a single entity. AI-integrated security provides a cohesive view across these domains, linking signals, actions, and outcomes into a single operational picture. This unified visibility helps teams prioritize threats, manage complexity, and maintain control in dynamic conditions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-real-world-examples-of-ai-in-integrated-security\">Real World Examples of AI in Integrated Security<\/h2>\n\n\n\n<p>The shift toward agentic AI security operations is already producing measurable outcomes across diverse use cases. Swimlane Turbine is a platform built specifically to support this shift. It allows security teams to ingest diverse telemetry, automate complex workflows, and operate from a unified system of record that drives consistent, real-time response across environments.<\/p>\n\n\n\n<p>The following examples highlight how Turbine enables integrated AI security operations that improve both performance and control in high-stakes settings.<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-ee6e3c9954a8d69c47f0eacd692cef3bedf89643\"><style>.bs-pro-button-p-btn-ee6e3c9954a8d69c47f0eacd692cef3bedf89643 .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/swimlane-turbine\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Learn more about Turbine<\/a><\/span>\n\n\n\n<h3 class=\"wp-block-heading\">Inside Our AI SOC: How Swimlane Cut MTTR in Half<\/h3>\n\n\n\n<p>Swimlane implemented Turbine within its own security operations center to modernize workflows and reduce response times. By replacing manual triage and escalation processes with adaptive playbooks, the team reduced mean time to respond by 50%. Turbine enabled dynamic case routing, automated enrichment, and direct response from within the system of record, allowing analysts to focus only on the cases that required human input.<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-55656bc52171a390fd00cd4903671c04add70174\"><style>.bs-pro-button-p-btn-55656bc52171a390fd00cd4903671c04add70174 .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/blog\/how-swimlane-cut-mttr-in-half\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Explore how Swimlane cut MTTR in half<\/a><\/span>\n\n\n\n<h3 class=\"wp-block-heading\">AI Automation Drives Compliance for Utility Company<\/h3>\n\n\n\n<p>A large utility provider used Swimlane Turbine to manage complex compliance requirements in its operational technology environment. Turbine\u2019s agentic AI automation and centralized case tracking allowed the team to eliminate spreadsheet-based audit prep and reduce the overhead of maintaining compliance documentation. This improvement not only saved time but also ensured greater accuracy and audit-readiness across departments.<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-bd65d8ddd02e8198e83290335325fc9502e31ddf\"><style>.bs-pro-button-p-btn-bd65d8ddd02e8198e83290335325fc9502e31ddf .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/resources\/case-studies\/compliance-ot\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Explore how Swimlane Turbine simplifies compliance at scale<\/a><\/span>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-swimlane-turbine-delivers-integrated-security-at-scale\">How Swimlane Turbine Delivers Integrated Security at Scale<\/h2>\n\n\n\n<p>Swimlane Turbine was purpose-built to operationalize integrated security at the scale and complexity demanded by modern enterprises. It combines agentic AI automation, continuous telemetry ingestion, and dynamic <a href=\"https:\/\/swimlane.com\/platform\/case-management\/\">case management<\/a> into a single platform that serves as a unified workbench for all AI and human reasoning. This architecture empowers teams to move from fragmented workflows to coordinated, measurable security programs.<\/p>\n\n\n\n<p>With Turbine, organizations can manage incident response, compliance enforcement, and operational efficiency from one unified interface. Security leaders gain full oversight of performance metrics such as mean-time-to-respond and return on investment, while analysts are equipped with intelligent playbooks that adapt to context and reduce manual effort. The result is an integrated security operation that scales without added complexity and drives measurable business value.<\/p>\n\n\n\n<div class=\"bs-div bs-div-780504ec595335944e97a5b9e1877653f3fe2723 bs-div---default\"><div class=\"bs-div__inner     \">\n<div class=\"bs-div bs-div-f2ff52954a2c2a09b10a45a9ec8e4268d53a8fa9 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-f2ff52954a2c2a09b10a45a9ec8e4268d53a8fa9 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/OG-Demo-Page.png' class='img-fluid'   alt='Get a live demo of Swimlane turbine' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-773aef0a3852274bc6b23f7985e05efd194e399e bs-div---default\"><div class=\"bs-div__inner     \">\n<h3 class=\"wp-block-heading\" id=\"h-see-what-agentic-ai-security-operations-look-like-in-action\">See What Agentic AI Security Operations Look Like in Action<\/h3>\n\n\n\n<p>Swimlane Turbine enables integrated security that scales, automates, and delivers real-time results. Learn how your team can reduce response times, unify workflows, and maximize ROI with a platform built for modern security operations.<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-1bb85e19d4a2b512fb5b8458c3d3db3ad053d680\"><style>.bs-pro-button-p-btn-1bb85e19d4a2b512fb5b8458c3d3db3ad053d680 .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/demo\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Request a Demo<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-03496002f89e98265cd2c4cad8f49ac06b5639a7 bs-div---default bs-div--blog-inner-light\"><div class=\"bs-div__inner     \">\n<h4 class=\"wp-block-heading\" id=\"h-tl-dr-how-ai-is-transforming-integrated-security\" style=\"font-size:26px\">TL;DR: How AI is Transforming Integrated Security<\/h4>\n\n\n\n<p>Agentic AI is redefining integrated security by enabling systems to make context-aware decisions, act autonomously, and reduce response time across the enterprise. This shift helps security teams unify siloed tools, scale operations without adding headcount, and gain full visibility into threats and performance. Swimlane Turbine delivers this model in practice by automating telemetry-driven workflows, reducing MTTR, and supporting complex use cases like compliance, incident response, and operational technology.<\/p>\n<\/div><\/div>\n\n\n\n<p><br><\/p>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-0ad64702520e52820989c3b8a4a5574abd826112 bs-column---default     \">\n<div class=\"bs-div bs-div-fd8632a22b144e6798bea2d36e7aab62982f63eb bs-div---default bs-div--related-posts bs-div--right-sticky-related-posts\"><div class=\"bs-div__inner     \">\n<div class=\"bs-div bs-div-f0851be86a4542da358c10ec17ccebffa17efe07 bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/ja\/tag\/ai\/'><span class='tag-content'>AI<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-related-posts\" style=\"font-size:26px\">Related Posts<\/h3>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d1cb9fb8d6f bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/what-automation-has-to-do-with-ai-and-cybersecurity\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__title\">\n        <h5>What Automation has to do with AI and Cybersecurity<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d1cb9fba7fb bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/8-questions-ai-vendors\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__title\">\n        <h5>8 Must-Ask Questions for AI Security Vendors\u00a0<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d1cb9fbbe3d bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/resources\/reports\/sans-ai-security-survey\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/OG-2025-SANS-Survey-AI-Security-1.png' class='img-fluid' alt='SANS AI Security Survey ' title='OG 2025 SANS Survey AI Security'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__title\">\n        <h5>SANS 2025 AI Survey: AI\u2019s Impact on Security Three Years Later<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12   bs-column-601afe1d46256d3b13b7ac6679644286e4c6669e bs-column---default     \"><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":21,"featured_media":54072,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":54074,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[202],"resource-type":[67],"resource-topic":[215],"resource-industry":[],"blog-category":[],"class_list":["post-54059","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-ai","resource-type-blogs","resource-topic-ai"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How AI is Transforming Integrated Security<\/title>\n<meta name=\"description\" content=\"Discover how AI is revolutionizing integrated security by unifying workflows, accelerating response times, &amp; empowering security teams to do more with less.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/ai\u304c\u7d71\u5408\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u5909\u9769\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How AI is Transforming Integrated Security\" \/>\n<meta property=\"og:description\" content=\"Discover how AI is revolutionizing integrated security by unifying workflows, accelerating response times, &amp; empowering security teams to do more with less.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/ai\u304c\u7d71\u5408\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u5909\u9769\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/How-AI-is-Transforming-Integrated-Security-SocialTile_Text.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"How AI is Transforming Integrated Security\" \/>\n<meta name=\"twitter:description\" content=\"Discover how AI is revolutionizing integrated security by unifying workflows, accelerating response times, &amp; empowering security teams to do more with less.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/How-AI-is-Transforming-Integrated-Security-SocialTile_Text.webp\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"6\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/ai-is-transforming-integrated-security\/\",\"url\":\"https:\/\/swimlane.com\/ja\/blog\/ai-is-transforming-integrated-security\/\",\"name\":\"How AI is Transforming Integrated Security\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/ja\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/ai-is-transforming-integrated-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/ai-is-transforming-integrated-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/How-AI-is-Transforming-Integrated-Security-Masthead.webp\",\"datePublished\":\"2026-03-11T16:15:00+00:00\",\"description\":\"Discover how AI is revolutionizing integrated security by unifying workflows, accelerating response times, & empowering security teams to do more with less.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/ai-is-transforming-integrated-security\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/ja\/blog\/ai-is-transforming-integrated-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/ai-is-transforming-integrated-security\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/How-AI-is-Transforming-Integrated-Security-Masthead.webp\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/How-AI-is-Transforming-Integrated-Security-Masthead.webp\",\"width\":1120,\"height\":666,\"caption\":\"How AI is Transforming Integrated Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/ai-is-transforming-integrated-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How AI is Transforming Integrated Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/ja\/#website\",\"url\":\"https:\/\/swimlane.com\/ja\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/ja\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/ja\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/ja\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/ja\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"AI\u304c\u7d71\u5408\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u3069\u3046\u5909\u9769\u3059\u308b\u304b","description":"AI \u304c\u30ef\u30fc\u30af\u30d5\u30ed\u30fc\u3092\u7d71\u5408\u3057\u3001\u5fdc\u7b54\u6642\u9593\u3092\u77ed\u7e2e\u3057\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30c1\u30fc\u30e0\u304c\u5c11\u306a\u3044\u30ea\u30bd\u30fc\u30b9\u3067\u3088\u308a\u591a\u304f\u306e\u6210\u679c\u3092\u751f\u307f\u51fa\u305b\u308b\u3088\u3046\u306b\u3059\u308b\u3053\u3068\u3067\u3001\u7d71\u5408\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u3069\u306e\u3088\u3046\u306a\u9769\u547d\u3092\u3082\u305f\u3089\u3057\u3066\u3044\u308b\u304b\u3092\u3054\u89a7\u304f\u3060\u3055\u3044\u3002.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/ai\u304c\u7d71\u5408\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u5909\u9769\/","og_locale":"ja_JP","og_type":"article","og_title":"How AI is Transforming Integrated Security","og_description":"Discover how AI is revolutionizing integrated security by unifying workflows, accelerating response times, & empowering security teams to do more with less.","og_url":"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/ai\u304c\u7d71\u5408\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u5909\u9769\/","og_site_name":"AI Security Automation","og_image":[{"width":1200,"height":630,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/How-AI-is-Transforming-Integrated-Security-SocialTile_Text.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_title":"How AI is Transforming Integrated Security","twitter_description":"Discover how AI is revolutionizing integrated security by unifying workflows, accelerating response times, & empowering security teams to do more with less.","twitter_image":"https:\/\/swimlane.com\/wp-content\/uploads\/How-AI-is-Transforming-Integrated-Security-SocialTile_Text.webp","twitter_site":"@swimlane","twitter_misc":{"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"6\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ja\/blog\/ai-is-transforming-integrated-security\/","url":"https:\/\/swimlane.com\/ja\/blog\/ai-is-transforming-integrated-security\/","name":"AI\u304c\u7d71\u5408\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u3069\u3046\u5909\u9769\u3059\u308b\u304b","isPartOf":{"@id":"https:\/\/swimlane.com\/ja\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ja\/blog\/ai-is-transforming-integrated-security\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ja\/blog\/ai-is-transforming-integrated-security\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/How-AI-is-Transforming-Integrated-Security-Masthead.webp","datePublished":"2026-03-11T16:15:00+00:00","description":"AI \u304c\u30ef\u30fc\u30af\u30d5\u30ed\u30fc\u3092\u7d71\u5408\u3057\u3001\u5fdc\u7b54\u6642\u9593\u3092\u77ed\u7e2e\u3057\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30c1\u30fc\u30e0\u304c\u5c11\u306a\u3044\u30ea\u30bd\u30fc\u30b9\u3067\u3088\u308a\u591a\u304f\u306e\u6210\u679c\u3092\u751f\u307f\u51fa\u305b\u308b\u3088\u3046\u306b\u3059\u308b\u3053\u3068\u3067\u3001\u7d71\u5408\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u3069\u306e\u3088\u3046\u306a\u9769\u547d\u3092\u3082\u305f\u3089\u3057\u3066\u3044\u308b\u304b\u3092\u3054\u89a7\u304f\u3060\u3055\u3044\u3002.","breadcrumb":{"@id":"https:\/\/swimlane.com\/ja\/blog\/ai-is-transforming-integrated-security\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ja\/blog\/ai-is-transforming-integrated-security\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/swimlane.com\/ja\/blog\/ai-is-transforming-integrated-security\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/How-AI-is-Transforming-Integrated-Security-Masthead.webp","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/How-AI-is-Transforming-Integrated-Security-Masthead.webp","width":1120,"height":666,"caption":"How AI is Transforming Integrated Security"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ja\/blog\/ai-is-transforming-integrated-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"How AI is Transforming Integrated Security"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ja\/#website","url":"https:\/\/swimlane.com\/ja\/","name":"\u30ed\u30fc\u30b3\u30fc\u30c9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\uff06SOAR\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\uff5c\u30b9\u30a4\u30e0\u30ec\u30fc\u30f3","description":"\u3042\u3089\u3086\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6a5f\u80fd\u3092\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u578bAI\u3067\u81ea\u52d5\u5316","publisher":{"@id":"https:\/\/swimlane.com\/ja\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ja\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ja\/#organization","name":"\u30ed\u30fc\u30b3\u30fc\u30c9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\uff06SOAR\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\uff5c\u30b9\u30a4\u30e0\u30ec\u30fc\u30f3","url":"https:\/\/swimlane.com\/ja\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/54059","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/users\/21"}],"version-history":[{"count":6,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/54059\/revisions"}],"predecessor-version":[{"id":54588,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/54059\/revisions\/54588"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/media\/54072"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/media?parent=54059"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/tags?post=54059"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-type?post=54059"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-topic?post=54059"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-industry?post=54059"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/blog-category?post=54059"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}