{"id":9350,"date":"2022-10-25T06:00:00","date_gmt":"2022-10-25T06:00:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/security-automation-roi\/"},"modified":"2025-12-09T03:15:22","modified_gmt":"2025-12-09T10:15:22","slug":"%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa%e3%83%86%e3%82%a3%e8%87%aa%e5%8b%95%e5%8c%96%e3%81%aeroi","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ja\/blog\/security-automation-roi\/","title":{"rendered":"\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316\u306eROI\u306e\u73fe\u5b9f\uff1a\u8a08\u7b97\u3068\u691c\u8a0e\u4e8b\u9805"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/ROIII_Masthead.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Enterprise masthead representing the strategic ROI of security automation and operational efficiency.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/ROIII_Masthead.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/ROIII_Masthead-300x182.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/ROIII_Masthead-1024x621.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/ROIII_Masthead-768x466.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2022-10-25T06:00:00-06:00\">10\u6708 25, 2022<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">The Reality of Security Automation ROI: Calculations &#038; Considerations<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/ja\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">4 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-f08f74d0af2cf0ad40ac7f7e7ff47f7939ce6b43 bs-section---default bs-section--blog-inner-table-of-contents  \"><style>.bs-section.bs-section-f08f74d0af2cf0ad40ac7f7e7ff47f7939ce6b43{ background-color: #eef4fa;} <\/style><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-12   bs-column-5f6574ebb29ac8d58ab608d2aff5b1bbe4f96332 bs-column---default     \">\n<h2 class=\"wp-block-heading\">Table of Contents<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-6   bs-column-2119ec9d0f7bbcc95647d0ccaa955654ac2a575a bs-column---default     \">\n<ul class=\"wp-block-list\">\n<li><a href=\"#roi-in-security\">WHAT IS \u2018ROI\u2019 IN SECURITY?<\/a><\/li>\n\n\n\n<li><a href=\"#important-to-calculate-roi\">WHY IS IT IMPORTANT TO CALCULATE ROI?<\/a><\/li>\n\n\n\n<li><a href=\"#roi-of-security-automation\">WHAT IS THE ROI OF SECURITY AUTOMATION?<\/a><\/li>\n\n\n\n<li><a href=\"#financial-benefits-of-security-automation\">WHAT ARE THE FINANCIAL BENEFITS OF SECURITY AUTOMATION?<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-6   bs-column-2119ec9d0f7bbcc95647d0ccaa955654ac2a575a bs-column---default     \">\n<ul class=\"wp-block-list\">\n<li><a href=\"#security-automation-benefit-soc-teams\">HOW DOES SECURITY AUTOMATION BENEFIT SOC TEAMS?<\/a><\/li>\n\n\n\n<li><a href=\"#how-long-will-it-take-to-see-the-benefits-of-security-automation\">HOW LONG WILL IT TAKE TO SEE THE BENEFITS OF SECURITY AUTOMATION?<\/a><\/li>\n\n\n\n<li><a href=\"#security-automation-cost-savings\">EXAMPLES OF SECURITY AUTOMATION COST SAVINGS<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/ja\/blog\/security-automation-roi\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/ja\/blog\/security-automation-roi\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('The%20Reality%20of%20Security%20Automation%20ROI%3A%20Calculations%20%26%20Considerations').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fsecurity-automation-roi%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=The%20Reality%20of%20Security%20Automation%20ROI%3A%20Calculations%20%26%20Considerations&url=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fsecurity-automation-roi%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fsecurity-automation-roi%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fsecurity-automation-roi%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<h2 class=\"wp-block-heading\">Everything you need to know about the ROI of security automation.<\/h2>\n\n\n\n<p>According to <a href=\"https:\/\/www.securitymagazine.com\/articles\/95325-of-soc-teams-overwhelmed-by-threat-volume\" target=\"_blank\" rel=\"noopener\">Security Magazine<\/a>, 70% of security operations center (SOC) teams are drowning in alert noise and the pressure to make near-real-time decisions about critical threats. During a cyber attack, time is of the essence and analysts must react as fast as possible \u2013 something that\u2019s easier said than done.<\/p>\n\n\n\n<p>With the average cost of a data breach near <a href=\"https:\/\/www.statista.com\/statistics\/273575\/us-average-cost-incurred-by-a-data-breach\/#:~:text=Average%20cost%20per%20data%20breach%20in%20the%20United%20States%202006%2D2022&amp;text=As%20of%202022%2C%20the%20average,million%20U.S.%20dollars%20in%202022.\" target=\"_blank\" rel=\"noopener\">$4.35 million<\/a>, security teams continue to seek out ways to improve incident response. Naturally, security leaders have started to turn to automation software like security orchestration, automation and response (SOAR) solutions. But it can be difficult to identify if a cybersecurity strategy actually improves security operations. In addition to the usual risks of implementing new technology, there are many other aspects to take into consideration, such as costs and benefits.<\/p>\n\n\n\n<p>Forecasting the return on investment (ROI) is an excellent way to quantify the value of the new tool and make sure it aligns with business goals, as well as gain the long-term support of board members. At the same time, automating security operations is undeniably the way to improve SOC teams&#8217; day-to-day work, as well as ensure business health and safety.<\/p>\n\n\n\n<p>But what does the ROI of security automation look like? In this article, you&#8217;ll learn:<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"roi-in-security\">What is ROI in Security?<\/h2>\n\n\n\n<p>ROI is the return you\u2019ll see on security investments, such as hiring more staff, outsourcing or adopting new security technology. Calculating ROI in security can be challenging and different than in other industries. To properly understand the methodology, keep in mind that security tools are a cost center and not a revenue generator.<\/p>\n\n\n\n<p>Deploying a security tool requires an investment upfront along with recurring expenses. But it will also generate cost savings in several areas of security operations: headcount demand, tool prices, response values and more. Some aspects such as analyst work satisfaction, loss of brand reputation and business disruption after a breach can\u2019t be perfectly quantified, but are also added value.<\/p>\n\n\n\n<p><span id=\"why-is-it-important\">C<\/span>alculating the ROI of security enables you to quantify the value of your new security tool. By comparing it to the cost of data breaches, it is possible to determine if it is worth the investment and the cost savings.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"important-to-calculate-roi\">Why is it Important to Calculate the ROI of a SOAR Solution?<\/h2>\n\n\n\n<p>One of the most popular benefits of <a href=\"https:\/\/swimlane.com\/blog\/what-is-soar\/\">SOAR platforms<\/a> is the cost savings from automating repetitive, mundane tasks at machine speeds. However, SOAR solutions come in a variety of shapes, sizes and capabilities. It\u2019s important to understand the ROI you may experience with <a href=\"https:\/\/swimlane.com\/blog\/low-code-security-automation-simplicity\">low-code SOAR<\/a> versus a legacy, full-code solution (or even a <a href=\"https:\/\/swimlane.com\/blog\/low-code-vs-no-code-security-automation\">no-code platform<\/a>).<\/p>\n\n\n\n<p><span id=\"security-automation-roi\">E<\/span>nterprise security teams already have dozens of cybersecurity tools in place. CISOs wonder why they should invest in yet another one. How is this new solution a great addition to their current technology stack, and how is it going to solve their current challenges without breaking the bank? Calculating the ROI of the specific solution highlights exactly what your team can expect from adopting the product.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"roi-of-security-automation\">What is the ROI of Security Automation?<\/h2>\n\n\n\n<p>The ROI of security automation is monetizing the ability to reduce the number of successful cyberattacks through processes and fast response time. One way to calculate the ROI of security automation is to follow an equation-based approach where the investment and the quantified returns are normalized into a common financial basis. The ROI leverages the average cost of incidents and the number of incidents that might be faced over a certain period of time.<\/p>\n\n\n\n<p>The average cost of incidents without automation can be estimated this way: the number of incidents, the time it takes to resolve an <span id=\"financial-benefits\">in<\/span>cident, the number of staff impacted and their associated cost. When automation comes into the equation, <strong>the time to resolve an incident is reduced by 70 to 95%<\/strong>, improving staff efficiency. This number can be compared to the price of the equipment to determine its ROI.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"financial-benefits-of-security-automation\">What are the Financial Benefits of Security Automation?<\/h2>\n\n\n\n<p>Enterprise <a href=\"https:\/\/swimlane.com\/blog\/soc-team-roles-responsibilities\/\">SOC teams<\/a> that use a security automation platform can determine cost reduction and benefits in four key areas. Not all solutions are equal and will offer different cost savings in all these areas. That&#8217;s it\u2019s important to identify what impact your solution has for each area.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Staff Salary Savings<\/strong> &#8211; Reduce the need for additional new team members that support security functions.<\/li>\n\n\n\n<li><strong>Staff Support Savings <\/strong>&#8211; Reduce support costs associated with larger security teams such as training, tools and other services.<\/li>\n\n\n\n<li><strong><span id=\"soc-benefits\">To<\/span>ol Savings<\/strong> &#8211; Reduce the number of supports tool needed to address security alerts.<\/li>\n\n\n\n<li><strong>Response Cost Savings<\/strong> &#8211; Reduce incident response costs that occur by lowering the likelihood of incidents and response time.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"security-automation-benefit-soc-teams\">How does Security Automation Benefit SOC Teams?<\/h2>\n\n\n\n<p>As mentioned earlier, it is nearly impossible to put a dollar amount in front of every savings security automation platform brings your team. One sure thing is that security automation is improving the lives of SOC analysts.<\/p>\n\n\n\n<p>Some of the top qualifiable benefits for security teams are:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Mitigate analyst alert fatigue and burnout<\/li>\n\n\n\n<li>Simplify security processes<\/li>\n\n\n\n<li><span id=\"time-to-see-benefits\">Re<\/span>gain time for more strategic work<\/li>\n\n\n\n<li>Improve overall job satisfaction<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how-long-will-it-take-to-see-the-benefits-of-security-automation\">How Long Will it Take to See the Benefits of Security Automation?<\/h2>\n\n\n\n<p>The benefits of <a href=\"https:\/\/swimlane.com\/blog\/security-automation\/\">security automation<\/a> are visible almost immediately. Once it is up and running, the daily life of your staff will dramatically increase. They will be able to focus on more strategic tasks, instead of detection identification. For instance, Swimlane customer <a href=\"https:\/\/swimlane.com\/blog\/procircular-security-automation-customer-story\/\">ProCircular<\/a> saw \u201cclose to a 60% efficiency increase\u201d in their team within the initial 45-day proof of value time.<\/p>\n\n\n\n<p><span id=\"examples\">Addi<\/span>tionally, after the first incident, the analysts will be able to identify how much time they saved in response time compared to previously.<\/p>\n\n\n\n<p><em>Related Reading: <\/em><a href=\"https:\/\/swimlane.com\/blog\/security-automation-roi\/\"><em>Learn How ProCircular Unlocks Power and Flexibility with Swimlane<\/em><\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"security-automation-cost-savings\">Real-Life Examples of Security Automation Cost Savings<\/h2>\n\n\n\n<p>One Fortune 100 Swimlane customer saves $160,000 a month by automating 3,700 hours of work. improving the efficiency of security allows them to save on operational costs, as well as improve their staff\u2019s daily work satisfaction. This reduces staff burnout and improves retention.<\/p>\n\n\n\n<p>Another Fortune 100 financial services customer saves roughly $900,000 a year by using Swimlane to automate security use cases in and <a href=\"https:\/\/swimlane.com\/blog\/outside-of-soc\">beyond the SOC<\/a>. They are able to measure and share the value of their security programs with business stakeholders with in-platform customizable reports.<\/p>\n\n\n\n<div class=\"bs-div bs-div-ba9166fe52027c7aaf879eddf3c863499437dc02 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-ba9166fe52027c7aaf879eddf3c863499437dc02 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/ROI-Analysis-Swimlane-Tag-Cyber-Thumbnail.png' class='img-fluid'   alt='TAG Cyber ROI report thumbnail showing 240% return on investment for Swimlane security automation.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-2aebcd1b2c11849d7c87d8462be32842b8c42b50 bs-div---default\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\">Calculate your ROI with Swimlane Turbine<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color\">To help companies evaluate the potential financial impact of the potential investment, TAG Cyber conducted an extensive study on the Swimlane Security Automation Solution.<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-e449a2a1f49c5f5b94cc8f21bbe8ae4216dccbf0\"><style>.bs-pro-button-p-btn-e449a2a1f49c5f5b94cc8f21bbe8ae4216dccbf0 .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/resources\/roi-report\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Download Report<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/ja\/tag\/automation\/'><span class='tag-content'>Automation<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e9fce20cf57 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/security-operations-platform\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>11\u6708 22, 2024<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>How to Choose the Best Security Operations Platform: Key Considerations &#038; Tips<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e9fce20e721 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/will-ai-drive-efficiency-budget-growth\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>12\u6708 20, 2024<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Will AI Drive Efficiency and Budget Growth? Risks, Rewards &#038; Reality<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e9fce20fb94 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/maximizing-security-roi\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>6\u6708 9, 2022<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>How AI Automation Maximizes Security ROI \u2013 Smart Cybersecurity Budget Strategies\u00a0<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-5f1a05c47bd78d88ac3be0e745c2c126161649fe bs-div---default bs-div--table-of-contents-right\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\">Table of Contents<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"#roi-in-security\">WHAT IS \u2018ROI\u2019 IN SECURITY?<\/a><\/li>\n\n\n\n<li><a href=\"#important-to-calculate-roi\">WHY IS IT IMPORTANT TO CALCULATE ROI?<\/a><\/li>\n\n\n\n<li><a href=\"#roi-of-security-automation\">WHAT IS THE ROI OF SECURITY AUTOMATION?<\/a><\/li>\n\n\n\n<li><a href=\"#financial-benefits-of-security-automation\">WHAT ARE THE FINANCIAL BENEFITS OF SECURITY AUTOMATION?<\/a><\/li>\n\n\n\n<li><a href=\"#security-automation-benefit-soc-teams\">HOW DOES SECURITY AUTOMATION BENEFIT SOC TEAMS?<\/a><\/li>\n\n\n\n<li><a href=\"#how-long-will-it-take-to-see-the-benefits-of-security-automation\">HOW LONG WILL IT TAKE TO SEE THE BENEFITS OF SECURITY AUTOMATION?<\/a><\/li>\n\n\n\n<li><a href=\"#security-automation-cost-savings\">EXAMPLES OF SECURITY AUTOMATION COST SAVINGS<\/a><\/li>\n<\/ul>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316\u306e ROI \u306b\u3064\u3044\u3066\u77e5\u3063\u3066\u304a\u304f\u3079\u304d\u3059\u3079\u3066\u306e\u3053\u3068\u3002.<\/p>","protected":false},"author":5,"featured_media":9351,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[236],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[75],"class_list":["post-9350","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-automation","resource-type-blogs","blog-category-security-automation"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The ROI of Security Automation<\/title>\n<meta name=\"description\" content=\"According to Security Magazine , 70% of security operations center (SOC) teams are drowning in alert noise and the pressure to make near-real-time\u2026\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316\u306eroi\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Reality of Security Automation ROI: Calculations &amp; Considerations\" \/>\n<meta property=\"og:description\" content=\"According to Security Magazine , 70% of security operations center (SOC) teams are drowning in alert noise and the pressure to make near-real-time\u2026\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316\u306eroi\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-09T10:15:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/ROIII_Masthead.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"679\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"6\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/blog\\\/security-automation-roi\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/blog\\\/security-automation-roi\\\/\",\"name\":\"The ROI of Security Automation\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/blog\\\/security-automation-roi\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/blog\\\/security-automation-roi\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/ROIII_Masthead.png\",\"datePublished\":\"2022-10-25T06:00:00+00:00\",\"dateModified\":\"2025-12-09T10:15:22+00:00\",\"description\":\"According to Security Magazine , 70% of security operations center (SOC) teams are drowning in alert noise and the pressure to make near-real-time\u2026\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/blog\\\/security-automation-roi\\\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/swimlane.com\\\/ja\\\/blog\\\/security-automation-roi\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/blog\\\/security-automation-roi\\\/#primaryimage\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/ROIII_Masthead.png\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/ROIII_Masthead.png\",\"width\":1120,\"height\":679,\"caption\":\"Enterprise masthead representing the strategic ROI of security automation and operational efficiency.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/blog\\\/security-automation-roi\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/swimlane.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Reality of Security Automation ROI: Calculations &#038; Considerations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/#website\",\"url\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/swimlane\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/swimlane\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316\u306eROI","description":"Security Magazine \u306b\u3088\u308b\u3068\u300170% \u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30aa\u30da\u30ec\u30fc\u30b7\u30e7\u30f3 \u30bb\u30f3\u30bf\u30fc (SOC) \u30c1\u30fc\u30e0\u304c\u30a2\u30e9\u30fc\u30c8 \u30ce\u30a4\u30ba\u3068\u307b\u307c\u30ea\u30a2\u30eb\u30bf\u30a4\u30e0\u306e\u5bfe\u5fdc\u3092\u6c42\u3081\u308b\u30d7\u30ec\u30c3\u30b7\u30e3\u30fc\u306b\u5727\u5012\u3055\u308c\u3066\u3044\u307e\u3059...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316\u306eroi\/","og_locale":"ja_JP","og_type":"article","og_title":"The Reality of Security Automation ROI: Calculations & Considerations","og_description":"According to Security Magazine , 70% of security operations center (SOC) teams are drowning in alert noise and the pressure to make near-real-time\u2026","og_url":"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316\u306eroi\/","og_site_name":"AI Security Automation","article_modified_time":"2025-12-09T10:15:22+00:00","og_image":[{"width":1120,"height":679,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/ROIII_Masthead.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"6\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ja\/blog\/security-automation-roi\/","url":"https:\/\/swimlane.com\/ja\/blog\/security-automation-roi\/","name":"\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316\u306eROI","isPartOf":{"@id":"https:\/\/swimlane.com\/ja\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ja\/blog\/security-automation-roi\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ja\/blog\/security-automation-roi\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/ROIII_Masthead.png","datePublished":"2022-10-25T06:00:00+00:00","dateModified":"2025-12-09T10:15:22+00:00","description":"Security Magazine \u306b\u3088\u308b\u3068\u300170% \u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30aa\u30da\u30ec\u30fc\u30b7\u30e7\u30f3 \u30bb\u30f3\u30bf\u30fc (SOC) \u30c1\u30fc\u30e0\u304c\u30a2\u30e9\u30fc\u30c8 \u30ce\u30a4\u30ba\u3068\u307b\u307c\u30ea\u30a2\u30eb\u30bf\u30a4\u30e0\u306e\u5bfe\u5fdc\u3092\u6c42\u3081\u308b\u30d7\u30ec\u30c3\u30b7\u30e3\u30fc\u306b\u5727\u5012\u3055\u308c\u3066\u3044\u307e\u3059...","breadcrumb":{"@id":"https:\/\/swimlane.com\/ja\/blog\/security-automation-roi\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ja\/blog\/security-automation-roi\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/swimlane.com\/ja\/blog\/security-automation-roi\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/ROIII_Masthead.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/ROIII_Masthead.png","width":1120,"height":679,"caption":"Enterprise masthead representing the strategic ROI of security automation and operational efficiency."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ja\/blog\/security-automation-roi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"The Reality of Security Automation ROI: Calculations &#038; Considerations"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ja\/#website","url":"https:\/\/swimlane.com\/ja\/","name":"\u30ed\u30fc\u30b3\u30fc\u30c9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\uff06SOAR\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\uff5c\u30b9\u30a4\u30e0\u30ec\u30fc\u30f3","description":"\u3042\u3089\u3086\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6a5f\u80fd\u3092\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u578bAI\u3067\u81ea\u52d5\u5316","publisher":{"@id":"https:\/\/swimlane.com\/ja\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ja\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ja\/#organization","name":"\u30ed\u30fc\u30b3\u30fc\u30c9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\uff06SOAR\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\uff5c\u30b9\u30a4\u30e0\u30ec\u30fc\u30f3","url":"https:\/\/swimlane.com\/ja\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/9350","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/9350\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/media\/9351"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/media?parent=9350"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/tags?post=9350"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-type?post=9350"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-topic?post=9350"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-industry?post=9350"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/blog-category?post=9350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}