{"id":9591,"date":"2020-10-29T08:00:00","date_gmt":"2020-10-29T14:00:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/how-soar-makes-threat-detection-and-remediation-more-effective\/"},"modified":"2024-07-01T10:51:31","modified_gmt":"2024-07-01T16:51:31","slug":"soar%e3%81%8c%e8%84%85%e5%a8%81%e3%81%ae%e6%a4%9c%e5%87%ba%e3%81%a8%e4%bf%ae%e5%be%a9%e3%82%92%e3%82%88%e3%82%8a%e5%8a%b9%e6%9e%9c%e7%9a%84%e3%81%ab%e3%81%99%e3%82%8b%e6%96%b9%e6%b3%95","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ja\/blog\/how-soar-makes-threat-detection-and-remediation-more-effective\/","title":{"rendered":"SOAR\u304c\u8105\u5a01\u306e\u691c\u51fa\u3068\u4fee\u5fa9\u3092\u3088\u308a\u52b9\u679c\u7684\u306b\u3059\u308b\u65b9\u6cd5"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/How-SOAR-Makes-Threat-Detection-and-Remediation-More-Effective.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Swimlane SOAR platform improving threat detection and automated remediation\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/How-SOAR-Makes-Threat-Detection-and-Remediation-More-Effective.png 800w, https:\/\/swimlane.com\/wp-content\/uploads\/How-SOAR-Makes-Threat-Detection-and-Remediation-More-Effective-300x199.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/How-SOAR-Makes-Threat-Detection-and-Remediation-More-Effective-768x510.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2020-10-29T08:00:00-06:00\">10\u6708 29, 2020<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">How SOAR Makes Threat Detection and Remediation More Effective<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/ja\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">2 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/ja\/blog\/how-soar-makes-threat-detection-and-remediation-more-effective\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/ja\/blog\/how-soar-makes-threat-detection-and-remediation-more-effective\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('How%20SOAR%20Makes%20Threat%20Detection%20and%20Remediation%20More%20Effective').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fhow-soar-makes-threat-detection-and-remediation-more-effective%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=How%20SOAR%20Makes%20Threat%20Detection%20and%20Remediation%20More%20Effective&url=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fhow-soar-makes-threat-detection-and-remediation-more-effective%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fhow-soar-makes-threat-detection-and-remediation-more-effective%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fhow-soar-makes-threat-detection-and-remediation-more-effective%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<h2>\u00a0<\/h2>\n<p>The only thing spookier than the goblins and ghouls out this Halloween are undetected threats\u2026<\/p>\n<p>You know what\u2019s really spooky? It\u2019s not the goblins and ghouls out this Halloween. It\u2019s devices around an organization\u2019s infrastructure that send more alerts than security operations center (SOC) teams can handle, leading to <a href=\"https:\/\/swimlane.com\/blog\/analyst-burnout-signs\" data-redactor-span=\"true\">analyst burnout <\/a>and churn. The good news is you can vanquish these threats with a security orchestration, automation and response (SOAR) solution!<\/p>\n<p>SOAR, first introduced as an official category by Gartner, is an approach to security operations and incident response to enhance SOC efficacy with its existing people, processes and technologies. While the <a href=\"https:\/\/swimlane.com\/blog\/sao-use-cases\" data-redactor-span=\"true\">use cases<\/a> for SOAR are virtually limitless, most organizations leverage SOAR in three key areas:<\/p>\n<ul>\n<li>Threat and <a href=\"https:\/\/swimlane.com\/resources\/vulnerability-management-soar-swimlane\" data-redactor-span=\"true\">vulnerability management<\/a><\/li>\n<li><a href=\"https:\/\/swimlane.com\/solutions\/security-automation-and-orchestration\/automated-incident-response\" data-redactor-span=\"true\">Incident response<\/a><\/li>\n<li><a href=\"https:\/\/swimlane.com\/solutions\/security-automation-and-orchestration\/security-automation\" data-redactor-span=\"true\">Security operations automation<\/a><\/li>\n<\/ul>\n<p>While integrating security technologies, SOAR allows enterprises to evaluate threats instantly, boosting their overall security stands and often averting data breaches in the first instance. SOAR solutions feature dashboards where most incident management and response activity takes place. Users can look at dashboards to view and manage real-time alerts and threat intelligence. Additionally, dashboards can generate reports for the CISO, SOC managers, and other organization stakeholders for better security intelligence and the ability to find opportunities for improvement.<\/p>\n<h3>So, how does SOAR make threat detection and remediation easier for SecOps?<\/h3>\n<p>Threat management isn\u2019t just about detection. A quick response is necessary to mitigate the organization\u2019s vulnerability. A true SOAR solution ingests data from the organization\u2019s<a href=\"https:\/\/swimlane.com\/blog\/siem-soar\" data-redactor-span=\"true\"> security information and event management (SIEM) system<\/a>, <a href=\"https:\/\/swimlane.com\/blog\/responding-to-insider-threats-with-soar\" data-redactor-span=\"true\">data loss prevention (DLP) tools<\/a>, <a href=\"https:\/\/swimlane.com\/resources\/ebook-sao-for-mssps\" data-redactor-span=\"true\">managed service alerts<\/a>, <a href=\"https:\/\/swimlane.com\/resources\/joint-solution-briefs\/swimlane_recorded_future_id\/\" data-redactor-span=\"true\">threat intelligence<\/a> feeds, and other sources that provide context to the data. It then outlines incident analysis and response processes in a workflow. And most importantly, it accomplishes all of this at machine speed with minimal (if any) human interaction, freeing up security analysts for higher-value tasks rather than the tedious copy\/paste typically associated with incident response processes.<\/p>\n<p>In short, by pulling all current security tools into one platform, analysts can automatically find and fix security problems in real time, enabling quicker, more intelligent remediation to all types of threats.<\/p>\n<p>As the growing threat landscape continues to get spookier and more sophisticated, a <a href=\"https:\/\/swimlane.com\/blog\/what-is-soar\/\">SOAR platform<\/a> is a critical need for SOCs to keep up (or even get ahead). To learn more, check out our e-book with SC Media, \u201cWhat is SOAR and how it makes threat detection and remediation more effective.\u201d<\/p>\n\n\n\n<div class=\"bs-div bs-div-d9c5723c7452741fa51dcfbad681e189ce0a3446 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-d9c5723c7452741fa51dcfbad681e189ce0a3446 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/SC-Media-Optimising-SOAR-Thumbnail.jpg' class='img-fluid'   alt='Optimising SOAR investment with implementation best practices for automation and orchestration success using Swimlane platform.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-2aebcd1b2c11849d7c87d8462be32842b8c42b50 bs-div---default\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-ebook-what-is-soar-and-how-it-makes-threat-detection-and-remediation-more-effective\">eBook: What Is SOAR and How It Makes Threat Detection and Remediation More Effective<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color\">Download this 14-page eBook to learn the essentials behind Security Orchestration, Automation and Response (SOAR), including how it improves threat detection and remediation across a range of verticals, while achieving economic savings and how to implement SOAR successfully.<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-e42453dcaf5c095d70e78ee8ff447a9ef71c3888\"><style>.bs-pro-button-p-btn-e42453dcaf5c095d70e78ee8ff447a9ef71c3888 .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/resources\/ebook-sc-media-what-is-soar\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Download Now<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/ja\/tag\/soar\/'><span class='tag-content'>SOAR<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69ea8be426e38 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/state-of-soar-2019\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>12\u6708 10, 2019<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>The State of SOAR 2019: How using SOAR tools makes life easier<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69ea8be428011 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/swimlane-dataminr-partnership\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>9\u6708 20, 2022<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Swimlane and Dataminr Pulse, Automated Response for Real-time Remediation<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69ea8be429426 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/what-is-threat-detection-incident-response\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>10\u6708 9, 2025<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>What is Threat Detection and Response?<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":9592,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[89],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[],"class_list":["post-9591","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-soar","resource-type-blogs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Effective Thread Detection &amp; Remediation with SOAR | Swimlane<\/title>\n<meta name=\"description\" content=\"Threat management isn\u2019t just about detection. A quick response is necessary to mitigate the organization\u2019s vulnerability.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/soar\u304c\u8105\u5a01\u306e\u691c\u51fa\u3068\u4fee\u5fa9\u3092\u3088\u308a\u52b9\u679c\u7684\u306b\u3059\u308b\u65b9\u6cd5\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How SOAR Makes Threat Detection and Remediation More Effective\" \/>\n<meta property=\"og:description\" content=\"Threat management isn\u2019t just about detection. A quick response is necessary to mitigate the organization\u2019s vulnerability.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/soar\u304c\u8105\u5a01\u306e\u691c\u51fa\u3068\u4fee\u5fa9\u3092\u3088\u308a\u52b9\u679c\u7684\u306b\u3059\u308b\u65b9\u6cd5\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-01T16:51:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/How-SOAR-Makes-Threat-Detection-and-Remediation-More-Effective.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"531\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"3\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/blog\\\/how-soar-makes-threat-detection-and-remediation-more-effective\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/blog\\\/how-soar-makes-threat-detection-and-remediation-more-effective\\\/\",\"name\":\"Effective Thread Detection & Remediation with SOAR | Swimlane\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/blog\\\/how-soar-makes-threat-detection-and-remediation-more-effective\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/blog\\\/how-soar-makes-threat-detection-and-remediation-more-effective\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/How-SOAR-Makes-Threat-Detection-and-Remediation-More-Effective.png\",\"datePublished\":\"2020-10-29T14:00:00+00:00\",\"dateModified\":\"2024-07-01T16:51:31+00:00\",\"description\":\"Threat management isn\u2019t just about detection. A quick response is necessary to mitigate the organization\u2019s vulnerability.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/blog\\\/how-soar-makes-threat-detection-and-remediation-more-effective\\\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/swimlane.com\\\/ja\\\/blog\\\/how-soar-makes-threat-detection-and-remediation-more-effective\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/blog\\\/how-soar-makes-threat-detection-and-remediation-more-effective\\\/#primaryimage\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/How-SOAR-Makes-Threat-Detection-and-Remediation-More-Effective.png\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/How-SOAR-Makes-Threat-Detection-and-Remediation-More-Effective.png\",\"width\":800,\"height\":531,\"caption\":\"Swimlane SOAR platform improving threat detection and automated remediation\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/blog\\\/how-soar-makes-threat-detection-and-remediation-more-effective\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/swimlane.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How SOAR Makes Threat Detection and Remediation More Effective\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/#website\",\"url\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ja\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/swimlane\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/swimlane\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SOAR\u306b\u3088\u308b\u52b9\u679c\u7684\u306a\u30b9\u30ec\u30c3\u30c9\u691c\u51fa\u3068\u4fee\u5fa9 | Swimlane","description":"\u8105\u5a01\u7ba1\u7406\u306f\u3001\u691c\u77e5\u3060\u3051\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u3002\u7d44\u7e54\u306e\u8106\u5f31\u6027\u3092\u8efd\u6e1b\u3059\u308b\u306b\u306f\u3001\u8fc5\u901f\u306a\u5bfe\u5fdc\u304c\u4e0d\u53ef\u6b20\u3067\u3059\u3002.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/soar\u304c\u8105\u5a01\u306e\u691c\u51fa\u3068\u4fee\u5fa9\u3092\u3088\u308a\u52b9\u679c\u7684\u306b\u3059\u308b\u65b9\u6cd5\/","og_locale":"ja_JP","og_type":"article","og_title":"How SOAR Makes Threat Detection and Remediation More Effective","og_description":"Threat management isn\u2019t just about detection. A quick response is necessary to mitigate the organization\u2019s vulnerability.","og_url":"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/soar\u304c\u8105\u5a01\u306e\u691c\u51fa\u3068\u4fee\u5fa9\u3092\u3088\u308a\u52b9\u679c\u7684\u306b\u3059\u308b\u65b9\u6cd5\/","og_site_name":"AI Security Automation","article_modified_time":"2024-07-01T16:51:31+00:00","og_image":[{"width":800,"height":531,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/How-SOAR-Makes-Threat-Detection-and-Remediation-More-Effective.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"3\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ja\/blog\/how-soar-makes-threat-detection-and-remediation-more-effective\/","url":"https:\/\/swimlane.com\/ja\/blog\/how-soar-makes-threat-detection-and-remediation-more-effective\/","name":"SOAR\u306b\u3088\u308b\u52b9\u679c\u7684\u306a\u30b9\u30ec\u30c3\u30c9\u691c\u51fa\u3068\u4fee\u5fa9 | Swimlane","isPartOf":{"@id":"https:\/\/swimlane.com\/ja\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ja\/blog\/how-soar-makes-threat-detection-and-remediation-more-effective\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ja\/blog\/how-soar-makes-threat-detection-and-remediation-more-effective\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/How-SOAR-Makes-Threat-Detection-and-Remediation-More-Effective.png","datePublished":"2020-10-29T14:00:00+00:00","dateModified":"2024-07-01T16:51:31+00:00","description":"\u8105\u5a01\u7ba1\u7406\u306f\u3001\u691c\u77e5\u3060\u3051\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u3002\u7d44\u7e54\u306e\u8106\u5f31\u6027\u3092\u8efd\u6e1b\u3059\u308b\u306b\u306f\u3001\u8fc5\u901f\u306a\u5bfe\u5fdc\u304c\u4e0d\u53ef\u6b20\u3067\u3059\u3002.","breadcrumb":{"@id":"https:\/\/swimlane.com\/ja\/blog\/how-soar-makes-threat-detection-and-remediation-more-effective\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ja\/blog\/how-soar-makes-threat-detection-and-remediation-more-effective\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/swimlane.com\/ja\/blog\/how-soar-makes-threat-detection-and-remediation-more-effective\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/How-SOAR-Makes-Threat-Detection-and-Remediation-More-Effective.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/How-SOAR-Makes-Threat-Detection-and-Remediation-More-Effective.png","width":800,"height":531,"caption":"Swimlane SOAR platform improving threat detection and automated remediation"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ja\/blog\/how-soar-makes-threat-detection-and-remediation-more-effective\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"How SOAR Makes Threat Detection and Remediation More Effective"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ja\/#website","url":"https:\/\/swimlane.com\/ja\/","name":"\u30ed\u30fc\u30b3\u30fc\u30c9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\uff06SOAR\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\uff5c\u30b9\u30a4\u30e0\u30ec\u30fc\u30f3","description":"\u3042\u3089\u3086\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6a5f\u80fd\u3092\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u578bAI\u3067\u81ea\u52d5\u5316","publisher":{"@id":"https:\/\/swimlane.com\/ja\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ja\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ja\/#organization","name":"\u30ed\u30fc\u30b3\u30fc\u30c9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\uff06SOAR\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\uff5c\u30b9\u30a4\u30e0\u30ec\u30fc\u30f3","url":"https:\/\/swimlane.com\/ja\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/9591","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/9591\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/media\/9592"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/media?parent=9591"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/tags?post=9591"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-type?post=9591"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-topic?post=9591"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-industry?post=9591"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/blog-category?post=9591"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}