{"id":9666,"date":"2020-01-09T00:00:00","date_gmt":"2020-01-09T07:00:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/the-past-present-and-future-of-soar-current-state-of-the-soc\/"},"modified":"2026-04-24T05:21:39","modified_gmt":"2026-04-24T11:21:39","slug":"%e3%82%bd%e3%82%a2%e3%81%ae%e9%81%8e%e5%8e%bb%e3%80%81%e7%8f%be%e5%9c%a8%e3%80%81%e3%81%9d%e3%81%97%e3%81%a6%e6%9c%aa%e6%9d%a5%e3%80%81%e7%a4%be%e4%bc%9a%e3%81%ae%e7%8f%be%e7%8a%b6","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ja\/blog\/the-past-present-and-future-of-soar-current-state-of-the-soc\/","title":{"rendered":"SOC\u306e\u73fe\u72b6\u3068SIEM\u306e\u6d3b\u7528"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-6770b3369b6c61539d3140cb52ed6bc5ec393625 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Vulnerability-management-program.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Close-up, monochrome image of hands typing on a Dell laptop beside a second open laptop, creating a serious, focused atmosphere that suggests intense cybersecurity work or digital investigation.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/Vulnerability-management-program.png 800w, https:\/\/swimlane.com\/wp-content\/uploads\/Vulnerability-management-program-300x186.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/Vulnerability-management-program-768x477.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-2ba18c9b6304620af4785b54fe900bf0ce0fc4d5 bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2020-01-09T00:00:00-07:00\">1\u6708 9, 2020<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">State of the SOC and Using SIEM<\/h1>\n\n\n<div class=\"bs-div bs-div-44a15e4b99450b7aaf810333a0fbaa4ff5112133 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/ja\/author\/Jay_Spann\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Jay_Spann.jpeg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tJay Spann\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">4 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-205a03f93391472c82564395e3b5684e68c8ef7d bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-fa02c15a19a9c2952663733986e45d4eef708638 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/ja\/blog\/the-past-present-and-future-of-soar-current-state-of-the-soc\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/ja\/blog\/the-past-present-and-future-of-soar-current-state-of-the-soc\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('State%20of%20the%20SOC%20and%20Using%20SIEM').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fthe-past-present-and-future-of-soar-current-state-of-the-soc%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=State%20of%20the%20SOC%20and%20Using%20SIEM&url=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fthe-past-present-and-future-of-soar-current-state-of-the-soc%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fthe-past-present-and-future-of-soar-current-state-of-the-soc%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fthe-past-present-and-future-of-soar-current-state-of-the-soc%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-0d83d6d9863f92131cc95492d42e5b50c72f00bb bs-column---default bs-column--contents     \">\n<h2>The Past, Present and Future of SOAR Part 1<\/h2>\n<p>Security operations centers (SOCs) need to be able to respond to any kind of alert, attack or incident quickly and effectively while running lean teams and proving ROI to their executives. Accomplishing this requires highly skilled and trained personnel, well-documented processes and finely-tuned technologies. Unfortunately, not many SOCs are blessed with this magic combination. Instead, they have to manage a daily deluge of alerts from an ever-evolving threat landscape and sophisticated bad actors with constant personnel churn and disparate tools and processes. In this typical environment, it takes too long for an analyst to receive an alert, read and comprehend its key details, copy and paste the data into other tools to verify that it is not a false positive, and then take action to stop the attack and begin remediation. Organizations cannot afford to be left vulnerable for that amount of time.<\/p>\n<h3>But we have a SIEM.<\/h3>\n<p>A <a href=\"https:\/\/swimlane.com\/blog\/siem-soar\/\">security information and event management (SIEM) system<\/a> is what most SOCs are now using to combat the dire issues described above. The thing about a SIEM, is it typically generates a massive volume of information, making it difficult for SOCs to keep up. In fact, according to <a href=\"https:\/\/swimlane.com\/resources\/ema-automation-summary-report\/\">recent Enterprise Management Associates (EMA) research<\/a>, 64% of the security tickets generated per day go uninvestigated because of a lack of manpower.<\/p>\n<p>While a SIEM solution helps capture alert data, it is not a Big Data tool. Security teams need Big Data tools to mine the large sets of data that accompany SIEM alerts to make snap decisions and identify patterns and trends. Organizations are looking at the tooling and the resources they have at their disposal\u2014whether that is data management, data pipeline or even cloud computing\u2014and wondering why they don\u2019t have access to those similar tools on the security side. As organizations migrate more and more of their resources\u2014especially their log aggregation, log management and data analytics\u2014to the cloud, they are starting to look at SIEM along with what tooling is available natively within those infrastructures. Ideally, teams would leverage the same technology stack and the same resources they have internally from a development and engineering perspective for security operations.<\/p>\n<h3>Enter automation.<\/h3>\n<p>In an effort to keep up with SIEM alerts, SOCs are implementing automation. Teams are automating tasks such as log standardization, log management, log aggregation, and the investigation and the review of log data via correlated alerts, to name a few. Obviously, it is not possible to review every log alert. Rather, the goal is to automate the aggregation and analysis of that logging information. And yes, organizations have been relatively successfully in implementing automation on this level over the past decade.<\/p>\n<p>However, all that really did was stem the top of the funnel relative to the amount of work that people had to do because there has been limited automation for the people component of security operations (SecOps). By automating as much as they could, organizations were really focused on prioritization or deduplication. To truly take advantage of automation, we must rethink our approach and identify opportunities earlier in the lifecycle of an attack. For example, are there earlier key performance indicators that identify something that doesn\u2019t require correlation or analytics on which we can take action? Organizations are beginning to realize the technologies feeding their SIEM or their data lake are hi fidelity and actionable in their original state and don\u2019t require so much of that processing.<\/p>\n<h3>So, today\u2019s SOC needs better automation. Is that all?<\/h3>\n<p>As an organization scales its resources, what happens when detections occur, and actions are required? Considering the number of cloud-based and other resources constantly being added, where should detections and actions be handled? The surface area is constantly and rapidly expanding with a plethora of new internet of things (IoT) devices, virtualization, mobile devices, containerization and other changes and additions that must be monitored. Each one of these technologies has its own infrastructure requirements, monitoring requirements, security, patching and vulnerability assessment requirements. When we look at the projected number of IP-enabled devices moving as high as 100 billion devices over the next 5-10 years, the number of things that we must do to keep that safe is just mind boggling. The flexibility and ability to scale across that surface area is incredibly important for organizations as they look at building security operations that are forward looking. So, in short, the answer is \u201cno.\u201d Improving automation in the SOC is not all.<\/p>\n<p>In the next two installations of this three-part blog series, we will take a look at how security orchestration, automation and response (SOAR) is working to alleviate the issues described here in the current state of the SOC and what organizations should keep in mind for a new decade of SecOps.<\/p>\n\n\n\n<div class=\"bs-div bs-div-ce58269220081bb986da7fc1443bfe39b79fed41 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-ce58269220081bb986da7fc1443bfe39b79fed41 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \">\n<div class=\"bs-div bs-div-773aef0a3852274bc6b23f7985e05efd194e399e bs-div---default\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-webinar-the-past-present-and-future-of-security-orchestration-automation-and-response\">Webinar: The Past, Present and Future of Security Orchestration, Automation and Response<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color\">Manual incident response processes and difficulty hiring experienced personnel leaves security teams struggling to keep up with the growing volume of alerts. SOAR streamlines and speeds up the incident response process by integrating your people, processes and technology. Watch this on-demand Swimlane webinar to get an in-depth look into the past, present and future of SOAR with research, reports and real-life SOAR customer data supporting these insights.<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-25666fb7a955e6867c9ca9d38118c57f38bcc78c\"><style>.bs-pro-button-p-btn-25666fb7a955e6867c9ca9d38118c57f38bcc78c .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/resources\/the-past-present-and-future-of-security-orchestration-automation-and-response\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Watch Now<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-0ad64702520e52820989c3b8a4a5574abd826112 bs-column---default     \">\n<div class=\"bs-div bs-div-f0851be86a4542da358c10ec17ccebffa17efe07 bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-5e7267355d8caf36f5b5e0c86eef387b664b848d bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69fa293828e4a bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/siem-alert-triage\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>3\u6708 13, 2018<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Using security automation and orchestration for SIEM triage<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69fa29382b4bb bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/state-of-soar-2019\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>12\u6708 10, 2019<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>The State of SOAR 2019: How using SOAR tools makes life easier<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69fa29382d0ea bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/incident-alert-management\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>10\u6708 11, 2017<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Using security automation and orchestration for incident alert management<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>SOAR\u306e\u904e\u53bb\u3001\u73fe\u5728\u3001\u305d\u3057\u3066\u672a\u6765 \u30d1\u30fc\u30c81<\/p>","protected":false},"author":29,"featured_media":9667,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[70],"class_list":["post-9666","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>State of the SOC and Using SIEM<\/title>\n<meta name=\"description\" content=\"According to recent Enterprise Management Associates research, 64% of the security tickets generated per day go uninvestigated because of a lack of\u2026\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u30bd\u30a2\u306e\u904e\u53bb\u3001\u73fe\u5728\u3001\u305d\u3057\u3066\u672a\u6765\u3001\u793e\u4f1a\u306e\u73fe\u72b6\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"State of the SOC and Using SIEM\" \/>\n<meta property=\"og:description\" content=\"According to recent Enterprise Management Associates research, 64% of the security tickets generated per day go uninvestigated because of a lack of\u2026\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u30bd\u30a2\u306e\u904e\u53bb\u3001\u73fe\u5728\u3001\u305d\u3057\u3066\u672a\u6765\u3001\u793e\u4f1a\u306e\u73fe\u72b6\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-24T11:21:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/Vulnerability-management-program.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"497\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"5\u5206\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SOC\u306e\u73fe\u72b6\u3068SIEM\u306e\u6d3b\u7528","description":"\u6700\u8fd1\u306e Enterprise Management Associates \u306e\u8abf\u67fb\u306b\u3088\u308b\u3068\u30011 \u65e5\u306b\u751f\u6210\u3055\u308c\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30c1\u30b1\u30c3\u30c8\u306e\u3046\u3061 64% \u304c\u3001\u9069\u5207\u306a\u5bfe\u5fdc\u304c\u53d6\u3089\u308c\u3066\u3044\u306a\u3044\u305f\u3081\u306b\u8abf\u67fb\u3055\u308c\u305a\u306b\u6b8b\u3063\u3066\u3044\u307e\u3059\u3002","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u30bd\u30a2\u306e\u904e\u53bb\u3001\u73fe\u5728\u3001\u305d\u3057\u3066\u672a\u6765\u3001\u793e\u4f1a\u306e\u73fe\u72b6\/","og_locale":"ja_JP","og_type":"article","og_title":"State of the SOC and Using SIEM","og_description":"According to recent Enterprise Management Associates research, 64% of the security tickets generated per day go uninvestigated because of a lack of\u2026","og_url":"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u30bd\u30a2\u306e\u904e\u53bb\u3001\u73fe\u5728\u3001\u305d\u3057\u3066\u672a\u6765\u3001\u793e\u4f1a\u306e\u73fe\u72b6\/","og_site_name":"AI Security Automation","article_modified_time":"2026-04-24T11:21:39+00:00","og_image":[{"width":800,"height":497,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/Vulnerability-management-program.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"5\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ja\/blog\/the-past-present-and-future-of-soar-current-state-of-the-soc\/","url":"https:\/\/swimlane.com\/ja\/blog\/the-past-present-and-future-of-soar-current-state-of-the-soc\/","name":"SOC\u306e\u73fe\u72b6\u3068SIEM\u306e\u6d3b\u7528","isPartOf":{"@id":"https:\/\/swimlane.com\/ja\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ja\/blog\/the-past-present-and-future-of-soar-current-state-of-the-soc\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ja\/blog\/the-past-present-and-future-of-soar-current-state-of-the-soc\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Vulnerability-management-program.png","datePublished":"2020-01-09T07:00:00+00:00","dateModified":"2026-04-24T11:21:39+00:00","description":"\u6700\u8fd1\u306e Enterprise Management Associates \u306e\u8abf\u67fb\u306b\u3088\u308b\u3068\u30011 \u65e5\u306b\u751f\u6210\u3055\u308c\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30c1\u30b1\u30c3\u30c8\u306e\u3046\u3061 64% \u304c\u3001\u9069\u5207\u306a\u5bfe\u5fdc\u304c\u53d6\u3089\u308c\u3066\u3044\u306a\u3044\u305f\u3081\u306b\u8abf\u67fb\u3055\u308c\u305a\u306b\u6b8b\u3063\u3066\u3044\u307e\u3059\u3002","breadcrumb":{"@id":"https:\/\/swimlane.com\/ja\/blog\/the-past-present-and-future-of-soar-current-state-of-the-soc\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ja\/blog\/the-past-present-and-future-of-soar-current-state-of-the-soc\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/swimlane.com\/ja\/blog\/the-past-present-and-future-of-soar-current-state-of-the-soc\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/Vulnerability-management-program.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Vulnerability-management-program.png","width":800,"height":497,"caption":"Close-up, monochrome image of hands typing on a Dell laptop beside a second open laptop, creating a serious, focused atmosphere that suggests intense cybersecurity work or digital investigation."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ja\/blog\/the-past-present-and-future-of-soar-current-state-of-the-soc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"State of the SOC and Using SIEM"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ja\/#website","url":"https:\/\/swimlane.com\/ja\/","name":"\u30ed\u30fc\u30b3\u30fc\u30c9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\uff06SOAR\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\uff5c\u30b9\u30a4\u30e0\u30ec\u30fc\u30f3","description":"\u3042\u3089\u3086\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6a5f\u80fd\u3092\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u578bAI\u3067\u81ea\u52d5\u5316","publisher":{"@id":"https:\/\/swimlane.com\/ja\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ja\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ja\/#organization","name":"\u30ed\u30fc\u30b3\u30fc\u30c9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\uff06SOAR\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\uff5c\u30b9\u30a4\u30e0\u30ec\u30fc\u30f3","url":"https:\/\/swimlane.com\/ja\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/9666","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/users\/29"}],"version-history":[{"count":1,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/9666\/revisions"}],"predecessor-version":[{"id":55841,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/9666\/revisions\/55841"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/media\/9667"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/media?parent=9666"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/tags?post=9666"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-type?post=9666"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-topic?post=9666"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-industry?post=9666"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/blog-category?post=9666"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}