{"id":186,"date":"2022-11-11T13:05:26","date_gmt":"2022-11-11T13:05:26","guid":{"rendered":"https:\/\/swimlane.com\/?page_id=186"},"modified":"2026-03-13T04:44:41","modified_gmt":"2026-03-13T10:44:41","slug":"%ec%9c%84%ed%98%91-%ec%82%ac%eb%83%a5","status":"publish","type":"page","link":"https:\/\/swimlane.com\/ko\/solutions\/use-cases\/threat-hunting\/","title":{"rendered":"\uc704\ud611 \ud0d0\uc9c0"},"content":{"rendered":"\n<section class=\"bs-section bs-section-07df96f68cc29bebb3a826838ece29a042e856af bs-section---default bs-section--common-banner-type-two bs-section--industry-type-header  \"><style>.bs-section.bs-section-07df96f68cc29bebb3a826838ece29a042e856af{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-12  col-xl-0 col-md-0 col-lg-7   bs-column-4fbbb1f4d1ab0b461605c8ad5f023e905fd82089 bs-column---default     \">\n<div class=\"bs-div bs-div-4f044dcfc814fd15628aafd7a158addba7fa3101 bs-div---default bs-div--breadcrumb\"><div class=\"bs-div__inner     \">\n<ul class=\"wp-block-list\">\n<li>Use Case<\/li>\n\n\n\n<li>Threat Hunting<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<h1 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-automate-threat-hunting\">Automate Threat Hunting<\/h1>\n\n\n\n<p class=\"has-white-color has-text-color\">Proactively search cyber threats that are lurking undetected in the network. With the ever-evolving cybersecurity landscape, having a proactive and automated cyber threat hunting process is particularly critical.<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow bs-pro-button-p-btn-8a4378e4d3e6881af439b4576a884e9d373f72d8\"><style>.bs-pro-button-p-btn-8a4378e4d3e6881af439b4576a884e9d373f72d8 .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"\/demo\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Request a Demo<\/a><\/span>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12 col-xl-0 col-md-0 col-lg-5   bs-column-79334b700cd2ef4bbf50cc52adb55626bc9e8d1d bs-column---default     \"><div class=\"bs-lottie-animator bs-lottie-animator---default\" id=\"lottie-d1a0eeb6-6458-4680-8a97-c1811ecc64cf\" data-settings=\"{&quot;desktop&quot;:{&quot;settings&quot;:{&quot;animateViewPort&quot;:1,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;About_lines1.json&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:0,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/About_lines1.json&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;,&quot;oneTimePlay&quot;:true}},&quot;mobile&quot;:{&quot;breakpoint&quot;:576,&quot;settings&quot;:{&quot;animateViewPort&quot;:1,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;Why_join_lines.json&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:0,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Why_join_lines.json&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;,&quot;oneTimePlay&quot;:true}}}\"><\/div>\n\n\n<div class=\"bs-div bs-div-780504ec595335944e97a5b9e1877653f3fe2723 bs-div---default\"><div class=\"bs-div__inner     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            <source srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/threathunting-1.png\" media=\"(max-width:575px)\"><source srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/threathunting-1.png\" media=\"(max-width:1280px)\">\n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/threathunting-1.png' class='img-fluid'   alt='Technical diagram representing automated threat hunting across distributed enterprise environments.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-c4a92d48afaa5cb31c2b7cdf4888339c353aa5ef bs-section---default bs-section--customers-counter bs-section--industry-counter  \"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-4   bs-column-2ed4b99f65b8d5ba6408ca2547b8f6144ab1ab11 bs-column---default     \">\n<div class=\"bs-div bs-div-990e9aea8b03c0ef21b1341e73feaa803316b6c2 bs-div---default\"><style>.bs-div.bs-div-990e9aea8b03c0ef21b1341e73feaa803316b6c2{ background-color: #fff;} <\/style><div class=\"bs-div__inner     \">\n<div class=\"bs-counter bs-counter---default bs-counter--gradient-title bs-counter--customers-counter\"><div class=\"bs-counter__container\"><div class=\"bs-counter__title\"><h2>Average cost of a data breach in 2022<\/h2><\/div><div class=\"bs-counter__wrapper\"><div class=\"bs-counter__prefix\"><p>$<\/p><\/div><div class=\"bs-counter__count\"><span data-counterup=\"true\" data-options=\"{&quot;startVal&quot;:0,&quot;endVal&quot;:4.25,&quot;decimalPlaces&quot;:2,&quot;duration&quot;:2,&quot;separator&quot;:&quot;,&quot;}\">4.25<\/span><\/div><div class=\"bs-counter__postfix\"><p>M<\/p><\/div><\/div><div class=\"bs-counter__summary\"><p>Attackers use automation, so level the playing field with SOAR.<\/p><\/div><\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12 col-md-4   bs-column-2ed4b99f65b8d5ba6408ca2547b8f6144ab1ab11 bs-column---default     \">\n<div class=\"bs-div bs-div-ea63ae5362b33e7e8eac17b10ec7b0f23da164a1 bs-div---default\"><style>.bs-div.bs-div-ea63ae5362b33e7e8eac17b10ec7b0f23da164a1{ background-color: #fff;} <\/style><div class=\"bs-div__inner     \">\n<div class=\"bs-counter bs-counter---default bs-counter--industry-counter\"><div class=\"bs-counter__container\"><div class=\"bs-counter__title\"><h2>framework helps hunters identify threat actors<\/h2><\/div><div class=\"bs-counter__wrapper\"><div class=\"bs-counter__count\"><span data-counterup=\"true\" data-options=\"{&quot;startVal&quot;:0,&quot;endVal&quot;:100,&quot;decimalPlaces&quot;:0,&quot;duration&quot;:2,&quot;separator&quot;:&quot;,&quot;}\">100<\/span><\/div><div class=\"bs-counter__postfix\"><p>MITRE ATT&amp;CK<\/p><\/div><\/div><div class=\"bs-counter__summary\"><p>Swimlane provides potential commands, queries and even detections for specific techniques.<\/p><\/div><\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12 col-md-4   bs-column-2ed4b99f65b8d5ba6408ca2547b8f6144ab1ab11 bs-column---default     \">\n<div class=\"bs-div bs-div-bbe60fb137c3ee7c6138c1f0372534543527aa73 bs-div---default\"><style>.bs-div.bs-div-bbe60fb137c3ee7c6138c1f0372534543527aa73{ background-color: #fff;} <\/style><div class=\"bs-div__inner     \">\n<div class=\"bs-counter bs-counter---default bs-counter--industry-counter\"><div class=\"bs-counter__container\"><div class=\"bs-counter__title\"><h2>and Entity threat hunts <\/h2><\/div><div class=\"bs-counter__wrapper\"><div class=\"bs-counter__count\"><span data-counterup=\"true\" data-options=\"{&quot;startVal&quot;:0,&quot;endVal&quot;:100,&quot;decimalPlaces&quot;:0,&quot;duration&quot;:2,&quot;separator&quot;:&quot;,&quot;}\">100<\/span><\/div><div class=\"bs-counter__postfix\"><p>Situational<\/p><\/div><\/div><div class=\"bs-counter__summary\"><p>Swimlane automates analysis of vulnerabilities and external attack data to identify trending TTPs.<\/p><\/div><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-ce7f7cfe7f12f3964e241f58fcbe6bdf0c53ac67 bs-section---default bs-section--solution-increase-security-teams bs-section--industry-increase-security-teams bs-section--customers-increase-security-teams  \"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default bs-row--row-wrap\">\n<div class=\" bs-column col-sm-12   bs-column-601afe1d46256d3b13b7ac6679644286e4c6669e bs-column---default     \">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default bs-row--common-lottie\">\n<div class=\" bs-column col-sm-12 col-md-6   bs-column-4d71ac348e3fee7f53d61f43b3fef89c1cba705a bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            <source srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/2023\/01\/sm1.png\" media=\"(max-width:575px)\">\n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/2023\/01\/s1.png' class='img-fluid'   alt='SOC analyst dashboard representing real-time threat metrics, incident severity, and forensic data charts.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-f73bd0532dc2805a4bbd3ac6d65dcd30774f0578 bs-div---default bs-div--left-right-lottie\"><div class=\"bs-div__inner     \"><div class=\"bs-lottie-animator bs-lottie-animator---default\" id=\"lottie-e298cd8f-bf65-410c-a9b5-4677db1d4478\" data-settings=\"{&quot;desktop&quot;:{&quot;settings&quot;:{&quot;animateViewPort&quot;:50,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;Automate_breach_Lines_1-2.json&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:0,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Automate_breach_Lines_1-2.json&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;,&quot;oneTimePlay&quot;:true}},&quot;mobile&quot;:{&quot;breakpoint&quot;:576,&quot;settings&quot;:{&quot;animateViewPort&quot;:50,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:0,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;,&quot;oneTimePlay&quot;:true}}}\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12 col-md-6   bs-column-4d71ac348e3fee7f53d61f43b3fef89c1cba705a bs-column---default     \">\n<div class=\"bs-blurb bs-blurb---default bs-blurb--r-imgtxt-l4-asn1 bs-blurb--no-image\"><div class=\"bs-blurb__container\"><div class=\"bs-blurb__title\"><h2>Integrate Tools for Better Visibility<\/h2><\/div><div class=\"bs-blurb__description\"><p>Swimlane Turbine\u2019s Autonomous Integrations provide an ecosystem-agnostic orchestration solution without requiring developer resources. This improves hunting capabilities and response, while effectively protecting the organization from attacks.<\/p><\/div><\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"bs-row row   bs-row---default bs-row--common-lottie\">\n<div class=\" bs-column col-sm-12 col-md-6   bs-column-4d71ac348e3fee7f53d61f43b3fef89c1cba705a bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            <source srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/2023\/01\/sm2.png\" media=\"(max-width:575px)\">\n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/2023\/01\/s2.png' class='img-fluid'   alt='Incident response workflow representing automated phishing remediation and threat log orchestration.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-f73bd0532dc2805a4bbd3ac6d65dcd30774f0578 bs-div---default bs-div--left-right-lottie\"><div class=\"bs-div__inner     \"><div class=\"bs-lottie-animator bs-lottie-animator---default\" id=\"lottie-3a46d5f8-9056-4c18-9134-4d4a7cba6139\" data-settings=\"{&quot;desktop&quot;:{&quot;settings&quot;:{&quot;animateViewPort&quot;:50,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;Automate_breach_Lines_4-2.json&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:0,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Automate_breach_Lines_4-2.json&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;,&quot;oneTimePlay&quot;:true}},&quot;mobile&quot;:{&quot;breakpoint&quot;:576,&quot;settings&quot;:{&quot;animateViewPort&quot;:50,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:0,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;,&quot;oneTimePlay&quot;:true}}}\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12 col-md-6   bs-column-4d71ac348e3fee7f53d61f43b3fef89c1cba705a bs-column---default     \">\n<div class=\"bs-blurb bs-blurb---default bs-blurb--r-imgtxt-l4-asn1 bs-blurb--no-image\"><div class=\"bs-blurb__container\"><div class=\"bs-blurb__title\"><h2>Reduce MTTD and MTTR by 50%<\/h2><\/div><div class=\"bs-blurb__description\"><p>Automate repetitive tasks to help continuously hunt for threats at machine speed, enabling your security team to focus on more complex threats quicker while also reducing mean time to detection (MTTD) and response (MTTR).<\/p><\/div><\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default bs-row--common-lottie\">\n<div class=\" bs-column col-sm-12 col-md-6   bs-column-4d71ac348e3fee7f53d61f43b3fef89c1cba705a bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            <source srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/2023\/01\/sm3.png\" media=\"(max-width:575px)\">\n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/2023\/01\/s3.png' class='img-fluid'   alt='Turbine SOC dashboard representing phishing attack metrics, severity trends, and real-time alert triage.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-f73bd0532dc2805a4bbd3ac6d65dcd30774f0578 bs-div---default bs-div--left-right-lottie\"><div class=\"bs-div__inner     \"><div class=\"bs-lottie-animator bs-lottie-animator---default\" id=\"lottie-2ac7de17-6a1a-4ef7-b674-1afe3079f87b\" data-settings=\"{&quot;desktop&quot;:{&quot;settings&quot;:{&quot;animateViewPort&quot;:50,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;Automate_breach_Lines_3-3.json&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:0,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Automate_breach_Lines_3-3.json&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;,&quot;oneTimePlay&quot;:true}},&quot;mobile&quot;:{&quot;breakpoint&quot;:576,&quot;settings&quot;:{&quot;animateViewPort&quot;:50,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:0,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;,&quot;oneTimePlay&quot;:true}}}\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12 col-md-6   bs-column-4d71ac348e3fee7f53d61f43b3fef89c1cba705a bs-column---default     \">\n<div class=\"bs-blurb bs-blurb---default bs-blurb--r-imgtxt-l4-asn1 bs-blurb--no-image\"><div class=\"bs-blurb__container\"><div class=\"bs-blurb__title\"><h2>Streamline the Threat Hunt Process<\/h2><\/div><div class=\"bs-blurb__description\"><p>Align your processes and procedures with industry best practices with fully-customizable, automated playbooks and workflows. Use Swimlane\u2019s adaptable low-code playbook builder to create the necessary automations to accelerate the hunt workflow and sift through the noise.<\/p><\/div><\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"bs-row row   bs-row---default bs-row--common-lottie\">\n<div class=\" bs-column col-sm-12 col-md-6   bs-column-4d71ac348e3fee7f53d61f43b3fef89c1cba705a bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            <source srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/2023\/01\/sm4.png\" media=\"(max-width:575px)\">\n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/2023\/01\/s4.png' class='img-fluid'   alt='Swimlane SOC interface representing real-time alert trends and incident response card orchestration.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-f73bd0532dc2805a4bbd3ac6d65dcd30774f0578 bs-div---default bs-div--left-right-lottie\"><div class=\"bs-div__inner     \"><div class=\"bs-lottie-animator bs-lottie-animator---default\" id=\"lottie-3a46d5f8-9056-4c18-9134-4d4a7cba6139\" data-settings=\"{&quot;desktop&quot;:{&quot;settings&quot;:{&quot;animateViewPort&quot;:50,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;Automate_breach_Lines_4-2.json&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:0,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Automate_breach_Lines_4-2.json&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;,&quot;oneTimePlay&quot;:true}},&quot;mobile&quot;:{&quot;breakpoint&quot;:576,&quot;settings&quot;:{&quot;animateViewPort&quot;:50,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:0,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;,&quot;oneTimePlay&quot;:true}}}\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12 col-md-6   bs-column-4d71ac348e3fee7f53d61f43b3fef89c1cba705a bs-column---default     \">\n<div class=\"bs-blurb bs-blurb---default bs-blurb--r-imgtxt-l4-asn1 bs-blurb--no-image\"><div class=\"bs-blurb__container\"><div class=\"bs-blurb__title\"><h2>Mitigate Analyst Burnout<\/h2><\/div><div class=\"bs-blurb__description\"><p>Swimlane handles the mundane and time-consuming tasks required for threat hunting, so that analysts can allocate their time to strategic work. Swimlane Turbine also helps SecOps standardize and scale critical security processes.<\/p><\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-1bd4d73b222bf5d43e638daec013769352fc1f53 bs-section---default bs-section--common-customer-stories bs-section--industry-we-used-to bs-section--common-progress-bar bs-section--btn-testimonial  \"><style><\/style><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-12   bs-column-601afe1d46256d3b13b7ac6679644286e4c6669e bs-column---default     \">\t<div id=\"slider-e68b2b4365b9afa82c5c2f53943ccead690b19a7\"\n\t\tclass=\"bs-slider bs-slider---default\">\n\t\t<div id=\"slider-e68b2b4365b9afa82c5c2f53943ccead690b19a7-content\" class=\"slick-slider\"\n\t\t\tdata-slick='{\"responsive\":[{\"breakpoint\":9999,\"settings\":{\"slidesToShow\":1,\"slidesToScroll\":1,\"arrows\":true,\"dots\":false,\"infinite\":false,\"autoplay\":false,\"draggable\":true,\"swipe\":true,\"autoplaySpeed\":3000,\"initialSlide\":0,\"speed\":300,\"fade\":false,\"variableWidth\":false,\"adaptiveHeight\":false,\"focusOnSelect\":false,\"centerMode\":false,\"centerPadding\":\"50px\",\"lazyLoad\":\"progressive\",\"unslick\":false}},{\"breakpoint\":576,\"settings\":{\"slidesToShow\":1,\"slidesToScroll\":1,\"arrows\":false,\"dots\":false,\"infinite\":false,\"autoplay\":false,\"draggable\":true,\"swipe\":true,\"autoplaySpeed\":3000,\"initialSlide\":0,\"speed\":300,\"fade\":false,\"variableWidth\":false,\"adaptiveHeight\":false,\"focusOnSelect\":false,\"centerMode\":false,\"centerPadding\":\"50px\",\"lazyLoad\":\"progressive\",\"unslick\":false}},{\"breakpoint\":992,\"settings\":{\"slidesToShow\":1,\"slidesToScroll\":1,\"arrows\":false,\"dots\":false,\"infinite\":false,\"autoplay\":false,\"draggable\":true,\"swipe\":true,\"autoplaySpeed\":3000,\"initialSlide\":0,\"speed\":300,\"fade\":false,\"variableWidth\":false,\"adaptiveHeight\":false,\"focusOnSelect\":false,\"centerMode\":false,\"centerPadding\":\"50px\",\"lazyLoad\":\"progressive\",\"unslick\":false}},{\"breakpoint\":1200,\"settings\":{\"slidesToShow\":1,\"slidesToScroll\":1,\"arrows\":true,\"dots\":false,\"infinite\":false,\"autoplay\":false,\"draggable\":true,\"swipe\":true,\"autoplaySpeed\":3000,\"initialSlide\":0,\"speed\":300,\"fade\":false,\"variableWidth\":false,\"adaptiveHeight\":false,\"focusOnSelect\":false,\"centerMode\":false,\"centerPadding\":\"50px\",\"lazyLoad\":\"progressive\",\"unslick\":false}}]}'\n\t\t\t\n\t\t>\t\t\t<div class=\"slick-slide-wrapper\" >\n\t\t\t\t\n\n<div class=\"bs-div bs-div-135de0557c9787169182ed2d632a1dba569187e5 bs-div---default bs-div--left\"><div class=\"bs-div__inner     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/1641484469260.jpeg' class='img-fluid'   alt='Professional headshot of a cybersecurity expert representing technical leadership and industry authority.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-3dca282e9645b37279c20ee702b798642d93c998 bs-div---default bs-div--right\"><style>.bs-div.bs-div-3dca282e9645b37279c20ee702b798642d93c998 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2023\/01\/customer-bg.png); background-position: center center;\n    background-size: cover;} @media only screen and (max-width: 1280px) {.bs-div.bs-div-3dca282e9645b37279c20ee702b798642d93c998 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2023\/01\/customer-stories.png); \n            background-image: \n            -webkit-image-set(\n              url(https:\/\/swimlane.com\/wp-content\/uploads\/2023\/01\/customer-stories.png) 1x\n            );\n          background-image: \n            image-set(\n              url(https:\/\/swimlane.com\/wp-content\/uploads\/2023\/01\/customer-stories.png) 1x\n            ); \n            background-position: center center;\n            background-size: cover;}}@media only screen and (max-width: 575px) {.bs-div.bs-div-3dca282e9645b37279c20ee702b798642d93c998 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2023\/01\/customer-stories.png); \n            background-image: \n            -webkit-image-set(\n              url(https:\/\/swimlane.com\/wp-content\/uploads\/2023\/01\/customer-stories.png) 1x\n            );\n          background-image: \n            image-set(\n              url(https:\/\/swimlane.com\/wp-content\/uploads\/2023\/01\/customer-stories.png) 1x\n            ); \n            background-position: center center;\n            background-size: cover;}}<\/style><div class=\"bs-div__inner     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/rvconnexlogo.svg' class='img-fluid'   alt='RV Connex logo: A red triangular wordmark representing the aerospace and defense cybersecurity entity.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-7139b807ad05bd22aa259e6bba039fb1e12be63f bs-div---default\"><div class=\"bs-div__inner     \">\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>In order to mature our security operations, we knew it was necessary to advance how we monitor and respond to threat intelligence by taking a more proactive approach to security operations.<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow bs-pro-button-p-btn-50a4319f8da9302b94b0dc434be1ab6695dfa413\"><style>.bs-pro-button-p-btn-50a4319f8da9302b94b0dc434be1ab6695dfa413 .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/case-study\/rv-connex\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Read Case Study<\/a><\/span>\n<cite><strong>Tanajak Watanakij<br><\/strong>Chief Information Security Officer<\/cite><\/blockquote>\n\n\n<div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/2022\/12\/quote-icon.png' class='img-fluid'   alt='Client testimonial symbol representing industry peer endorsements and verified customer success stories.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\t\t\t<\/div>\t\t<\/div>\n\t<\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-a5aeb9d2f2dc0696aaef58b7601f4fcd1ac23620 bs-section---default bs-section--common-related-resources  \"><style>.bs-section.bs-section-a5aeb9d2f2dc0696aaef58b7601f4fcd1ac23620{ background-color: #eef4fa;} <\/style><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-9   bs-column-8d2c49bb1cf5f12e285bf47bc89609d3d01cdaf3 bs-column---default bs-column--button-order     \">\n<h2 class=\"wp-block-heading\" id=\"h-resources-for-threat-hunting-automation\">Resources for Threat Hunting Automation<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-lg-4 col-md-12   bs-column-af48fe59d18d1c8fe627d0add77b6e876cea4ccc bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69dbc26c6f83d bs-single-post---default bs-single-post--home-resources enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/cyber-threat-hunting\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/CYBER_THEAT_HUNTING_MAST.png' class='img-fluid' alt='' title='1'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Blog<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h3>What is Cyber Threat Hunting? Methods, Tools, and Tips<\/h3>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-lg-4 col-md-12   bs-column-af48fe59d18d1c8fe627d0add77b6e876cea4ccc bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69dbc26c713a0 bs-single-post---default bs-single-post--home-resources enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/THREAT-INT-IOC-1.png' class='img-fluid' alt='' title='THREAT INT IOC'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Demo<\/span><span>Video<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h3>Threat Intelligence &amp; IOC Lookup Use Case<\/h3>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-lg-4 col-md-12   bs-column-af48fe59d18d1c8fe627d0add77b6e876cea4ccc bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69dbc26c73136 bs-single-post---default bs-single-post--home-resources enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/cyber-threat-intelligence\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/THREATINTELLIGENCE-1.png' class='img-fluid' alt='' title='1'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Blog<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h3>Automating Threat Intelligence Enrichment<\/h3>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-12  col-xl-3 col-md-12 col-lg-12   bs-column-c7d3cdeaba4324c0d6a4cf77614556e640f15b25 bs-column---default bs-column--button-order d-flex justify-content-center align-items-center    justify-content-xl-end\">\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow bs-pro-button-p-btn-6c66537bcd48cc401b629dc5ddab0e088548593e\"><style>.bs-pro-button-p-btn-6c66537bcd48cc401b629dc5ddab0e088548593e .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/resources\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">View All Resources<\/a><\/span>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-79cb1c03057474db040ed21515409b57769df356 bs-section---default bs-section--common-ready-to-get-started bs-section--ready-to-get-started  \"><style>.bs-section.bs-section-79cb1c03057474db040ed21515409b57769df356{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-7   bs-column-907d77122393493fd461ea1de3d57b6a5b8c1406 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-automate-threat-hunting-with-swimlane-turbine\">Automate Threat Hunting with Swimlane Turbine<\/h2>\n\n\n\n<p>The world\u2019s most capable security automation platform<\/p>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12 col-md-5   bs-column-51d128c3b2bbe8a1646d70b5ab8afea9a4970717 bs-column---default     \">\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow bs-pro-button-p-btn-405bab890063c79568c7c38f4ea1667f5e761b90\"><style>.bs-pro-button-p-btn-405bab890063c79568c7c38f4ea1667f5e761b90 .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/swimlane-turbine\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Explore Turbine<\/a><\/span>\n\n\n<div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/2022\/12\/ready-to-start.png' class='img-fluid'   alt='Abstract blue gradient background: Conceptual geometric imagery for modern SaaS and cloud-native interfaces.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div><\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":32434,"parent":168,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"class_list":["post-186","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Threat Hunting - AI Security Automation<\/title>\n<meta name=\"description\" content=\"By automating manual processes and reducing the time it takes to identify and remediate threats, you reduce your risk of cyber attacks and minimize the impact of security incidents.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ko\/\uc194\ub8e8\uc158\/\uc0ac\uc6a9-\uc0ac\ub840\/\uc704\ud611-\uc0ac\ub0e5\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Threat Hunting\" \/>\n<meta property=\"og:description\" content=\"Swimlane is the largest and fastest-growing pure-play security automation company. Our platform is trusted by major organizations world-wide.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ko\/\uc194\ub8e8\uc158\/\uc0ac\uc6a9-\uc0ac\ub840\/\uc704\ud611-\uc0ac\ub0e5\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-13T10:44:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/THREAT-HUNTING.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data1\" content=\"2\ubd84\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\uc704\ud611 \ud0d0\uc9c0 - AI \uae30\ubc18 \ubcf4\uc548 \uc790\ub3d9\ud654","description":"\uc218\ub3d9 \ud504\ub85c\uc138\uc2a4\ub97c \uc790\ub3d9\ud654\ud558\uace0 \uc704\ud611\uc744 \uc2dd\ubcc4\ud558\uace0 \ud574\uacb0\ud558\ub294 \ub370 \uac78\ub9ac\ub294 \uc2dc\uac04\uc744 \ub2e8\ucd95\ud568\uc73c\ub85c\uc368 \uc0ac\uc774\ubc84 \uacf5\uaca9 \uc704\ud5d8\uc744 \uc904\uc774\uace0 \ubcf4\uc548 \uc0ac\uace0\uc758 \uc601\ud5a5\uc744 \ucd5c\uc18c\ud654\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ko\/\uc194\ub8e8\uc158\/\uc0ac\uc6a9-\uc0ac\ub840\/\uc704\ud611-\uc0ac\ub0e5\/","og_locale":"ko_KR","og_type":"article","og_title":"Threat Hunting","og_description":"Swimlane is the largest and fastest-growing pure-play security automation company. Our platform is trusted by major organizations world-wide.","og_url":"https:\/\/swimlane.com\/ko\/\uc194\ub8e8\uc158\/\uc0ac\uc6a9-\uc0ac\ub840\/\uc704\ud611-\uc0ac\ub0e5\/","og_site_name":"AI Security Automation","article_modified_time":"2026-03-13T10:44:41+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/THREAT-HUNTING.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"2\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ko\/solutions\/use-cases\/threat-hunting\/","url":"https:\/\/swimlane.com\/ko\/solutions\/use-cases\/threat-hunting\/","name":"\uc704\ud611 \ud0d0\uc9c0 - AI \uae30\ubc18 \ubcf4\uc548 \uc790\ub3d9\ud654","isPartOf":{"@id":"https:\/\/swimlane.com\/ko\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ko\/solutions\/use-cases\/threat-hunting\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ko\/solutions\/use-cases\/threat-hunting\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/THREAT-HUNTING.png","datePublished":"2022-11-11T13:05:26+00:00","dateModified":"2026-03-13T10:44:41+00:00","description":"\uc218\ub3d9 \ud504\ub85c\uc138\uc2a4\ub97c \uc790\ub3d9\ud654\ud558\uace0 \uc704\ud611\uc744 \uc2dd\ubcc4\ud558\uace0 \ud574\uacb0\ud558\ub294 \ub370 \uac78\ub9ac\ub294 \uc2dc\uac04\uc744 \ub2e8\ucd95\ud568\uc73c\ub85c\uc368 \uc0ac\uc774\ubc84 \uacf5\uaca9 \uc704\ud5d8\uc744 \uc904\uc774\uace0 \ubcf4\uc548 \uc0ac\uace0\uc758 \uc601\ud5a5\uc744 \ucd5c\uc18c\ud654\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.","breadcrumb":{"@id":"https:\/\/swimlane.com\/ko\/solutions\/use-cases\/threat-hunting\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ko\/solutions\/use-cases\/threat-hunting\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/solutions\/use-cases\/threat-hunting\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/THREAT-HUNTING.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/THREAT-HUNTING.png","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ko\/solutions\/use-cases\/threat-hunting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Solutions","item":"https:\/\/swimlane.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"Use Cases","item":"https:\/\/swimlane.com\/solutions\/use-cases\/"},{"@type":"ListItem","position":4,"name":"Threat Hunting"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ko\/#website","url":"https:\/\/swimlane.com\/ko\/","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","description":"\ubaa8\ub4e0 \ubcf4\uc548 \uae30\ub2a5\uc744 \uc704\ud55c \uc5d0\uc774\uc804\ud2b8 \uae30\ubc18 AI \uc790\ub3d9\ud654","publisher":{"@id":"https:\/\/swimlane.com\/ko\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ko\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ko\/#organization","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","url":"https:\/\/swimlane.com\/ko\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-19 10:03:56","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/pages\/186","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/comments?post=186"}],"version-history":[{"count":1,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/pages\/186\/revisions"}],"predecessor-version":[{"id":54969,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/pages\/186\/revisions\/54969"}],"up":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/pages\/168"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media\/32434"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media?parent=186"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}