{"id":9308,"date":"2025-07-02T16:59:53","date_gmt":"2025-07-02T22:59:53","guid":{"rendered":"https:\/\/swimlane.com\/resource\/what-is-soar\/"},"modified":"2025-12-24T01:07:17","modified_gmt":"2025-12-24T08:07:17","slug":"%ec%86%9f%ec%95%84%ec%98%a4%eb%a5%b4%eb%8a%94-%ea%b2%83%ec%9d%80-%eb%ac%b4%ec%97%87%ec%9d%b8%ea%b0%80","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ko\/blog\/what-is-soar\/","title":{"rendered":"SOAR\ub780 \ubb34\uc5c7\uc77c\uae4c\uc694? SOAR \ud50c\ub7ab\ud3fc \uc644\ubcbd \uac00\uc774\ub4dc"},"content":{"rendered":"\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-33.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Enterprise digital landscape masthead representing global connectivity and secure cloud infrastructure orchestration.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-33.jpg 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-33-300x178.jpg 300w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-33-1024x609.jpg 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-33-768x457.jpg 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2025-07-02T16:59:53-06:00\">7\uc6d4 2, 2025<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">What is SOAR? A Complete Guide to SOAR Platforms<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/ko\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">8 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/ko\/blog\/what-is-soar\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/ko\/blog\/what-is-soar\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('What%20is%20SOAR%3F%20A%20Complete%20Guide%20to%20SOAR%20Platforms').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fwhat-is-soar%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=What%20is%20SOAR%3F%20Guide%20to%20SOAR%20Platforms%20Cyber%20Security&url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fwhat-is-soar%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fwhat-is-soar%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fwhat-is-soar%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<h2 class=\"wp-block-heading\" id=\"h-what-is-security-orchestration-automation-and-response-soar-guide-to-soar-platforms-in-cyber-security-nbsp\">What is Security Orchestration, Automation and Response (SOAR)? Guide to SOAR Platforms in Cyber Security&nbsp;<\/h2>\n\n\n\n<div class=\"bs-div bs-div-8d5175a48f2cd3ca3bdd0365063b72cdbcca3051 bs-div---default bs-div--blog-inner-light\"><div class=\"bs-div__inner     \">\n<p><em><em>Security Orchestration, Automation, and Response (SOAR) is a powerful security solution that combines disparate security tools, automates repetitive tasks, and orchestrates workflows. It empowers security teams to manage and respond to security incidents more efficiently, consolidate and analyze threat intelligence, and streamline overall security operations. By integrating automation and orchestration, SOAR platforms dramatically reduce manual effort and accelerate incident resolution.<\/em><\/em><\/p>\n<\/div><\/div>\n\n\n\n<p>Security teams are constantly battling an overwhelming volume of alerts, complex attack surfaces, and a shortage of skilled professionals. This relentless pressure can lead to burnout, missed threats, and inefficient security operations. Fortunately, a powerful solution has emerged to help organizations reclaim control: Security Orchestration, Automation, and Response (SOAR). This guide will demystify SOAR, exploring its core components, benefits, and how these vital cybersecurity tools empower your team to operate with unprecedented speed, precision, and efficacy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is a SOAR Platform?&nbsp;<\/h2>\n\n\n\n<p>A <a href=\"https:\/\/swimlane.com\/solutions\/soar\/\">Security orchestration, automation and response (SOAR) <\/a>platform is designed to help <a href=\"https:\/\/swimlane.com\/blog\/soc-team-roles-responsibilities\/\">security operations (SecOps) teams<\/a> automatically execute repetitive tasks, such as responding to phishing alerts, SIEM or EDR alert triage and is typically used within the context of the Security Operations Center (SOC).<\/p>\n\n\n\n<p><a href=\"https:\/\/www.gartner.com\/reviews\/market\/security-orchestration-automation-and-response-solutions\">Gartner<\/a> defines SOAR technology as \u201csolutions that combine incident response, orchestration and automation, and threat intelligence platform management capabilities in a single solution\u201d. At the most basic level, there are three primary ways that SOAR works to improve SecOps outcomes:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Automates <\/strong><a href=\"https:\/\/swimlane.com\/solutions\/use-cases\/incident-response\/\"><strong>incident response<\/strong><\/a><strong>: <\/strong>SOAR security software \u2013 specifically security automation \u2013 executes a sequence of workflow tasks without human intervention. Security teams who automate incident response with SOAR speed their <a href=\"https:\/\/swimlane.com\/blog\/reducing-security-operations-mttd-mttr\/\">mean time to resolution (MTTR)<\/a>. Automation also frees up analyst time for more strategic work, increasing the team\u2019s job satisfaction and retention rates.<\/li>\n\n\n\n<li><strong>Adds context to incident data:<\/strong> <a href=\"https:\/\/swimlane.com\/solutions\/security-orchestration\/\">Security orchestration<\/a> integrates disparate systems or platforms. This leads to consolidated and contextualized intelligence so that analysts can quickly view all incident data in a single <a href=\"https:\/\/www.swimlane.com\/solutions\/security-automation-and-orchestration\/case-management\">case management <\/a>view, complete with customizable <a href=\"https:\/\/www.swimlane.com\/solutions\/security-automation-and-orchestration\/soc-dashboards-metrics\">dashboards and reports.<\/a> This enrichment process provides security teams with actionable intelligence so they can improve operational efficiencies and mature the security posture.<\/li>\n\n\n\n<li><strong>Unifies people, process and technology: <\/strong><a href=\"https:\/\/swimlane.com\/platform\/autonomous-integrations\">Integrations <\/a>are the magic behind how SOAR unites people, processes, and technology. SOAR technologies that deliver well-orchestrated security ecosystems ensure that security teams accelerate time-to-value and speed incident response times.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">What are Security Orchestration and Automation?<\/h3>\n\n\n\n<p><strong>Security orchestration <\/strong>integrates and coordinates the various <a href=\"https:\/\/swimlane.com\/blog\/cybersecurity-automation-tools\/\">security tools<\/a> and processes involved in a security operation. The goal of security orchestration is to streamline and improve the efficiency of security operations by automating manual tasks and integrating different tools and processes.<\/p>\n\n\n\n<p><strong>Security automation<\/strong> refers specifically to the use of automated tools and processes to perform security tasks. This can include things like automating the deployment of security patches, automating the investigation of security incidents, and automating the implementation of security controls.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Difference Between Automation and Orchestration<\/h3>\n\n\n\n<p>The main difference between security orchestration and <a href=\"https:\/\/swimlane.com\/blog\/security-automation\">security automation<\/a> is that security orchestration involves coordinating a wide range of security tasks simultaneously across tech stacks, while security automation focuses specifically on the use of automated tools and processes to perform these tasks.<\/p>\n\n\n\n<p>Both approaches can help improve the efficiency and effectiveness of security operations, but security orchestration takes a more holistic view of the security landscape, while security automation is more focused on the use of specific tools and processes.<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow bs-pro-button-p-btn-a48bd7337ff2a4fb6361a70a482b84c886dc0570\"><style>.bs-pro-button-p-btn-a48bd7337ff2a4fb6361a70a482b84c886dc0570 .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/blog\/automation-vs-orchestration\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Discover our blog, Security Orchestration vs. Automation for more information.<\/a><\/span>\n\n\n\n<h3 class=\"wp-block-heading\">What is Threat Intelligence Management?<\/h3>\n\n\n\n<p><a href=\"https:\/\/swimlane.com\/blog\/cyber-threat-intelligence\">Threat intelligence management<\/a> ingests, analyzes and enriches data about potential security threats. This can include information about cyber threats such as malware, phishing attacks, and hacking attempts, as well as physical security threats such as terrorism or other forms of violence.<\/p>\n\n\n\n<p>Threat intelligence management is an important part of a comprehensive security strategy, as it helps organizations stay informed about potential threats and take proactive measures to protect themselves.<\/p>\n\n\n\n<p>The goal of threat intelligence management is to provide organizations with the information they need to protect themselves against potential threats. This can involve gathering information from a variety of sources, such as open-source intelligence, proprietary data sources and even social media. Once this information is collected, it is analyzed to determine its relevance and potential impact on the organization.<\/p>\n\n\n\n<p>Finally, the information is disseminated to the appropriate parties within the organization, such as the security team or top executives, so that they can take appropriate action to mitigate any potential threats.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is Incident Response?<\/h3>\n\n\n\n<p><a href=\"https:\/\/swimlane.com\/blog\/incident-response\/\">Incident response<\/a> responds to and manages the aftermath of a security incident. A security incident is any event that poses a potential threat to an organization\u2019s information, systems, or networks. This can include cyber attacks, data breaches, network intrusions, and other types of security incidents.<\/p>\n\n\n\n<p>The goal of incident response automation is to minimize the impact of a security incident and restore normal operations as quickly as possible. To achieve this, organizations typically have an incident response plan in place that outlines the steps to be taken in the event of a security incident.<\/p>\n\n\n\n<p>Effective incident response requires a coordinated effort between different teams and departments within an organization. This can include the security team, IT staff, legal departments and other stakeholders. Some SOAR platforms offer case management and reporting to make this communication across teams easier.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why is SOAR Important?<\/h2>\n\n\n\n<p>SOAR platforms help organizations streamline and improve the efficiency of their security operations by automating tasks and integrating different security tools and processes. There are several reasons why a SOAR platform can be important for an organization:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>You can increase SOC efficiencies:<\/strong> SOAR technologies can automate many routine tasks, freeing up security analysts to focus on more complex and high-priority tasks. This can help improve the efficiency of<a href=\"https:\/\/swimlane.com\/blog\/what-is-a-security-operations-center-soc\/\"> security operations centers (SOC)<\/a> and reduce the workload of security staff.<\/li>\n\n\n\n<li><strong>You can enhance incident response:<\/strong> A robust SOAR platform can provide a centralized platform for managing incident response, including automating the investigation and response to security incidents. This can help organizations respond to incidents more quickly and effectively.<\/li>\n\n\n\n<li><strong>You can integrate with diverse tech stacks: <\/strong>Certain SOAR solutions can integrate with a variety of different security tools and processes, allowing organizations to better manage their security infrastructure and gain a more comprehensive view of their security posture.<\/li>\n\n\n\n<li><strong>You can improve security risk posture:<\/strong> By automating tasks and integrating different security tools and processes, a SOAR platform can help organizations identify and mitigate potential security risks more effectively. This can help reduce the overall risk profile of the organization.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">4 Benefits of SOAR<\/h2>\n\n\n\n<p>SOAR technologies have many benefits for SOC teams. Breach prevention, improved SecOps KPIs, reduced analyst burnout and improved overall ROI are the leading benefits that customers realize.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Reduce the likelihood of a breach: <\/strong>With SOAR, <a href=\"https:\/\/swimlane.com\/customers\/\">enterprise security teams are able to proactively respond to ~80% more security telemetry data<\/a>. They were able to stop attacks earlier in the attack lifecycle and prevent them from becoming breaches. Actionable intelligence that is gathered through modern SOAR platforms helps measurably improve their risk posture over time.<\/li>\n\n\n\n<li><strong>Improve SecOps metrics:<\/strong> <a href=\"https:\/\/swimlane.com\/resources\/case-studies\/fernao-magellan\/\">German MSSP, fernao magellan<\/a>, talks about how Swimlane helped their team consolidate case management, improve alert triage, and ultimately save 70% of the time previously&nbsp; spent on incident response.<\/li>\n\n\n\n<li><strong>Reduce staff burnout:<\/strong> By using low-code SOAR, analysts save the time required to filter, sort, and visualize data. This frees analysts from manual and error-prone tasks so they can spend more time on strategic initiatives. Because of this, customers are able to retain talent and institutional knowledge, which leads to greater overall security.<\/li>\n\n\n\n<li><strong>Improve ROI for all security investments: <\/strong>A Fortune 100 security team saves $160,000 per month in labor costs. This financial benefit is a result of low-code SOAR, saving them 3,700 hours of work each week. The ROI was calculated by measuring the percentage of detection alerts that require manual processes versus automated processes. Automation dashboards and reporting make it easy to measure these statistics so that security leaders can evaluate the efficacy of their investments.<\/li>\n<\/ol>\n\n\n\n<p>The benefits of SOAR for <a href=\"https:\/\/swimlane.com\/blog\/soc-team-roles-responsibilities\/\">SOC teams<\/a> are expansive. Below, <a href=\"https:\/\/www.youtube.com\/watch?v=thWEa-N1A5Y\">watch how SOAR improves the life of a security analyst.<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Common SOAR Use Cases<\/h3>\n\n\n\n<p>The most common SOAR use cases tend to be SOC-oriented use cases, such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Phishing investigation and triage<\/li>\n\n\n\n<li>SIEM and EDR alert\/event management<\/li>\n\n\n\n<li>Threat intelligence enrichment &amp; processes<\/li>\n\n\n\n<li>Digital forensics<\/li>\n\n\n\n<li>Incident response<\/li>\n\n\n\n<li>Vulnerability management<\/li>\n\n\n\n<li>Threat hunting<\/li>\n\n\n\n<li>Insider Threats<\/li>\n<\/ul>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow bs-pro-button-p-btn-9b9f22577eebdb6e06ca3ef94537184263cb453e\"><style>.bs-pro-button-p-btn-9b9f22577eebdb6e06ca3ef94537184263cb453e .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/blog\/common-soar-use-cases\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Read more about Common SOAR Use Cases<\/a><\/span>\n\n\n\n<h3 class=\"wp-block-heading\">SOAR Use Cases Outside the SOC<\/h3>\n\n\n\n<p>Security teams are also looking for ways to utilize automation outside of traditional SOC use cases. SecOps teams can turn to modern SOAR platforms to help automation:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>security fraud and brand impersonation<\/li>\n\n\n\n<li>Fraud case management<\/li>\n\n\n\n<li>Securing employee onboarding and offboarding<\/li>\n\n\n\n<li>Mobile phishing triage<\/li>\n<\/ul>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow bs-pro-button-p-btn-53aff6b3b9d75fccc3eb4fae86a87d34288727dd\"><style>.bs-pro-button-p-btn-53aff6b3b9d75fccc3eb4fae86a87d34288727dd .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/blog\/outside-of-soc\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Read more about Outside the SOC Use Cases<\/a><\/span>\n\n\n\n<h2 class=\"wp-block-heading\">5 SOAR Best Practices: What to Look for in a SOAR Platform?<\/h2>\n\n\n\n<p>When considering a SOAR platform, there are several key factors that you should consider:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Integration capabilities:<\/strong> Look for a SOAR platform that can easily integrate with a variety of different security tools and processes. This will allow you to manage your security infrastructure and gain a more comprehensive view of your security posture.<\/li>\n\n\n\n<li><strong>Automation capabilities:<\/strong> Consider the types of tasks that the SOAR platform can automate and whether these align with your organization\u2019s needs. Look for a platform that can automate a wide range of tasks, including incident response, vulnerability management, and threat intelligence gathering.<\/li>\n\n\n\n<li><strong>Customization and flexibility:<\/strong> Look for a SOAR platform that can be customized and configured to meet the specific needs of your organization. This will allow you to tailor the platform to your unique security requirements and workflows.<\/li>\n\n\n\n<li><strong>Ease of use:<\/strong> Consider the usability of the SOAR platform, including its user interface and the overall learning curve for your team. A platform that is easy to use will make it easier for your team to get up and running quickly and will reduce the time and effort required to manage and maintain the platform.<\/li>\n\n\n\n<li><strong>Support and training:<\/strong> Look for a SOAR platform that offers comprehensive support and training resources. This will ensure that you have the resources you need to effectively use and maintain the platform.<\/li>\n<\/ol>\n\n\n\n<p>By considering these factors, you can choose the best security automation tools that meet the specific needs of your organization and help improve the efficiency and effectiveness of your security operations.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What SOC metrics should I be looking at?<\/h3>\n\n\n\n<p>SOAR success and metrics are going to be unique to each company and the organization\u2019s goals, but a few basic <a href=\"https:\/\/swimlane.com\/blog\/soar-security-metrics\">key performance indicators (KPIs)<\/a> and incident response metrics that all security teams need to measure include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Mean time to detect (MTTD)<\/li>\n\n\n\n<li>Mean time to investigate (MTTI)<\/li>\n\n\n\n<li>Mean time to respond (MTTR)<\/li>\n\n\n\n<li>Granular ROI reporting<\/li>\n\n\n\n<li>Analyst workload<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">What SOAR Metrics Should I Be Looking At?<\/h3>\n\n\n\n<p>Traditionally, the value of SOAR has been limited to the SOC, but as we look to the future of security automation, we can expect to see the notion of SOC metrics expand to include more comprehensive security metrics.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.gartner.com\/en\/articles\/4-metrics-that-prove-your-cybersecurity-program-works\">Gartner<\/a> has started referring to this as their \u201cCARE standard for cybersecurity.\u201d This framework provides a suggestion for what the industry standard of security metrics or KPIs should be. This framework is outlined by the CARE acronym: consistent, adequate, reasonable, and effective. Some KPIs that align with these groups include metrics like:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Consistent<\/strong>: security awareness training completed by employees in the past month<\/li>\n\n\n\n<li><strong>Adequate: <\/strong>percentage of endpoints that have been updated for anti-malware protections<\/li>\n\n\n\n<li><strong>Reasonable: <\/strong>average length of delays caused by security protocols<\/li>\n\n\n\n<li><strong>Effective: <\/strong>number of incidents in the past year related to configuration issues<\/li>\n<\/ul>\n\n\n\n<p>While these metrics are not commonly associated with SOAR use cases, some platforms are capable of offering these detailed insights. That\u2019s why it\u2019s important to <a href=\"https:\/\/swimlane.com\/blog\/11-soar-platform-capabilities\">evaluate SOAR vendors<\/a> in detail before investing in these security automation solutions.<\/p>\n\n\n\n<div class=\"bs-div bs-div-b7f4bee6a09adf7066acb898d675743cedf91291 bs-div---default bs-div--blog-inner-light\"><div class=\"bs-div__inner     \">\n<h4 class=\"wp-block-heading\" id=\"h-tl-dr-what-is-soar-nbsp\" style=\"font-size:26px\">TL;DR: What is SOAR?&nbsp;<\/h4>\n\n\n\n<p>SOAR is a powerful cybersecurity solution designed to streamline security operations by integrating your existing tools, automating repetitive tasks, and orchestrating complex workflows. Essentially, it helps security teams respond to threats faster and more effectively by reducing manual effort and human error. In short, SOAR enhances your team&#8217;s efficiency, significantly cuts down MTTR, combats analyst burnout, and ultimately maximizes the return on your security investments, all while bolstering your defense against breaches.<\/p>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">SOAR FAQs&nbsp;<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-what-are-the-characteristics-of-a-soar-security-platform\">What are the characteristics of a SOAR security platform?<\/h3>\n\n\n\n<p>SOAR platforms are characterized by their ability to orchestrate workflows, automate repetitive tasks, manage security incidents, and integrate threat intelligence. Key features include customizable playbooks, case management, and robust reporting.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Which SOAR platform offers the best integration with existing security tools?<\/h3>\n\n\n\n<p>Swimlane is designed for extensive integration with existing security tools. It offers an API-first architecture and a vast library of pre-built connectors and a marketplace to integrate with virtually any security product, overcoming vendor lock-in and allowing organizations to leverage their current investments.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How does SOAR improve the efficiency of security teams?<\/h3>\n\n\n\n<p>SOAR significantly improves efficiency by automating repetitive, manual tasks, which drastically reduces MTTR to incidents. By streamlining workflows and providing enriched context, it frees up security analysts to focus on more complex, strategic initiatives, thereby mitigating burnout and enhancing overall SecOps effectiveness.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How does SOAR integrate with other security tools?<\/h3>\n\n\n\n<p>Swimlane integrates with other security tools via its API-first architecture and a wide range of pre-built connectors available in its marketplace. This enables bi-directional communication, allowing Swimlane to ingest alerts, enrich data, and trigger actions across various security solutions (like SIEMs, EDRs, firewalls, and threat intelligence platforms) to automate the entire incident response lifecycle.<\/p>\n\n\n\n<div class=\"bs-div bs-div-7c7b72975a3b8fbc4382208626e0d9964c9e3e68 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-7c7b72975a3b8fbc4382208626e0d9964c9e3e68 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/ROInaked.png' class='img-fluid'   alt='Data visualization representing quantifiable Security ROI and the financial impact of automated security operations.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-2aebcd1b2c11849d7c87d8462be32842b8c42b50 bs-div---default\"><div class=\"bs-div__inner     \">\n<h3 class=\"wp-block-heading\" id=\"h-swimlane-roi-calculator\">Swimlane ROI calculator<\/h3>\n\n\n\n<p>Estimate the savings you can achieve with Swimlane Turbine.<br><\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-acbeda55edeac441835634e82bfc9dea4d1c07b1\"><style>.bs-pro-button-p-btn-acbeda55edeac441835634e82bfc9dea4d1c07b1 .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/roi-calculator\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Calculate ROI<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/ko\/tag\/soar\/'><span class='tag-content'>SOAR<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d0736bc5e8b bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/reducing-security-operations-mttd-mttr\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>1\uc6d4 6, 2017<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>MTTD vs. MTTR in Cybersecurity: A Complete Guide to Reducing Detection and Response Times<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d0736bc7312 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/security-automation-platform\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>10\uc6d4 22, 2024<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>How Security Automation Platforms Streamline SOC Operations<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d0736bc856e bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/what-is-a-security-operations-center-soc\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>12\uc6d4 14, 2022<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>What is a Security Operations Center (SOC)? SOC Guide<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>\ubcf4\uc548 \uc624\ucf00\uc2a4\ud2b8\ub808\uc774\uc158, \uc790\ub3d9\ud654 \ubc0f \ub300\uc751(SOAR) \uc194\ub8e8\uc158\uc5d0 \ub300\ud574 \uc54c\uc544\uc57c \ud560 \ubaa8\ub4e0 \uac83.<\/p>","protected":false},"author":5,"featured_media":48880,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":48881,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[89],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[70],"class_list":["post-9308","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-soar","resource-type-blogs","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is SOAR? Guide to SOAR Platforms Cyber Security<\/title>\n<meta name=\"description\" content=\"Everything you need to know about Security Orchestration, Automation, &amp; Response (SOAR) solutions. Learn how SOAR can transform your security operations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/\uc19f\uc544\uc624\ub974\ub294-\uac83\uc740-\ubb34\uc5c7\uc778\uac00\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is SOAR? Guide to SOAR Platforms Cyber Security\" \/>\n<meta property=\"og:description\" content=\"Everything you need to know about Security Orchestration, Automation, &amp; Response (SOAR) solutions. Learn how SOAR can transform your security operations!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/\uc19f\uc544\uc624\ub974\ub294-\uac83\uc740-\ubb34\uc5c7\uc778\uac00\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-24T08:07:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-13.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"What is SOAR? Guide to SOAR Platforms Cyber Security\" \/>\n<meta name=\"twitter:description\" content=\"Everything you need to know about Security Orchestration, Automation, &amp; Response (SOAR) solutions. Learn how SOAR can transform your security operations!\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-13.jpg\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data1\" content=\"11\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/what-is-soar\/\",\"url\":\"https:\/\/swimlane.com\/ko\/blog\/what-is-soar\/\",\"name\":\"What is SOAR? Guide to SOAR Platforms Cyber Security\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/what-is-soar\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/what-is-soar\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-33.jpg\",\"datePublished\":\"2025-07-02T22:59:53+00:00\",\"dateModified\":\"2025-12-24T08:07:17+00:00\",\"description\":\"Everything you need to know about Security Orchestration, Automation, & Response (SOAR) solutions. Learn how SOAR can transform your security operations.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/what-is-soar\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/ko\/blog\/what-is-soar\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/what-is-soar\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-33.jpg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-33.jpg\",\"width\":1120,\"height\":666,\"caption\":\"Enterprise digital landscape masthead representing global connectivity and secure cloud infrastructure orchestration.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/what-is-soar\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is SOAR? A Complete Guide to SOAR Platforms\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/ko\/#website\",\"url\":\"https:\/\/swimlane.com\/ko\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/ko\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/ko\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/ko\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SOAR\ub780 \ubb34\uc5c7\uc778\uac00\uc694? SOAR \ud50c\ub7ab\ud3fc \uc0ac\uc774\ubc84 \ubcf4\uc548 \uac00\uc774\ub4dc","description":"\ubcf4\uc548 \uc624\ucf00\uc2a4\ud2b8\ub808\uc774\uc158, \uc790\ub3d9\ud654 \ubc0f \ub300\uc751(SOAR) \uc194\ub8e8\uc158\uc5d0 \ub300\ud55c \ubaa8\ub4e0 \uac83\uc744 \uc54c\uc544\ubcf4\uc138\uc694. SOAR\uac00 \ubcf4\uc548 \uc6b4\uc601\uc744 \uc5b4\ub5bb\uac8c \ud601\uc2e0\ud560 \uc218 \uc788\ub294\uc9c0 \uc0b4\ud3b4\ubcf4\uc138\uc694.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/\uc19f\uc544\uc624\ub974\ub294-\uac83\uc740-\ubb34\uc5c7\uc778\uac00\/","og_locale":"ko_KR","og_type":"article","og_title":"What is SOAR? Guide to SOAR Platforms Cyber Security","og_description":"Everything you need to know about Security Orchestration, Automation, & Response (SOAR) solutions. Learn how SOAR can transform your security operations!","og_url":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/\uc19f\uc544\uc624\ub974\ub294-\uac83\uc740-\ubb34\uc5c7\uc778\uac00\/","og_site_name":"AI Security Automation","article_modified_time":"2025-12-24T08:07:17+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-13.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"What is SOAR? Guide to SOAR Platforms Cyber Security","twitter_description":"Everything you need to know about Security Orchestration, Automation, & Response (SOAR) solutions. Learn how SOAR can transform your security operations!","twitter_image":"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-13.jpg","twitter_site":"@swimlane","twitter_misc":{"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"11\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ko\/blog\/what-is-soar\/","url":"https:\/\/swimlane.com\/ko\/blog\/what-is-soar\/","name":"SOAR\ub780 \ubb34\uc5c7\uc778\uac00\uc694? SOAR \ud50c\ub7ab\ud3fc \uc0ac\uc774\ubc84 \ubcf4\uc548 \uac00\uc774\ub4dc","isPartOf":{"@id":"https:\/\/swimlane.com\/ko\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ko\/blog\/what-is-soar\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ko\/blog\/what-is-soar\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-33.jpg","datePublished":"2025-07-02T22:59:53+00:00","dateModified":"2025-12-24T08:07:17+00:00","description":"\ubcf4\uc548 \uc624\ucf00\uc2a4\ud2b8\ub808\uc774\uc158, \uc790\ub3d9\ud654 \ubc0f \ub300\uc751(SOAR) \uc194\ub8e8\uc158\uc5d0 \ub300\ud55c \ubaa8\ub4e0 \uac83\uc744 \uc54c\uc544\ubcf4\uc138\uc694. SOAR\uac00 \ubcf4\uc548 \uc6b4\uc601\uc744 \uc5b4\ub5bb\uac8c \ud601\uc2e0\ud560 \uc218 \uc788\ub294\uc9c0 \uc0b4\ud3b4\ubcf4\uc138\uc694.","breadcrumb":{"@id":"https:\/\/swimlane.com\/ko\/blog\/what-is-soar\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ko\/blog\/what-is-soar\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/blog\/what-is-soar\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-33.jpg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-33.jpg","width":1120,"height":666,"caption":"Enterprise digital landscape masthead representing global connectivity and secure cloud infrastructure orchestration."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ko\/blog\/what-is-soar\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"What is SOAR? A Complete Guide to SOAR Platforms"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ko\/#website","url":"https:\/\/swimlane.com\/ko\/","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","description":"\ubaa8\ub4e0 \ubcf4\uc548 \uae30\ub2a5\uc744 \uc704\ud55c \uc5d0\uc774\uc804\ud2b8 \uae30\ubc18 AI \uc790\ub3d9\ud654","publisher":{"@id":"https:\/\/swimlane.com\/ko\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ko\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ko\/#organization","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","url":"https:\/\/swimlane.com\/ko\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/9308","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/9308\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media\/48880"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media?parent=9308"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/tags?post=9308"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-type?post=9308"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-topic?post=9308"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-industry?post=9308"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/blog-category?post=9308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}