{"id":9431,"date":"2022-06-14T15:06:00","date_gmt":"2022-06-14T21:06:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/security-operations-system-of-record\/"},"modified":"2023-02-08T04:14:55","modified_gmt":"2023-02-08T04:14:55","slug":"%eb%b3%b4%ec%95%88-%ec%9a%b4%ec%98%81-%ec%8b%9c%ec%8a%a4%ed%85%9c-%ea%b8%b0%eb%a1%9d","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ko\/blog\/security-operations-system-of-record\/","title":{"rendered":"\ubcf4\uc548 \uae30\ub85d \uc2dc\uc2a4\ud15c: \uc54c\uc544\uc57c \ud560 \ubaa8\ub4e0 \uac83"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/SYSOFREC.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Cybersecurity analyst imagery representing AI-powered data protection and secure document management.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/SYSOFREC.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/SYSOFREC-300x182.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/SYSOFREC-1024x621.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/SYSOFREC-768x466.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2022-06-14T15:06:00-06:00\">6\uc6d4 14, 2022<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">A System of Record for Security: Everything You Need to Know<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/ko\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">5 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/ko\/blog\/security-operations-system-of-record\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/ko\/blog\/security-operations-system-of-record\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('A%20System%20of%20Record%20for%20Security%3A%20Everything%20You%20Need%20to%20Know').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fsecurity-operations-system-of-record%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=A%20System%20of%20Record%20for%20Security%3A%20Everything%20You%20Need%20to%20Know&url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fsecurity-operations-system-of-record%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fsecurity-operations-system-of-record%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fsecurity-operations-system-of-record%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<h2>Dynamic case management, low-code dashboards, and reporting all work together to build a powerful system of record for security.<\/h2>\n<p dir=\"ltr\">Security is a multi-headed monster, isn\u2019t it? Thousands of alerts, a plethora of siloed tools, and countless threats \u2013 all of these challenges are happening simultaneously. No matter how you try to tackle them, these problems continue to grow. You need infinite eyes across the security operations center (SOC) to manage it all.<\/p>\n<p dir=\"ltr\">It\u2019s futile to manually triage every alert, though \u2013 or to guess where it\u2019ll be next. If you want to be an effective security leader, a system of record can help guide you through the security mud pit.<\/p>\n<p dir=\"ltr\">Security is a process, not a product. There is no silver bullet for security. And there is no single tool that will automatically keep your data safe. The tools, techniques, and tactics change every day. But being able to pull actionable intelligence across your data \u2014 taking advantage of all the insight available in your security operations center \u2014 can help you instantly and dramatically increase your organization&#8217;s security posture.<\/p>\n<h3><strong>What is a System of Record for Security?<\/strong><\/h3>\n<p>A security system of record is a platform used to manage and track data, providing end-to-end visibility and maintaining compliance when it comes to security incident management. Typically, the most powerful system of record for security is a <a href=\"https:\/\/swimlane.com\/blog\/meet-swimlane-turbine\">security automation platform<\/a>. These solutions speed up investigations with enriched data and facilitate process compliance and rapid response, making it easier to close more security alerts in less time.<\/p>\n<p dir=\"ltr\">Security teams need a system of record for security. Without a system of record, each part of security (and even beyond the SOC) operates in silos, often creating incomplete or incorrect data regarding vulnerabilities and threats.<\/p>\n<p dir=\"ltr\">There are three key features a security automation solution needs in order to be an effective system of record.<\/p>\n<h2><strong>Dynamic Case Management<\/strong><\/h2>\n<p dir=\"ltr\">Robust case management is a critical component of any effective low-code automation or <a href=\"https:\/\/swimlane.com\/blog\/what-is-soar\"><strong>security orchestration, automation and response (SOAR) platform<\/strong><\/a>. Some solutions act as a simple evidence locker, while others provide direct interaction with all data and related actions tied to an incident. The latter allows analysts to respond faster with greater flexibility.<\/p>\n<p dir=\"ltr\">Benefits of dynamic case management include:<\/p>\n<ul>\n<li dir=\"ltr\">\n<p dir=\"ltr\"><strong>Analyze and enrich incident data in real-time:<\/strong> Help your team manage and report on all aspects of a security incident or alert within a single user interface. Instantly execute a range of correlated actions specific to that case.<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\"><strong>Enforce process standardization and compliance: <\/strong>Workflow-driven case management records ensure that analysts are working with the right data at all times, which leads to more accurate incident responses.<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\"><strong>Remediate security alerts at machine speeds: <\/strong>See the bigger picture, faster. Gain immediate visibility into the details of all relevant security events. Automation is key to staying ahead of threats and resolving them before they affect your business.<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\"><strong>Adapt to any use case \u2013 <\/strong> Put the pieces of your incident response process together through a fully interactive and integrated workflow and case management system. It provides a dynamic, targeted threat management system that can adapt easily to any number of critical use cases.<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\"><strong>Define repeatable incident response processes \u2013 <\/strong>Manage cases based on defined, repeatable processes to deliver consistent incident response remediation. By using dynamic case management, SecOps teams can easily collaborate with other departments via automated notifications.<\/p>\n<\/li>\n<\/ul>\n<h2><strong>Low-Code Dashboards<\/strong><\/h2>\n<p dir=\"ltr\">Security professionals of all levels can understand the effectiveness of their security operations with the help of dashboards powered by <a href=\"https:\/\/swimlane.com\/blog\/low-code-security-automation-simplicity\">low-code security automation<\/a> engines. Built-in SOC dashboards allow leaders to quickly view where they need to reallocate resources to avoid employee burnout and highlight which employees may need additional training. Security leaders are empowered to easily identify trends over time by looking at historical records, other tools, and observables across the organization. This creates a centralized management hub for security teams to gain an end-to-end view of their security posture.<\/p>\n<p dir=\"ltr\">Benefits of low-code dashboards include:<\/p>\n<ul>\n<li dir=\"ltr\">\n<p dir=\"ltr\"><strong>Integrate and measure your entire technology stack: <\/strong>API-first architecture and pre-built integrations provide an ideal platform for aggregating security data through the integration and tracking of your SOC\u2019s entire technology stack.<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\"><strong>Maximize staff efficiency and optimize tools: <\/strong>Performance metrics are accessible through built-in SOC dashboards, which makes it easy to see where you need to adjust resources to avoid employee burnout or who needs additional training in certain areas.<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\"><strong>Fully customizable SOC dashboards \u2013 <\/strong>Display and interact with your data however you need. Low-code API-first architecture allows you to integrate all of your security systems to feed into a central view, providing a clear and comprehensive picture of how your SecOps program is functioning.<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\"><strong>Improve staff efficiency \u2013 <\/strong>Using low-code dashboards can save time and reduce errors, allowing security analysts to stay on top of incidents without getting overwhelmed. By using security automation as a system of record, your staff can speed up their pace of threat response without getting overwhelmed.<\/p>\n<\/li>\n<\/ul>\n<h2><strong>Point-in-Time Reporting<\/strong><\/h2>\n<p>Robust case management and powerful dashboards work together so that SOC managers can leverage point-in-time reporting to build custom reports to inform CISOs and other stakeholders. Leaders can track security tools in the technology stack and overall performance to measure the ROI across the SOC. Doing so allows you to compare and assess the best solutions for your unique environment.<\/p>\n<p>During critical events, automation platforms can create real-time reports with detailed insights that pinpoint problematic areas of security operations. This makes it easier to analyze retrospectives and develop a counter-strategy.<\/p>\n<p dir=\"ltr\">Benefits of point-in-time reporting include:<\/p>\n<ul>\n<li dir=\"ltr\">\n<p dir=\"ltr\"><strong>Track mean time to resolution (MTTR) and establish ROI: <\/strong>Automatically track every step of your security incident response process to measure your team&#8217;s effectiveness. Built-in capabilities measure value, such as time saved on MTTR, in detail to provide a quantifiable ROI.<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\"><strong>Benchmark and cross-check security tools: <\/strong>Visualize integrated tools, track key SOC KPIs, and identify potential efficiency gains quickly. Cross-check multiple tools against one another inside to identify potential redundancies or tools that are under-delivering value.<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\"><strong>Robust reporting and analytics:<\/strong> Low-code automation solutions make it easy to monitor and manage major events, progress, threat intelligence, and other security metrics. This provides a clear picture of the performance, capacity, and value of an organization\u2019s security investment.<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\"><strong>Surface gaps and opportunities:<\/strong> In-depth security reporting and flexible SOC dashboards help you get a clear view of all incident resolution processes, efficiency gaps, and optimization opportunities. Each member of your team has a unique profile that allows you to analyze individual and team performance to identify opportunities for staff reallocation or additional training to increase efficiency.<\/p>\n<\/li>\n<\/ul>\n<p dir=\"ltr\">In the end, every SOC needs a powerful system of record to retain data and share it across teams, so that everyone can keep track of important information about your critical infrastructure, threats, and company safety at all times. That way, in the event of a major incident or breach, you have a complete picture of everything that has happened to your organization up to that point \u2013 and you can use that information to secure the future of your company.<\/p>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69f39e950b70f bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/automated-incident-response\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>8\uc6d4 22, 2025<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Automated Incident Response: Everything You Need to Know<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69f39e950cc95 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/automating-dfir-with-soar\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>12\uc6d4 22, 2022<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Everything You Need to Know About Automating DFIR<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69f39e950e594 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/ready-for-soar\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>9\uc6d4 5, 2019<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>How do you know if you\u2019re ready for SOAR?<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>\ub3d9\uc801 \uc0ac\ub840 \uad00\ub9ac, \ub85c\uc6b0\ucf54\ub4dc \ub300\uc2dc\ubcf4\ub4dc \ubc0f \ubcf4\uace0 \uae30\ub2a5\uc774 \ubaa8\ub450 \ud1b5\ud569\ub418\uc5b4 \uac15\ub825\ud55c \ubcf4\uc548 \uae30\ub85d \uc2dc\uc2a4\ud15c\uc744 \uad6c\ucd95\ud569\ub2c8\ub2e4.<\/p>","protected":false},"author":5,"featured_media":9433,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[],"class_list":["post-9431","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>A System of Record for Security: Everything You Need to Know<\/title>\n<meta name=\"description\" content=\"Security is a multi-headed monster, isn\u2019t it? Thousands of alerts, a plethora of siloed tools, and countless threats \u2013 all of these challenges are\u2026\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/\ubcf4\uc548-\uc6b4\uc601-\uc2dc\uc2a4\ud15c-\uae30\ub85d\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A System of Record for Security: Everything You Need to Know\" \/>\n<meta property=\"og:description\" content=\"Security is a multi-headed monster, isn\u2019t it? Thousands of alerts, a plethora of siloed tools, and countless threats \u2013 all of these challenges are\u2026\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/\ubcf4\uc548-\uc6b4\uc601-\uc2dc\uc2a4\ud15c-\uae30\ub85d\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-08T04:14:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/SYSOFREC.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"679\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data1\" content=\"6\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/blog\\\/security-operations-system-of-record\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/blog\\\/security-operations-system-of-record\\\/\",\"name\":\"A System of Record for Security: Everything You Need to Know\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/blog\\\/security-operations-system-of-record\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/blog\\\/security-operations-system-of-record\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/SYSOFREC.png\",\"datePublished\":\"2022-06-14T21:06:00+00:00\",\"dateModified\":\"2023-02-08T04:14:55+00:00\",\"description\":\"Security is a multi-headed monster, isn\u2019t it? Thousands of alerts, a plethora of siloed tools, and countless threats \u2013 all of these challenges are\u2026\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/blog\\\/security-operations-system-of-record\\\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/swimlane.com\\\/ko\\\/blog\\\/security-operations-system-of-record\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/blog\\\/security-operations-system-of-record\\\/#primaryimage\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/SYSOFREC.png\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/SYSOFREC.png\",\"width\":1120,\"height\":679,\"caption\":\"Cybersecurity analyst imagery representing AI-powered data protection and secure document management.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/blog\\\/security-operations-system-of-record\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/swimlane.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A System of Record for Security: Everything You Need to Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/#website\",\"url\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/swimlane\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/swimlane\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\ubcf4\uc548 \uae30\ub85d \uc2dc\uc2a4\ud15c: \uc54c\uc544\uc57c \ud560 \ubaa8\ub4e0 \uac83","description":"\ubcf4\uc548\uc740 \ub9c8\uce58 \uc5ec\ub7ec \uba38\ub9ac\ub97c \uac00\uc9c4 \uad34\ubb3c\uacfc \uac19\uc8e0? \uc218\ucc9c \uac1c\uc758 \uacbd\uace0, \ubd84\uc0b0\ub41c \ub3c4\uad6c\ub4e4, \uadf8\ub9ac\uace0 \ubb34\uc218\ud55c \uc704\ud611\ub4e4\uae4c\uc9c0, \uc774 \ubaa8\ub4e0 \uac83\ub4e4\uc774 \ubcf4\uc548 \ubb38\uc81c\ub97c \uc57c\uae30\ud569\ub2c8\ub2e4\u2026","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/\ubcf4\uc548-\uc6b4\uc601-\uc2dc\uc2a4\ud15c-\uae30\ub85d\/","og_locale":"ko_KR","og_type":"article","og_title":"A System of Record for Security: Everything You Need to Know","og_description":"Security is a multi-headed monster, isn\u2019t it? Thousands of alerts, a plethora of siloed tools, and countless threats \u2013 all of these challenges are\u2026","og_url":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/\ubcf4\uc548-\uc6b4\uc601-\uc2dc\uc2a4\ud15c-\uae30\ub85d\/","og_site_name":"AI Security Automation","article_modified_time":"2023-02-08T04:14:55+00:00","og_image":[{"width":1120,"height":679,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/SYSOFREC.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"6\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ko\/blog\/security-operations-system-of-record\/","url":"https:\/\/swimlane.com\/ko\/blog\/security-operations-system-of-record\/","name":"\ubcf4\uc548 \uae30\ub85d \uc2dc\uc2a4\ud15c: \uc54c\uc544\uc57c \ud560 \ubaa8\ub4e0 \uac83","isPartOf":{"@id":"https:\/\/swimlane.com\/ko\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ko\/blog\/security-operations-system-of-record\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ko\/blog\/security-operations-system-of-record\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/SYSOFREC.png","datePublished":"2022-06-14T21:06:00+00:00","dateModified":"2023-02-08T04:14:55+00:00","description":"\ubcf4\uc548\uc740 \ub9c8\uce58 \uc5ec\ub7ec \uba38\ub9ac\ub97c \uac00\uc9c4 \uad34\ubb3c\uacfc \uac19\uc8e0? \uc218\ucc9c \uac1c\uc758 \uacbd\uace0, \ubd84\uc0b0\ub41c \ub3c4\uad6c\ub4e4, \uadf8\ub9ac\uace0 \ubb34\uc218\ud55c \uc704\ud611\ub4e4\uae4c\uc9c0, \uc774 \ubaa8\ub4e0 \uac83\ub4e4\uc774 \ubcf4\uc548 \ubb38\uc81c\ub97c \uc57c\uae30\ud569\ub2c8\ub2e4\u2026","breadcrumb":{"@id":"https:\/\/swimlane.com\/ko\/blog\/security-operations-system-of-record\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ko\/blog\/security-operations-system-of-record\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/blog\/security-operations-system-of-record\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/SYSOFREC.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/SYSOFREC.png","width":1120,"height":679,"caption":"Cybersecurity analyst imagery representing AI-powered data protection and secure document management."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ko\/blog\/security-operations-system-of-record\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"A System of Record for Security: Everything You Need to Know"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ko\/#website","url":"https:\/\/swimlane.com\/ko\/","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","description":"\ubaa8\ub4e0 \ubcf4\uc548 \uae30\ub2a5\uc744 \uc704\ud55c \uc5d0\uc774\uc804\ud2b8 \uae30\ubc18 AI \uc790\ub3d9\ud654","publisher":{"@id":"https:\/\/swimlane.com\/ko\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ko\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ko\/#organization","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","url":"https:\/\/swimlane.com\/ko\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/9431","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/9431\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media\/9433"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media?parent=9431"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/tags?post=9431"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-type?post=9431"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-topic?post=9431"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-industry?post=9431"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/blog-category?post=9431"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}