{"id":9816,"date":"2018-01-17T09:45:00","date_gmt":"2018-01-17T16:45:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/sao-use-cases\/"},"modified":"2023-10-10T13:34:51","modified_gmt":"2023-10-10T19:34:51","slug":"sao-%ec%82%ac%ec%9a%a9-%ec%82%ac%eb%a1%80","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ko\/blog\/sao-use-cases\/","title":{"rendered":"\ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f \uc624\ucf00\uc2a4\ud2b8\ub808\uc774\uc158: \uc2e4\uc81c \ud65c\uc6a9 \uc0ac\ub840"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/01.17.18-SOAR-Use-Cases.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Close-up of the word \u201cSecurity\u201d displayed on a digital screen with a cursor hand hovering over it, illuminated in low light to create a tense and foreboding cybersecurity atmosphere.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/01.17.18-SOAR-Use-Cases.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/01.17.18-SOAR-Use-Cases-300x186.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/01.17.18-SOAR-Use-Cases-1024x636.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/01.17.18-SOAR-Use-Cases-768x477.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2018-01-17T09:45:00-07:00\">1\uc6d4 17, 2018<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Security automation and orchestration: Real-world use cases<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/ko\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">4 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/ko\/blog\/sao-use-cases\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/ko\/blog\/sao-use-cases\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Security%20automation%20and%20orchestration%3A%20Real-world%20use%20cases').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fsao-use-cases%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Security%20automation%20and%20orchestration%3A%20Real-world%20use%20cases&url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fsao-use-cases%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fsao-use-cases%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fsao-use-cases%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<h2>&nbsp;<\/h2>\n<p>Download our eBook <a href=\"https:\/\/swimlane.com\/sao-use-cases-ebook\/\">8 Real World Use Cases for Security Orchestration, Automation and Response (SOAR)<\/a> to read more now.<\/p>\n<p>As enterprises confront the growing challenge of hiring enough qualified cybersecurity personnel for the endless barrage of security alerts they receive, the odds can seem stacked against even the best security operations (SecOps) teams.<\/p>\n<p>Security orchestration, automation and response offers a solution. With SOAR, you can automate a significant portion of SecOps tasks and centralize all of your threat data to improve incident response. By utilizing SOAR, your team can handle <em>more<\/em> alerts in the same amount of time without adding staff, while <em>decreasing<\/em> mean time to resolution (MTTR).<\/p>\n<h3>Security automation and orchestration use cases<\/h3>\n<p>Although SOAR sounds good in theory, does it really work? Here are some real-world examples of how it can help your existing security operations.<\/p>\n<h3>Phishing attacks<\/h3>\n<p>The sheer number of phishing attacks that occur on a daily basis is growing. It\u2019s simply impossible to investigate every phishing attempt. SOAR automates the investigation process and quarantines suspected emails so your SecOps team can focus on bigger threats that require more intense investigation.<\/p>\n<p>Plus, when you use SOAR to combat phishing attacks your incident response processes are clearly defined and consistently executed. The solution can respond to threats at machine speeds with minimal effort. Then as threats evolve, workflows can be modified to incorporate new anti-phishing processes and technologies so you are always protected.<\/p>\n<h3>SIEM triage<\/h3>\n<p>SIEM solutions offer organizations useful tools to improve security but typically generate too many alerts without context. To handle alerts, SecOps teams rely on faulty SIEM triage techniques, which can result in less than 1 percent of severe alerts getting investigated. Every unattended alert has the potential to lead to a major breach.<\/p>\n<blockquote>\n<p>Using traditional SIEM triage methods, less than 1 percent of severe and critical alarms every get investigated \u2013 leaving your organization at risk.<\/p>\n<\/blockquote>\n<p>SOAR can automate most of the investigation process and provide your team with the context they need to complete additional analysis. Using SOAR, you can significantly improve security operations efficiency, while reducing risk and increasing threat protection.<\/p>\n<h3>Threat hunting<\/h3>\n<p>In today\u2019s threat environment, it\u2019s not enough to simply block threats\u2014organizations must proactively identify and hunt for new types of attacks. If SecOps teams are overwhelmed with repetitive and time-consuming work, then they are unable to hunt for potential future threats.<\/p>\n<p>SOAR helps centralize and integrate your existing technologies to provide you with a comprehensive view of all relevant threat data. These insights provide analysts with a clear picture of the threat landscape without having to hunt for the information in multiple tools. This leads to proactive protection to your organization.<\/p>\n<h3>Insider threat detection<\/h3>\n<p>The biggest sources of breach attempts come from malicious insiders, negligent employees and stolen credentials. Quickly identifying these insider threats is a major challenge that requires extensive manual effort using disparate tools. In addition, insider threats often emulate normal user behavior and spread across systems, which makes them even more difficult to find.<\/p>\n<p>Security orchestration allows you to integrate your tools to identify these insider threats, even if the attack is spread across solutions. Automating components of the incident detection and response process helps keep things running smoothly without additional overhead.<\/p>\n<h3>Threat intelligence<\/h3>\n<p>Manually gathering comprehensive threat data across your entire IT infrastructure is inefficient and time-consuming. As threat intelligence feeds evolve to accommodate new indicators of compromise (IOCs) you need a solution that can scale with those changes. SOAR ensures your security infrastructure leverages the most current threat intelligence data at all times. This information helps analysts respond to threats faster, while significantly minimizing risk.<\/p>\n<h3>Identity verification and enforcement<\/h3>\n<p>The ability to rapidly verify privileged credentials is critical to maintaining good security hygiene. SecOps teams must ensure easy access to legitimate users while also defending against fraudulent users using stolen credentials. In large organizations, constantly validating user activity at all times may be impossible.<\/p>\n<blockquote>\n<p>Organizations must have a way to ensure legitimate users can access what they need, while fraudulent users using stolen credentials are kept out.<\/p>\n<\/blockquote>\n<p>SOAR provides SecOps teams the tools they need to quickly determine if activity is legitimate or malicious. SOAR can be set up to instigate automatic actions like disabling accounts or quarantining hosts based on detected behaviors. The tool can then alert appropriate parties to investigate and mitigate malicious activity as quickly as possible.<\/p>\n<h3>Endpoint protection<\/h3>\n<p>Endpoint alerts can overwhelm even the best security teams, resulting in ineffective alert response and a slow MTTR. SOAR can automatically triage endpoint-related alerts by enriching your data from your other security solutions and taking appropriate actions. This ensures that <em>all<\/em> security alerts are addressed and can help organizations prevent smaller incidents from turning into major security breaches.<\/p>\n<h3>Forensic investigation<\/h3>\n<p>Manually gathering forensic data post-incident is time-consuming and error-prone. SAO automatically collects all the contextual information you need from your disparate tools, providing your SecOps team with everything they need to rapidly conduct an investigation. This allows your analysts to spend more time analyzing and making proactive security decisions rather than performing administrative tasks.<\/p>\n<h6>Security automation and orchestration with Swimlane<\/h6>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-3092\" src=\"https:\/\/swimlane.com\/assets\/uploads\/images\/wp\/2018\/01\/security-automation-and-orchestration-sao-eBook.png\" alt=\"security automation and orchestration - sao - eBook\" width=\"325\" height=\"386\">The SOAR solution from Swimlane integrates all of the tools within your existing security infrastructure to help you:<\/p>\n<ul>\n<li>Automate incident response<\/li>\n<li>Prioritize security alerts<\/li>\n<li>Centralize threat intelligence data<\/li>\n<li>Decrease MTTR<\/li>\n<li>Maintain real-time oversight<\/li>\n<\/ul>\n<p>All while maintaining a clear picture of the state of security within your organization.<\/p>\n<p>Want to learn more? Download our eBook <a href=\"https:\/\/swimlane.com\/sao-use-cases-ebook\/\">8 Real World Use Cases for Security Orchestration, Automation and Response (SOAR)<\/a> including detailed workflows on how SAO can help with each of these tasks.<\/p>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/ko\/tag\/soar\/'><span class='tag-content'>SOAR<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d71dd9671ef bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/financial-services-swimlane\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>1\uc6d4 12, 2022<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Fortune 500 Financial Service Company Leverages Swimlane\u2019s Low-Code Security Automation to Solve Cross-Departmental Security Use Cases<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d71dd968c25 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/swimlane-dataminr-partnership\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>9\uc6d4 20, 2022<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Swimlane and Dataminr Pulse, Automated Response for Real-time Remediation<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d71dd96a6a1 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/security-orchestration\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>8\uc6d4 16, 2017<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Security Orchestration | What is Security Orchestration?<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":9817,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[89],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[69],"class_list":["post-9816","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-soar","resource-type-blogs","blog-category-use-cases"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Security automation and orchestration: in Your World<\/title>\n<meta name=\"description\" content=\"Learn how you can implement security automation and orchestration in the real world to improve your security operations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/sao-\uc0ac\uc6a9-\uc0ac\ub840\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security automation and orchestration: Real-world use cases\" \/>\n<meta property=\"og:description\" content=\"Learn how you can implement security automation and orchestration in the real world to improve your security operations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/sao-\uc0ac\uc6a9-\uc0ac\ub840\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-10T19:34:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/01.17.18-SOAR-Use-Cases.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"696\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data1\" content=\"5\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/sao-use-cases\/\",\"url\":\"https:\/\/swimlane.com\/ko\/blog\/sao-use-cases\/\",\"name\":\"Security automation and orchestration: in Your World\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/sao-use-cases\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/sao-use-cases\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/01.17.18-SOAR-Use-Cases.png\",\"datePublished\":\"2018-01-17T16:45:00+00:00\",\"dateModified\":\"2023-10-10T19:34:51+00:00\",\"description\":\"Learn how you can implement security automation and orchestration in the real world to improve your security operations.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/sao-use-cases\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/ko\/blog\/sao-use-cases\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/sao-use-cases\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/01.17.18-SOAR-Use-Cases.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/01.17.18-SOAR-Use-Cases.png\",\"width\":1120,\"height\":696,\"caption\":\"Close-up of the word \u201cSecurity\u201d displayed on a digital screen with a cursor hand hovering over it, illuminated in low light to create a tense and foreboding cybersecurity atmosphere.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/sao-use-cases\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security automation and orchestration: Real-world use cases\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/ko\/#website\",\"url\":\"https:\/\/swimlane.com\/ko\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/ko\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/ko\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/ko\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f \uc624\ucf00\uc2a4\ud2b8\ub808\uc774\uc158: \uc5ec\ub7ec\ubd84\uc758 \uc5c5\ubb34 \ud658\uacbd\uc5d0 \ub9de\ucdb0 \uad6c\ud604\ud558\uc138\uc694","description":"\uc2e4\uc81c \ud658\uacbd\uc5d0\uc11c \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f \uc624\ucf00\uc2a4\ud2b8\ub808\uc774\uc158\uc744 \uad6c\ud604\ud558\uc5ec \ubcf4\uc548 \uc6b4\uc601\uc744 \uac1c\uc120\ud558\ub294 \ubc29\ubc95\uc744 \uc54c\uc544\ubcf4\uc138\uc694.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/sao-\uc0ac\uc6a9-\uc0ac\ub840\/","og_locale":"ko_KR","og_type":"article","og_title":"Security automation and orchestration: Real-world use cases","og_description":"Learn how you can implement security automation and orchestration in the real world to improve your security operations.","og_url":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/sao-\uc0ac\uc6a9-\uc0ac\ub840\/","og_site_name":"AI Security Automation","article_modified_time":"2023-10-10T19:34:51+00:00","og_image":[{"width":1120,"height":696,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/01.17.18-SOAR-Use-Cases.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"5\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ko\/blog\/sao-use-cases\/","url":"https:\/\/swimlane.com\/ko\/blog\/sao-use-cases\/","name":"\ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f \uc624\ucf00\uc2a4\ud2b8\ub808\uc774\uc158: \uc5ec\ub7ec\ubd84\uc758 \uc5c5\ubb34 \ud658\uacbd\uc5d0 \ub9de\ucdb0 \uad6c\ud604\ud558\uc138\uc694","isPartOf":{"@id":"https:\/\/swimlane.com\/ko\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ko\/blog\/sao-use-cases\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ko\/blog\/sao-use-cases\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/01.17.18-SOAR-Use-Cases.png","datePublished":"2018-01-17T16:45:00+00:00","dateModified":"2023-10-10T19:34:51+00:00","description":"\uc2e4\uc81c \ud658\uacbd\uc5d0\uc11c \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f \uc624\ucf00\uc2a4\ud2b8\ub808\uc774\uc158\uc744 \uad6c\ud604\ud558\uc5ec \ubcf4\uc548 \uc6b4\uc601\uc744 \uac1c\uc120\ud558\ub294 \ubc29\ubc95\uc744 \uc54c\uc544\ubcf4\uc138\uc694.","breadcrumb":{"@id":"https:\/\/swimlane.com\/ko\/blog\/sao-use-cases\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ko\/blog\/sao-use-cases\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/blog\/sao-use-cases\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/01.17.18-SOAR-Use-Cases.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/01.17.18-SOAR-Use-Cases.png","width":1120,"height":696,"caption":"Close-up of the word \u201cSecurity\u201d displayed on a digital screen with a cursor hand hovering over it, illuminated in low light to create a tense and foreboding cybersecurity atmosphere."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ko\/blog\/sao-use-cases\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Security automation and orchestration: Real-world use cases"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ko\/#website","url":"https:\/\/swimlane.com\/ko\/","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","description":"\ubaa8\ub4e0 \ubcf4\uc548 \uae30\ub2a5\uc744 \uc704\ud55c \uc5d0\uc774\uc804\ud2b8 \uae30\ubc18 AI \uc790\ub3d9\ud654","publisher":{"@id":"https:\/\/swimlane.com\/ko\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ko\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ko\/#organization","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","url":"https:\/\/swimlane.com\/ko\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/9816","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/9816\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media\/9817"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media?parent=9816"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/tags?post=9816"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-type?post=9816"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-topic?post=9816"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-industry?post=9816"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/blog-category?post=9816"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}