{"id":38065,"date":"2024-04-30T14:52:14","date_gmt":"2024-04-30T20:52:14","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=38065"},"modified":"2025-10-01T11:52:42","modified_gmt":"2025-10-01T17:52:42","slug":"caso-de-uso-de-pesquisa-de-indicadores-de-comprometimento-iocs-de-inteligencia-de-ameacas","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/pt\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/","title":{"rendered":"Caso de uso de Intelig\u00eancia de Amea\u00e7as e Consulta de Indicadores de Comprometimento (IOCs)"},"content":{"rendered":"<section class=\"bs-section bs-section-0ace0c84eaa888bce49c4f2de89bf8347ace13a6 bs-section---default bs-section--common-header-with-form\"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-12   bs-column-5f6574ebb29ac8d58ab608d2aff5b1bbe4f96332 bs-column---default\"><div class=\"bs-lottie-animator bs-lottie-animator---default\" id=\"lottie-c7d5ff8e-a115-40ae-aecb-0a84b90fe739\" data-settings=\"{&quot;desktop&quot;:{&quot;settings&quot;:{&quot;animateViewPort&quot;:0.5,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;Contact_lines1.json&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:1,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Contact_lines1.json&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}},&quot;mobile&quot;:{&quot;breakpoint&quot;:576,&quot;settings&quot;:{&quot;animateViewPort&quot;:50,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:0,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}}}\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column  col-sm-0 col-md-10   bs-column-e324ba46e668efb8a167f6c6f82d98452b10172b bs-column---default\">\n<p class=\"common-header__blue-text has-blue-color has-text-color\" style=\"font-size:18px;text-transform:uppercase\"><span>V\u00eddeos<\/span><\/p>\n\n\n<h1 style=\"font-style:normal;font-weight:400;\" class=\"common-header__gated-page wp-block-post-title has-text-color has-black-color\">Caso de uso de Intelig\u00eancia de Amea\u00e7as e Consulta de Indicadores de Comprometimento (IOCs)<\/h1>\n\n\n<p><span class=\"yt-core-attributed-string yt-core-attributed-string--white-space-pre-wrap\" role=\"text\"><span class=\"yt-core-attributed-string--link-inherit-color\">Diariamente, um volume enorme de dados flui pelo Centro de Opera\u00e7\u00f5es de Seguran\u00e7a (SOC), provenientes de diversas fontes e ferramentas de seguran\u00e7a. Para sua equipe de seguran\u00e7a, filtrar mais de 10.000 alertas por dia para encontrar indicadores v\u00e1lidos de comprometimento (IOCs) pode ser uma tarefa \u00e1rdua. Veja como o Swimlane automatiza e orquestra o processo de busca de IOCs, combinando dados de m\u00e1quinas com decis\u00f5es humanas em uma \u00fanica fonte de informa\u00e7\u00f5es confi\u00e1veis.<\/span><\/span><\/p>\n\n\n\n<iframe loading=\"lazy\" width=\"100%\" height=\"auto\" style=\"min-height:520px\" src=\"https:\/\/www.youtube.com\/embed\/rMmGXAGeukM?si=dpQhZZV2NlyxGoGH\" title=\"Reprodutor de v\u00eddeo do YouTube\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-14ca56fdc3be4b5f0a8616120c8005c221b5c55b bs-section---default bs-section--related-items\"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-12   bs-column-5f6574ebb29ac8d58ab608d2aff5b1bbe4f96332 bs-column---default\">\n<h2 class=\"wp-block-heading has-deep-color has-text-color\" id=\"h-you-might-also-be-interested-in\">Voc\u00ea tamb\u00e9m pode se interessar por<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-12   bs-column-33aba5295b76f4052fb226277a0b4e1e4747889c bs-column---default\">\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69db76d83f40f bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/blog\/cyber-threat-intelligence\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/THREATINTELLIGENCE-1.png' class='img-fluid' alt='' title='1'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Blogue<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Automatizando o enriquecimento da intelig\u00eancia de amea\u00e7as<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Ler mais<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69db76d840b26 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/THREAT-INT-IOC-1.png' class='img-fluid' alt='' title='AMEA\u00c7A INT IOC'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Demonstra\u00e7\u00e3o<\/span><span>V\u00eddeo<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Caso de uso de Intelig\u00eancia de Amea\u00e7as e Consulta de Indicadores de Comprometimento (IOCs)<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Ler mais<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69db76d8421c5 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/blog\/hero-ai-model-updates\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-38.jpg' class='img-fluid' alt='Hero AI com tecnologia Mistral 3.1: IA mais inteligente para automa\u00e7\u00e3o de SecOps' title='Cabe\u00e7alho'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Blogue<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Intelig\u00eancia Aprimorada: IA Heroica Agora Impulsionada por um Modelo 3x Maior<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Ler mais<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"<p>Are you looking to automate the triage of security alert data from Splunk? Watch this use case demo to learn how Swimlane can automate the alert triage process while integrating with Splunk, VirusTotal and Symantec Endpoint Protection.<\/p>","protected":false},"author":43,"featured_media":38067,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":38067,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[206,105],"resource-topic":[132,136],"resource-industry":[108,121,99],"blog-category":[],"class_list":["post-38065","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-demo","resource-type-videos","resource-topic-platform","resource-topic-soar","resource-industry-use-case","resource-industry-threat-hunting","resource-industry-alert-triage"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Automating Splunk Alert Triage Demo (4:11)<\/title>\n<meta name=\"description\" content=\"Splunk and Swimlane are shown as powerful combination for managing Alert Triage in this webinar.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/pt\/recursos\/videos\/caso-de-uso-de-pesquisa-de-indicadores-de-comprometimento-iocs-de-inteligencia-de-ameacas\/\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Threat Intelligence &amp; IOC Lookup Use Case\" \/>\n<meta property=\"og:description\" content=\"Splunk and Swimlane are shown as powerful combination for managing Alert Triage in this webinar.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/pt\/recursos\/videos\/caso-de-uso-de-pesquisa-de-indicadores-de-comprometimento-iocs-de-inteligencia-de-ameacas\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-01T17:52:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/THREAT-INT-IOC-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo estimado de leitura\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/pt\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/\",\"url\":\"https:\/\/swimlane.com\/pt\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/\",\"name\":\"Automating Splunk Alert Triage Demo (4:11)\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/pt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/pt\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/pt\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/THREAT-INT-IOC-1.png\",\"datePublished\":\"2024-04-30T20:52:14+00:00\",\"dateModified\":\"2025-10-01T17:52:42+00:00\",\"description\":\"Splunk and Swimlane are shown as powerful combination for managing Alert Triage in this webinar.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/pt\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/pt\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/swimlane.com\/pt\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/THREAT-INT-IOC-1.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/THREAT-INT-IOC-1.png\",\"width\":1280,\"height\":720,\"caption\":\"Technical interface displaying automated threat intelligence research and IOC analysis workflows.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/pt\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Threat Intelligence &amp; IOC Lookup Use Case\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/pt\/#website\",\"url\":\"https:\/\/swimlane.com\/pt\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/pt\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/pt\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/pt\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/pt\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Demonstra\u00e7\u00e3o de automa\u00e7\u00e3o da triagem de alertas do Splunk (4:11)","description":"Neste webinar, Splunk e Swimlane s\u00e3o apresentados como uma combina\u00e7\u00e3o poderosa para o gerenciamento da triagem de alertas.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/pt\/recursos\/videos\/caso-de-uso-de-pesquisa-de-indicadores-de-comprometimento-iocs-de-inteligencia-de-ameacas\/","og_locale":"pt_PT","og_type":"article","og_title":"Threat Intelligence &amp; IOC Lookup Use Case","og_description":"Splunk and Swimlane are shown as powerful combination for managing Alert Triage in this webinar.","og_url":"https:\/\/swimlane.com\/pt\/recursos\/videos\/caso-de-uso-de-pesquisa-de-indicadores-de-comprometimento-iocs-de-inteligencia-de-ameacas\/","og_site_name":"AI Security Automation","article_modified_time":"2025-10-01T17:52:42+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/THREAT-INT-IOC-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Tempo estimado de leitura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/pt\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/","url":"https:\/\/swimlane.com\/pt\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/","name":"Demonstra\u00e7\u00e3o de automa\u00e7\u00e3o da triagem de alertas do Splunk (4:11)","isPartOf":{"@id":"https:\/\/swimlane.com\/pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/pt\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/pt\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/THREAT-INT-IOC-1.png","datePublished":"2024-04-30T20:52:14+00:00","dateModified":"2025-10-01T17:52:42+00:00","description":"Neste webinar, Splunk e Swimlane s\u00e3o apresentados como uma combina\u00e7\u00e3o poderosa para o gerenciamento da triagem de alertas.","breadcrumb":{"@id":"https:\/\/swimlane.com\/pt\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/pt\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/"]}]},{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/swimlane.com\/pt\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/THREAT-INT-IOC-1.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/THREAT-INT-IOC-1.png","width":1280,"height":720,"caption":"Technical interface displaying automated threat intelligence research and IOC analysis workflows."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/pt\/resources\/videos\/threat-intelligence-ioc-lookup-use-case\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Threat Intelligence &amp; IOC Lookup Use Case"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/pt\/#website","url":"https:\/\/swimlane.com\/pt\/","name":"Automa\u00e7\u00e3o de seguran\u00e7a de baixo c\u00f3digo e plataforma SOAR | Swimlane","description":"Automa\u00e7\u00e3o de IA ag\u00eantica para todas as fun\u00e7\u00f5es de seguran\u00e7a","publisher":{"@id":"https:\/\/swimlane.com\/pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/pt\/#organization","name":"Automa\u00e7\u00e3o de seguran\u00e7a de baixo c\u00f3digo e plataforma SOAR | Swimlane","url":"https:\/\/swimlane.com\/pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource\/38065","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/users\/43"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource\/38065\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/media\/38067"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/media?parent=38065"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/tags?post=38065"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-type?post=38065"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-topic?post=38065"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-industry?post=38065"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/blog-category?post=38065"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}