{"id":45681,"date":"2025-03-06T13:16:15","date_gmt":"2025-03-06T20:16:15","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=45681"},"modified":"2025-12-09T03:14:41","modified_gmt":"2025-12-09T10:14:41","slug":"dora-ciberseguranca","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/pt\/blog\/dora-cybersecurity\/","title":{"rendered":"Automa\u00e7\u00e3o DORA: Garantindo Conformidade e Resili\u00eancia Operacional"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"609\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-23-1024x609.png\" alt=\"\" class=\"wp-image-45686\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-23-1024x609.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-23-300x178.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-23-768x457.png 768w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-23.png 1120w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2025-03-06T13:16:15-07:00\">Mar 6, 2025<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">DORA Automation: Ensure Compliance and Operational Resilience<\/h1>\n\n\n<div class=\"bs-div bs-div-1c02a909fcd723a1ec953772586290c0df1291b1 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/pt\/author\/peter.draper\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/peter-draper.jpeg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tPeter Draper\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">5 <\/span> Minute Read\n<\/div>\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\"><\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/pt\/blog\/dora-cybersecurity\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/pt\/blog\/dora-cybersecurity\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('DORA%20Automation%3A%20Ensure%20Compliance%20and%20Operational%20Resilience').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Fdora-cybersecurity%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=What%20is%20DORA%3F%20How%20to%20Ensure%20Compliance%20Through%20Automation&url=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Fdora-cybersecurity%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Fdora-cybersecurity%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Fdora-cybersecurity%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<p>European enterprises face many <a href=\"https:\/\/swimlane.com\/blog\/grc-automation-deliverables\/\">GRC requirements,<\/a> demanding significant resources to maintain compliance and provide auditors and regulators with the necessary evidence. The <a href=\"https:\/\/www.eiopa.europa.eu\/digital-operational-resilience-act-dora_en\">Digital Operational Resilience Act (DORA)<\/a>, which took effect on January 16, 2023, introduces additional regulatory requirements for financial services and ICT companies operating in or working with the European Union (EU).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is DORA?<\/h2>\n\n\n\n<p>DORA outlines guidelines for<a href=\"https:\/\/swimlane.com\/blog\/automate-third-party-risk-with-cyfirma\/\"> cyber risk management <\/a>and operational resilience, aiming to enhance the digital resilience of financial entities across Europe. While it primarily applies to EU organisations, UK-based companies may be subject to DORA if they do business with EU entities. Compliance is required not only for financial institutions but also for ICT services companies supporting them.<\/p>\n\n\n\n<p>The compliance deadline, set for January 17, 2025, has now passed. It\u2019s crucial for in-scope companies to implement efficient strategies to meet DORA\u2019s requirements, both now and in the long term. Managing this alongside other regulations can be resource-intensive.<\/p>\n\n\n\n<p>Automation enables organisations to streamline compliance, strengthen operational resilience, and reduce burdens. Continue reading this blog for a more detailed exploration.<\/p>\n\n\n\n<p><strong>Understanding DORA Regulation\u2019s Requirements&nbsp;<\/strong><\/p>\n\n\n\n<p>DORA\u2019s set of requirements overlaps in many cases with other compliance regulations and their associated controls:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>ICT Risk Management:<\/strong> Establishing a comprehensive framework for identifying, protecting against, detecting, responding to, and recovering from ICT risks.<\/li>\n\n\n\n<li><strong>ICT Incident Reporting:<\/strong> Implementing robust mechanisms for reporting major ICT-related incidents to relevant authorities within strict timeframes.<\/li>\n\n\n\n<li><strong>Digital Operational Resilience Testing:<\/strong> Conducting regular testing, including advanced testing like threat-led penetration testing (TLPT), to ensure systems can withstand disruptions.<\/li>\n\n\n\n<li><strong>Third-Party Risk Management:<\/strong> Managing risks associated with third-party ICT providers, including due diligence, contractual obligations, and continuous monitoring.<\/li>\n\n\n\n<li><strong>Information Sharing:<\/strong> Participating in information sharing arrangements to enhance collective cybersecurity resilience.<\/li>\n<\/ul>\n\n\n\n<p>Tracking compliance status, progress, and regulatory changes across multiple requirements can be overwhelming for many organisations. Manual processes often make this even more challenging, quickly becoming unsustainable. Automation eases this burden by enabling security and compliance teams to meet regulatory requirements without straining resources, reducing frontline coverage, or increasing business risk. It also consolidates compliance requirements from any frameworks such as GDPR, ISO 27001, and NIS2 into a comprehensive, unified view.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Automation Supports DORA Compliance in Cybersecurity&nbsp;<\/h2>\n\n\n\n<p>Deploying the right automation technology can support <a href=\"https:\/\/swimlane.com\/solutions\/industries\/banking-finance-insurance\/\">Financial Services<\/a> and ICT Services companies to deliver on the different technical elements which drive the higher-level key requirements for DORA.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>ICT Risk Management:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Automated risk assessments, vulnerability scanning, security patching, and configuration management are all elements organisations are already working on.&nbsp; Many of these require manual processes and significant resources to deliver, never mind the collection and collation of the evidence to provide to regulators.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>ICT Incident Reporting:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Incident detection, classification, and reporting workflows can benefit significantly from the use of Automation ensuring timely notifications to authorities.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Digital Operational Resilience Testing:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Penetration testing, vulnerability assessments, and scenario testing, when enhanced with automation can facilitate regular and efficient testing by automating repetitive and mundane elements as well as combining the information from multiple systems and solutions to provide a higher level of efficacy.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Third-Party Risk Management:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Automated monitoring of third-party providers, triggering alerts for potential risks and compliance gaps can be realised through the correct use of automation technologies<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Information Sharing:<\/strong>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/swimlane.com\/blog\/ai-automation-threat-intelligence-2\/\">Automated threat intelligence<\/a> feeds and platforms can facilitate information sharing and collaboration through robust, automated integrations.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-implement-dora-automation-a-practical-approach-nbsp\">Implement DORA Automation: A Practical Approach&nbsp;<\/h2>\n\n\n\n<p>Follow this step-by-step guide to easily implement DORA automation within your organisation. AI automation can help you stay compliant and adapt to future regulatory changes with ease.&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Conduct a DORA Gap Analysis:&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>Assess current practices against DORA requirements to identify areas needing improvement.<\/p>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li>Prioritize Automation Opportunities:&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>Focus on automating key processes related to risk management, incident reporting, and testing.<\/p>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li>Select and Integrate Automation Tools:&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>Choose appropriate<a href=\"https:\/\/swimlane.com\/blog\/cybersecurity-automation-tools\/\"> security automation tools <\/a>for each area and integrate them into existing workflows focusing on automation tools with maximum flexibility and coverage as well as the inclusion of AI to enhance standard process automation capabilities.<\/p>\n\n\n\n<ol start=\"4\" class=\"wp-block-list\">\n<li>Establish Monitoring and Reporting:&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>Set up dashboards to track DORA metrics and demonstrate compliance to regulators.<\/p>\n\n\n\n<ol start=\"5\" class=\"wp-block-list\">\n<li>Maintain and Update Automation:&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>Regularly review and update automation tools and processes to adapt to evolving threats and regulatory changes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">DORA Automation Tools and Technologies&nbsp;<\/h2>\n\n\n\n<p>Various tools and technologies can streamline and automate compliance with DORA obligations. Below is a breakdown of key solutions categorized by DORA\u2019s core requirements.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Risk Management:<\/strong> Vulnerability scanners, security information and event management (SIEM) systems, configuration management tools.<\/li>\n\n\n\n<li><strong>Incident Reporting:<\/strong> Incident management platforms, automated notification systems.<\/li>\n\n\n\n<li><strong>Resilience Testing:<\/strong> Penetration testing tools, vulnerability assessment platforms, chaos engineering tools.<\/li>\n\n\n\n<li><strong>Third-Party Risk Management:<\/strong> Vendor risk management platforms, security rating services.<\/li>\n\n\n\n<li><strong>Information Sharing:<\/strong> Threat intelligence platforms, collaborative security platforms.<\/li>\n<\/ul>\n\n\n\n<p>All of these tools can be integrated into a robust and flexible centralized automation platform, adding significant value to organisations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Best Practices for DORA Automation&nbsp;<\/h2>\n\n\n\n<p>These best practices will help you maximize the benefits of<a href=\"https:\/\/swimlane.com\/blog\/security-automation\/\"> security automation<\/a> throughout your DORA and other regulatory compliance journeys.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Align automation with DORA requirements and regulatory guidance<\/li>\n\n\n\n<li>Prioritize automation based on risk and criticality<\/li>\n\n\n\n<li>Ensure data accuracy and integrity for reporting and compliance<\/li>\n\n\n\n<li>Integrate automation into existing security and IT operations workflows<\/li>\n\n\n\n<li>Establish clear roles and responsibilities for automation management<\/li>\n\n\n\n<li>Regularly review and update automation processes to address new threats and regulatory changes<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">DORA and Cybersecurity: A Synergistic Approach&nbsp;<\/h2>\n\n\n\n<p>Achieving compliance is not only about ticking boxes but more about building a solid cybersecurity foundation. Most of the controls need to meet a wide range of regulatory requirements overlap, and most of them fall squarely within the realm of cybersecurity. Effective risk management, both in your own environment and across your supply chain, along with regular testing and proactive incident reporting, are not just compliance requirements\u2014they&#8217;re essential components of a strong cybersecurity program.<\/p>\n\n\n\n<p>A strong cybersecurity program could already meet many of DORA\u2019s requirements. The real struggle for many organisations is combining data from different risk and cybersecurity areas into a clear, comprehensive view that satisfies all stakeholders.&nbsp;<\/p>\n\n\n\n<p>This is where adding security automation to your cybersecurity program will create this centralized view and help achieve the holy grail of continuous security and compliance.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Benefits of DORA Compliance Automation&nbsp;<\/h2>\n\n\n\n<p>Automating DORA compliance opens the door to a world where:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The compliance burden is reduced across your internal teams<\/li>\n\n\n\n<li>Each audit takes minutes to provide the data required rather than weeks and potentially months of heavy lifting &#8211; streamlining compliance<\/li>\n\n\n\n<li>Security and risk teams are automatically alerted to changes in your compliance posture with the ability to respond and resolve the compliance breaches<\/li>\n\n\n\n<li>Security controls can be mapped and evidenced across multiple regulations giving the bigger picture to your executive team<\/li>\n\n\n\n<li>Operational Resilience and security posture are continuously improved and that improvement reported regularly within your organisation<\/li>\n\n\n\n<li>Your organisation has a real time view of risk both internal and within your supply chain<\/li>\n\n\n\n<li>Your resources are freed up to manage improvements in security and risk rather than battling just to keep up&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>With DORA\u2019s deadline already passed, now is the time to take action! Security automation drives compliance and strengthens digital resilience, streamlining processes and enhancing both security and efficiency. The right automation tool can elevate your efforts and simplify compliance.<\/p>\n\n\n\n<p>Ready to see how it can work for you?<a href=\"https:\/\/swimlane.com\/demo\/\"> Request a demo <\/a>today!<\/p>\n\n\n\n<div class=\"bs-div bs-div-91103da672f431009115c2b4dd3e89284290a37b bs-div---default\"><div class=\"bs-div__inner     \">\n<div class=\"bs-div bs-div-a9b7c1672df9c19fe02f6a458b2ef10a022b5ae6 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-a9b7c1672df9c19fe02f6a458b2ef10a022b5ae6 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/ChaosThumbnail.png' class='img-fluid'   alt='roi report swimlane security automation' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-2aebcd1b2c11849d7c87d8462be32842b8c42b50 bs-div---default\"><div class=\"bs-div__inner     \">\n<h3 class=\"wp-block-heading\" id=\"h-see-swimlane-turbine-in-action\">See Swimlane Turbine in Action<\/h3>\n\n\n\n<p>If you haven\u2019t had the chance to explore Swimlane Turbine yet, request a demo below.&nbsp;<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-c076c9ac57cd534c762c2626e42d0e057820dbdf\"><style>.bs-pro-button-p-btn-c076c9ac57cd534c762c2626e42d0e057820dbdf .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/demo\/\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Request a Demo<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/pt\/tag\/automation\/'><span class='tag-content'>Automation<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d02e7a19103 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/blog\/ai-in-cybersecurity-2025-year-of-put-up-or-shut-up\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Jan 3, 2025<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>AI in Cybersecurity: 2025 is the year of \u201cPut Up or Shut Up\u201d<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d02e7a1a694 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/resources\/infographics\/5-tips-to-build-automated-soc-mcr\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Set 23, 2024<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>5 Tips to Build an Automated SOC<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d02e7a1b7ee bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/resources\/webinar-keeping-up-with-vulnerability-management\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Fev 26, 2025<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Are You Keeping Up with Vulnerability Management?<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Watch Now<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d02e7a1cd86 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/resources\/videos\/hero-private-agentic-ai-companion-sec-ops\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Fev 3, 2025<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Meet Hero, the first private agentic AI Companion for SecOps<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":91,"featured_media":45692,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":45688,"learn_more_label":"","image_alt_text":"What is DORA? How to Ensure Compliance Through Automation","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[236],"resource-type":[67],"resource-topic":[228],"resource-industry":[93],"blog-category":[],"class_list":["post-45681","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-automation","resource-type-blogs","resource-topic-compliance","resource-industry-automation"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is DORA? How to Ensure Compliance Through Automation<\/title>\n<meta name=\"description\" content=\"AI automation helps UK businesses comply with the EU&#039;s Digital Operations Resilience Act. This guide covers key requirements, tools, and best practices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/pt\/blogue\/dora-ciberseguranca\/\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is DORA? How to Ensure Compliance Through Automation\" \/>\n<meta property=\"og:description\" content=\"AI automation helps UK businesses comply with the EU&#039;s Digital Operations Resilience Act. This guide covers key requirements, tools, and best practices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/pt\/blogue\/dora-ciberseguranca\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-09T10:14:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-14.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"What is DORA? How to Ensure Compliance Through Automation\" \/>\n<meta name=\"twitter:description\" content=\"AI automation helps UK businesses comply with the EU&#039;s Digital Operations Resilience Act. This guide covers key requirements, tools, and best practices.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-14.png\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo estimado de leitura\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/pt\/blog\/dora-cybersecurity\/\",\"url\":\"https:\/\/swimlane.com\/pt\/blog\/dora-cybersecurity\/\",\"name\":\"What is DORA? How to Ensure Compliance Through Automation\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/pt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/pt\/blog\/dora-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/pt\/blog\/dora-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-24.png\",\"datePublished\":\"2025-03-06T20:16:15+00:00\",\"dateModified\":\"2025-12-09T10:14:41+00:00\",\"description\":\"AI automation helps UK businesses comply with the EU's Digital Operations Resilience Act. This guide covers key requirements, tools, and best practices.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/pt\/blog\/dora-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/pt\/blog\/dora-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/swimlane.com\/pt\/blog\/dora-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-24.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-24.png\",\"width\":1120,\"height\":666,\"caption\":\"Digital gears and upward arrow with EU flag, representing regulatory compliance automation and cybersecurity growth in Europe.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/pt\/blog\/dora-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DORA Automation: Ensure Compliance and Operational Resilience\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/pt\/#website\",\"url\":\"https:\/\/swimlane.com\/pt\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/pt\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/pt\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/pt\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/pt\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"O que \u00e9 DORA? Como garantir a conformidade por meio da automa\u00e7\u00e3o?","description":"A automa\u00e7\u00e3o por IA ajuda as empresas do Reino Unido a cumprir a Lei de Resili\u00eancia das Opera\u00e7\u00f5es Digitais da UE. Este guia aborda os principais requisitos, ferramentas e boas pr\u00e1ticas.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/pt\/blogue\/dora-ciberseguranca\/","og_locale":"pt_PT","og_type":"article","og_title":"What is DORA? How to Ensure Compliance Through Automation","og_description":"AI automation helps UK businesses comply with the EU's Digital Operations Resilience Act. This guide covers key requirements, tools, and best practices.","og_url":"https:\/\/swimlane.com\/pt\/blogue\/dora-ciberseguranca\/","og_site_name":"AI Security Automation","article_modified_time":"2025-12-09T10:14:41+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-14.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_title":"What is DORA? How to Ensure Compliance Through Automation","twitter_description":"AI automation helps UK businesses comply with the EU's Digital Operations Resilience Act. This guide covers key requirements, tools, and best practices.","twitter_image":"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-14.png","twitter_site":"@swimlane","twitter_misc":{"Tempo estimado de leitura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/pt\/blog\/dora-cybersecurity\/","url":"https:\/\/swimlane.com\/pt\/blog\/dora-cybersecurity\/","name":"O que \u00e9 DORA? Como garantir a conformidade por meio da automa\u00e7\u00e3o?","isPartOf":{"@id":"https:\/\/swimlane.com\/pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/pt\/blog\/dora-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/pt\/blog\/dora-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-24.png","datePublished":"2025-03-06T20:16:15+00:00","dateModified":"2025-12-09T10:14:41+00:00","description":"A automa\u00e7\u00e3o por IA ajuda as empresas do Reino Unido a cumprir a Lei de Resili\u00eancia das Opera\u00e7\u00f5es Digitais da UE. Este guia aborda os principais requisitos, ferramentas e boas pr\u00e1ticas.","breadcrumb":{"@id":"https:\/\/swimlane.com\/pt\/blog\/dora-cybersecurity\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/pt\/blog\/dora-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/swimlane.com\/pt\/blog\/dora-cybersecurity\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-24.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-24.png","width":1120,"height":666,"caption":"Digital gears and upward arrow with EU flag, representing regulatory compliance automation and cybersecurity growth in Europe."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/pt\/blog\/dora-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"DORA Automation: Ensure Compliance and Operational Resilience"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/pt\/#website","url":"https:\/\/swimlane.com\/pt\/","name":"Automa\u00e7\u00e3o de seguran\u00e7a de baixo c\u00f3digo e plataforma SOAR | Swimlane","description":"Automa\u00e7\u00e3o de IA ag\u00eantica para todas as fun\u00e7\u00f5es de seguran\u00e7a","publisher":{"@id":"https:\/\/swimlane.com\/pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/pt\/#organization","name":"Automa\u00e7\u00e3o de seguran\u00e7a de baixo c\u00f3digo e plataforma SOAR | Swimlane","url":"https:\/\/swimlane.com\/pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource\/45681","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/users\/91"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource\/45681\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/media\/45692"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/media?parent=45681"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/tags?post=45681"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-type?post=45681"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-topic?post=45681"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-industry?post=45681"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/blog-category?post=45681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}