{"id":9841,"date":"2017-10-11T06:49:00","date_gmt":"2017-10-11T12:49:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/incident-alert-management\/"},"modified":"2023-02-08T09:10:49","modified_gmt":"2023-02-08T09:10:49","slug":"gerenciamento-de-alertas-de-incidentes","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/pt\/blog\/incident-alert-management\/","title":{"rendered":"Utilizando automa\u00e7\u00e3o e orquestra\u00e7\u00e3o de seguran\u00e7a para gerenciamento de alertas de incidentes."},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/10.04.17-Too-many-alerts.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Overwhelmed security analyst surrounded by multiple alert notifications on computer screens, representing alert fatigue in SOC teams.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/10.04.17-Too-many-alerts.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/10.04.17-Too-many-alerts-300x186.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/10.04.17-Too-many-alerts-1024x636.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/10.04.17-Too-many-alerts-768x477.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2017-10-11T06:49:00-06:00\">Out 11, 2017<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Using security automation and orchestration for incident alert management<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/pt\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">4 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/pt\/blog\/incident-alert-management\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/pt\/blog\/incident-alert-management\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Using%20security%20automation%20and%20orchestration%20for%20incident%20alert%20management').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Fincident-alert-management%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Using%20security%20automation%20and%20orchestration%20for%20incident%20alert%20management&url=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Fincident-alert-management%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Fincident-alert-management%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Fincident-alert-management%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<h2 class=\"wp-block-heading\">&nbsp;<\/h2>\n\n\n\n<p>Ensuring your organization is protected from the cyberattacks that threaten businesses can be a daunting task. As a result, many companies implement a composite of security solutions to protect them from all sides. Each of those solutions produces their own security alerts which require investigation by security operations (SecOps) teams. SecOps then becomes overwhelmed with alerts&#8211; which can lead to burnout, staff turnover and ultimately an organization vulnerable to threats.<\/p>\n\n\n\n<p>Utilizing a comprehensive security automation and orchestration solution to improve your incident alert management process is the best way to ensure your organization is protected and hold onto your valuable SecOps employees.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The problem: There are too many alerts\u2026<\/h3>\n\n\n\n<p>The importance of having security solutions in place to protect your organization cannot be emphasized enough. Just in 2017, there have been <a href=\"https:\/\/www.wired.com\/story\/2017-biggest-hacks-so-far\/\" target=\"_blank\" rel=\"noreferrer noopener\">numerous cyberattacks that halted business operations<\/a> and <a href=\"http:\/\/money.cnn.com\/2017\/05\/15\/technology\/ransomware-whos-been-hit\/index.html\" target=\"_blank\" rel=\"noreferrer noopener\">impacted companies in over 100 countries<\/a>. To prevent these types of attacks, security systems must issue alerts to the SecOps team to draw their attention to potentially suspicious activity for further investigation.<\/p>\n\n\n\n<p>Unfortunately, the number of security alerts that many solutions generate has put organizations in a \u201cboy who cried wolf\u201d situation. Large enterprises receive between 10,000 and 150,000 security alerts <em>per day<\/em>, making it impossible to manually investigate every alert, especially when organizations lack the staff and resources to do so. As a result, up to 70 percent of alerts are ignored and every alert ignored <em>could<\/em> lead to a breach.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u2026And alert triage is a popular but faulty solution.<\/h3>\n\n\n\n<p>Many organizations rely on alert triage for incident alert management. Alert triage allows SecOps teams to scan alerts based on specific criteria, quickly determine the likely seriousness of the threat, and prioritize investigations accordingly. Although this seems like a viable solution, it can easily lead to missing a real attack. It is just not possible to ignore large volumes of alerts and still fully defend your organization.<\/p>\n\n\n\n<p>Current incident alert management processes:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Are unable to keep up with evolving threats:<\/strong> Cyber threats are constantly evolving, so alert evaluation processes must evolve with them. But many organizations utilize the same criteria for alert triage for years, and can\u2019t (or don\u2019t) modify criteria as new attacks or techniques enter the cybersphere. The result is that they are unable to catch the latest and most dangerous threats.<\/li>\n\n\n\n<li><strong>Have integration complications:<\/strong> All of your security tools need to integrate both with each other <em>and<\/em> your custom processes. Many tools designed to integrate disparate security solutions still require SecOps teams to complete manual research and investigations, which significantly slows down response times.<\/li>\n\n\n\n<li><strong>Rely on tribal knowledge:<\/strong> Cybersecurity employees build up an informal knowledge base that helps them complete their job duties. Given the repetitive nature of cybersecurity work, staff turnover is common. When employees leave, that informal knowledge base is lost and every new employee has to start with incomplete and disparate information.<\/li>\n\n\n\n<li><strong>Don\u2019t provide enough context:<\/strong> Many solutions generate alerts but don\u2019t provide enough information for staff to fully understand the issue, forcing them to perform manual investigations which further slows them down.<\/li>\n\n\n\n<li><strong>Take place on too many disparate screens and applications:<\/strong> If SecOps teams use multiple solutions, it is likely that each tool generates separate alerts. Without any centralization of these alerts, understanding the complete security picture is slow and challenging.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/swimlane.com\/security-automation-and-orchestration\/\">Security automation and orchestration<\/a> is the answer<\/h3>\n\n\n\n<p>Security automation and orchestration is popular in the cybersecurity field, commonly suggested as a solution to a variety of security management issues. Individually these terms are defined as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/swimlane.com\/blog\/security-automation\/\"><strong>Security automation<\/strong><\/a> is the use of automated systems to detect and prevent cyber threats, while also contributing to the overall threat intelligence of an organization to help better prepare and defend against future attacks.<\/li>\n\n\n\n<li><a href=\"https:\/\/swimlane.com\/security-orchestration-platform\/\"><strong>Security orchestration<\/strong><\/a> is the process of bringing together numerous tools and resources to work together harmoniously to improve an organization\u2019s security operations.<\/li>\n<\/ul>\n\n\n\n<p>Working together, security automation and orchestration improves security workflows, processes and overall alert management by removing slow manual intervention tasks and replacing them with machine-speed decision making and response. It works within your security infrastructure to integrate the tools you <em>already<\/em> have to better serve your organization.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How Swimlane can help<\/h3>\n\n\n\n<p>Swimlane utilizes security automation and orchestration to help you improve your incident alert management process. It allows your organization to:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/assets\/uploads\/images\/wp\/2017\/10\/incident-alert-management-security-automation-and-orchestration-dashboard-1024x576.png\" alt=\"Dashboard\" class=\"wp-image-1955\"\/><\/figure>\n\n\n\n<p>   <\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Centralize security operations<\/strong>: Centralized dashboards integrate data from all of your existing solutions using API-first architecture. This provides your SecOps team with more context surrounding alerts and a more comprehensive view of the state of security within your organization.<\/li>\n\n\n\n<li><strong>Automate tedious tasks:<\/strong> 80 to 90 percent of security tasks can be automated to some extent. Utilizing automation allows SecOps teams to handle <em>more<\/em> alerts, in the <em>same<\/em> amount of time using your <em>existing<\/em> staff.<\/li>\n\n\n\n<li><strong>Reduce management complexity: <\/strong>Today, organizations rely on multiple solutions, vendors and teams to secure their critical systems and data, which can make managing security a nightmare. Security automation and orchestration helps you coordinate your vendors and tools and enables you to better leverage their capabilities.<\/li>\n<\/ul>\n\n\n\n<p>All of the benefits of security automation and orchestration come together to reduce the overall mean time to resolution (MTTR) and significantly improve protection for your organization. Utilizing Swimlane is the answer to refining your incident alert management process so you can <a href=\"https:\/\/swimlane.com\/blog\/security-operations-efficiency\/\">respond to every alert<\/a> and defend your organization from all cyber threats.<\/p>\n\n\n\n<p>Want to know how security automation and orchestration is utilized in the real world? Download our eBook: <a href=\"https:\/\/swimlane.com\/sao-use-cases-ebook\/\"><em>8 Real World Use Cases for Security Automation and Orchestration<\/em><\/a>.<\/p>\n\n\n\n<p>Interested in learning more about Swimlane? <a href=\"https:\/\/swimlane.com\/contact\/\">Contact us<\/a> or <a href=\"https:\/\/swimlane.com\/demo\/\">schedule a demo<\/a>.<\/p>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/pt\/tag\/soar\/'><span class='tag-content'>SOAR<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d07dbc32b3c bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/blog\/siem-alert-triage\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Mar 13, 2018<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Using security automation and orchestration for SIEM triage<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d07dbc33db8 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/blog\/security-alert-management\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Mai 9, 2017<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Security alert management: Simplified with automation<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d07dbc34f60 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/blog\/nist-incident-response\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Jan 31, 2018<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Improving incident response with the NIST Cybersecurity Framework and security automation and orchestration (SAO)<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":9842,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[89],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[70],"class_list":["post-9841","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-soar","resource-type-blogs","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Using security automation and orchestration for incident alert\u2026<\/title>\n<meta name=\"description\" content=\"Security automation and orchestration is the solution to improving incident alert management.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/pt\/blogue\/gerenciamento-de-alertas-de-incidentes\/\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Using security automation and orchestration for incident alert management\" \/>\n<meta property=\"og:description\" content=\"Security automation and orchestration is the solution to improving incident alert management.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/pt\/blogue\/gerenciamento-de-alertas-de-incidentes\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-08T09:10:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/10.04.17-Too-many-alerts.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"696\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo estimado de leitura\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/pt\/blog\/incident-alert-management\/\",\"url\":\"https:\/\/swimlane.com\/pt\/blog\/incident-alert-management\/\",\"name\":\"Using security automation and orchestration for incident alert\u2026\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/pt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/pt\/blog\/incident-alert-management\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/pt\/blog\/incident-alert-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/10.04.17-Too-many-alerts.png\",\"datePublished\":\"2017-10-11T12:49:00+00:00\",\"dateModified\":\"2023-02-08T09:10:49+00:00\",\"description\":\"Security automation and orchestration is the solution to improving incident alert management.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/pt\/blog\/incident-alert-management\/#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/pt\/blog\/incident-alert-management\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/swimlane.com\/pt\/blog\/incident-alert-management\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/10.04.17-Too-many-alerts.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/10.04.17-Too-many-alerts.png\",\"width\":1120,\"height\":696,\"caption\":\"Overwhelmed security analyst surrounded by multiple alert notifications on computer screens, representing alert fatigue in SOC teams.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/pt\/blog\/incident-alert-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Using security automation and orchestration for incident alert management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/pt\/#website\",\"url\":\"https:\/\/swimlane.com\/pt\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/pt\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/pt\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/pt\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/pt\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Utilizando automa\u00e7\u00e3o e orquestra\u00e7\u00e3o de seguran\u00e7a para alertas de incidentes\u2026","description":"A automa\u00e7\u00e3o e orquestra\u00e7\u00e3o de seguran\u00e7a s\u00e3o a solu\u00e7\u00e3o para aprimorar o gerenciamento de alertas de incidentes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/pt\/blogue\/gerenciamento-de-alertas-de-incidentes\/","og_locale":"pt_PT","og_type":"article","og_title":"Using security automation and orchestration for incident alert management","og_description":"Security automation and orchestration is the solution to improving incident alert management.","og_url":"https:\/\/swimlane.com\/pt\/blogue\/gerenciamento-de-alertas-de-incidentes\/","og_site_name":"AI Security Automation","article_modified_time":"2023-02-08T09:10:49+00:00","og_image":[{"width":1120,"height":696,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/10.04.17-Too-many-alerts.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Tempo estimado de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/pt\/blog\/incident-alert-management\/","url":"https:\/\/swimlane.com\/pt\/blog\/incident-alert-management\/","name":"Utilizando automa\u00e7\u00e3o e orquestra\u00e7\u00e3o de seguran\u00e7a para alertas de incidentes\u2026","isPartOf":{"@id":"https:\/\/swimlane.com\/pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/pt\/blog\/incident-alert-management\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/pt\/blog\/incident-alert-management\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/10.04.17-Too-many-alerts.png","datePublished":"2017-10-11T12:49:00+00:00","dateModified":"2023-02-08T09:10:49+00:00","description":"A automa\u00e7\u00e3o e orquestra\u00e7\u00e3o de seguran\u00e7a s\u00e3o a solu\u00e7\u00e3o para aprimorar o gerenciamento de alertas de incidentes.","breadcrumb":{"@id":"https:\/\/swimlane.com\/pt\/blog\/incident-alert-management\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/pt\/blog\/incident-alert-management\/"]}]},{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/swimlane.com\/pt\/blog\/incident-alert-management\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/10.04.17-Too-many-alerts.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/10.04.17-Too-many-alerts.png","width":1120,"height":696,"caption":"Overwhelmed security analyst surrounded by multiple alert notifications on computer screens, representing alert fatigue in SOC teams."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/pt\/blog\/incident-alert-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Using security automation and orchestration for incident alert management"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/pt\/#website","url":"https:\/\/swimlane.com\/pt\/","name":"Automa\u00e7\u00e3o de seguran\u00e7a de baixo c\u00f3digo e plataforma SOAR | Swimlane","description":"Automa\u00e7\u00e3o de IA ag\u00eantica para todas as fun\u00e7\u00f5es de seguran\u00e7a","publisher":{"@id":"https:\/\/swimlane.com\/pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/pt\/#organization","name":"Automa\u00e7\u00e3o de seguran\u00e7a de baixo c\u00f3digo e plataforma SOAR | Swimlane","url":"https:\/\/swimlane.com\/pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource\/9841","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource\/9841\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/media\/9842"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/media?parent=9841"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/tags?post=9841"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-type?post=9841"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-topic?post=9841"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-industry?post=9841"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/blog-category?post=9841"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}