    <meta property="twitter:title" content="Security Teams Are Having an Automation Awakening" />
    <meta property="twitter:description" content="Our Demisto team commissioned a study to find out specific challenges at each stage of the incident response lifecycle, how current product capabilities help overcome these challenges, and what capabilities are missing in today's security products." />
{"version":"1.0","provider_name":"Palo Alto Networks Blog","provider_url":"https:\/\/www.prismacloud.io\/blog","author_name":"Palo Alto Networks","author_url":"https:\/\/www.prismacloud.io\/blog\/author\/palo-alto-networks-staff\/","title":"Security Teams Are Having an Automation Awakening","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"s7BJ2yM0CY\"><a href=\"https:\/\/www.prismacloud.io\/blog\/2019\/08\/state-soar-report-2019-security-teams-automation-awakening\/\">Security Teams Are Having an Automation Awakening<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.prismacloud.io\/blog\/2019\/08\/state-soar-report-2019-security-teams-automation-awakening\/embed\/#?secret=s7BJ2yM0CY\" width=\"600\" height=\"338\" title=\"&#8220;Security Teams Are Having an Automation Awakening&#8221; &#8212; Palo Alto Networks Blog\" data-secret=\"s7BJ2yM0CY\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.prismacloud.io\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.paloaltonetworks.ca\/blog\/wp-content\/uploads\/2019\/08\/Demisto-SOAR.png","thumbnail_width":2444,"thumbnail_height":1376,"description":"Our Demisto team commissioned a study to find out specific challenges at each stage of the incident response lifecycle, how current product capabilities help overcome these challenges, and what capabilities are missing in today's security products."}