{"id":490,"date":"2022-09-09T00:00:00","date_gmt":"2022-09-09T00:00:00","guid":{"rendered":"https:\/\/env-beyondsoftconsultinginc-development.kinsta.cloud\/br\/insights\/blog\/microsoft-defender-inteligencia-em-dobro-para-identificar-vulnerabilidades\/"},"modified":"2026-01-13T15:09:49","modified_gmt":"2026-01-13T15:09:49","slug":"microsoft-defender-inteligencia-em-dobro-para-identificar-vulnerabilidades","status":"publish","type":"blog","link":"https:\/\/www.beyondsoft.com\/br\/insights\/blog\/microsoft-defender-inteligencia-em-dobro-para-identificar-vulnerabilidades\/","title":{"rendered":"Microsoft Defender: intelig\u00eancia em dobro para identificar vulnerabilidades"},"content":{"rendered":"\n<p>Ao longo dos \u00faltimos meses, compartilhamos no blog da Beyondsoft Brasil passos importantes para tornar o ambiente corporativo mais seguro com Zero Trust. Tamb\u00e9m mostramos como proteger dados e usu\u00e1rios na nuvem da Microsoft e recuperar infraestruturas ap\u00f3s um ataque. Mas acreditamos que ainda h\u00e1 muito o que discutir sobre ciberseguran\u00e7a.<\/p>\n\n\n\n<p>Com o avan\u00e7o da digitaliza\u00e7\u00e3o, metaverso e 5G, os ataques a plataformas do governo e empresas privadas tendem a se intensificar. Suas consequ\u00eancias podem durar meses ou at\u00e9 anos, especialmente em setores como educa\u00e7\u00e3o, sa\u00fade e varejo.<\/p>\n\n\n\n<p>O roubo de dados ao redor do mundo aumentou 59% no primeiro semestre de 2022. Entre as amea\u00e7as, o ransomware segue como o principal causador de falhas e perdas nas organiza\u00e7\u00f5es.<\/p>\n\n\n\n<p>Entre os cinco pa\u00edses que mais sofrem ataques desse tipo, o <a href=\"https:\/\/www.consumidormoderno.com.br\/2022\/09\/06\/brasil-ataques-ransomware-mundo\/\" target=\"_blank\" rel=\"noreferrer noopener\">Brasil contabiliza 1.540 incidentes por semana<\/a>. Isso significa que, mais cedo ou mais tarde, um invasor pode chegar at\u00e9 os sistemas da sua empresa. S\u00f3 essa informa\u00e7\u00e3o j\u00e1 seria o suficiente para justificar nossos esfor\u00e7os em compartilhar especializa\u00e7\u00f5es e promover projetos complexos de seguran\u00e7a que conclu\u00edmos, mas vamos al\u00e9m.<\/p>\n\n\n\n<p>Com Especializa\u00e7\u00e3o Avan\u00e7ada em Defesa Contra Amea\u00e7as, Prote\u00e7\u00e3o &amp; Governan\u00e7a da Informa\u00e7\u00e3o e Gest\u00e3o de Identidade e Acesso, a Beyondsoft Brasil entende de Microsoft 365 e Azure como ningu\u00e9m e estamos sempre de olho nos recursos lan\u00e7ados pela empresa para impulsionar o neg\u00f3cio dos clientes.<\/p>\n\n\n\n<p>Por isso, separamos dois dos an\u00fancios recentes feitos pela Microsoft para ajudar nossos clientes a alcan\u00e7arem uma intelig\u00eancia de amea\u00e7as incompar\u00e1vel e, principalmente, acion\u00e1vel, sendo capaz de conter os crimes que citamos acima.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Intelig\u00eancia de Amea\u00e7as do Microsoft Defender<\/strong><\/h3>\n\n\n\n<p>O <a href=\"https:\/\/go.microsoft.com\/fwlink\/?linkid=2202366\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Defender Threat Intelligence<\/a> simplifica a detec\u00e7\u00e3o de ataques com uma biblioteca de informa\u00e7\u00f5es brutas sobre amea\u00e7as. Logo, ela detalha os advers\u00e1rios por nome, correlacionando suas ferramentas, t\u00e1ticas e procedimentos (TTPs).<\/p>\n\n\n\n<p>Com uma base s\u00f3lida de pesquisas em seguran\u00e7a e rastreamento, o Defender Threat Intelligence oferece volume, escala e profundidade. Esses recursos capacitam os centros de opera\u00e7\u00f5es de seguran\u00e7a (SOCs) a entender amea\u00e7as espec\u00edficas e fortalecer sua postura de defesa. Isso tamb\u00e9m ajuda a aprimorar recursos de detec\u00e7\u00e3o do <a href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fazure.microsoft.com%2Fpt-br%2Fservices%2Fmicrosoft-sentinel%2F&amp;data=05%7C01%7Cv-cdevera%40microsoft.com%7C3e735d3aa1994e352f8508da74b74eeb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637950628246886175%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;sdata=jsfGJyOgRYQ%2FTZdSW6hvcwvoX%2Fv8jobP1Nd%2B7eXHBns%3D&amp;reserved=0\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Sentinel<\/a> e de toda a fam\u00edlia Defender.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Gerenciamento da Superf\u00edcie de Ataque Externa do Defender<\/strong><\/h3>\n\n\n\n<p>O Microsoft Defender conta com o <a href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fcloud-security%2Fmicrosoft-defender-external-attack-surface-management&amp;data=05%7C01%7Cv-cdevera%40microsoft.com%7C3e735d3aa1994e352f8508da74b74eeb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637950628246886175%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;sdata=EWE%2FUcxruSBOPUkiSiqjC22cmcURC5RHTiBJfdoF3lk%3D&amp;reserved=0\" target=\"_blank\" rel=\"noreferrer noopener\">Gerenciamento de Superf\u00edcie de Ataque Externo<\/a> (<a href=\"https:\/\/go.microsoft.com\/fwlink\/?linkid=2202448\" target=\"_blank\" rel=\"noreferrer noopener\">External Attack Surface Management<\/a>). Ele oferece aos neg\u00f3cios a vis\u00e3o que os invasores t\u00eam do ambiente.<br>Essa ferramenta verifica conex\u00f5es e ativos criados por shadow IT, fus\u00f5es e aquisi\u00e7\u00f5es (M&amp;A) e cataloga\u00e7\u00e3o incompleta. Tamb\u00e9m identifica exposi\u00e7\u00e3o de parceiros de neg\u00f3cios e ajuda a gerenciar o crescimento r\u00e1pido dos neg\u00f3cios. Com essa vis\u00e3o completa do ambiente de TI da organiza\u00e7\u00e3o, as equipes podem tomar medidas recomendadas para mitigar riscos. Os recursos, terminais e ativos desconhecidos s\u00e3o protegidos com ferramentas de gerenciamento de eventos e informa\u00e7\u00f5es de seguran\u00e7a (<a href=\"https:\/\/tiinside.com.br\/15\/08\/2022\/sua-empresa-disse-sim-para-o-siem\/\" target=\"_blank\" rel=\"noreferrer noopener\">SIEM<\/a>).<br>Al\u00e9m disso, o Defender utiliza detec\u00e7\u00e3o e resposta estendida (<a href=\"https:\/\/www.microsoft.com\/pt-br\/security\/business\/security-101\/what-is-xdr\">XDR<\/a>) para garantir maior seguran\u00e7a.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.beyondsoft.com\/br\/wp-content\/uploads\/sites\/5\/2023\/12\/microsoft-defender-02.jpg\" alt=\"\" class=\"wp-image-1041783\" \/><\/figure>\n\n\n\n<p>Atualmente, o trabalho realizado pela Microsoft para rastrear <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/08\/02\/microsoft-announces-new-solutions-for-threat-intelligence-and-attack-surface-management\/?culture=pt-br&amp;country=BR\" target=\"_blank\" rel=\"noreferrer noopener\">35 fam\u00edlias de ransomware<\/a> em mais de 250 na\u00e7\u00f5es, al\u00e9m de cibercriminosos e outros agentes de amea\u00e7as ajuda a gerar insights valiosos para o mercado.<\/p>\n\n\n\n<p>Com uma nuvem que processa e analisa mais de 43 trilh\u00f5es de sinais de seguran\u00e7a todos os dias, a organiza\u00e7\u00e3o ainda promove otimiza\u00e7\u00f5es poderosas dos recursos que nossos especialistas oferecem diariamente \u00e0s organiza\u00e7\u00f5es espalhadas pelo Brasil.<\/p>\n\n\n\n<p>Ent\u00e3o, se voc\u00ea quer fazer parte desse grupo e garantir a seguran\u00e7a durante o trabalho h\u00edbrido, otimizando a moderniza\u00e7\u00e3o ou migra\u00e7\u00e3o para novos ambientes, entre em <a data-type=\"link\" data-id=\"https:\/\/www.beyondsoft.com\/br\/fale-conosco\/\" href=\"https:\/\/www.beyondsoft.com\/br\/fale-conosco\/\" target=\"_blank\" rel=\"noreferrer noopener\">contato<\/a> conosco!<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ao longo dos \u00faltimos meses, compartilhamos no blog da Beyondsoft Brasil passos importantes para tornar o ambiente corporativo mais seguro com Zero Trust. Tamb\u00e9m mostramos como proteger dados e usu\u00e1rios na nuvem da Microsoft e recuperar infraestruturas ap\u00f3s um ataque. Mas acreditamos que ainda h\u00e1 muito o que discutir sobre ciberseguran\u00e7a. Com o avan\u00e7o da [&hellip;]<\/p>\n","protected":false},"featured_media":1045924,"template":"","tags":[4,68,6,69],"service-category":[121],"industry-category":[],"external-author":[],"class_list":["post-490","blog","type-blog","status-publish","has-post-thumbnail","hentry","tag-cloud","tag-defender","tag-microsoft","tag-microsoftdefender","service-category-operacoes-seguras-e-ageis"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft Defender: intelig\u00eancia em dobro para identificar vulnerabilidades - Beyondsoft Brasil<\/title>\n<meta name=\"description\" content=\"Microsoft Defender oferece intelig\u00eancia avan\u00e7ada para identificar vulnerabilidades e proteger seu ambiente contra amea\u00e7as cibern\u00e9ticas.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.beyondsoft.com\/br\/insights\/blog\/microsoft-defender-inteligencia-em-dobro-para-identificar-vulnerabilidades\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Defender: intelig\u00eancia em dobro para identificar vulnerabilidades - Beyondsoft Brasil\" \/>\n<meta property=\"og:description\" content=\"Microsoft Defender oferece intelig\u00eancia avan\u00e7ada para identificar vulnerabilidades e proteger seu ambiente contra amea\u00e7as cibern\u00e9ticas.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.beyondsoft.com\/br\/insights\/blog\/microsoft-defender-inteligencia-em-dobro-para-identificar-vulnerabilidades\/\" \/>\n<meta property=\"og:site_name\" content=\"Beyondsoft Brasil\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-13T15:09:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.beyondsoft.com\/br\/wp-content\/uploads\/sites\/5\/2022\/09\/BR-Blog-Redesign-Custom-dimensions-1.pdf-15.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"840\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.beyondsoft.com\/br\/insights\/blog\/microsoft-defender-inteligencia-em-dobro-para-identificar-vulnerabilidades\/\",\"url\":\"https:\/\/www.beyondsoft.com\/br\/insights\/blog\/microsoft-defender-inteligencia-em-dobro-para-identificar-vulnerabilidades\/\",\"name\":\"Microsoft Defender: intelig\u00eancia em dobro para identificar vulnerabilidades - Beyondsoft Brasil\",\"isPartOf\":{\"@id\":\"https:\/\/www.beyondsoft.com\/br\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.beyondsoft.com\/br\/insights\/blog\/microsoft-defender-inteligencia-em-dobro-para-identificar-vulnerabilidades\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.beyondsoft.com\/br\/insights\/blog\/microsoft-defender-inteligencia-em-dobro-para-identificar-vulnerabilidades\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.beyondsoft.com\/br\/wp-content\/uploads\/sites\/5\/2022\/09\/BR-Blog-Redesign-Custom-dimensions-1.pdf-15.png\",\"datePublished\":\"2022-09-09T00:00:00+00:00\",\"dateModified\":\"2026-01-13T15:09:49+00:00\",\"description\":\"Microsoft Defender oferece intelig\u00eancia avan\u00e7ada para identificar vulnerabilidades e proteger seu ambiente contra amea\u00e7as cibern\u00e9ticas.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.beyondsoft.com\/br\/insights\/blog\/microsoft-defender-inteligencia-em-dobro-para-identificar-vulnerabilidades\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.beyondsoft.com\/br\/insights\/blog\/microsoft-defender-inteligencia-em-dobro-para-identificar-vulnerabilidades\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.beyondsoft.com\/br\/insights\/blog\/microsoft-defender-inteligencia-em-dobro-para-identificar-vulnerabilidades\/#primaryimage\",\"url\":\"https:\/\/www.beyondsoft.com\/br\/wp-content\/uploads\/sites\/5\/2022\/09\/BR-Blog-Redesign-Custom-dimensions-1.pdf-15.png\",\"contentUrl\":\"https:\/\/www.beyondsoft.com\/br\/wp-content\/uploads\/sites\/5\/2022\/09\/BR-Blog-Redesign-Custom-dimensions-1.pdf-15.png\",\"width\":1600,\"height\":840},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.beyondsoft.com\/br\/insights\/blog\/microsoft-defender-inteligencia-em-dobro-para-identificar-vulnerabilidades\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/www.beyondsoft.com\/br\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\/\/www.beyondsoft.com\/br\/insights\/blog\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Microsoft Defender: intelig\u00eancia em dobro para identificar vulnerabilidades\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.beyondsoft.com\/br\/#website\",\"url\":\"https:\/\/www.beyondsoft.com\/br\/\",\"name\":\"Beyondsoft Brasil\",\"description\":\"Beyond your expectations\",\"publisher\":{\"@id\":\"https:\/\/www.beyondsoft.com\/br\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.beyondsoft.com\/br\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.beyondsoft.com\/br\/#organization\",\"name\":\"Beyondsoft Brasil\",\"url\":\"https:\/\/www.beyondsoft.com\/br\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.beyondsoft.com\/br\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.beyondsoft.com\/br\/wp-content\/uploads\/sites\/5\/2024\/03\/cropped-bci-logo.png\",\"contentUrl\":\"https:\/\/www.beyondsoft.com\/br\/wp-content\/uploads\/sites\/5\/2024\/03\/cropped-bci-logo.png\",\"width\":758,\"height\":200,\"caption\":\"Beyondsoft Brasil\"},\"image\":{\"@id\":\"https:\/\/www.beyondsoft.com\/br\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/beyondsoftbrasil\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Defender: intelig\u00eancia em dobro para identificar vulnerabilidades - Beyondsoft Brasil","description":"Microsoft Defender oferece intelig\u00eancia avan\u00e7ada para identificar vulnerabilidades e proteger seu ambiente contra amea\u00e7as cibern\u00e9ticas.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.beyondsoft.com\/br\/insights\/blog\/microsoft-defender-inteligencia-em-dobro-para-identificar-vulnerabilidades\/","og_locale":"pt_BR","og_type":"article","og_title":"Microsoft Defender: intelig\u00eancia em dobro para identificar vulnerabilidades - Beyondsoft Brasil","og_description":"Microsoft Defender oferece intelig\u00eancia avan\u00e7ada para identificar vulnerabilidades e proteger seu ambiente contra amea\u00e7as cibern\u00e9ticas.","og_url":"https:\/\/www.beyondsoft.com\/br\/insights\/blog\/microsoft-defender-inteligencia-em-dobro-para-identificar-vulnerabilidades\/","og_site_name":"Beyondsoft Brasil","article_modified_time":"2026-01-13T15:09:49+00:00","og_image":[{"width":1600,"height":840,"url":"https:\/\/www.beyondsoft.com\/br\/wp-content\/uploads\/sites\/5\/2022\/09\/BR-Blog-Redesign-Custom-dimensions-1.pdf-15.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.beyondsoft.com\/br\/insights\/blog\/microsoft-defender-inteligencia-em-dobro-para-identificar-vulnerabilidades\/","url":"https:\/\/www.beyondsoft.com\/br\/insights\/blog\/microsoft-defender-inteligencia-em-dobro-para-identificar-vulnerabilidades\/","name":"Microsoft Defender: intelig\u00eancia em dobro para identificar vulnerabilidades - Beyondsoft Brasil","isPartOf":{"@id":"https:\/\/www.beyondsoft.com\/br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.beyondsoft.com\/br\/insights\/blog\/microsoft-defender-inteligencia-em-dobro-para-identificar-vulnerabilidades\/#primaryimage"},"image":{"@id":"https:\/\/www.beyondsoft.com\/br\/insights\/blog\/microsoft-defender-inteligencia-em-dobro-para-identificar-vulnerabilidades\/#primaryimage"},"thumbnailUrl":"https:\/\/www.beyondsoft.com\/br\/wp-content\/uploads\/sites\/5\/2022\/09\/BR-Blog-Redesign-Custom-dimensions-1.pdf-15.png","datePublished":"2022-09-09T00:00:00+00:00","dateModified":"2026-01-13T15:09:49+00:00","description":"Microsoft Defender oferece intelig\u00eancia avan\u00e7ada para identificar vulnerabilidades e proteger seu ambiente contra amea\u00e7as cibern\u00e9ticas.","breadcrumb":{"@id":"https:\/\/www.beyondsoft.com\/br\/insights\/blog\/microsoft-defender-inteligencia-em-dobro-para-identificar-vulnerabilidades\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.beyondsoft.com\/br\/insights\/blog\/microsoft-defender-inteligencia-em-dobro-para-identificar-vulnerabilidades\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.beyondsoft.com\/br\/insights\/blog\/microsoft-defender-inteligencia-em-dobro-para-identificar-vulnerabilidades\/#primaryimage","url":"https:\/\/www.beyondsoft.com\/br\/wp-content\/uploads\/sites\/5\/2022\/09\/BR-Blog-Redesign-Custom-dimensions-1.pdf-15.png","contentUrl":"https:\/\/www.beyondsoft.com\/br\/wp-content\/uploads\/sites\/5\/2022\/09\/BR-Blog-Redesign-Custom-dimensions-1.pdf-15.png","width":1600,"height":840},{"@type":"BreadcrumbList","@id":"https:\/\/www.beyondsoft.com\/br\/insights\/blog\/microsoft-defender-inteligencia-em-dobro-para-identificar-vulnerabilidades\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/www.beyondsoft.com\/br\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/www.beyondsoft.com\/br\/insights\/blog\/"},{"@type":"ListItem","position":3,"name":"Microsoft Defender: intelig\u00eancia em dobro para identificar vulnerabilidades"}]},{"@type":"WebSite","@id":"https:\/\/www.beyondsoft.com\/br\/#website","url":"https:\/\/www.beyondsoft.com\/br\/","name":"Beyondsoft Brasil","description":"Beyond your expectations","publisher":{"@id":"https:\/\/www.beyondsoft.com\/br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.beyondsoft.com\/br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.beyondsoft.com\/br\/#organization","name":"Beyondsoft Brasil","url":"https:\/\/www.beyondsoft.com\/br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.beyondsoft.com\/br\/#\/schema\/logo\/image\/","url":"https:\/\/www.beyondsoft.com\/br\/wp-content\/uploads\/sites\/5\/2024\/03\/cropped-bci-logo.png","contentUrl":"https:\/\/www.beyondsoft.com\/br\/wp-content\/uploads\/sites\/5\/2024\/03\/cropped-bci-logo.png","width":758,"height":200,"caption":"Beyondsoft Brasil"},"image":{"@id":"https:\/\/www.beyondsoft.com\/br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/beyondsoftbrasil"]}]}},"_links":{"self":[{"href":"https:\/\/www.beyondsoft.com\/br\/wp-json\/wp\/v2\/blog\/490","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.beyondsoft.com\/br\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.beyondsoft.com\/br\/wp-json\/wp\/v2\/types\/blog"}],"version-history":[{"count":2,"href":"https:\/\/www.beyondsoft.com\/br\/wp-json\/wp\/v2\/blog\/490\/revisions"}],"predecessor-version":[{"id":1045437,"href":"https:\/\/www.beyondsoft.com\/br\/wp-json\/wp\/v2\/blog\/490\/revisions\/1045437"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.beyondsoft.com\/br\/wp-json\/wp\/v2\/media\/1045924"}],"wp:attachment":[{"href":"https:\/\/www.beyondsoft.com\/br\/wp-json\/wp\/v2\/media?parent=490"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.beyondsoft.com\/br\/wp-json\/wp\/v2\/tags?post=490"},{"taxonomy":"service-category","embeddable":true,"href":"https:\/\/www.beyondsoft.com\/br\/wp-json\/wp\/v2\/service-category?post=490"},{"taxonomy":"industry-category","embeddable":true,"href":"https:\/\/www.beyondsoft.com\/br\/wp-json\/wp\/v2\/industry-category?post=490"},{"taxonomy":"external-author","embeddable":true,"href":"https:\/\/www.beyondsoft.com\/br\/wp-json\/wp\/v2\/external-author?post=490"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}