{"id":663,"date":"2024-08-06T17:17:27","date_gmt":"2024-08-06T20:17:27","guid":{"rendered":"https:\/\/conversys.global\/?post_type=blue-huddle&#038;p=663"},"modified":"2024-12-19T17:15:10","modified_gmt":"2024-12-19T20:15:10","slug":"huddledr","status":"publish","type":"blue-huddle","link":"https:\/\/conversys.global\/en\/blue-huddle\/huddledr\/","title":{"rendered":"huddleEDR"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><section id=\"huddledr1\" class=\"vc_section\"><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4 class=\"blue\">Overview<\/h4>\n<h2>Advanced Endpoint Detection and Response for Cyber Security<\/h2>\n<p>huddleEDR (Endpoint Detection and Response) is an advanced endpoint cybersecurity solution from Conversys that goes beyond prevention, identifying and responding to threats that manage to overcome traditional layers of protection. By continuously monitoring activity on endpoints such as computers, servers and mobile devices, huddleEDR allows suspicious behavior to be identified and immediate action to be taken to mitigate risks.<\/p>\n<p>This constant vigilance allows for the early detection of suspicious behavior, such as the execution of malicious files, access to confidential data or attempts to communicate with unknown systems. It can also play a vital role in analyzing and investigating threats, providing valuable insights into the nature and origin of malicious activities.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\" id=\"beneficios\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h2>Benefits of huddleEDR<\/h2>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center wpb_content_element  icone\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/dr-i1.svg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"dr-i1\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3>Prevention of Zero-Day Attacks:<\/h3>\n<p>Blocks unknown and newly discovered threats.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center wpb_content_element  icone\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/dr-i2.svg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"dr-i2\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3>Enhanced Prevention Strategy:<\/h3>\n<p>Continuous improvement of cyber defenses based on behavioral analysis.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center wpb_content_element  icone\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/dr-i3.svg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"dr-i3\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3>Minimizing Impacts:<\/h3>\n<p>Reduces incident response time and limits damage.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center wpb_content_element  icone\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/dr-i4.svg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"dr-i4\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3>Capacity for in-depth research:<\/h3>\n<p>Detailed and forensic analysis of security incidents.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center wpb_content_element  icone\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/dr-i5.svg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"dr-i5\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3>Intelligent Automation:<\/h3>\n<p>Automated processes for detecting and responding to threats.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center wpb_content_element  icone\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/dr-i6.svg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"dr-i6\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3>Operational efficiency:<\/h3>\n<p>Maximizes safety with minimal impact on daily operations.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section id=\"huddledr2\" class=\"vc_section\"><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3>Main Features<\/h3>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_left wpb_content_element  icone\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/dr-i7.svg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"dr-i7\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>Zero-Day Threat Prevention:<\/h4>\n<p>It uses heuristic techniques and behavioral analysis to identify suspicious activity that does not correspond to known patterns.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_left wpb_content_element  icone\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/dr-i8.svg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"dr-i8\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>Advanced Detection:<\/h4>\n<p>It continuously monitors endpoint behavior, using signatures and heuristics to identify known and unknown threats in real time.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_left wpb_content_element  icone\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/dr-i9.svg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"dr-i9\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>Forensic Analysis:<\/h4>\n<p>Detailed data collection for post-incident analysis, allowing accurate reconstruction of events.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_left wpb_content_element  icone\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/dr-i10.svg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"dr-i10\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>Integration with SIEM:<\/h4>\n<p>Extends security visibility through integration with Security Information and Event Management Systems (SIEM).<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3>Essential deliveries<\/h3>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_left wpb_content_element  icone\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/dr-i12.svg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"dr-i12\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>Real-time alerts:<\/h4>\n<p>Immediate notifications of suspicious activity for a rapid response.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_left wpb_content_element  icone\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/dr-i13.svg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"dr-i13\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>Configuration optimization:<\/h4>\n<p>Continuous adjustment of huddleEDR settings to ensure effective protection.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_left wpb_content_element  icone\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/dr-i14.svg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"dr-i14\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>Customized reports:<\/h4>\n<p>Reports that highlight key metrics, threat trends and the effectiveness of security measures.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_left wpb_content_element  icone\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/dr-i15.svg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"dr-i15\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>Rapid Incident Response:<\/h4>\n<p>Efficient coordination with the security team to minimize impacts and ensure continuity of operations.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_left wpb_content_element  icone\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/dr-i16.svg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"dr-i16\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>Event Analysis:<\/h4>\n<p>Advanced tools for detailed analysis of incidents and threats.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_left wpb_content_element  icone\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/dr-i11.svg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"dr-i11\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>Endpoint monitoring:<\/h4>\n<p>It uses artificial intelligence and machine learning to proactively identify suspicious behavior.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section id=\"huddledr3\" class=\"vc_section vc_custom_1722995245269 vc_section-has-fill\"><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center wpb_content_element  tabela\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"740\" height=\"866\" src=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/tabela-dr.jpg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"DR-TABLE\" srcset=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/tabela-dr.jpg 740w, https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/tabela-dr-256x300.jpg 256w\" sizes=\"(max-width: 740px) 100vw, 740px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/section><section id=\"cta\" class=\"vc_section\"><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-8\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>Contact Conversys<\/h4>\n<h2>And find out how huddleEDR can protect your company against cyber threats, offering advanced detection and rapid response to ensure the ongoing security of your digital assets.<\/h2>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"bt justify-content-end\">\n        <a class=\"color-white outline-false  size-normal\" href=\"https:\/\/conversys.global\/en\/contato\/\" target=\"_self\" title=\"Get in touch\">Get in touch<\/a>\n    <\/div><\/div><\/div><\/div><\/div><\/section>\n<\/div>","protected":false},"featured_media":0,"template":"","tipo":[22],"class_list":["post-663","blue-huddle","type-blue-huddle","status-publish","hentry","tipo-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>huddleEDR - Conversys<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conversys.global\/en\/blue-huddle\/huddledr\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"huddleEDR - Conversys\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conversys.global\/en\/blue-huddle\/huddledr\/\" \/>\n<meta property=\"og:site_name\" content=\"Conversys\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-19T20:15:10+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conversys.global\/en\/blue-huddle\/huddledr\/\",\"url\":\"https:\/\/conversys.global\/en\/blue-huddle\/huddledr\/\",\"name\":\"huddleEDR - Conversys\",\"isPartOf\":{\"@id\":\"https:\/\/conversys.global\/en\/#website\"},\"datePublished\":\"2024-08-06T20:17:27+00:00\",\"dateModified\":\"2024-12-19T20:15:10+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conversys.global\/en\/blue-huddle\/huddledr\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conversys.global\/en\/blue-huddle\/huddledr\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conversys.global\/en\/blue-huddle\/huddledr\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conversys.global\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blue Huddle\",\"item\":\"https:\/\/conversys.global\/blue-huddle\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security\",\"item\":\"https:\/\/conversys.global\/?tipo=security\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"huddleEDR\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conversys.global\/en\/#website\",\"url\":\"https:\/\/conversys.global\/en\/\",\"name\":\"Conversys\",\"description\":\"IT Solutions\",\"publisher\":{\"@id\":\"https:\/\/conversys.global\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conversys.global\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/conversys.global\/en\/#organization\",\"name\":\"Conversys\",\"url\":\"https:\/\/conversys.global\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conversys.global\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/conversys.svg\",\"contentUrl\":\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/conversys.svg\",\"width\":219,\"height\":40,\"caption\":\"Conversys\"},\"image\":{\"@id\":\"https:\/\/conversys.global\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"huddleEDR - Conversys","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conversys.global\/en\/blue-huddle\/huddledr\/","og_locale":"en_US","og_type":"article","og_title":"huddleEDR - Conversys","og_url":"https:\/\/conversys.global\/en\/blue-huddle\/huddledr\/","og_site_name":"Conversys","article_modified_time":"2024-12-19T20:15:10+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conversys.global\/en\/blue-huddle\/huddledr\/","url":"https:\/\/conversys.global\/en\/blue-huddle\/huddledr\/","name":"huddleEDR - Conversys","isPartOf":{"@id":"https:\/\/conversys.global\/en\/#website"},"datePublished":"2024-08-06T20:17:27+00:00","dateModified":"2024-12-19T20:15:10+00:00","breadcrumb":{"@id":"https:\/\/conversys.global\/en\/blue-huddle\/huddledr\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conversys.global\/en\/blue-huddle\/huddledr\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/conversys.global\/en\/blue-huddle\/huddledr\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conversys.global\/"},{"@type":"ListItem","position":2,"name":"Blue Huddle","item":"https:\/\/conversys.global\/blue-huddle\/"},{"@type":"ListItem","position":3,"name":"Security","item":"https:\/\/conversys.global\/?tipo=security"},{"@type":"ListItem","position":4,"name":"huddleEDR"}]},{"@type":"WebSite","@id":"https:\/\/conversys.global\/en\/#website","url":"https:\/\/conversys.global\/en\/","name":"Conversys","description":"IT Solutions","publisher":{"@id":"https:\/\/conversys.global\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conversys.global\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/conversys.global\/en\/#organization","name":"Conversys","url":"https:\/\/conversys.global\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conversys.global\/en\/#\/schema\/logo\/image\/","url":"https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/conversys.svg","contentUrl":"https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/conversys.svg","width":219,"height":40,"caption":"Conversys"},"image":{"@id":"https:\/\/conversys.global\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/conversys.global\/en\/wp-json\/wp\/v2\/blue-huddle\/663"}],"collection":[{"href":"https:\/\/conversys.global\/en\/wp-json\/wp\/v2\/blue-huddle"}],"about":[{"href":"https:\/\/conversys.global\/en\/wp-json\/wp\/v2\/types\/blue-huddle"}],"wp:attachment":[{"href":"https:\/\/conversys.global\/en\/wp-json\/wp\/v2\/media?parent=663"}],"wp:term":[{"taxonomy":"tipo","embeddable":true,"href":"https:\/\/conversys.global\/en\/wp-json\/wp\/v2\/tipo?post=663"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}