{"id":191,"date":"2024-03-29T18:49:43","date_gmt":"2024-03-29T21:49:43","guid":{"rendered":"https:\/\/conversys.global\/?post_type=solucao&#038;p=191"},"modified":"2024-09-19T19:05:32","modified_gmt":"2024-09-19T22:05:32","slug":"endpoint-security","status":"publish","type":"solucao","link":"https:\/\/conversys.global\/en\/cybersecurity\/endpoint-security\/","title":{"rendered":"Endpoint Security"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><section class=\"vc_section\"><div class=\"vc_row wpb_row vc_row-fluid justify-content-between align-items-center\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4 class=\"blue\">Advanced security solution<\/h4>\n<h2>EDR &amp; XDR (Endpoint Detection and Response \/ Extended Detection and Response)<\/h2>\n<p>EDR &amp; XDR (Endpoint Detection and Response and Extended Detection and Response) is an advanced endpoint security solution that continuously monitors user devices to effectively detect and respond to cyber threats. With advanced, agile and flexible features, it uses the most advanced cutting-edge technologies in favor of cyber security.<\/p>\n<ul class=\"check\">\n<li><strong>Artificial Intelligence:<\/strong> use of advanced algorithms to identify patterns and anomalies.<\/li>\n<li><strong>Machine Learning:<\/strong> continuous learning based on endpoint behavior to improve threat detection.<\/li>\n<li><strong>Visibility:<\/strong> comprehensive, real-time monitoring of all devices connected to the network.<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-5\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center wpb_content_element\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"1080\" height=\"1080\" src=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/1080-1080-18.png\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"1080-1080 (18)\" srcset=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/1080-1080-18.png 1080w, https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/1080-1080-18-300x300.png 300w, https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/1080-1080-18-1024x1024.png 1024w, https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/1080-1080-18-150x150.png 150w, https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/1080-1080-18-768x768.png 768w\" sizes=\"(max-width: 1080px) 100vw, 1080px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1722134140413\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<ul class=\"check col2\">\n<li><strong>Forensic Analysis:<\/strong> tools to investigate incidents and understand the origin and impact of threats.<\/li>\n<li><strong>Zero Day Protection:<\/strong> protection against vulnerabilities that have not yet been discovered or fixed.<\/li>\n<li><strong>Device Control:<\/strong> management of which devices can connect to the network, reducing security risks.<\/li>\n<li><strong>Integration:<\/strong> the ability to integrate with other security tools for coordinated defense.<\/li>\n<li><strong>Mitigation:<\/strong> rapid and effective response to reduce the impact of any security incident.<\/li>\n<li><strong>Rollback:<\/strong> the ability to revert devices to a safe state after an incident.<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/section><section class=\"vc_section vc_custom_1722132396157 vc_section-has-fill\"><div class=\"vc_row wpb_row vc_row-fluid justify-content-between align-items-center\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4 class=\"blue\">Security for mobile devices<\/h4>\n<h2>Mobile Protection<\/h2>\n<p>Mobile protection offers an essential layer of security for mobile devices, guaranteeing the protection of personal information, banking transactions and interaction on social networks. Check out the resources available for applying a mobile protection solution and service.<\/p>\n<ul class=\"check\">\n<li><strong>Malware protection:<\/strong> robust defense against malicious software that tries to infect mobile devices.<\/li>\n<li><strong>Protection against Phishings:<\/strong> safeguards against attempts to steal information via phishing.<\/li>\n<li><strong>Protection against social engineering attacks:<\/strong> preventing attacks that try to manipulate users into revealing confidential information.<\/li>\n<li><strong>Application Access Control:<\/strong> managing which applications can be installed and used.<\/li>\n<li><strong>Control of Data Applications:<\/strong> regulating the use of data between applications.<\/li>\n<li><strong>Zero Day Protection:<\/strong> defense against unknown vulnerabilities.<\/li>\n<li><strong>Remote locking:<\/strong> the ability to remotely lock devices in the event of loss or theft.<\/li>\n<li><strong>Location:<\/strong> tools for tracking the location of mobile devices.<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-5\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center wpb_content_element\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"1080\" height=\"1080\" src=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/1080-1080-19.png\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"1080-1080 (19)\" srcset=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/1080-1080-19.png 1080w, https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/1080-1080-19-300x300.png 300w, https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/1080-1080-19-1024x1024.png 1024w, https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/1080-1080-19-150x150.png 150w, https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/1080-1080-19-768x768.png 768w\" sizes=\"(max-width: 1080px) 100vw, 1080px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/section><section class=\"vc_section\"><div class=\"vc_row wpb_row vc_row-fluid justify-content-between align-items-center\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4 class=\"blue\">Essential barrier against online threats<\/h4>\n<h2>Web Protection<\/h2>\n<p>Web protection provides an essential barrier against a variety of online threats targeting websites, web applications and endpoints. Check out the malicious attack points in this category that are covered by advanced protection solutions.<\/p>\n<ul class=\"check\">\n<li><strong>Protection against SQL injection attacks:<\/strong> defense against attempts to inject malicious SQL commands into databases.<\/li>\n<li><strong>Cross-site Scripting (XSS) protection:<\/strong> preventing attacks that exploit vulnerabilities in web page scripts.<\/li>\n<li><strong>Denial of Service (DDoS) attacks:<\/strong> protection against attacks aimed at overloading system resources.<\/li>\n<li><strong>Malware protection:<\/strong> safeguards against malicious software programs.<\/li>\n<li><strong>Protection against Phishings:<\/strong> blocking attempts to fish for sensitive information.<\/li>\n<li><strong>Protection against social engineering attacks:<\/strong> mitigation of attacks that manipulate individuals to obtain confidential data.<\/li>\n<li><strong>DNS Poisoning attacks:<\/strong> defense against attempts to redirect traffic to sites controlled by attackers.<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-5\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center wpb_content_element\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"1080\" height=\"1080\" src=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/1080-1080-35.png\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"1080-1080 (35)\" srcset=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/1080-1080-35.png 1080w, https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/1080-1080-35-300x300.png 300w, https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/1080-1080-35-1024x1024.png 1024w, https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/1080-1080-35-150x150.png 150w, https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/1080-1080-35-768x768.png 768w\" sizes=\"(max-width: 1080px) 100vw, 1080px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/section><section class=\"vc_section vc_custom_1722465710931 vc_section-has-fill\"><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><a href=\"https:\/\/conversys.global\/en\/the-blue-huddle\/\" title=\"Blue Huddle\" class=\"blue-ttl shortcode\">\n            <h4>Learn about other solutions<\/h4>\n            <img decoding=\"async\" src=\"https:\/\/conversys.global\/wp-content\/themes\/conversys\/images\/blue-huddle.svg\" width=\"220\" height=\"50\" alt=\"Blue Huddle\">\n        <\/a><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid justify-content-between align-items-center\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4 class=\"blue\">Phishing, malware, ransomware<\/h4>\n<h2>E-mail protection<\/h2>\n<p>Email protection is crucial to defending your business from a variety of cyber threats, protecting both individual users and organizations from phishing, malware, ransomware and other forms of threats based on the channel that is considered the main gateway to malicious attacks: email.<\/p>\n<ul class=\"check\">\n<li><strong>Malware protection:<\/strong> effective barriers against malicious software.<\/li>\n<li><strong>Protection against Phishings:<\/strong> robust defense against phishing attempts.<\/li>\n<li><strong>Native architecture with Office 365 and GSuite frameworks:<\/strong> native integration with the most popular corporate email platforms.<\/li>\n<li><strong>Artificial Intelligence for Detection:<\/strong> use of AI to identify threats more accurately.<\/li>\n<li><strong>In-line protection:<\/strong> real-time email analysis and filtering during transmission.<\/li>\n<li><strong>Sandboxing:<\/strong> secure execution of suspicious files in an isolated environment for analysis.<\/li>\n<li><strong>URL protection:<\/strong> checking and filtering malicious URLs in emails.<\/li>\n<li><strong>CDR - Disarm and Rebuild Content:<\/strong> technology that removes malicious content from files without altering their functionality.<\/li>\n<li><strong>DLP - Data Loss Prevention:<\/strong> measures to prevent sensitive data being leaked via email.<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-5\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center wpb_content_element\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"1080\" height=\"1080\" src=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/1080-1080-36.png\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"1080-1080 (36)\" srcset=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/1080-1080-36.png 1080w, https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/1080-1080-36-300x300.png 300w, https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/1080-1080-36-1024x1024.png 1024w, https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/1080-1080-36-150x150.png 150w, https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/1080-1080-36-768x768.png 768w\" sizes=\"(max-width: 1080px) 100vw, 1080px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/section><section id=\"cta\" class=\"vc_section\"><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-8\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>Talk to a consultant<\/h4>\n<h2>Let's talk about your business challenges?<\/h2>\n<h4>We find the right solution for your company.<\/h4>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"bt justify-content-end\">\n        <a class=\"color-white outline-false  size-normal\" href=\"https:\/\/conversys.global\/en\/contato\/\" target=\"_self\" title=\"Get in touch\">Get in touch<\/a>\n    <\/div><\/div><\/div><\/div><\/div><\/section>\n<\/div>","protected":false},"featured_media":0,"parent":507,"menu_order":9,"template":"","destaque":[],"class_list":["post-191","solucao","type-solucao","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Endpoint Security - Conversys<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conversys.global\/en\/cybersecurity\/endpoint-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Endpoint Security - Conversys\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conversys.global\/en\/cybersecurity\/endpoint-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Conversys\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-19T22:05:32+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conversys.global\/en\/cybersecurity\/endpoint-security\/\",\"url\":\"https:\/\/conversys.global\/en\/cybersecurity\/endpoint-security\/\",\"name\":\"Endpoint Security - Conversys\",\"isPartOf\":{\"@id\":\"https:\/\/conversys.global\/en\/#website\"},\"datePublished\":\"2024-03-29T21:49:43+00:00\",\"dateModified\":\"2024-09-19T22:05:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conversys.global\/en\/cybersecurity\/endpoint-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conversys.global\/en\/cybersecurity\/endpoint-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conversys.global\/en\/cybersecurity\/endpoint-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conversys.global\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solu\u00e7\u00f5es\",\"item\":\"https:\/\/conversys.global\/solucoes\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\",\"item\":\"https:\/\/conversys.global\/cybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Endpoint Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conversys.global\/en\/#website\",\"url\":\"https:\/\/conversys.global\/en\/\",\"name\":\"Conversys\",\"description\":\"IT Solutions\",\"publisher\":{\"@id\":\"https:\/\/conversys.global\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conversys.global\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/conversys.global\/en\/#organization\",\"name\":\"Conversys\",\"url\":\"https:\/\/conversys.global\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conversys.global\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/conversys.svg\",\"contentUrl\":\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/conversys.svg\",\"width\":219,\"height\":40,\"caption\":\"Conversys\"},\"image\":{\"@id\":\"https:\/\/conversys.global\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Endpoint Security - Conversys","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conversys.global\/en\/cybersecurity\/endpoint-security\/","og_locale":"en_US","og_type":"article","og_title":"Endpoint Security - Conversys","og_url":"https:\/\/conversys.global\/en\/cybersecurity\/endpoint-security\/","og_site_name":"Conversys","article_modified_time":"2024-09-19T22:05:32+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conversys.global\/en\/cybersecurity\/endpoint-security\/","url":"https:\/\/conversys.global\/en\/cybersecurity\/endpoint-security\/","name":"Endpoint Security - Conversys","isPartOf":{"@id":"https:\/\/conversys.global\/en\/#website"},"datePublished":"2024-03-29T21:49:43+00:00","dateModified":"2024-09-19T22:05:32+00:00","breadcrumb":{"@id":"https:\/\/conversys.global\/en\/cybersecurity\/endpoint-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conversys.global\/en\/cybersecurity\/endpoint-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/conversys.global\/en\/cybersecurity\/endpoint-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conversys.global\/"},{"@type":"ListItem","position":2,"name":"Solu\u00e7\u00f5es","item":"https:\/\/conversys.global\/solucoes\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity","item":"https:\/\/conversys.global\/cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Endpoint Security"}]},{"@type":"WebSite","@id":"https:\/\/conversys.global\/en\/#website","url":"https:\/\/conversys.global\/en\/","name":"Conversys","description":"IT Solutions","publisher":{"@id":"https:\/\/conversys.global\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conversys.global\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/conversys.global\/en\/#organization","name":"Conversys","url":"https:\/\/conversys.global\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conversys.global\/en\/#\/schema\/logo\/image\/","url":"https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/conversys.svg","contentUrl":"https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/conversys.svg","width":219,"height":40,"caption":"Conversys"},"image":{"@id":"https:\/\/conversys.global\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/conversys.global\/en\/wp-json\/wp\/v2\/solucao\/191"}],"collection":[{"href":"https:\/\/conversys.global\/en\/wp-json\/wp\/v2\/solucao"}],"about":[{"href":"https:\/\/conversys.global\/en\/wp-json\/wp\/v2\/types\/solucao"}],"up":[{"embeddable":true,"href":"https:\/\/conversys.global\/en\/wp-json\/wp\/v2\/solucao\/507"}],"wp:attachment":[{"href":"https:\/\/conversys.global\/en\/wp-json\/wp\/v2\/media?parent=191"}],"wp:term":[{"taxonomy":"destaque","embeddable":true,"href":"https:\/\/conversys.global\/en\/wp-json\/wp\/v2\/destaque?post=191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}