{"id":56648,"date":"2023-02-20T07:33:45","date_gmt":"2023-02-20T10:33:45","guid":{"rendered":"https:\/\/abes.org.br\/?p=56648"},"modified":"2023-01-25T17:37:20","modified_gmt":"2023-01-25T20:37:20","slug":"gartner-preve-que-10-das-grandes-empresas-terao-programas-de-protecao-zero-trust-ate-2026","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/gartner-preve-que-10-das-grandes-empresas-terao-programas-de-protecao-zero-trust-ate-2026\/","title":{"rendered":"Gartner predicts 10% of large enterprises will have &#039;Zero Trust&#039; protection programs by 2026"},"content":{"rendered":"<p><span class=\"m_592635715137461127xnormaltextrun\"><i>analysts<\/i><\/span><span class=\"m_592635715137461127contentpasted0\"><i>\u00a0<\/i><\/span><span class=\"m_592635715137461127xnormaltextrun\"><i>indicate that it is<\/i><\/span><span class=\"m_592635715137461127contentpasted0\"><i>\u00a0<\/i><\/span><span class=\"m_592635715137461127xnormaltextrun\"><i>necessary to balance<\/i><\/span><span class=\"m_592635715137461127contentpasted0\"><i>\u00a0<\/i><\/span><span class=\"m_592635715137461127xnormaltextrun\"><i>the implementation of the Zero Trust approach with business management and other risk protection actions<\/i><\/span><span class=\"m_592635715137461127xeop\">\u00a0<\/span><\/p>\n<div>\n<p class=\"m_592635715137461127xparagraph\"><span class=\"m_592635715137461127xnormaltextrun\">The adoption of security models&#039;<i>Zero Trust&#039;<\/i>\u00a0is a priority for most organizations<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">that have<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">a strategy to reduce cyber risks and threats, but few<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">companies are<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">getting<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">complete the implementation process.<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">This is one of the insights from the most recent survey by the<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\"><b>Gartner<\/b><\/span><span class=\"m_592635715137461127xnormaltextrun\">, a world leader in business research and advice, which predicts that by 2026, 10% of large companies will have a<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">&#039;<i>Zero Trust&#039;<\/i>\u00a0mature and measurable in force,<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">against only<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">less than 1%<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">that we have<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">at the moment.<\/span><span class=\"m_592635715137461127xeop\">\u00a0<\/span><u><\/u><u><\/u><\/p>\n<\/div>\n<div>\n<p class=\"m_592635715137461127xparagraph\"><span class=\"m_592635715137461127xnormaltextrun\">Gartner defines<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">&#039;<i>Zero Trust&#039;\u00a0<\/i>as a security paradigm that explicitly identifies users and devices,<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">giving them the right amount of access so the business can operate with minimal friction while mitigating risks.<\/span><span class=\"m_592635715137461127xeop\">\u00a0<\/span><u><\/u><u><\/u><\/p>\n<\/div>\n<div>\n<div id=\"attachment_56644\" style=\"width: 238px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-56644\" class=\"wp-image-56644 size-full\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/01\/john-watts.jpg\" alt=\"\" width=\"228\" height=\"232\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/01\/john-watts.jpg 228w, https:\/\/abes.org.br\/wp-content\/uploads\/2023\/01\/john-watts-12x12.jpg 12w\" sizes=\"(max-width: 228px) 100vw, 228px\" \/><p id=\"caption-attachment-56644\" class=\"wp-caption-text\">John Watts, Vice President and Analyst at Gartner<\/p><\/div>\n<p class=\"m_592635715137461127xparagraph\"><span class=\"m_592635715137461127xnormaltextrun\">\u201cMany organizations have established their infrastructure with implicit rather than explicit trust models to facilitate access, work, and operations of<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">collaborators. Attackers abuse this implicit trust in the infrastructure to<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">proliferate<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">the spread of<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\"><i>malware<\/i><\/span><span class=\"m_592635715137461127xnormaltextrun\">\u00a0and then achieve your goals.\u201d<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">affirms<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">John Watts<\/span><span class=\"m_592635715137461127xnormaltextrun\">,<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">Vice President and Analyst at Gartner. &quot;O<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\"><i>Zero Trust<\/i><\/span><span class=\"m_592635715137461127xnormaltextrun\">\u00a0It is a shift in thinking to address these threats, requiring continually assessed, explicitly calculated and adaptive trust across users, devices and resources.\u201d<\/span><span class=\"m_592635715137461127xeop\">\u00a0<\/span><u><\/u><u><\/u><\/p>\n<\/div>\n<div>\n<p class=\"m_592635715137461127xparagraph\"><span class=\"m_592635715137461127xnormaltextrun\">to help the<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">companies<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">to complete the scope of their implementations of<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\"><i>Zero Trust<\/i><\/span><span class=\"m_592635715137461127xnormaltextrun\">, it is essential that the\u00a0<\/span><a href=\"https:\/\/www.gartner.com\/en\/publications\/ciso-effectiveness?utm_medium=press-release&amp;utm_campaign=RM_GB_YOY_ITSEC_NPP_PR1_4HABITSCISOEFFECTIVE&amp;utm_term=ebook\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/nam12.safelinks.protection.outlook.com\/?url%3Dhttps%253A%252F%252Fwww.gartner.com%252Fen%252Fpublications%252Fciso-effectiveness%253Futm_medium%253Dpress-release%2526utm_campaign%253DRM_GB_YOY_ITSEC_NPP_PR1_4HABITSCISOEFFECTIVE%2526utm_term%253Debook%26data%3D05%257C01%257C%257C564f1eba2dd8490f326b08dafe3bac4b%257C84df9e7fe9f640afb435aaaaaaaaaaaa%257C1%257C0%257C638101829513365236%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%257C%257C%257C%26sdata%3DPA5cnm8FpQCMtLj1iyn0mAcYhHWY1RQr6iDDGVQI3%252Fc%253D%26reserved%3D0&amp;source=gmail&amp;ust=1674765160436000&amp;usg=AOvVaw3wtMFuBhjK3jhy_wXi61Hh\"><span class=\"m_592635715137461127xnormaltextrun\">CISOs<i>\u00a0<\/i>(<i>Chief Information Security Officer<\/i>)<\/span><\/a><span class=\"m_592635715137461127xnormaltextrun\"><i>\u00a0<\/i><\/span><span class=\"m_592635715137461127xnormaltextrun\">and risk management leaders start by developing an effective strategy that balances the need for security with the<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">business administration.<\/span><span class=\"m_592635715137461127xeop\">\u00a0<\/span><u><\/u><u><\/u><\/p>\n<\/div>\n<div>\n<p class=\"m_592635715137461127xparagraph\"><span class=\"m_592635715137461127xnormaltextrun\">&quot;This means<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">start with an organization&#039;s strategy and define a scope for<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\"><i>Zero Trust<\/i><\/span><span class=\"m_592635715137461127xnormaltextrun\">\u201d,<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">it says<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">Watts.<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">According to the Gartner analyst, after defining the strategy, the<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">executives responsible for cybersecurity and risk management leaders must begin<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">managing<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">identity, as this is a factor<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">fundamental to<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">the application of<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">&#039;<i>Zero Trust&#039;<\/i>. They also need to improve not only the technology but also<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">support the development of<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">people and<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">processes for building and managing these identities. &quot;No<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">if<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">must presume that<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">O<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">&#039;<i>Zero Trust&#039;<\/i>\u00a0will eliminate<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">all<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">cyber threats.<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">Instead, it decreases<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">the risk and limits the impacts of a<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">eventual<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">attack.&quot;<\/span><span class=\"m_592635715137461127xeop\">\u00a0<\/span><u><\/u><u><\/u><\/p>\n<\/div>\n<div>\n<div id=\"attachment_56645\" style=\"width: 233px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-56645\" class=\"wp-image-56645 size-full\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/01\/jeremy-dhoine.jpg\" alt=\"\" width=\"223\" height=\"231\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/01\/jeremy-dhoine.jpg 223w, https:\/\/abes.org.br\/wp-content\/uploads\/2023\/01\/jeremy-dhoine-12x12.jpg 12w\" sizes=\"(max-width: 223px) 100vw, 223px\" \/><p id=\"caption-attachment-56645\" class=\"wp-caption-text\">Jeremy D&#039;Hoinne, Vice President of Gartner<\/p><\/div>\n<p class=\"m_592635715137461127xparagraph\"><span class=\"m_592635715137461127xnormaltextrun\">The Gartner Analysts<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">estimate that by 2026, more than half of cyberattacks will target areas<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">in which the controls<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">&#039;<i>Zero Trust&#039;<\/i>\u00a0do not cover<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">or what not<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">manage to protect. \u201cThe enterprise attack surface is expanding more rapidly and attackers will quickly consider targeting<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">you<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">assets and<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">to the<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">vulnerabilities outside the scope of architectures<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\"><i>Zero Trust<\/i><\/span><span class=\"m_592635715137461127xnormaltextrun\">\u00a0(ZTAs)\u201d,<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">affirms\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">Jeremy D&#039;Hoinne<\/span><span class=\"m_592635715137461127xnormaltextrun\">,<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">Vice president<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">from Gartner.<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">For the analyst, this can take the form of scanning and exploiting APIs (communication mechanisms between<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">software components)<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">aimed at the public or directed at<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">collaborators<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">through social engineering, intimidation, or exploiting faults due to employees creating their own<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">&#039;diversion&#039; to avoid strict policies of<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">&#039;<i>Zero Trust&#039;<\/i>.<\/span><span class=\"m_592635715137461127xeop\">\u00a0<\/span><u><\/u><u><\/u><\/p>\n<\/div>\n<div>\n<p class=\"m_592635715137461127xparagraph\"><span class=\"m_592635715137461127xnormaltextrun\">Gartner recommends that organizations implement<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">O &#039;<i>Zero Trust&#039;<\/i>\u00a0for<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">mitigate<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">risks to the most critical assets,<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">since the return will be greater that way. However, the &#039;<i>Zero Trust&#039;<\/i>\u00a0does not solve all security needs.<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2022-06-07-gartner-highlights-three-ways-security-leaders-can-prepare-for-the-evolution-of-cybersecurity-strategy-roles-and-technology\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/nam12.safelinks.protection.outlook.com\/?url%3Dhttps%253A%252F%252Fwww.gartner.com%252Fen%252Fnewsroom%252Fpress-releases%252F2022-06-07-gartner-highlights-three-ways-security-leaders-can-prepare-for-the-evolution-of-cybersecurity-strategy-roles-and-technology%26data%3D05%257C01%257C%257C564f1eba2dd8490f326b08dafe3bac4b%257C84df9e7fe9f640afb435aaaaaaaaaaaa%257C1%257C0%257C638101829513365236%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%257C%257C%257C%26sdata%3DdyLqmdr8WSwPVATGr9GJ4xGbq75NBX5N39buHYU%252FGqA%253D%26reserved%3D0&amp;source=gmail&amp;ust=1674765160437000&amp;usg=AOvVaw1NP7Tm7QkCaN2uTfagl1do\"><span class=\"m_592635715137461127xnormaltextrun\">Cybersecurity executives and risk management leaders<\/span><\/a><span class=\"m_592635715137461127xnormaltextrun\">\u00a0must also run a<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">ongoing exposure management<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">Threats (STEM \u2014 from<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\"><i>Continuous Threat Exposure Management<\/i><\/span><span class=\"m_592635715137461127xnormaltextrun\">, in English) for better<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">control the structure<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">and<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">get<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">optimize<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">exposure to threats<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">that go beyond<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">of the scope<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">of the architectures of<\/span><span class=\"m_592635715137461127contentpasted0\">\u00a0<\/span><span class=\"m_592635715137461127xnormaltextrun\">&#039;<i>Zero Trust&#039;<\/i>.<\/span><span class=\"m_592635715137461127xeop\">\u00a0<\/span><\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Analistas\u00a0indicam que \u00e9\u00a0necess\u00e1rio\u00a0equilibrar\u00a0a\u00a0implementa\u00e7\u00e3o\u00a0da abordagem de\u00a0Zero Trust com a gest\u00e3o dos neg\u00f3cios\u00a0e outras a\u00e7\u00f5es de prote\u00e7\u00e3o contra riscos\u00a0 A\u00a0ado\u00e7\u00e3o de modelos de seguran\u00e7a\u00a0\u2018Zero Trust\u2019\u00a0\u00e9 uma prioridade para a maioria das organiza\u00e7\u00f5es\u00a0que possuem\u00a0uma estrat\u00e9gia para reduzir riscos\u00a0e\u00a0amea\u00e7as cibern\u00e9ticas, mas poucas\u00a0companhias est\u00e3o\u00a0conseguindo\u00a0concluir\u00a0o processo de implementa\u00e7\u00e3o.\u00a0Esse \u00e9 um dos insights da mais recente pesquisa do\u00a0Gartner, l\u00edder mundial em pesquisa [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[200,3663,270,1061],"class_list":["post-56648","post","type-post","status-publish","format-standard","hentry","category-coluna-4","category-ultimas-noticias","tag-arquitetura-digital","tag-exploracao-de-apis","tag-seguranca-cibernetica","tag-zero-trust"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Gartner prev\u00ea que 10% das grandes empresas ter\u00e3o programas de prote\u00e7\u00e3o \u2018Zero Trust\u2019 at\u00e9 2026 - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/gartner-preve-que-10-das-grandes-empresas-terao-programas-de-protecao-zero-trust-ate-2026\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gartner prev\u00ea que 10% das grandes empresas ter\u00e3o programas de prote\u00e7\u00e3o \u2018Zero Trust\u2019 at\u00e9 2026 - ABES\" \/>\n<meta property=\"og:description\" content=\"Analistas\u00a0indicam que \u00e9\u00a0necess\u00e1rio\u00a0equilibrar\u00a0a\u00a0implementa\u00e7\u00e3o\u00a0da abordagem de\u00a0Zero Trust com a gest\u00e3o dos neg\u00f3cios\u00a0e outras a\u00e7\u00f5es de prote\u00e7\u00e3o contra riscos\u00a0 A\u00a0ado\u00e7\u00e3o de modelos de seguran\u00e7a\u00a0\u2018Zero Trust\u2019\u00a0\u00e9 uma prioridade para a maioria das organiza\u00e7\u00f5es\u00a0que possuem\u00a0uma estrat\u00e9gia para reduzir riscos\u00a0e\u00a0amea\u00e7as cibern\u00e9ticas, mas poucas\u00a0companhias est\u00e3o\u00a0conseguindo\u00a0concluir\u00a0o processo de implementa\u00e7\u00e3o.\u00a0Esse \u00e9 um dos insights da mais recente pesquisa do\u00a0Gartner, l\u00edder mundial em pesquisa [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/gartner-preve-que-10-das-grandes-empresas-terao-programas-de-protecao-zero-trust-ate-2026\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-20T10:33:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/01\/john-watts.jpg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/gartner-preve-que-10-das-grandes-empresas-terao-programas-de-protecao-zero-trust-ate-2026\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/gartner-preve-que-10-das-grandes-empresas-terao-programas-de-protecao-zero-trust-ate-2026\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\"},\"headline\":\"Gartner prev\u00ea que 10% das grandes empresas ter\u00e3o programas de prote\u00e7\u00e3o \u2018Zero Trust\u2019 at\u00e9 2026\",\"datePublished\":\"2023-02-20T10:33:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/gartner-preve-que-10-das-grandes-empresas-terao-programas-de-protecao-zero-trust-ate-2026\\\/\"},\"wordCount\":714,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/gartner-preve-que-10-das-grandes-empresas-terao-programas-de-protecao-zero-trust-ate-2026\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/john-watts.jpg\",\"keywords\":[\"arquitetura digital\",\"explora\u00e7\u00e3o de APIs\",\"seguran\u00e7a cibern\u00e9tica\",\"Zero Trust\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/gartner-preve-que-10-das-grandes-empresas-terao-programas-de-protecao-zero-trust-ate-2026\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/gartner-preve-que-10-das-grandes-empresas-terao-programas-de-protecao-zero-trust-ate-2026\\\/\",\"name\":\"Gartner prev\u00ea que 10% das grandes empresas ter\u00e3o programas de prote\u00e7\u00e3o \u2018Zero Trust\u2019 at\u00e9 2026 - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/gartner-preve-que-10-das-grandes-empresas-terao-programas-de-protecao-zero-trust-ate-2026\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/gartner-preve-que-10-das-grandes-empresas-terao-programas-de-protecao-zero-trust-ate-2026\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/john-watts.jpg\",\"datePublished\":\"2023-02-20T10:33:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/gartner-preve-que-10-das-grandes-empresas-terao-programas-de-protecao-zero-trust-ate-2026\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/gartner-preve-que-10-das-grandes-empresas-terao-programas-de-protecao-zero-trust-ate-2026\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/gartner-preve-que-10-das-grandes-empresas-terao-programas-de-protecao-zero-trust-ate-2026\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/john-watts.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/john-watts.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/gartner-preve-que-10-das-grandes-empresas-terao-programas-de-protecao-zero-trust-ate-2026\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gartner prev\u00ea que 10% das grandes empresas ter\u00e3o programas de prote\u00e7\u00e3o \u2018Zero Trust\u2019 at\u00e9 2026\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Gartner predicts that 101% of large companies will have &#039;Zero Trust&#039; protection programs by 2026 - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/gartner-preve-que-10-das-grandes-empresas-terao-programas-de-protecao-zero-trust-ate-2026\/","og_locale":"en_US","og_type":"article","og_title":"Gartner prev\u00ea que 10% das grandes empresas ter\u00e3o programas de prote\u00e7\u00e3o \u2018Zero Trust\u2019 at\u00e9 2026 - ABES","og_description":"Analistas\u00a0indicam que \u00e9\u00a0necess\u00e1rio\u00a0equilibrar\u00a0a\u00a0implementa\u00e7\u00e3o\u00a0da abordagem de\u00a0Zero Trust com a gest\u00e3o dos neg\u00f3cios\u00a0e outras a\u00e7\u00f5es de prote\u00e7\u00e3o contra riscos\u00a0 A\u00a0ado\u00e7\u00e3o de modelos de seguran\u00e7a\u00a0\u2018Zero Trust\u2019\u00a0\u00e9 uma prioridade para a maioria das organiza\u00e7\u00f5es\u00a0que possuem\u00a0uma estrat\u00e9gia para reduzir riscos\u00a0e\u00a0amea\u00e7as cibern\u00e9ticas, mas poucas\u00a0companhias est\u00e3o\u00a0conseguindo\u00a0concluir\u00a0o processo de implementa\u00e7\u00e3o.\u00a0Esse \u00e9 um dos insights da mais recente pesquisa do\u00a0Gartner, l\u00edder mundial em pesquisa [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/gartner-preve-que-10-das-grandes-empresas-terao-programas-de-protecao-zero-trust-ate-2026\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2023-02-20T10:33:45+00:00","og_image":[{"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/01\/john-watts.jpg","type":"","width":"","height":""}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/gartner-preve-que-10-das-grandes-empresas-terao-programas-de-protecao-zero-trust-ate-2026\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/gartner-preve-que-10-das-grandes-empresas-terao-programas-de-protecao-zero-trust-ate-2026\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3"},"headline":"Gartner prev\u00ea que 10% das grandes empresas ter\u00e3o programas de prote\u00e7\u00e3o \u2018Zero Trust\u2019 at\u00e9 2026","datePublished":"2023-02-20T10:33:45+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/gartner-preve-que-10-das-grandes-empresas-terao-programas-de-protecao-zero-trust-ate-2026\/"},"wordCount":714,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/gartner-preve-que-10-das-grandes-empresas-terao-programas-de-protecao-zero-trust-ate-2026\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/01\/john-watts.jpg","keywords":["arquitetura digital","explora\u00e7\u00e3o de APIs","seguran\u00e7a cibern\u00e9tica","Zero Trust"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/gartner-preve-que-10-das-grandes-empresas-terao-programas-de-protecao-zero-trust-ate-2026\/","url":"https:\/\/abes.org.br\/gartner-preve-que-10-das-grandes-empresas-terao-programas-de-protecao-zero-trust-ate-2026\/","name":"Gartner predicts that 101% of large companies will have &#039;Zero Trust&#039; protection programs by 2026 - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/gartner-preve-que-10-das-grandes-empresas-terao-programas-de-protecao-zero-trust-ate-2026\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/gartner-preve-que-10-das-grandes-empresas-terao-programas-de-protecao-zero-trust-ate-2026\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/01\/john-watts.jpg","datePublished":"2023-02-20T10:33:45+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/gartner-preve-que-10-das-grandes-empresas-terao-programas-de-protecao-zero-trust-ate-2026\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/gartner-preve-que-10-das-grandes-empresas-terao-programas-de-protecao-zero-trust-ate-2026\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/gartner-preve-que-10-das-grandes-empresas-terao-programas-de-protecao-zero-trust-ate-2026\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/01\/john-watts.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2023\/01\/john-watts.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/gartner-preve-que-10-das-grandes-empresas-terao-programas-de-protecao-zero-trust-ate-2026\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Gartner prev\u00ea que 10% das grandes empresas ter\u00e3o programas de prote\u00e7\u00e3o \u2018Zero Trust\u2019 at\u00e9 2026"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-19 02:36:46","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/56648","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=56648"}],"version-history":[{"count":1,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/56648\/revisions"}],"predecessor-version":[{"id":56649,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/56648\/revisions\/56649"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=56648"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=56648"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=56648"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}