{"id":75330,"date":"2024-05-28T13:32:32","date_gmt":"2024-05-28T16:32:32","guid":{"rendered":"https:\/\/abes.org.br\/?p=75330"},"modified":"2024-05-27T21:39:54","modified_gmt":"2024-05-28T00:39:54","slug":"clm-turbina-a-seguranca-de-identidade-com-ia","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/clm-turbina-a-seguranca-de-identidade-com-ia\/","title":{"rendered":"CLM supercharges identity security with AI"},"content":{"rendered":"<p style=\"text-align: center;\"><em>With the acquisition of Fastpath eAuthomize, Delinea integrates solutions for identity governance and administration (IGA) and cloud threat elimination<\/em><\/p>\n<p style=\"font-weight: 400;\">The proliferation of infrastructure-as-a-service (IaaS) and software-as-a-service (SaaS) applications generates an absurd amount of data and identities, which exponentially increases uncontrolled interactions. And it drastically expands the cybersecurity challenge that, in addition to protecting infrastructure, also needs to manage, monitor and safeguard interactions between human and machine identities.<\/p>\n<p style=\"font-weight: 400;\">In this scenario, CLM, a Latin American value-added distributor focused on information security, data protection, cloud and infrastructure for data centers, reinforces its portfolio with solutions for identity management and administration (IGA) and for detection and elimination of identity-based threats in the cloud, brought by its partner Delinea, with the recent acquisition of the companies Fastpath and Automize.<\/p>\n<p style=\"font-weight: 400;\">Fastpath is a leader in Identity Governance and Administration (IGA) and identity access rights, and Authomize specializes in detecting and eliminating identity-based threats in the cloud.<\/p>\n<p style=\"font-weight: 400;\">These acquisitions mark a significant expansion in Delinea&#039;s capabilities, which is already a leader (Gartner) in solutions that expand privileged access management (PAM), by integrating dynamic controls and governance, based on Artificial Intelligence, into access authorizations.<\/p>\n<div id=\"attachment_75331\" style=\"width: 205px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-75331\" class=\"wp-image-75331\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/05\/Marcela-Bote-cLM.jpg\" alt=\"\" width=\"195\" height=\"236\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/05\/Marcela-Bote-cLM.jpg 412w, https:\/\/abes.org.br\/wp-content\/uploads\/2024\/05\/Marcela-Bote-cLM-247x300.jpg 247w, https:\/\/abes.org.br\/wp-content\/uploads\/2024\/05\/Marcela-Bote-cLM-10x12.jpg 10w\" sizes=\"(max-width: 195px) 100vw, 195px\" \/><p id=\"caption-attachment-75331\" class=\"wp-caption-text\">Marcella Botte, Delinea product manager at CLM<\/p><\/div>\n<p>\u201cFastpath\u2019s capabilities reduce cyber risks and ensure compliance by extending the reach of Delinea\u2019s least privilege to applications with the provisioning of user accounts and access rights to applications and data,\u201d explains Marcella Botte, Delinea product manager at CLM .<\/p>\n<p style=\"font-weight: 400;\">Now, Delinea&#039;s robust security and privileged user access control platform also manages authorizations, centrally and AI-driven, and applies least privilege to infrastructure, applications and data, assessing user risk.<\/p>\n<p style=\"font-weight: 400;\">For CLM, the integration of IGA and PAM technologies in the cloud ushers in a new era, redefining identity security and establishing pioneering standards for Privileged Access Management, in an increasingly digital and interconnected world, where cybersecurity challenges only arise expand.<\/p>\n<p style=\"font-weight: 400;\">\u201cThe Delinea platform, built on a deep understanding of context, privilege, human and machine identities, and the data those identities seek to engage with, ushers in an advanced and necessary approach to securing modern, distributed environments across infrastructure, applications and data. Delinea is redefining the identity security landscape by providing unparalleled insights and control over user access and privileges,\u201d concludes Marcella.<\/p>","protected":false},"excerpt":{"rendered":"<p>Com a aquisi\u00e7\u00e3o da Fastpath eAuthomize, Delinea integra solu\u00e7\u00f5es para governan\u00e7a e administra\u00e7\u00e3o de identidade (IGA) e elimina\u00e7\u00e3o de amea\u00e7as em nuvem A prolifera\u00e7\u00e3o de aplicativos de infraestrutura como servi\u00e7o (IaaS) e software como servi\u00e7o (SaaS) gera uma quantidade absurda de dados e de identidades, o que aumenta exponencialmente as intera\u00e7\u00f5es n\u00e3o controladas. E amplia [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":75332,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[108,5575],"class_list":["post-75330","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coluna-4","category-ultimas-noticias","tag-ciberseguranca","tag-solucoes-para-governanca"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CLM turbina a seguran\u00e7a de identidade com IA - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/clm-turbina-a-seguranca-de-identidade-com-ia\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CLM turbina a seguran\u00e7a de identidade com IA - ABES\" \/>\n<meta property=\"og:description\" content=\"Com a aquisi\u00e7\u00e3o da Fastpath eAuthomize, Delinea integra solu\u00e7\u00f5es para governan\u00e7a e administra\u00e7\u00e3o de identidade (IGA) e elimina\u00e7\u00e3o de amea\u00e7as em nuvem A prolifera\u00e7\u00e3o de aplicativos de infraestrutura como servi\u00e7o (IaaS) e software como servi\u00e7o (SaaS) gera uma quantidade absurda de dados e de identidades, o que aumenta exponencialmente as intera\u00e7\u00f5es n\u00e3o controladas. E amplia [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/clm-turbina-a-seguranca-de-identidade-com-ia\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-28T16:32:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/05\/Marcela-Bote-CLM-corte.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"892\" \/>\n\t<meta property=\"og:image:height\" content=\"504\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/clm-turbina-a-seguranca-de-identidade-com-ia\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/clm-turbina-a-seguranca-de-identidade-com-ia\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\"},\"headline\":\"CLM turbina a seguran\u00e7a de identidade com IA\",\"datePublished\":\"2024-05-28T16:32:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/clm-turbina-a-seguranca-de-identidade-com-ia\\\/\"},\"wordCount\":513,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/clm-turbina-a-seguranca-de-identidade-com-ia\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Marcela-Bote-CLM-corte.jpg\",\"keywords\":[\"ciberseguran\u00e7a\",\"solu\u00e7\u00f5es para governan\u00e7a\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/clm-turbina-a-seguranca-de-identidade-com-ia\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/clm-turbina-a-seguranca-de-identidade-com-ia\\\/\",\"name\":\"CLM turbina a seguran\u00e7a de identidade com IA - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/clm-turbina-a-seguranca-de-identidade-com-ia\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/clm-turbina-a-seguranca-de-identidade-com-ia\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Marcela-Bote-CLM-corte.jpg\",\"datePublished\":\"2024-05-28T16:32:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/clm-turbina-a-seguranca-de-identidade-com-ia\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/clm-turbina-a-seguranca-de-identidade-com-ia\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/clm-turbina-a-seguranca-de-identidade-com-ia\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Marcela-Bote-CLM-corte.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Marcela-Bote-CLM-corte.jpg\",\"width\":892,\"height\":504},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/clm-turbina-a-seguranca-de-identidade-com-ia\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CLM turbina a seguran\u00e7a de identidade com IA\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CLM turbina a seguran\u00e7a de identidade com IA - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/clm-turbina-a-seguranca-de-identidade-com-ia\/","og_locale":"en_US","og_type":"article","og_title":"CLM turbina a seguran\u00e7a de identidade com IA - ABES","og_description":"Com a aquisi\u00e7\u00e3o da Fastpath eAuthomize, Delinea integra solu\u00e7\u00f5es para governan\u00e7a e administra\u00e7\u00e3o de identidade (IGA) e elimina\u00e7\u00e3o de amea\u00e7as em nuvem A prolifera\u00e7\u00e3o de aplicativos de infraestrutura como servi\u00e7o (IaaS) e software como servi\u00e7o (SaaS) gera uma quantidade absurda de dados e de identidades, o que aumenta exponencialmente as intera\u00e7\u00f5es n\u00e3o controladas. E amplia [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/clm-turbina-a-seguranca-de-identidade-com-ia\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2024-05-28T16:32:32+00:00","og_image":[{"width":892,"height":504,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/05\/Marcela-Bote-CLM-corte.jpg","type":"image\/jpeg"}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/clm-turbina-a-seguranca-de-identidade-com-ia\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/clm-turbina-a-seguranca-de-identidade-com-ia\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3"},"headline":"CLM turbina a seguran\u00e7a de identidade com IA","datePublished":"2024-05-28T16:32:32+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/clm-turbina-a-seguranca-de-identidade-com-ia\/"},"wordCount":513,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/clm-turbina-a-seguranca-de-identidade-com-ia\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/05\/Marcela-Bote-CLM-corte.jpg","keywords":["ciberseguran\u00e7a","solu\u00e7\u00f5es para governan\u00e7a"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/clm-turbina-a-seguranca-de-identidade-com-ia\/","url":"https:\/\/abes.org.br\/clm-turbina-a-seguranca-de-identidade-com-ia\/","name":"CLM turbina a seguran\u00e7a de identidade com IA - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/clm-turbina-a-seguranca-de-identidade-com-ia\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/clm-turbina-a-seguranca-de-identidade-com-ia\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/05\/Marcela-Bote-CLM-corte.jpg","datePublished":"2024-05-28T16:32:32+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/clm-turbina-a-seguranca-de-identidade-com-ia\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/clm-turbina-a-seguranca-de-identidade-com-ia\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/clm-turbina-a-seguranca-de-identidade-com-ia\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/05\/Marcela-Bote-CLM-corte.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/05\/Marcela-Bote-CLM-corte.jpg","width":892,"height":504},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/clm-turbina-a-seguranca-de-identidade-com-ia\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"CLM turbina a seguran\u00e7a de identidade com IA"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-13 12:10:51","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/75330","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=75330"}],"version-history":[{"count":1,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/75330\/revisions"}],"predecessor-version":[{"id":75333,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/75330\/revisions\/75333"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media\/75332"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=75330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=75330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=75330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}