{"id":18372,"date":"2021-05-18T17:18:58","date_gmt":"2021-05-18T16:18:58","guid":{"rendered":"https:\/\/www.n-able.com\/?p=18372"},"modified":"2025-01-31T12:54:23","modified_gmt":"2025-01-31T12:54:23","slug":"endpoint-security-for-business-solutions","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/pt-br\/blog\/endpoint-security-for-business-solutions","title":{"rendered":"Endpoint security for business: the top 4 solutions to implement"},"content":{"rendered":"<p class=\"p1\">Endpoints without strong security can carry major vulnerabilities to your infrastructure, which is why it\u2019s crucial to implement strong endpoint security for businesses. With the right tools\u2014including endpoint detection and response (EDR) solutions, centrally <a href=\"https:\/\/www.n-able.com\/blog\/using-managed-antivirus-solutions-your-msp\" target=\"_blank\" rel=\"noopener\">managed antivirus<\/a>, and web filtering software for business\u2014a managed services provider (MSP) can offer strong security for their customers.<\/p>\n<h2 class=\"p1\">What are endpoints?<\/h2>\n<p class=\"p1\">Endpoints are any device used to gain access to computing resources, like back-end applications and files being stored on corporate networks. These can include your corporate laptop or a personal iPad you occasionally use to access the enterprise network. Even your smartphone, smartwatch, and virtual assistant can be endpoints, and each one presents potential security risks.<\/p>\n<p class=\"p1\">Endpoint security has become even more of a hot-button topic as internet of things (IoT) devices increasingly make their way onto business networks. IoT describes a network of objects that connect and exchange data with each other and other systems over the Internet via software, sensors, and other such technologies. For example, a manufacturing warehouse might make use of a network of sensors to gauge temperature, humidity, and other environmental factors in various areas of the warehouse to maintain the optimal manufacturing environment.<\/p>\n<p class=\"p1\">While these IoT devices add convenience and accuracy, each device could potentially be exploited by a bad actor. And because IoT setups tend to deploy so many sensors, the trend has introduced an exponentially growing number of risks.<\/p>\n<h2 class=\"p1\">Why is endpoint security for business important?<\/h2>\n<p class=\"p1\">Endpoint devices are prime targets for cybercriminals because they can provide a gateway into your managed networks and systems if left unprotected.<\/p>\n<p class=\"p1\">As mentioned previously, each endpoint device represents an individual source of risk that can be used to exploit and compromise your network. If, for example, a cybercriminal manages to install malware on a laptop, this can give the hacker direct access to your company\u2019s accounts. The hacker could then continue on to infiltrate your remaining infrastructure.<\/p>\n<p class=\"p1\">As the number of endpoints continues to multiply, it\u2019s becoming even clearer that endpoint security is crucial in any company\u2019s larger cybersecurity efforts\u2014after all, the network can only be as strong as its most vulnerable elements.<\/p>\n<h2 class=\"p1\">The best endpoint security and EDR solutions for MSPs<\/h2>\n<p class=\"p1\">Endpoint security can be strengthened with a variety of solutions, including EDR, web filtering software for business, or centrally managed antivirus.<b> <\/b>To strengthen your MSP\u2019s endpoint security strategy, consider the following solutions.<\/p>\n<h3>1. Endpoint detection and response (EDR) solutions<\/h3>\n<p class=\"p1\"><a href=\"https:\/\/www.n-able.com\/features\/edr-solutions?promo=blog\" target=\"_blank\" rel=\"noopener\">EDR solutions<\/a> can monitor endpoint system events and activities, giving your team the visibility necessary to uncover problems or threats that would otherwise go unnoticed. These solutions help you stay ahead of threats across your customer networks, with real-time endpoint file analysis and monitoring to identify threats and determine if action is necessary. Plus, they can help with fileless attacks as well.<\/p>\n<p class=\"p1\">EDR solutions are even more effective when they\u2019re integrated\u2014which is why N&#8209;able RMM and N&#8209;central allow you to stay ahead of threats without leaving your all-in-one dashboard. RMM and N&#8209;central are powerful remote monitoring and management tools that include enterprise-grade EDR capabilities to help you prevent attacks and respond to threats. Features of the integrated EDR solution within these two platforms include offline protection, enhanced quarantine, automated rollback, and behavioral AI engines and machine learning.<\/p>\n<h3>2. Centrally managed antivirus<\/h3>\n<p class=\"p1\">Some customers may prefer to stick with antivirus instead of opting for full EDR solutions. While AV does offer lesser protection than EDR, good AV solutions can still offer a mix of value and protection. Some customers may use AV across the board to keep costs down, or may take a risk-based approach by using AV for most employees and EDR for higher-risk employees.<\/p>\n<p class=\"p1\">For customers opting for antivirus, it helps to centrally manage AV across your customer base from one dashboard. A good managed antivirus solution allows you to configure the protection you need for before, during, and after a cyberattack. Tools like RMM and N&#8209;central use up-to-date virus definitions for signature-based scans that allow you to protect against existing malware threats, as well as rule-based and behavioral scans to look for anything suspicious that might indicate an emerging or otherwise unknown threat.<\/p>\n<h3>3. Password management<\/h3>\n<p class=\"p1\">When it comes to accessing your endpoint devices, proper password management is often your first line of defense against unauthorized individuals. Strong, unique passwords that are stored securely can help deter and prevent cyberattackers\u2014and a robust password management solution makes implementing and managing strong passwords easy.<\/p>\n<p class=\"p1\"><a href=\"https:\/\/www.passportalmsp.com\/password-management?promo=blog\" target=\"_blank\" rel=\"noopener\">N&#8209;able Passportal<\/a>\u00a0is a powerful password management system that utilizes an <a href=\"https:\/\/www.passportalmsp.com\/use-cases\/enterprise-password-vault?promo=blog\" target=\"_blank\" rel=\"noopener\">encrypted vault<\/a>\u00a0controlled by role-based permissions and multifactor authentication for optimal security. This tool also helps your team and customers, via the Passportal Site add-on, generate complex passwords that get stored in a centralized location. For maximum efficiency, Passportal can also be integrated with RMM or N&#8209;central to deliver a powerful, all-in-one endpoint security solution.<\/p>\n<h3>4. Email protection<\/h3>\n<p class=\"p1\">Email protection is a crucial part of endpoint security because poor email security can make your endpoints vulnerable to attack. Email represents one of the main ways that data traffic enters and exits your network. As such, cybercriminals regularly exploit email to conceal and deliver their cyberattacks. Research has shown that cybercriminals may even be using email to deliver malware in up to <a href=\"https:\/\/digitalguardian.com\/blog\/91-percent-cyber-attacks-start-phishing-email-heres-how-protect-against-phishing\" target=\"_blank\" rel=\"noopener\">90% of cyberattacks<\/a>. <a href=\"https:\/\/www.n-able.com\/blog\/7-things-look-when-choosing-email-security-solution\" target=\"_blank\" rel=\"noopener\">Secure email<\/a>\u00a0gateways are able to monitor incoming and outgoing emails for suspicious activity, blocking potentially malicious emails from being received or delivered.<\/p>\n<p class=\"p1\"><a href=\"https:\/\/www.n-able.com\/products\/mail-assure?promo=blog\" target=\"_blank\" rel=\"noopener\">N&#8209;able Mail Assure<\/a>\u00a0is a highly sophisticated email protection solution that uses collective threat intelligence to filter emails with 99.999% accuracy. The proprietary filtering technology helps you protect your customers from email spoofing, phishing, spam, impersonation, social engineering attacks, and other email-borne threats. With 24\/7 email continuity, you can help prevent customer downtime and decreased productivity with a web-based console that remains available even in the event of an outage.<\/p>\n<h2 class=\"p1\">Getting started with endpoint security for business<\/h2>\n<p class=\"p1\">Endpoint security is critical for protecting your customers\u2019 networks from cybercriminals. N&#8209;central covers a range of aspects of endpoint security, including EDR, <a href=\"https:\/\/www.n-able.com\/features\/web-filtering-software?promo=blog\" target=\"_blank\" rel=\"noopener\">web filtering software for business<\/a>, centrally managed antivirus, mobile device management, access control, network filtering, password management, and more. This solution is ideal for MSPs that deal with complex infrastructure, providing a user-friendly and fully centralized platform that makes safeguarding your endpoints easy. For MSPs interested in learning more, a <a href=\"https:\/\/www.passportalmsp.com\/password-management?promo=blog\" target=\"_blank\" rel=\"noopener\">30-day free trial<\/a>\u00a0is available.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Endpoints can bring serious vulnerabilities to a network\u2014find out which EDR solutions your MSP should implement to protect them.\u00a0<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-18372","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Endpoint security for business: 4 solutions | N-able<\/title>\n<meta name=\"description\" content=\"Find out how important endpoint security is for businesses and discover the best EDR solution for your MSP.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/pt-br\/blog\/endpoint-security-for-business-solutions\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Endpoint security for business: 4 solutions | N-able\" \/>\n<meta property=\"og:description\" content=\"Find out how important endpoint security is for businesses and discover the best EDR solution for your MSP.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/pt-br\/blog\/endpoint-security-for-business-solutions\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-18T16:18:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-31T12:54:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/05\/Endpoint-Security-for-Business-The-Top-5-Solutions-To-Implement.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/05\/Endpoint-Security-for-Business-The-Top-5-Solutions-To-Implement.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/endpoint-security-for-business-solutions#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/endpoint-security-for-business-solutions\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Endpoint security for business: the top 4 solutions to implement\",\"datePublished\":\"2021-05-18T17:18:58+01:00\",\"dateModified\":\"2025-01-31T12:54:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/endpoint-security-for-business-solutions\"},\"wordCount\":1061,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/endpoint-security-for-business-solutions\",\"url\":\"https:\/\/www.n-able.com\/pt-br\/blog\/endpoint-security-for-business-solutions\",\"name\":\"Endpoint security for business: 4 solutions | N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\"},\"datePublished\":\"2021-05-18T17:18:58+01:00\",\"dateModified\":\"2025-01-31T12:54:23+00:00\",\"description\":\"Find out how important endpoint security is for businesses and discover the best EDR solution for your MSP.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/endpoint-security-for-business-solutions#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/pt-br\/blog\/endpoint-security-for-business-solutions\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/endpoint-security-for-business-solutions#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Endpoint security for business: the top 4 solutions to implement\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/pt-br?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Endpoint security for business: 4 solutions | N-able","description":"Find out how important endpoint security is for businesses and discover the best EDR solution for your MSP.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/pt-br\/blog\/endpoint-security-for-business-solutions","og_locale":"pt_BR","og_type":"article","og_title":"Endpoint security for business: 4 solutions | N-able","og_description":"Find out how important endpoint security is for businesses and discover the best EDR solution for your MSP.","og_url":"https:\/\/www.n-able.com\/pt-br\/blog\/endpoint-security-for-business-solutions","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2021-05-18T16:18:58+00:00","article_modified_time":"2025-01-31T12:54:23+00:00","og_image":[{"width":1600,"height":800,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/05\/Endpoint-Security-for-Business-The-Top-5-Solutions-To-Implement.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/05\/Endpoint-Security-for-Business-The-Top-5-Solutions-To-Implement.jpg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"N-able","Est. tempo de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/endpoint-security-for-business-solutions#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/endpoint-security-for-business-solutions"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Endpoint security for business: the top 4 solutions to implement","datePublished":"2021-05-18T17:18:58+01:00","dateModified":"2025-01-31T12:54:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/endpoint-security-for-business-solutions"},"wordCount":1061,"publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"articleSection":["Security"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/endpoint-security-for-business-solutions","url":"https:\/\/www.n-able.com\/pt-br\/blog\/endpoint-security-for-business-solutions","name":"Endpoint security for business: 4 solutions | N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br#website"},"datePublished":"2021-05-18T17:18:58+01:00","dateModified":"2025-01-31T12:54:23+00:00","description":"Find out how important endpoint security is for businesses and discover the best EDR solution for your MSP.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/endpoint-security-for-business-solutions#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/pt-br\/blog\/endpoint-security-for-business-solutions"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/endpoint-security-for-business-solutions#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Endpoint security for business: the top 4 solutions to implement"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/pt-br#website","url":"https:\/\/www.n-able.com\/pt-br","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/pt-br?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/pt-br#organization","name":"N-able","url":"https:\/\/www.n-able.com\/pt-br","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/18372","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/comments?post=18372"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/18372\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/media?parent=18372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}