{"id":4935,"date":"2018-08-15T22:00:25","date_gmt":"2018-08-15T21:00:25","guid":{"rendered":"https:\/\/www.n-able.com\/?p=4935"},"modified":"2021-03-30T22:06:14","modified_gmt":"2021-03-30T21:06:14","slug":"intrusion-detection-systems-ids-vs-intrusion-prevention-systems-ips-whats-what","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/pt-br\/blog\/intrusion-detection-systems-ids-vs-intrusion-prevention-systems-ips-whats-what","title":{"rendered":"Intrusion Detection Systems (IDS) vs Intrusion Prevention Systems (IPS): What\u2019s What?"},"content":{"rendered":"<div class=\"field field--name-node-title field--type-ds field--label-hidden field--item\"><\/div>\n<div class=\"field field--name-body field--type-text-with-summary field--label-hidden field--item\">\n<p>An Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) have very similar acronyms by which they are commonly known, yet they perform very different tasks within the network security process. So what exactly do they do, how do they do it, and does your organization need either, neither, or both as part of your overall security posture?<\/p>\n<h3><b>Intrusion Detection System 101<\/b><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"img-responsive\" title=\"\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/08\/Body_IDS.jpg\" alt=\"Body_IDS.jpg\" width=\"409\" height=\"202\" align=\"left\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>Definitions are important in the security world\u2014you have to understand what you are dealing with before you can accurately determine if it&#8217;s a good fit for the needs of your organization. So what exactly is an Intrusion Detection System (IDS)? Simply put, an IDS can be either a hardware device or software application that monitors network traffic, incoming and outbound, for any malicious activity or security policy violation. Think of it as an intruder alarm, sounding an alert if it spots any activity that could lead to network and data compromise. It does this by inspecting the packets that flow across the network in order to detect known indicators of compromise and traffic patterns that suggest suspicious activity. In other words, an IDS is a passive system used to bring real-time visibility into potential network compromises.<\/p>\n<p>How the IDS achieves this will depend on the type of system being deployed. They can be either network based, or host based. Network-based Intrusion Detection Systems (NIDS) will have sensors strategically placed within the network itself, sometimes at multiple locations, to monitor the most traffic without creating performance bottlenecks. Host-based Intrusion Detection Systems (HIDS) do things differently, and are run on specific hosts or devices, only monitoring the traffic associated with them. Either type can take different approaches to detecting suspicious traffic. Some might use signature detection, comparing packets against a database of known threats. Some might use an anomaly-based approach, comparing traffic patterns against an established network \u201cnormality\u201d baseline. Some will combine both methods. All are known for generating false positives, at least initially. The IDS will need configuration to fine-tune it for the particular \u201cnorms\u201d of your network and the devices attached to it.<\/p>\n<h3><b>Intrusion Prevention System 101<\/b><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"img-responsive\" title=\"\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/08\/Body_IPS.jpg\" alt=\"Body_IPS.jpg\" width=\"411\" height=\"203\" align=\"right\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>An Intrusion Prevention System (IPS) is like an IDS on steroids. Not only can it detect the same kind of malicious activity and policy violation that an IDS does, but as the name suggests it can execute a real-time response to stop an immediate threat to your network. Like an IDS, the IPS can be NIPS-based with sensors at various points of the network or HIPS-based with sensors on the host to monitor individual devices. Unlike the IDS, an IPS has the ability to configure policy-based rules and actions to be executed when any anomaly is detected. Think of it as being an active defense system, tailored to best suit your business needs in terms of security posture.<\/p>\n<p>Although often considered a\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/5-rules-for-firewall-management-for-msp\">firewall<\/a>, this is an erroneous assumption about an IPS. If anything, an IPS is a firewall in reverse: The firewall applies a rule-set to allow traffic to flow; an IPS applies a rule-set to deny and drop traffic. That said, there are Unified Threat Management (UTM) devices, which do both and therefore act as firewall and IPS simultaneously. These might appear to offer the best of both worlds, in that they can actively allow \u201cgood\u201d traffic while also blocking known \u201cbad\u201d traffic.\u00a0 However, UTMs can be hard to manage optimally, and tend not to enable the same granularity of control over IPS protections as a stand-alone IPS can offer.<\/p>\n<h3><b>Which do you need?<\/b><\/h3>\n<p>Now you know the differences between an IDS and IPS, which does your organization need as part of its network security implementation? Truth be told, the stand-alone IDS has pretty much been replaced by the IPS as far as the\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/use-cases\/msp-security-software\">IT security<\/a>\u00a0industry is concerned. That&#8217;s not to say intrusion detection is a busted flush, but rather that detection has to be accompanied by prevention technologies in today\u2019s increasingly frantic threat climate. For most organizations, the notion of administering an IDS as a separate solution alongside other reactive solutions makes little sense. What makes more sense is to adopt a layered approach to detection and prevention while working with a managed service provider (MSP) able to make better sense of the complexities of the security function and respond to alerts more effectively.<\/p>\n<p><em>Davey has been writing about IT security for more than two decades, and is a three times winner of the BT Information Security Journalist of the Year title. An ex-hacker turned security consultant and journalist, Davey was given the prestigious &#8216;Enigma&#8217; award for his &#8216;lifetime contribution&#8217; to information security journalism in 2011.\u00a0<\/em><\/p>\n<p><em>You can follow Davey on Twitter at\u00a0<a class=\"ext\" href=\"https:\/\/twitter.com\/happygeek\" target=\"_blank\" rel=\"noopener noreferrer\">@happygeek<\/a><\/em><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>An Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) have very similar acronyms by which they are commonly known, yet they perform very different tasks within the network security&#8230;<\/p>\n","protected":false},"author":25,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-4935","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Intrusion Detection Systems (IDS) vs Intrusion Prevention Systems (IPS): What\u2019s What? - N-able<\/title>\n<meta name=\"description\" content=\"You\u2019ve no doubt heard mention of intrusion protection and intrusion prevention systems, but which one is best for your organization? Davey Winder explains.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/pt-br\/blog\/intrusion-detection-systems-ids-vs-intrusion-prevention-systems-ips-whats-what\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Intrusion Detection Systems (IDS) vs Intrusion Prevention Systems (IPS): What\u2019s What? - N-able\" \/>\n<meta property=\"og:description\" content=\"You\u2019ve no doubt heard mention of intrusion protection and intrusion prevention systems, but which one is best for your organization? Davey Winder explains.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/pt-br\/blog\/intrusion-detection-systems-ids-vs-intrusion-prevention-systems-ips-whats-what\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-15T21:00:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-30T21:06:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/08\/Body_IDS.jpg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/intrusion-detection-systems-ids-vs-intrusion-prevention-systems-ips-whats-what#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/intrusion-detection-systems-ids-vs-intrusion-prevention-systems-ips-whats-what\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7\"},\"headline\":\"Intrusion Detection Systems (IDS) vs Intrusion Prevention Systems (IPS): What\u2019s What?\",\"datePublished\":\"2018-08-15T22:00:25+01:00\",\"dateModified\":\"2021-03-30T21:06:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/intrusion-detection-systems-ids-vs-intrusion-prevention-systems-ips-whats-what\"},\"wordCount\":789,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/intrusion-detection-systems-ids-vs-intrusion-prevention-systems-ips-whats-what#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/08\/Body_IDS.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/intrusion-detection-systems-ids-vs-intrusion-prevention-systems-ips-whats-what\",\"url\":\"https:\/\/www.n-able.com\/pt-br\/blog\/intrusion-detection-systems-ids-vs-intrusion-prevention-systems-ips-whats-what\",\"name\":\"Intrusion Detection Systems (IDS) vs Intrusion Prevention Systems (IPS): What\u2019s What? - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/intrusion-detection-systems-ids-vs-intrusion-prevention-systems-ips-whats-what#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/intrusion-detection-systems-ids-vs-intrusion-prevention-systems-ips-whats-what#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/08\/Body_IDS.jpg\",\"datePublished\":\"2018-08-15T22:00:25+01:00\",\"dateModified\":\"2021-03-30T21:06:14+00:00\",\"description\":\"You\u2019ve no doubt heard mention of intrusion protection and intrusion prevention systems, but which one is best for your organization? Davey Winder explains.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/intrusion-detection-systems-ids-vs-intrusion-prevention-systems-ips-whats-what#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/pt-br\/blog\/intrusion-detection-systems-ids-vs-intrusion-prevention-systems-ips-whats-what\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/intrusion-detection-systems-ids-vs-intrusion-prevention-systems-ips-whats-what#primaryimage\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/08\/Body_IDS.jpg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/08\/Body_IDS.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/intrusion-detection-systems-ids-vs-intrusion-prevention-systems-ips-whats-what#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Intrusion Detection Systems (IDS) vs Intrusion Prevention Systems (IPS): What\u2019s What?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/pt-br?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g\",\"caption\":\"Guest\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Intrusion Detection Systems (IDS) vs Intrusion Prevention Systems (IPS): What\u2019s What? - N-able","description":"You\u2019ve no doubt heard mention of intrusion protection and intrusion prevention systems, but which one is best for your organization? Davey Winder explains.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/pt-br\/blog\/intrusion-detection-systems-ids-vs-intrusion-prevention-systems-ips-whats-what","og_locale":"pt_BR","og_type":"article","og_title":"Intrusion Detection Systems (IDS) vs Intrusion Prevention Systems (IPS): What\u2019s What? - N-able","og_description":"You\u2019ve no doubt heard mention of intrusion protection and intrusion prevention systems, but which one is best for your organization? Davey Winder explains.","og_url":"https:\/\/www.n-able.com\/pt-br\/blog\/intrusion-detection-systems-ids-vs-intrusion-prevention-systems-ips-whats-what","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2018-08-15T21:00:25+00:00","article_modified_time":"2021-03-30T21:06:14+00:00","og_image":[{"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/08\/Body_IDS.jpg","type":"","width":"","height":""}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Guest","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/intrusion-detection-systems-ids-vs-intrusion-prevention-systems-ips-whats-what#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/intrusion-detection-systems-ids-vs-intrusion-prevention-systems-ips-whats-what"},"author":{"name":"Guest","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7"},"headline":"Intrusion Detection Systems (IDS) vs Intrusion Prevention Systems (IPS): What\u2019s What?","datePublished":"2018-08-15T22:00:25+01:00","dateModified":"2021-03-30T21:06:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/intrusion-detection-systems-ids-vs-intrusion-prevention-systems-ips-whats-what"},"wordCount":789,"publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/intrusion-detection-systems-ids-vs-intrusion-prevention-systems-ips-whats-what#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/08\/Body_IDS.jpg","articleSection":["Security"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/intrusion-detection-systems-ids-vs-intrusion-prevention-systems-ips-whats-what","url":"https:\/\/www.n-able.com\/pt-br\/blog\/intrusion-detection-systems-ids-vs-intrusion-prevention-systems-ips-whats-what","name":"Intrusion Detection Systems (IDS) vs Intrusion Prevention Systems (IPS): What\u2019s What? - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/intrusion-detection-systems-ids-vs-intrusion-prevention-systems-ips-whats-what#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/intrusion-detection-systems-ids-vs-intrusion-prevention-systems-ips-whats-what#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/08\/Body_IDS.jpg","datePublished":"2018-08-15T22:00:25+01:00","dateModified":"2021-03-30T21:06:14+00:00","description":"You\u2019ve no doubt heard mention of intrusion protection and intrusion prevention systems, but which one is best for your organization? Davey Winder explains.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/intrusion-detection-systems-ids-vs-intrusion-prevention-systems-ips-whats-what#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/pt-br\/blog\/intrusion-detection-systems-ids-vs-intrusion-prevention-systems-ips-whats-what"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/intrusion-detection-systems-ids-vs-intrusion-prevention-systems-ips-whats-what#primaryimage","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/08\/Body_IDS.jpg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/08\/Body_IDS.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/intrusion-detection-systems-ids-vs-intrusion-prevention-systems-ips-whats-what#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Intrusion Detection Systems (IDS) vs Intrusion Prevention Systems (IPS): What\u2019s What?"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/pt-br#website","url":"https:\/\/www.n-able.com\/pt-br","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/pt-br?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/pt-br#organization","name":"N-able","url":"https:\/\/www.n-able.com\/pt-br","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7","name":"Guest","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g","caption":"Guest"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/4935","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/comments?post=4935"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/4935\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/media?parent=4935"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}