{"id":4973,"date":"2019-03-13T23:26:21","date_gmt":"2019-03-13T23:26:21","guid":{"rendered":"https:\/\/www.n-able.com\/?p=4973"},"modified":"2021-07-09T15:38:41","modified_gmt":"2021-07-09T14:38:41","slug":"cloud-siem-solutions","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/pt-br\/blog\/cloud-siem-solutions","title":{"rendered":"Cloud SIEM Solutions"},"content":{"rendered":"<p>Today\u2019s enterprises face rapidly evolving threats to their cybersecurity at a moment in which they rely on their IT infrastructure more than ever. In fact,\u00a0<a class=\"ext\" href=\"https:\/\/www.businesswire.com\/news\/home\/20180612005256\/en\/Worldwide-Spending-Digital-Transformation-Soar-1-Trillion\" target=\"_blank\" rel=\"noopener noreferrer\">research from IDC<\/a>\u00a0indicates enterprise spending on the technology that enables digital transformation will have topped $1 trillion in 2018, an increase of 16.8% over the previous year. At the same time, the total global cost of cybercrime is expected to exceed a record\u00a0<a class=\"ext\" href=\"https:\/\/www.rgj.com\/story\/money\/business\/2018\/05\/02\/cost-cybercrime-exceed-2-trillion-2019\/575440002\/\" target=\"_blank\" rel=\"noopener noreferrer\">$2 trillion this year<\/a>, suggesting that those technologies driving digital transformations are at risk.<\/p>\n<p>What\u2019s more, the cost of suffering from a cyberattack has only increased. According to\u00a0<a class=\"ext\" href=\"https:\/\/databreachcalculator.mybluemix.net\/assets\/2018_Global_Cost_of_a_Data_Breach_Report.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">the Ponemon Institute and IBM Security<\/a>, the average total\u00a0cost of a\u00a0data breach\u00a0to companies around the world rose 6.4% in 2018 to $3.86 million. Clearly, enterprises can ill afford to leave themselves vulnerable to technologically advanced bad actors.<\/p>\n<p>To that end, it\u2019s incumbent upon you and your IT team to research, deploy, and manage\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/use-cases\/msp-security-software\">cybersecurity solutions<\/a>\u00a0that can keep your systems, networks, and sensitive information secure. Regardless of your industry, the size of your business, or the scope of your team, protecting your organization from malicious online activity\u2014activity that can cost enterprises millions of dollars\u2014should be one of your top priorities.<\/p>\n<p>For many organizations, security information and event management (SIEM) offers the flexibility needed to deploy over complex digital environments, and the sophistication to effectively manage a wide range of threats. Indeed, SIEM tools collect, store, and analyze security information from across your organization in order to alert IT professionals to ongoing attacks and comb through log data to identify irregularities.<\/p>\n<p>As SIEM tools become more popular, however\u2014the market for SIEM tools is expected to hit\u00a0<a class=\"ext\" href=\"https:\/\/solutionsreview.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">almost $6 billion by 2021<\/a>\u2014businesses that have integrated cloud computing into their operation need to ensure their cybersecurity platforms can account for this technology. If you and your team rely on the cloud at multiple levels of your business, it\u2019s important that you learn more about cloud-based SIEM solutions.<\/p>\n<h3><b>What is a SIEM solution?<\/b><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"img-responsive\" title=\"\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/cloud%20sieum.jpg\" alt=\"\" width=\"437\" height=\"216\" align=\"left\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>A\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/cloud-siem-solutions\">SIEM solution<\/a>\u00a0combines two types of cybersecurity technology, security information management (SIM) and security event management (SEM). SIM sifts through log data in order to monitor for irregularities, which are identified based on rules set by the SIEM provider and your IT team. SEM analyzes data in real time in order to monitor for threats to your digital environment, generating warnings for IT professionals who can then evaluate those threats.<\/p>\n<p>By making SIM and SEM work in concert with one another,\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/siem-as-a-service\">SIEM tools\u00a0<\/a>safeguard organizations against ongoing attacks while simultaneously monitoring for issues in log data. Such platforms provide end-to-end visibility over data gathered from a range of cybersecurity assets, including IoT devices, computer applications, firewalls, and antivirus software. By gathering this information and consolidating it in virtualized, user-friendly dashboards, SIEM tools make it possible for IT professionals to manage widespread, complex digital environments that would be too unwieldy to monitor and protect on their own. Furthermore, as enterprises invest further in cloud infrastructure and rely on off-site SaaS, SIEM providers are adapting their products to account for the changing nature of the digital environments they aim to protect.<\/p>\n<p>With its balance of SIM and SEM and its capacity for integration with emerging capabilities, SIEM technology makes an effective solution to the cybersecurity needs of enterprises of varying sizes. With that said, there are considerations that IT teams need to take into account. For instance, IT professionals will need to set some of the rules that SIEM tools use to analyze information and identify potential issues in log data. Those rules will change from one organization to the next, but it\u2019s important to get them right so your SIEM platform doesn\u2019t generate too many false positives and burn out your team.<\/p>\n<h3><b>What is SIEM as a service?<\/b><\/h3>\n<p>While it is possible to install a SIEM tool on-site, you can conveniently access SIEM as a service via the cloud. This means that the key functions of SIEM technology\u2014SIM, SEM, and virtualization allowing for intuitive user control\u2014are accessed via cloud computing technology from an off-site location.<\/p>\n<p>With cloud SIEM as a managed service, businesses have access to those tools and insight into their cybersecurity profile, but the managed services provider (MSP) controls the SIEM as a service function from a separate location, updating the business as necessary on security vulnerabilities.<\/p>\n<h3><b>What are the advantages of cloud-based SIEM?<\/b><\/h3>\n<p>For businesses, cloud SIEM tools mean convenience. For starters, accessing SIEM over the cloud can get SIEM capabilities up and running on a shorter timeline. When businesses install SIEM on-site, there can be a longer IT onboarding process before full operational status. By choosing to access SIEM as a service, businesses could be enjoying the benefits of this technology more quickly.<\/p>\n<p>This also speaks to the shortage of qualified IT staff available to enterprises. With\u00a0<a class=\"ext\" href=\"https:\/\/www2.staffingindustry.com\/site\/Editorial\/IT-Staffing-Report\/Feb.-1-2018\/IT-employers-to-add-staff-but-facing-tech-skills-shortage-Hays-reports\" target=\"_blank\" rel=\"noopener noreferrer\">two-thirds of employers<\/a>\u00a0reporting a skills shortage among available technology professionals, IT departments need to contend with increasingly sophisticated threats with fewer experts available to help. Cloud-based SIEM can provide a solution, as MSPs can relieve organizations of the time and responsibility around their cybersecurity goals while ensuring expertise and compliance.<\/p>\n<p>While on-site SIEM tools are convenient and offer direct control, they may be difficult to scale as a business grows. Indeed, because SIEM technology connects cybersecurity assets from across an organization into a central platform, businesses would need to update that technology every time they add new assets, change firewall or antivirus settings, or integrate new technology. With cloud SIEM as a service, however, MSPs can scale conveniently and as needed, handling updates and staying on top of emerging capabilities.<\/p>\n<p>Finally, a cloud SIEM solution can cut costs for businesses. While on-site SIEM tools may require investment in certain\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/how-manage-hardware-lifecycles-msp\" target=\"_blank\" rel=\"noopener\">hardware-software combinations<\/a>, enterprises eventually need to update those assets as they become outdated. By opting for SIEM as a service, however, a business can transition from a capital expenditure model to an operational expense framework. Meanwhile, MSPs can invest in hardware and platforms that scale with and across their clients.<\/p>\n<h3><b>What cloud-based SIEM solutions does SolarWinds offer?<\/b><\/h3>\n<p>For an MSP investing in cloud-based SIEM solutions, you\u2019ll want to offer your clients a reputable and reliable service. With the industry-leading\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/threat-monitor?utm_medium=website&amp;utm_source=direct&amp;utm_campaign=tm-glbl-en-mb-seo-siem-cloud-2019-03-11\" target=\"_blank\" rel=\"noopener\">N&#8209;able Threat Monitor<\/a>\u00a0platform, you can monitor, respond, and report security threats as they happen\u2014and before they wreak havoc across your clients\u2019 systems and networks.<\/p>\n<p>With Threat Monitor, SolarWinds offers MSPs an intelligent approach to threat monitoring. This means that, as a cloud service, Threat Monitor provides convenient, scalable access to a wide range of next-generation SIEM capabilities.<\/p>\n<p>For instance, a central dashboard provides intuitive insights into a cybersecurity profile. From there, you can easily collect log information from disparate sources and assess the intent and severity of potential threats in a way that puts you in control. Threat Monitor evaluates these threats from multiple origin points, including IP and Domain Reputation databases, ensuring that you\u2019re protected against known and unknown security threats.<\/p>\n<p>If you\u2019re working on a moderately sized team, Threat Monitor can help you be sure that nothing falls through the cracks. You\u2019ll be able to normalize logs from within your client\u2019s ecosystem and analyze them against multiple sources of threat intelligence, thus allowing you to spend less time looking through dense logs and more time developing an understanding of your vulnerabilities.<\/p>\n<p>For MSPs managing a larger organization\u2019s cybersecurity defenses, Threat Monitor can manage threats in tandem with you and save your attention for truly pressing issues. For instance, Threat Monitor can automate intelligent responses to detected threats that resolve them without requiring constant touch. When you\u2019re working in an enterprise with widespread systems and networks, this level of prioritization is key.<\/p>\n<p>No matter what type of clients you have, it\u2019s important that they have a SIEM solution. For many enterprises, managed cloud-based solutions are an appropriate and effective choice, allowing you to remotely guard against threats, identify vulnerabilities, and protect clients from bad actors.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><a href=\"https:\/\/www.solarwindsmsp.com\/products\/threat-monitor?utm_medium=website&amp;utm_source=direct&amp;utm_campaign=tm-glbl-en-mb-seo-siem-cloud-2019-03-11\" target=\"_blank\" rel=\"noopener\">Click here<\/a>\u00a0to find out how SolarWinds Threat Monitor can help you\u00a0monitor, respond, and report security threats as they happen<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today\u2019s enterprises face rapidly evolving threats to their cybersecurity at a moment in which they rely on their IT infrastructure more than ever. In fact, research from IDC indicates enterprise&#8230;<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-4973","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cloud SIEM Solutions - N-able<\/title>\n<meta name=\"description\" content=\"SIEM tools collect, store, and analyze security information from across your organization in order to alert IT professionals to ongoing attacks. Find out more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/pt-br\/blog\/cloud-siem-solutions\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud SIEM Solutions - N-able\" \/>\n<meta property=\"og:description\" content=\"SIEM tools collect, store, and analyze security information from across your organization in order to alert IT professionals to ongoing attacks. Find out more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/pt-br\/blog\/cloud-siem-solutions\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-13T23:26:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-09T14:38:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/cloud%20sieum.jpg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/cloud-siem-solutions#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/cloud-siem-solutions\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Cloud SIEM Solutions\",\"datePublished\":\"2019-03-13T23:26:21+00:00\",\"dateModified\":\"2021-07-09T14:38:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/cloud-siem-solutions\"},\"wordCount\":1353,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/cloud-siem-solutions#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/cloud%20sieum.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/cloud-siem-solutions\",\"url\":\"https:\/\/www.n-able.com\/pt-br\/blog\/cloud-siem-solutions\",\"name\":\"Cloud SIEM Solutions - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/cloud-siem-solutions#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/cloud-siem-solutions#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/cloud%20sieum.jpg\",\"datePublished\":\"2019-03-13T23:26:21+00:00\",\"dateModified\":\"2021-07-09T14:38:41+00:00\",\"description\":\"SIEM tools collect, store, and analyze security information from across your organization in order to alert IT professionals to ongoing attacks. Find out more.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/cloud-siem-solutions#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/pt-br\/blog\/cloud-siem-solutions\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/cloud-siem-solutions#primaryimage\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/cloud%20sieum.jpg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/cloud%20sieum.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/cloud-siem-solutions#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud SIEM Solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/pt-br?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cloud SIEM Solutions - N-able","description":"SIEM tools collect, store, and analyze security information from across your organization in order to alert IT professionals to ongoing attacks. Find out more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/pt-br\/blog\/cloud-siem-solutions","og_locale":"pt_BR","og_type":"article","og_title":"Cloud SIEM Solutions - N-able","og_description":"SIEM tools collect, store, and analyze security information from across your organization in order to alert IT professionals to ongoing attacks. Find out more.","og_url":"https:\/\/www.n-able.com\/pt-br\/blog\/cloud-siem-solutions","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2019-03-13T23:26:21+00:00","article_modified_time":"2021-07-09T14:38:41+00:00","og_image":[{"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/cloud%20sieum.jpg","type":"","width":"","height":""}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"N-able","Est. tempo de leitura":"7 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/cloud-siem-solutions#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/cloud-siem-solutions"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Cloud SIEM Solutions","datePublished":"2019-03-13T23:26:21+00:00","dateModified":"2021-07-09T14:38:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/cloud-siem-solutions"},"wordCount":1353,"publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/cloud-siem-solutions#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/cloud%20sieum.jpg","articleSection":["Security"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/cloud-siem-solutions","url":"https:\/\/www.n-able.com\/pt-br\/blog\/cloud-siem-solutions","name":"Cloud SIEM Solutions - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/cloud-siem-solutions#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/cloud-siem-solutions#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/cloud%20sieum.jpg","datePublished":"2019-03-13T23:26:21+00:00","dateModified":"2021-07-09T14:38:41+00:00","description":"SIEM tools collect, store, and analyze security information from across your organization in order to alert IT professionals to ongoing attacks. Find out more.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/cloud-siem-solutions#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/pt-br\/blog\/cloud-siem-solutions"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/cloud-siem-solutions#primaryimage","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/cloud%20sieum.jpg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/cloud%20sieum.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/cloud-siem-solutions#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Cloud SIEM Solutions"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/pt-br#website","url":"https:\/\/www.n-able.com\/pt-br","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/pt-br?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/pt-br#organization","name":"N-able","url":"https:\/\/www.n-able.com\/pt-br","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/4973","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/comments?post=4973"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/4973\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/media?parent=4973"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}