{"id":47777,"date":"2025-09-17T17:55:45","date_gmt":"2025-09-17T17:55:45","guid":{"rendered":"https:\/\/becolve.com\/blog\/ids-vs-ips-qual-e-a-diferenca\/"},"modified":"2025-09-17T17:55:59","modified_gmt":"2025-09-17T17:55:59","slug":"ids-vs-ips-qual-e-a-diferenca","status":"publish","type":"blog","link":"https:\/\/becolve.com\/pt-pt\/blog\/ids-vs-ips-qual-e-a-diferenca\/","title":{"rendered":"IDS vs. IPS: Qual \u00e9 a diferen\u00e7a?"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>A <strong>dete\u00e7\u00e3o e preven\u00e7\u00e3o de intrus\u00f5es<\/strong> s\u00e3o dois termos gerais que descrevem as pr\u00e1ticas de seguran\u00e7a das aplica\u00e7\u00f5es utilizadas para mitigar ataques e bloquear novas amea\u00e7as.<\/p>\n<p>A primeira \u00e9 uma <strong>medida reativa que identifica a dete\u00e7\u00e3o de intrusos.<\/strong> Capaz de <strong>detetar o malware<\/strong> existente, como troianos, portas traseiras, rootkits) e detetar ataques de engenharia social como, man in the middle, phishing que manipulam os utilizadores para o roubo de credenciais e informa\u00e7\u00f5es confidenciais.<\/p>\n<p>A segunda \u00e9 uma <strong>medida de seguran\u00e7a proativa que utiliza um sistema de preven\u00e7\u00e3o de intrus\u00f5es<\/strong> para bloquear ataques preventivos de aplica\u00e7\u00f5es. Isto inclui inclus\u00f5es em ficheiros remotos que facilitam as <strong>inje\u00e7\u00f5es de malware<\/strong> e inje\u00e7\u00f5es de SQL, utilizadas para aceder \u00e0s bases de dados de uma empresa. <\/p>\n<h2><strong>O que \u00e9 um sistema de dete\u00e7\u00e3o de intrusos (IDS)?<\/strong><\/h2>\n<p>Um <strong><a href=\"https:\/\/logitek.es\/productos-lk\/ids-monitorizacion-y-perfilado-del-trafico-de-red-ot-y-deteccion-de-anomalias\/\" target=\"_blank\" rel=\"noopener noreferrer\">IDS<\/a><\/strong> \u00e9 um <strong>dispositivo de hardware ou uma aplica\u00e7\u00e3o de software<\/strong> que utiliza assinaturas de intrus\u00e3o conhecidas para detetar e analisar o tr\u00e1fego de rede de entrada e sa\u00edda em busca de atividades anormais.<\/p>\n<p>Isto \u00e9 feito atrav\u00e9s de:<\/p>\n<ul>\n<li>Compara\u00e7\u00f5es de ficheiros do sistema com assinaturas de malware.<\/li>\n<li>Processos de digitaliza\u00e7\u00e3o que detetam sinais de padr\u00f5es maliciosos.<\/li>\n<li>Monitoriza\u00e7\u00e3o do comportamento do utilizador para detetar inten\u00e7\u00f5es maliciosas.<\/li>\n<li>Monitoriza\u00e7\u00e3o de configura\u00e7\u00f5es e defini\u00e7\u00f5es do sistema.<\/li>\n<li>Monitoriza\u00e7\u00e3o do tr\u00e1fego de rede de entrada e sa\u00edda dos dispositivos<\/li>\n<\/ul>\n<p>Ao detetar uma viola\u00e7\u00e3o da pol\u00edtica de seguran\u00e7a, um v\u00edrus ou um erro de configura\u00e7\u00e3o, <strong>um IDS pode expulsar um utilizador<\/strong> infrator da rede e enviar um alerta ao pessoal de seguran\u00e7a.<\/p>\n<p>Apesar dos seus benef\u00edcios, incluindo a an\u00e1lise aprofundada do tr\u00e1fego de rede e a dete\u00e7\u00e3o de ataques, <strong>um IDS tem inconvenientes inerentes<\/strong>. Devido ao facto de utilizar assinaturas de intrus\u00e3o previamente conhecidas para localizar ataques, as amea\u00e7as recentemente descobertas 0 Day podem permanecer sem ser detetadas. <\/p>\n<p>Al\u00e9m disso, <strong>um IDS apenas deteta ataques cont\u00ednuos<\/strong>, n\u00e3o ataques de entrada. Para os bloquear, \u00e9 necess\u00e1rio um sistema de preven\u00e7\u00e3o de intrus\u00f5es. <\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-28898\" src=\"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/ids.jpg\" alt=\"sistema de dete\u00e7\u00e3o de intrusos IDS\" width=\"500\" height=\"353\"><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>O que \u00e9 um sistema de preven\u00e7\u00e3o de intrus\u00f5es (IPS)?<\/strong><\/h2>\n<p>Um <strong><a href=\"https:\/\/logitek.es\/productos-lk\/next-gen-ips-industrial\/\" target=\"_blank\" rel=\"noopener noreferrer\">IPS<\/a><\/strong> complementa uma configura\u00e7\u00e3o de IDS atrav\u00e9s da <strong>inspe\u00e7\u00e3o proativa do tr\u00e1fego de entrada de um sistema<\/strong> para eliminar os pedidos maliciosos. Uma configura\u00e7\u00e3o t\u00edpica de IPS utiliza firewalls de aplica\u00e7\u00f5es web e solu\u00e7\u00f5es de filtragem de tr\u00e1fego para proteger as aplica\u00e7\u00f5es. <\/p>\n<p>Um IPS <strong>evita ataques ao descartar pacotes maliciosos,<\/strong> bloquear IPs ofensivos e alertar o pessoal de seguran\u00e7a de poss\u00edveis amea\u00e7as. Este sistema geralmente usa uma base de dados preexistente para o reconhecimento de assinaturas e pode ser programado para reconhecer ataques baseados no tr\u00e1fego e anomalias de comportamento. <\/p>\n<p>Embora seja eficaz para bloquear os vetores de ataque conhecidos, <strong>alguns sistemas IPS t\u00eam limita\u00e7\u00f5es<\/strong>. Estes s\u00e3o geralmente causados por uma <strong>depend\u00eancia excessiva de regras predefinidas<\/strong>, tornando-os suscet\u00edveis a falsos positivos. <\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-28901\" src=\"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/IPS.jpg\" alt=\"Esquema sistema de preven\u00e7\u00e3o de intrusos IDS\" width=\"500\" height=\"477\"><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>A Logitek otimiza a seguran\u00e7a da sua rede OT<\/strong><\/h2>\n<p>Na <strong><a href=\"https:\/\/logitek.es\/industria_40_soluciones_real_time\/\" target=\"_blank\" rel=\"noopener noreferrer\">Logitek<\/a><\/strong> implementamos <strong>solu\u00e7\u00f5es IDS\/IPS para os ambientes industriais<\/strong> e <strong><a href=\"https:\/\/logitek.es\/ztcedge\/\" target=\"_blank\" rel=\"noopener noreferrer\">Edge<\/a><\/strong> face a ambientes de miss\u00e3o cr\u00edtica. concebidos para a sua utiliza\u00e7\u00e3o em ambientes de n\u00edveis 1-3 face a ativos de miss\u00e3o cr\u00edtica ou no Edge. A sua transpar\u00eancia e a capacidade de detetar o tr\u00e1fego da sua rede OT e os ativos de produ\u00e7\u00e3o destinam-se a encaixar perfeitamente na sua rede sem interromper as opera\u00e7\u00f5es.  <\/p>\n<p>Se necessitar de mais informa\u00e7\u00f5es sobre os <strong>sistemas IDS ou IPS<\/strong>, n\u00e3o hesite em contactar-nos.<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/www.ciberseguridadlogitek.com\/contacto&#8221; button_text=&#8221;Mais informa\u00e7\u00f5es&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Descrevemos as caracter\u00edsticas, vantagens e desvantagens dos sistemas de dete\u00e7\u00e3o de intrusos (IDS) face aos sistemas de preven\u00e7\u00e3o (IPS).<\/p>\n","protected":false},"author":31,"featured_media":47780,"menu_order":0,"template":"","categories":[969],"tags":[],"arquitectura":[1838],"area":[],"sector":[],"experto":[203],"weborigen":[157],"productos-tax":[],"soluciones-tax":[],"marcas-tax":[],"coauthors":[],"class_list":["post-47777","blog","type-blog","status-publish","has-post-thumbnail","hentry","category-ciberseguranca","arquitectura-ciberseguranca-industrial","experto-ciberseguranca-industrial-disponibilidade-total","weborigen-ciberseguridadlogitek-com"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IDS vs. IPS: Qual \u00e9 a diferen\u00e7a?<\/title>\n<meta name=\"description\" content=\"Dete\u00e7\u00e3o e preven\u00e7\u00e3o de intrus\u00f5es (IDS e IPS): descrevemos as caracter\u00edsticas, vantagens e desvantagens de cada uma das 2 pr\u00e1ticas de ciberseguran\u00e7a\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/becolve.com\/pt-pt\/blog\/ids-vs-ips-qual-e-a-diferenca\/\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IDS vs. IPS: Qual \u00e9 a diferen\u00e7a?\" \/>\n<meta property=\"og:description\" content=\"Dete\u00e7\u00e3o e preven\u00e7\u00e3o de intrus\u00f5es (IDS e IPS): descrevemos as caracter\u00edsticas, vantagens e desvantagens de cada uma das 2 pr\u00e1ticas de ciberseguran\u00e7a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/becolve.com\/pt-pt\/blog\/ids-vs-ips-qual-e-a-diferenca\/\" \/>\n<meta property=\"og:site_name\" content=\"Becolve Digital\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-17T17:55:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/IDS-vs-IPS.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Logitek_es\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo estimado de leitura\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutos\" \/>\n\t<meta name=\"twitter:label2\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data2\" content=\"Becolve Digital\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/becolve.com\/pt-pt\/blog\/ids-vs-ips-qual-e-a-diferenca\/\",\"url\":\"https:\/\/becolve.com\/pt-pt\/blog\/ids-vs-ips-qual-e-a-diferenca\/\",\"name\":\"IDS vs. IPS: Qual \u00e9 a diferen\u00e7a?\",\"isPartOf\":{\"@id\":\"https:\/\/becolve.com\/pt-pt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/becolve.com\/pt-pt\/blog\/ids-vs-ips-qual-e-a-diferenca\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/becolve.com\/pt-pt\/blog\/ids-vs-ips-qual-e-a-diferenca\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/IDS-vs-IPS.jpg\",\"datePublished\":\"2025-09-17T17:55:45+00:00\",\"dateModified\":\"2025-09-17T17:55:59+00:00\",\"description\":\"Dete\u00e7\u00e3o e preven\u00e7\u00e3o de intrus\u00f5es (IDS e IPS): descrevemos as caracter\u00edsticas, vantagens e desvantagens de cada uma das 2 pr\u00e1ticas de ciberseguran\u00e7a\",\"breadcrumb\":{\"@id\":\"https:\/\/becolve.com\/pt-pt\/blog\/ids-vs-ips-qual-e-a-diferenca\/#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/becolve.com\/pt-pt\/blog\/ids-vs-ips-qual-e-a-diferenca\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/becolve.com\/pt-pt\/blog\/ids-vs-ips-qual-e-a-diferenca\/#primaryimage\",\"url\":\"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/IDS-vs-IPS.jpg\",\"contentUrl\":\"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/IDS-vs-IPS.jpg\",\"width\":800,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/becolve.com\/pt-pt\/blog\/ids-vs-ips-qual-e-a-diferenca\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/becolve.com\/pt-pt\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog Items\",\"item\":\"https:\/\/becolve.com\/pt-pt\/blog\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IDS vs. IPS: Qual \u00e9 a diferen\u00e7a?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/becolve.com\/pt-pt\/#website\",\"url\":\"https:\/\/becolve.com\/pt-pt\/\",\"name\":\"Becolve Digital\",\"description\":\"Impulsamos la transformaci\u00f3n digital en la industria e infraestructuras\",\"publisher\":{\"@id\":\"https:\/\/becolve.com\/pt-pt\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/becolve.com\/pt-pt\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/becolve.com\/pt-pt\/#organization\",\"name\":\"Becolve Digital\",\"url\":\"https:\/\/becolve.com\/pt-pt\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/becolve.com\/pt-pt\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/becolve-logo-h-black_200.png\",\"contentUrl\":\"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/becolve-logo-h-black_200.png\",\"width\":200,\"height\":64,\"caption\":\"Becolve Digital\"},\"image\":{\"@id\":\"https:\/\/becolve.com\/pt-pt\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/Logitek_es\",\"https:\/\/www.linkedin.com\/company\/becolve-digital\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IDS vs. IPS: Qual \u00e9 a diferen\u00e7a?","description":"Dete\u00e7\u00e3o e preven\u00e7\u00e3o de intrus\u00f5es (IDS e IPS): descrevemos as caracter\u00edsticas, vantagens e desvantagens de cada uma das 2 pr\u00e1ticas de ciberseguran\u00e7a","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/becolve.com\/pt-pt\/blog\/ids-vs-ips-qual-e-a-diferenca\/","og_locale":"pt_PT","og_type":"article","og_title":"IDS vs. IPS: Qual \u00e9 a diferen\u00e7a?","og_description":"Dete\u00e7\u00e3o e preven\u00e7\u00e3o de intrus\u00f5es (IDS e IPS): descrevemos as caracter\u00edsticas, vantagens e desvantagens de cada uma das 2 pr\u00e1ticas de ciberseguran\u00e7a","og_url":"https:\/\/becolve.com\/pt-pt\/blog\/ids-vs-ips-qual-e-a-diferenca\/","og_site_name":"Becolve Digital","article_modified_time":"2025-09-17T17:55:59+00:00","og_image":[{"width":800,"height":400,"url":"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/IDS-vs-IPS.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@Logitek_es","twitter_misc":{"Tempo estimado de leitura":"4 minutos","Written by":"Becolve Digital"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/becolve.com\/pt-pt\/blog\/ids-vs-ips-qual-e-a-diferenca\/","url":"https:\/\/becolve.com\/pt-pt\/blog\/ids-vs-ips-qual-e-a-diferenca\/","name":"IDS vs. IPS: Qual \u00e9 a diferen\u00e7a?","isPartOf":{"@id":"https:\/\/becolve.com\/pt-pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/becolve.com\/pt-pt\/blog\/ids-vs-ips-qual-e-a-diferenca\/#primaryimage"},"image":{"@id":"https:\/\/becolve.com\/pt-pt\/blog\/ids-vs-ips-qual-e-a-diferenca\/#primaryimage"},"thumbnailUrl":"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/IDS-vs-IPS.jpg","datePublished":"2025-09-17T17:55:45+00:00","dateModified":"2025-09-17T17:55:59+00:00","description":"Dete\u00e7\u00e3o e preven\u00e7\u00e3o de intrus\u00f5es (IDS e IPS): descrevemos as caracter\u00edsticas, vantagens e desvantagens de cada uma das 2 pr\u00e1ticas de ciberseguran\u00e7a","breadcrumb":{"@id":"https:\/\/becolve.com\/pt-pt\/blog\/ids-vs-ips-qual-e-a-diferenca\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/becolve.com\/pt-pt\/blog\/ids-vs-ips-qual-e-a-diferenca\/"]}]},{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/becolve.com\/pt-pt\/blog\/ids-vs-ips-qual-e-a-diferenca\/#primaryimage","url":"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/IDS-vs-IPS.jpg","contentUrl":"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/IDS-vs-IPS.jpg","width":800,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/becolve.com\/pt-pt\/blog\/ids-vs-ips-qual-e-a-diferenca\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/becolve.com\/pt-pt\/"},{"@type":"ListItem","position":2,"name":"Blog Items","item":"https:\/\/becolve.com\/pt-pt\/blog\/"},{"@type":"ListItem","position":3,"name":"IDS vs. IPS: Qual \u00e9 a diferen\u00e7a?"}]},{"@type":"WebSite","@id":"https:\/\/becolve.com\/pt-pt\/#website","url":"https:\/\/becolve.com\/pt-pt\/","name":"Becolve Digital","description":"Impulsamos la transformaci\u00f3n digital en la industria e infraestructuras","publisher":{"@id":"https:\/\/becolve.com\/pt-pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/becolve.com\/pt-pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Organization","@id":"https:\/\/becolve.com\/pt-pt\/#organization","name":"Becolve Digital","url":"https:\/\/becolve.com\/pt-pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/becolve.com\/pt-pt\/#\/schema\/logo\/image\/","url":"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/becolve-logo-h-black_200.png","contentUrl":"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/becolve-logo-h-black_200.png","width":200,"height":64,"caption":"Becolve Digital"},"image":{"@id":"https:\/\/becolve.com\/pt-pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/Logitek_es","https:\/\/www.linkedin.com\/company\/becolve-digital\/"]}]}},"_links":{"self":[{"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/blog\/47777","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/users\/31"}],"version-history":[{"count":0,"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/blog\/47777\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/media\/47780"}],"wp:attachment":[{"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/media?parent=47777"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/categories?post=47777"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/tags?post=47777"},{"taxonomy":"arquitectura","embeddable":true,"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/arquitectura?post=47777"},{"taxonomy":"area","embeddable":true,"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/area?post=47777"},{"taxonomy":"sector","embeddable":true,"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/sector?post=47777"},{"taxonomy":"experto","embeddable":true,"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/experto?post=47777"},{"taxonomy":"weborigen","embeddable":true,"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/weborigen?post=47777"},{"taxonomy":"productos-tax","embeddable":true,"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/productos-tax?post=47777"},{"taxonomy":"soluciones-tax","embeddable":true,"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/soluciones-tax?post=47777"},{"taxonomy":"marcas-tax","embeddable":true,"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/marcas-tax?post=47777"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/becolve.com\/pt-pt\/wp-json\/wp\/v2\/coauthors?post=47777"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}