{"id":6361,"date":"2020-09-16T11:44:17","date_gmt":"2020-09-16T14:44:17","guid":{"rendered":"https:\/\/addvalue.com.br\/novo\/?p=6361"},"modified":"2020-09-18T09:31:23","modified_gmt":"2020-09-18T12:31:23","slug":"endpoint-security-2020","status":"publish","type":"post","link":"https:\/\/addvalue.com.br\/novo\/artigos\/endpoint-security-2020\/","title":{"rendered":"What\u2019s New In Gartner\u2019s Hype Cycle For Endpoint Security, 2020"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-6362\" src=\"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2020\/09\/960x0.jpg\" alt=\"\" width=\"712\" height=\"615\" \/><br \/>\n<span style=\"color: #999999;\">GETTY<\/span><\/p>\n<ul>\n<li>Remote working\u2019s rapid growth is making endpoint security an urgent priority for all organizations today.<\/li>\n<li>Cloud-first deployment strategies dominate the innovations on this year\u2019s Hype Cycle for Endpoint Security.<\/li>\n<li>Zero Trust Security (ZTNA) is gaining adoption in enterprises who realize identities are the new security perimeter of their business.<\/li>\n<li>By 2024, at least 40% of enterprises will have strategies for adopting Secure Access Service Edge (SASE) up from less than 1% at year-end 2018.<\/li>\n<\/ul>\n<p>These and many other new insights are from <a class=\"color-link\" title=\"https:\/\/www.gartner.com\/document\/3987589\" href=\"https:\/\/www.gartner.com\/document\/3987589\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.gartner.com\/document\/3987589\" aria-label=\"Gartner Hype Cycle for Endpoint Security, 2020\">Gartner Hype Cycle for Endpoint Security, 2020<\/a> published earlier this year and the recent announcement, <a class=\"color-link\" title=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2020-08-26-gartner-says-bring-your-own-pc-security-will-transfor\" href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2020-08-26-gartner-says-bring-your-own-pc-security-will-transfor\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2020-08-26-gartner-says-bring-your-own-pc-security-will-transfor\" aria-label=\"Gartner Says Bring Your Own PC Security Will Transform Businesses within the Next Five Years\">Gartner Says Bring Your Own PC Security Will Transform Businesses within the Next Five Years<\/a>. Gartner\u2019s definition of Hype Cycles includes <a class=\"color-link\" title=\"https:\/\/www.gartner.com\/en\/research\/methodologies\/gartner-hype-cycle\" href=\"https:\/\/www.gartner.com\/en\/research\/methodologies\/gartner-hype-cycle\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.gartner.com\/en\/research\/methodologies\/gartner-hype-cycle\" aria-label=\"five phases of a technology\u2019s lifecycle and is explained here\">five phases of a technology\u2019s lifecycle and is explained here<\/a>. \u00a0There are 20 technologies on this year\u2019s Hype Cycle for Endpoint Security. The proliferation of endpoint attacks, the rapid surge in remote working, ransomware, fileless and phishing attacks are together, creating new opportunities for vendors to fast-track innovation. Cloud has become the platform of choice for organizations adopting endpoint security today, as evidenced by the Hype Cycle\u2019s many references to cloud-first deployment strategies.\u00a0\u00a0The Gartner Hype Cycle for Endpoint Security, 2020, is shown below:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-6363\" src=\"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2020\/09\/960x02.jpg\" alt=\"\" width=\"1014\" height=\"783\" srcset=\"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2020\/09\/960x02.jpg 960w, https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2020\/09\/960x02-300x232.jpg 300w, https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2020\/09\/960x02-768x593.jpg 768w\" sizes=\"auto, (max-width: 1014px) 100vw, 1014px\" \/><br \/>\n<span style=\"color: #999999;\">AUGUST 26, 2020 GARTNER SAYS BRING YOUR OWN PC SECURITY WILL TRANSFORM BUSINESSES WITHIN THE NEXT FIVE YEARS<\/span><\/p>\n<h4><strong>Details Of What\u2019s New In Gartner\u2019s Hype Cycle for Endpoint Security, 2020<\/strong><\/h4>\n<ul>\n<li><strong>Five technologies are on the Hype Cycle for the first time reflecting remote working\u2019s rapid growth and the growing severity and sophistication of endpoint attacks.<\/strong> Unified Endpoint Security, Extended Detection and Response, Business E-Mail Compromise Protection, BYOPC Security and Secure Access Service Edge (SASE) are the five technologies added this year. Many organizations are grappling with how to equip their remote workforces with systems, devices and smartphones, with many reverting to have employees use their own. Bring your PC (BYOPC) has become so dominant so fast that Gartner replaced BYOD on this year\u2019s Hype Cycle with the new term. Gartner sees BYOPC as one of the most vulnerable threat surfaces every business has today. Employees\u2019 devices accessing valuable data and applications continues to accelerate without safeguards in place across many organizations.<\/li>\n<li><strong>Extended detection and response (XDR) are on the Hype Cycle for the first time, reflecting the trend of vendor consolidation across cybersecurity spending today. <\/strong>Gartner defines XDR as a vendor-specific, threat detection and incident response tool that unifies multiple security products into a security operations system. XDR and its potential to reduce the total cost and complexity of cybersecurity infrastructures is a dominant theme throughout this year\u2019s Hype Cycle. XDR vendors are claiming that their integrated portfolios of detection and response applications deliver greater accuracy and prevention than stand-alone systems, driving down Total Cost of Ownership (TCO) and increasing productivity. Key vendors in XDR include Cisco, FireEye, Fortinet, McAfee, Microsoft, Palo Alto Networks, Sophos, Symantec and Trend Micro.<\/li>\n<li><strong>Business email compromise (BEC) protection is on the Hype Cycle for the first time this year.\u00a0P<\/strong>hishing attacks cost businesses $1.8B in 2019, according to the FBI, underscoring the need for better security in the area of business email. Gartner defines business email compromise (BEC) protection as a series of solutions that detect and filter malicious emails that fraudulently impersonate business associates to misdirect funds or data. There have been many instances of business email compromise attacks focused on C-level executives, hoping that a fraudulent directive from them to subordinates leads to thousands of dollars being transferred to outside accounts or being sent in gift cards.Gartner found that fraudulent invoices accounted for 39% of such attacks in 2018, posing an internal risk to organizations and reputation risk.<\/li>\n<li><strong>Unified Endpoint Security (UES) is being driven by IT organizations\u2019 demand for having a single security console for all security events.<\/strong> Gartner notes that successful vendors in UES will be those that can demonstrate significant productivity gains from the integration of security and operations and those that can rapidly process large amounts of data to detect previously unknown threats. CIOs and CISOs are looking for a way to integrate UES and Unified Endpoint Management (UEM), so their teams can have a single, comprehensive real-time console of all devices that provides alerts of any security events. The goal is to adjust security policies across all devices. Absolute\u2019s approach to leveraging their unique persistence, resilience and intelligence capabilities are worth watching. Their approach delivers unified endpoint security by relying on their Endpoint Resilience platform that includes a permanent digital tether to every endpoint in the enterprise. By having an undeletable digital thread to every device, Absolute is enabling self-healing, greater visibility and control. Based on conversations with their customers in Education and Healthcare, Absolute\u2019s unique approach gives IT complete visibility into where every device is at all times and what each device configuration looks like in real-time.<\/li>\n<li><strong>Unified Endpoint Management (UEM) is expanding rapidly beyond managing PCs and mobile devices to provide greater insights from endpoint analytics and deeper integration Identity and Access Management.<\/strong> Gartner notes interest in UEM remains strong and use-case-driven across their client base. UEM\u2019s many benefits, including streamlining continuous OS updates across multiple mobile platforms, enabling device management regardless of the connection and having an architecture capable of supporting a wide range of devices and operating systems are why enterprises are looking to expand their adoption of UEM. Another major benefit enterprises mention is automating Internet-based patching, policy, configuration management. UEM leaders include MobileIron, whose platform reflects industry leadership with its advanced unified endpoint management (UEM) capabilities. MobileIron provides customers with additional security solutions integrated to their UEM platform, including passwordless multi-factor authentication (Zero Sign-On) and mobile threat defense (MTD). MTD is noteworthy for its success at MobileIron customers who need to validate devices at scale, establish user context, verify network connections, then detect and remediate threats.<\/li>\n<li>\u00a0<strong>Gartner says ten technologies were either removed or replaced in the Hype Cycle because they\u2019ve evolved into features of broader technologies or have developed into tools that address more than security.<\/strong> The ten technologies include protected browsers, DLP for mobile devices, managed detection and response, user and entity behavior analytics, IoT security, content collaboration platforms, mobile identity, user authentication, trusted environments and BYOD being replaced by BYOPC.<\/li>\n<\/ul>\n<p><span style=\"color: #808080;\">--<\/span><\/p>\n<p><span style=\"color: #808080;\">Fonte: https:\/\/www.forbes.com\/sites\/louiscolumbus\/2020\/08\/30\/whats-new-in-gartners-hype-cycle-for-endpoint-security-2020\/?utm_source=LinkedIn%20&amp;utm_medium=Social_post&amp;utm_term=&amp;utm_content=&amp;utm_campaign=#26c00c279ac1<\/span><br \/>\n<span style=\"color: #808080;\"><a class=\"contrib-link--name remove-underline\" style=\"color: #808080;\" href=\"https:\/\/www.forbes.com\/sites\/louiscolumbus\/\">Louis Columbus<\/a><span class=\"contrib-byline-type\">Senior Contributor <\/span><a class=\"remove-underline\" style=\"color: #808080;\" href=\"https:\/\/www.forbes.com\/enterprise-cloud\">Enterprise &amp; Cloud<\/a><\/span><br \/>\n<span style=\"color: #808080;\"><a class=\"bertie-badge\" style=\"color: #808080;\" href=\"https:\/\/www.forbes.com\/editors-picks\">EDITORS' PICK<\/a><span class=\"vert-pipe\">|<\/span><span class=\"pageviews\">12,643 views<\/span><span class=\"vert-pipe\">|<\/span><time>Aug 30, 2020,<\/time><span class=\"time\"><time>07:03pm EDT<\/time><\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nGETTY<\/p>\n<p>Remote working\u2019s rapid growth is making endpoint security an urgent priority for all organizations today.<br \/>\nCloud-first deployment strategies dominate the innovations on this year\u2019s Hype Cycle for Endpoint Security.<br \/>\nZero Trust Security (ZTNA) is gaining adoption in enterprises who realize identities are the new security perimeter of their business.<br \/>\nBy 2024, at least 40% of enterprises will have strategies for adopting Secure Access Service Edge (SASE) up from less than 1% at year-end 2018.<\/p>\n<p>These and many other new insights are from Gartner Hype Cycle for Endpoint Security, 2020 published earlier this year and<\/p>\n","protected":false},"author":1,"featured_media":6365,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[115],"tags":[124,48,47,109],"class_list":["post-6361","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-artigos","tag-sophos","tag-citrix","tag-commvault","tag-palo-alto-networks"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What\u2019s New In Gartner\u2019s Hype Cycle For Endpoint Security, 2020 - Add Value<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/addvalue.com.br\/novo\/artigos\/endpoint-security-2020\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What\u2019s New In Gartner\u2019s Hype Cycle For Endpoint Security, 2020 - Add Value\" \/>\n<meta property=\"og:description\" content=\"GETTY Remote working\u2019s rapid growth is making endpoint security an urgent priority for all organizations today. Cloud-first deployment strategies dominate the innovations on this year\u2019s Hype Cycle for Endpoint Security. Zero Trust Security (ZTNA) is gaining adoption in enterprises who realize identities are the new security perimeter of their business. By 2024, at least 40% of enterprises will have strategies for adopting Secure Access Service Edge (SASE) up from less than 1% at year-end 2018. These and many other new insights are from Gartner Hype Cycle for Endpoint Security, 2020 published earlier this year and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/addvalue.com.br\/novo\/artigos\/endpoint-security-2020\/\" \/>\n<meta property=\"og:site_name\" content=\"Add Value\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-16T14:44:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-18T12:31:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2020\/09\/endpoint_blog.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"addvalue\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"addvalue\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/addvalue.com.br\/novo\/artigos\/endpoint-security-2020\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/addvalue.com.br\/novo\/artigos\/endpoint-security-2020\/\"},\"author\":{\"name\":\"addvalue\",\"@id\":\"https:\/\/addvalue.com.br\/novo\/#\/schema\/person\/9dcae17489d35780e33cd4f1d48db37e\"},\"headline\":\"What\u2019s New In Gartner\u2019s Hype Cycle For Endpoint Security, 2020\",\"datePublished\":\"2020-09-16T14:44:17+00:00\",\"dateModified\":\"2020-09-18T12:31:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/addvalue.com.br\/novo\/artigos\/endpoint-security-2020\/\"},\"wordCount\":1091,\"image\":{\"@id\":\"https:\/\/addvalue.com.br\/novo\/artigos\/endpoint-security-2020\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2020\/09\/endpoint_blog.jpg\",\"keywords\":[\"#Sophos\",\"Citrix\",\"Commvault\",\"Palo Alto Networks\"],\"articleSection\":[\"Artigos\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/addvalue.com.br\/novo\/artigos\/endpoint-security-2020\/\",\"url\":\"https:\/\/addvalue.com.br\/novo\/artigos\/endpoint-security-2020\/\",\"name\":\"What\u2019s New In Gartner\u2019s Hype Cycle For Endpoint Security, 2020 - Add Value\",\"isPartOf\":{\"@id\":\"https:\/\/addvalue.com.br\/novo\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/addvalue.com.br\/novo\/artigos\/endpoint-security-2020\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/addvalue.com.br\/novo\/artigos\/endpoint-security-2020\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2020\/09\/endpoint_blog.jpg\",\"datePublished\":\"2020-09-16T14:44:17+00:00\",\"dateModified\":\"2020-09-18T12:31:23+00:00\",\"author\":{\"@id\":\"https:\/\/addvalue.com.br\/novo\/#\/schema\/person\/9dcae17489d35780e33cd4f1d48db37e\"},\"breadcrumb\":{\"@id\":\"https:\/\/addvalue.com.br\/novo\/artigos\/endpoint-security-2020\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/addvalue.com.br\/novo\/artigos\/endpoint-security-2020\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/addvalue.com.br\/novo\/artigos\/endpoint-security-2020\/#primaryimage\",\"url\":\"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2020\/09\/endpoint_blog.jpg\",\"contentUrl\":\"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2020\/09\/endpoint_blog.jpg\",\"width\":700,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/addvalue.com.br\/novo\/artigos\/endpoint-security-2020\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/addvalue.com.br\/novo\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What\u2019s New In Gartner\u2019s Hype Cycle For Endpoint Security, 2020\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/addvalue.com.br\/novo\/#website\",\"url\":\"https:\/\/addvalue.com.br\/novo\/\",\"name\":\"Add Value\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/addvalue.com.br\/novo\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/addvalue.com.br\/novo\/#\/schema\/person\/9dcae17489d35780e33cd4f1d48db37e\",\"name\":\"addvalue\",\"url\":\"https:\/\/addvalue.com.br\/novo\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What\u2019s New In Gartner\u2019s Hype Cycle For Endpoint Security, 2020 - Add Value","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/addvalue.com.br\/novo\/artigos\/endpoint-security-2020\/","og_locale":"pt_BR","og_type":"article","og_title":"What\u2019s New In Gartner\u2019s Hype Cycle For Endpoint Security, 2020 - Add Value","og_description":"GETTY Remote working\u2019s rapid growth is making endpoint security an urgent priority for all organizations today. Cloud-first deployment strategies dominate the innovations on this year\u2019s Hype Cycle for Endpoint Security. Zero Trust Security (ZTNA) is gaining adoption in enterprises who realize identities are the new security perimeter of their business. By 2024, at least 40% of enterprises will have strategies for adopting Secure Access Service Edge (SASE) up from less than 1% at year-end 2018. These and many other new insights are from Gartner Hype Cycle for Endpoint Security, 2020 published earlier this year and","og_url":"https:\/\/addvalue.com.br\/novo\/artigos\/endpoint-security-2020\/","og_site_name":"Add Value","article_published_time":"2020-09-16T14:44:17+00:00","article_modified_time":"2020-09-18T12:31:23+00:00","og_image":[{"width":700,"height":350,"url":"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2020\/09\/endpoint_blog.jpg","type":"image\/jpeg"}],"author":"addvalue","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"addvalue","Est. tempo de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/addvalue.com.br\/novo\/artigos\/endpoint-security-2020\/#article","isPartOf":{"@id":"https:\/\/addvalue.com.br\/novo\/artigos\/endpoint-security-2020\/"},"author":{"name":"addvalue","@id":"https:\/\/addvalue.com.br\/novo\/#\/schema\/person\/9dcae17489d35780e33cd4f1d48db37e"},"headline":"What\u2019s New In Gartner\u2019s Hype Cycle For Endpoint Security, 2020","datePublished":"2020-09-16T14:44:17+00:00","dateModified":"2020-09-18T12:31:23+00:00","mainEntityOfPage":{"@id":"https:\/\/addvalue.com.br\/novo\/artigos\/endpoint-security-2020\/"},"wordCount":1091,"image":{"@id":"https:\/\/addvalue.com.br\/novo\/artigos\/endpoint-security-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2020\/09\/endpoint_blog.jpg","keywords":["#Sophos","Citrix","Commvault","Palo Alto Networks"],"articleSection":["Artigos"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/addvalue.com.br\/novo\/artigos\/endpoint-security-2020\/","url":"https:\/\/addvalue.com.br\/novo\/artigos\/endpoint-security-2020\/","name":"What\u2019s New In Gartner\u2019s Hype Cycle For Endpoint Security, 2020 - Add Value","isPartOf":{"@id":"https:\/\/addvalue.com.br\/novo\/#website"},"primaryImageOfPage":{"@id":"https:\/\/addvalue.com.br\/novo\/artigos\/endpoint-security-2020\/#primaryimage"},"image":{"@id":"https:\/\/addvalue.com.br\/novo\/artigos\/endpoint-security-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2020\/09\/endpoint_blog.jpg","datePublished":"2020-09-16T14:44:17+00:00","dateModified":"2020-09-18T12:31:23+00:00","author":{"@id":"https:\/\/addvalue.com.br\/novo\/#\/schema\/person\/9dcae17489d35780e33cd4f1d48db37e"},"breadcrumb":{"@id":"https:\/\/addvalue.com.br\/novo\/artigos\/endpoint-security-2020\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/addvalue.com.br\/novo\/artigos\/endpoint-security-2020\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/addvalue.com.br\/novo\/artigos\/endpoint-security-2020\/#primaryimage","url":"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2020\/09\/endpoint_blog.jpg","contentUrl":"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2020\/09\/endpoint_blog.jpg","width":700,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/addvalue.com.br\/novo\/artigos\/endpoint-security-2020\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/addvalue.com.br\/novo\/"},{"@type":"ListItem","position":2,"name":"What\u2019s New In Gartner\u2019s Hype Cycle For Endpoint Security, 2020"}]},{"@type":"WebSite","@id":"https:\/\/addvalue.com.br\/novo\/#website","url":"https:\/\/addvalue.com.br\/novo\/","name":"Add Value","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/addvalue.com.br\/novo\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Person","@id":"https:\/\/addvalue.com.br\/novo\/#\/schema\/person\/9dcae17489d35780e33cd4f1d48db37e","name":"addvalue","url":"https:\/\/addvalue.com.br\/novo\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/addvalue.com.br\/novo\/wp-json\/wp\/v2\/posts\/6361","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/addvalue.com.br\/novo\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/addvalue.com.br\/novo\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/addvalue.com.br\/novo\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/addvalue.com.br\/novo\/wp-json\/wp\/v2\/comments?post=6361"}],"version-history":[{"count":1,"href":"https:\/\/addvalue.com.br\/novo\/wp-json\/wp\/v2\/posts\/6361\/revisions"}],"predecessor-version":[{"id":6364,"href":"https:\/\/addvalue.com.br\/novo\/wp-json\/wp\/v2\/posts\/6361\/revisions\/6364"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/addvalue.com.br\/novo\/wp-json\/wp\/v2\/media\/6365"}],"wp:attachment":[{"href":"https:\/\/addvalue.com.br\/novo\/wp-json\/wp\/v2\/media?parent=6361"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/addvalue.com.br\/novo\/wp-json\/wp\/v2\/categories?post=6361"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/addvalue.com.br\/novo\/wp-json\/wp\/v2\/tags?post=6361"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}