{"id":71094,"date":"2026-04-20T18:29:52","date_gmt":"2026-04-20T21:29:52","guid":{"rendered":"https:\/\/a3aengenharia.com\/en-us\/solutions\/geral\/endpoint-detection-and-response-edr-xdr-en\/"},"modified":"2026-04-20T18:29:52","modified_gmt":"2026-04-20T21:29:52","slug":"endpoint-detection-and-response-edr-xdr-en","status":"publish","type":"solutions","link":"https:\/\/a3aengenharia.com\/en-us\/solutions\/cybersecurity-engineering\/endpoint-detection-and-response-edr-xdr-en\/","title":{"rendered":"Endpoint Detection and Response (EDR \/ XDR)"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"featured_media":0,"parent":0,"menu_order":0,"template":"","meta":{"_a3a_post_lang":"en-us","_a3a_translation_group_id":"solutions-70788"},"segments":[409],"class_list":["post-71094","solutions","type-solutions","status-publish","hentry","segments-cybersecurity-engineering"],"_links":{"self":[{"href":"https:\/\/a3aengenharia.com\/en-us\/wp-json\/wp\/v2\/solutions\/71094","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/a3aengenharia.com\/en-us\/wp-json\/wp\/v2\/solutions"}],"about":[{"href":"https:\/\/a3aengenharia.com\/en-us\/wp-json\/wp\/v2\/types\/solutions"}],"wp:attachment":[{"href":"https:\/\/a3aengenharia.com\/en-us\/wp-json\/wp\/v2\/media?parent=71094"}],"wp:term":[{"taxonomy":"segments","embeddable":true,"href":"https:\/\/a3aengenharia.com\/en-us\/wp-json\/wp\/v2\/segments?post=71094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}