{"id":2460,"date":"2023-05-19T13:50:52","date_gmt":"2023-05-19T13:50:52","guid":{"rendered":"https:\/\/lp.stitcloud.com\/?p=2460"},"modified":"2025-07-12T11:34:39","modified_gmt":"2025-07-12T11:34:39","slug":"mitos-e-verdades-da-tecnologia-parte-3-data-lake-seguranca","status":"publish","type":"post","link":"https:\/\/www.stitcloud.com\/en\/blog\/mitos-e-verdades-da-tecnologia-parte-3-data-lake-seguranca\/","title":{"rendered":"Technology Myths and Truths Part 3 Data Lake Security"},"content":{"rendered":"<h2>Data Lake Myths and Truths about its Security<\/h2>\n<p><\/p>\n\n\n<\/p>\n<h2 class=\"wp-block-heading\">The security of your Data Lake is one of the main aspects to consider when creating a data storage and processing solution.\u00a0<\/h2>\n<p>Firstly, it is important to guarantee the integrity, confidentiality and availability of data, in addition to preventing external and internal threats.\u00a0<\/p>\n<p>To achieve this, it is necessary to implement security measures, such as encryption, access control, monitoring of suspicious activities.\u00a0<\/p>\n<p>Furthermore, regular backups and penetration testing are essential to maintain Data Lake security.\u00a0<\/p>\n<p>Al\u00e9m das medidas t\u00e9cnicas\u00a0\u00e9 fundamental seguir as regulamenta\u00e7\u00f5es e leis de prote\u00e7\u00e3o de dados.\u00a0 No Brasil,\u00a0a LGPD estabelece diretrizes espec\u00edficas, enquanto na Europa,\u00a0a GDPR na Europa \u00e9 uma refer\u00eancia importante.\u00a0<\/p>\n<p>Lack of security can lead to data loss, leakage of sensitive information, damage to the company&#039;s reputation and possible legal sanctions.\u00a0<\/p>\n<p>\n\n\n\n<\/p>\n<ul class=\"wp-block-list\">\n\n<\/ul>\n<p>\n\n<\/p>\t\t\n\t\t\t<h3>Uncovering the Myths and Truths about the Security of your Data Lake<\/h3>\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<a tabindex=\"0\">Myth 1: Data Lake security is a technical issue and does not need to be addressed at a strategic level<\/a>\n\t\t\t\t\t<h4>Truth: Data Lake security must be addressed at a strategic level to ensure that security policies are aligned with the company&#039;s business objectives.<\/h4>\n<h4>Security should be a concern at all levels of the company, from senior management to end users.<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t<a tabindex=\"0\">Myth 2: Data Lake security is an IT department&#039;s sole concern<\/a>\n\t\t\t\t\t<h4>Truth: Although the IT team plays an important role in Data Lake security, all company stakeholders must be aware of security measures and contribute to their implementation.<\/h4>\n<h4>End user awareness and training is important to prevent internal security breaches.<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t<a tabindex=\"0\">Myth 3: Data Lake security is the sole responsibility of the cloud provider<\/a>\n\t\t\t\t\t<p>Truth: While the cloud provider is responsible for providing a secure infrastructure, the company is responsible for ensuring the security of the data it stores in the Data Lake. This includes implementing security policies, encrypting sensitive data, and controlling access to data.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t<a tabindex=\"0\">Myth 4: Compliance with regulations is enough to ensure data lake security<\/a>\n\t\t\t\t\t<p>Truth: While regulatory compliance is important to ensuring data lake security, it is not sufficient on its own. Regulations establish minimum security requirements, but companies must implement additional security measures to protect their data and prevent breaches.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t<a tabindex=\"0\">Myth 5: Data Lake security can be neglected if the company relies on third-party solutions for data processing<\/a>\n\t\t\t\t\t<p>Truth: Data Lake security is the company&#039;s responsibility, regardless of who is processing the data. It is important to ensure that the third-party solutions the company uses also implement adequate security measures.\u00a0<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t<a tabindex=\"0\">Myth 6: Using antivirus software is enough to protect the data lake<\/a>\n\t\t\t\t\t<p>Truth: While using antivirus software is an important security measure, it is not sufficient on its own. Cyber threats are constantly evolving, and it is necessary to implement multiple layers of security to ensure data protection.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t<a tabindex=\"0\">Myth 7: Encryption is enough to protect data in the data lake<\/a>\n\t\t\t\t\t<p><strong>True:<\/strong>\u00a0Encryption is an important security measure, but it is not sufficient by itself. The company must also implement access controls, security monitoring and other security measures to protect data.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t<a tabindex=\"0\">Myth 8: Data Lake security is not important for smaller companies<\/a>\n\t\t\t\t\t<p>Truth: Data Lake security is important for companies of all sizes, as all companies store sensitive and strategic data that needs to be protected. Smaller businesses can also be targets of hackers and need to implement appropriate security measures to protect their data.\u00a0<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t<a tabindex=\"0\">Myth 9: Data Lake security is too expensive<\/a>\n\t\t\t\t\t<p>Truth: While Data Lake security can require a significant upfront investment, the costs of a data breach can be much greater. Data Lake security is an investment that can protect your data and your company&#039;s future.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t<a tabindex=\"0\">Myth 10: The cloud is less secure than local storage<\/a>\n\t\t\t\t\t<h6>Truth: The cloud can be as secure or even more secure than on-premises storage, as long as the company implements the appropriate security measures. Cloud providers have teams dedicated to ensuring the security of cloud infrastructure and implement stringent security measures to protect data. \u00a0<\/h6>\n\t\t\t<h5>Importance<\/h5>\t\t\n\t\t<p>Data Lake security is an investment that can protect the data and future of your business and is essential for protecting the company&#039;s confidential and strategic data. <br style=\"white-space-collapse: preserve;\" \/><br style=\"white-space-collapse: preserve;\" \/>Companies must implement appropriate security measures, including encryption, access controls, security monitoring and two-factor authentication. <br style=\"white-space-collapse: preserve;\" \/><br style=\"white-space-collapse: preserve;\" \/>Data Lake security is an investment that can protect the data and future of your business and is essential for protecting the company&#039;s confidential and strategic data. <br style=\"white-space-collapse: preserve;\" \/><br style=\"white-space-collapse: preserve;\" \/>While the cloud provider is responsible for providing a secure infrastructure, the company is responsible for ensuring the security of its data.<\/p>\t\t\n\t\t\t<a href=\"https:\/\/www.stitcloud.com\/en\/contato\/\">\n\t\t\t\t\t\tSpeak to an expert\n\t\t\t\t\t<\/a>","protected":false},"excerpt":{"rendered":"<p>Data Lake Myths and Truths about its Security The security of your Data Lake is one of the main aspects to be considered when creating a data storage and processing solution. Firstly, it is important to guarantee the integrity, confidentiality and availability of data, in addition to preventing external and internal threats. To achieve this, it is necessary to implement measures [\u2026]<\/p>","protected":false},"author":2,"featured_media":4498,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19,20],"tags":[],"class_list":["post-2460","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-laker","category-data-analytics"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Mitos e Verdades da Tecnologia Parte 3 Data Lake Seguran\u00e7a<\/title>\n<meta name=\"description\" content=\"A seguran\u00e7a do Data Lake \u00e9 um dos principais aspectos a serem considerados ao criar uma solu\u00e7\u00e3o de armazenamento e processamento de dados.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/stitcloud.com\/blog\/mitos-e-verdades-da-tecnologia-parte-3-data-lake-seguranca\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mitos e Verdades da Tecnologia Parte 3 Data Lake Seguran\u00e7a\" \/>\n<meta property=\"og:description\" content=\"A seguran\u00e7a do Data Lake \u00e9 um dos principais aspectos a serem considerados ao criar uma solu\u00e7\u00e3o de armazenamento e processamento de dados.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/stitcloud.com\/blog\/mitos-e-verdades-da-tecnologia-parte-3-data-lake-seguranca\/\" \/>\n<meta property=\"og:site_name\" content=\"ST IT Cloud\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-19T13:50:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-12T11:34:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/stitcloud.com\/wp-content\/uploads\/2023\/07\/governana-de-dados-data-lake.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Agencia TechD\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Agencia TechD\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/stitcloud.com\\\/blog\\\/mitos-e-verdades-da-tecnologia-parte-3-data-lake-seguranca\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/stitcloud.com\\\/blog\\\/mitos-e-verdades-da-tecnologia-parte-3-data-lake-seguranca\\\/\"},\"author\":{\"name\":\"Agencia TechD\",\"@id\":\"https:\\\/\\\/www.stitcloud.com\\\/#\\\/schema\\\/person\\\/f9d98f0f3255478c92ab8a083868edb6\"},\"headline\":\"Mitos e Verdades da Tecnologia Parte 3 Data Lake Seguran\u00e7a\",\"datePublished\":\"2023-05-19T13:50:52+00:00\",\"dateModified\":\"2025-07-12T11:34:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/stitcloud.com\\\/blog\\\/mitos-e-verdades-da-tecnologia-parte-3-data-lake-seguranca\\\/\"},\"wordCount\":935,\"publisher\":{\"@id\":\"https:\\\/\\\/www.stitcloud.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/stitcloud.com\\\/blog\\\/mitos-e-verdades-da-tecnologia-parte-3-data-lake-seguranca\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stitcloud.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/governana-de-dados-data-lake.jpg\",\"articleSection\":[\"Cloud Laker\",\"Data Analytics\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/stitcloud.com\\\/blog\\\/mitos-e-verdades-da-tecnologia-parte-3-data-lake-seguranca\\\/\",\"url\":\"https:\\\/\\\/stitcloud.com\\\/blog\\\/mitos-e-verdades-da-tecnologia-parte-3-data-lake-seguranca\\\/\",\"name\":\"Mitos e Verdades da Tecnologia Parte 3 Data Lake Seguran\u00e7a\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stitcloud.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/stitcloud.com\\\/blog\\\/mitos-e-verdades-da-tecnologia-parte-3-data-lake-seguranca\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/stitcloud.com\\\/blog\\\/mitos-e-verdades-da-tecnologia-parte-3-data-lake-seguranca\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stitcloud.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/governana-de-dados-data-lake.jpg\",\"datePublished\":\"2023-05-19T13:50:52+00:00\",\"dateModified\":\"2025-07-12T11:34:39+00:00\",\"description\":\"A seguran\u00e7a do Data Lake \u00e9 um dos principais aspectos a serem considerados ao criar uma solu\u00e7\u00e3o de armazenamento e processamento de dados.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/stitcloud.com\\\/blog\\\/mitos-e-verdades-da-tecnologia-parte-3-data-lake-seguranca\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/stitcloud.com\\\/blog\\\/mitos-e-verdades-da-tecnologia-parte-3-data-lake-seguranca\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/stitcloud.com\\\/blog\\\/mitos-e-verdades-da-tecnologia-parte-3-data-lake-seguranca\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.stitcloud.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/governana-de-dados-data-lake.jpg\",\"contentUrl\":\"https:\\\/\\\/www.stitcloud.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/governana-de-dados-data-lake.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"Data Lake - Governan\u00e7a de Dados\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/stitcloud.com\\\/blog\\\/mitos-e-verdades-da-tecnologia-parte-3-data-lake-seguranca\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/www.stitcloud.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mitos e Verdades da Tecnologia Parte 3 Data Lake Seguran\u00e7a\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.stitcloud.com\\\/#website\",\"url\":\"https:\\\/\\\/www.stitcloud.com\\\/\",\"name\":\"ST IT Cloud\",\"description\":\"Especialistas em Data Analytics, IA e Machine Learning\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.stitcloud.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.stitcloud.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.stitcloud.com\\\/#organization\",\"name\":\"ST IT Cloud\",\"url\":\"https:\\\/\\\/www.stitcloud.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.stitcloud.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.stitcloud.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/logo-ST-IT-CLOUD.svg\",\"contentUrl\":\"https:\\\/\\\/www.stitcloud.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/logo-ST-IT-CLOUD.svg\",\"width\":70,\"height\":79,\"caption\":\"ST IT Cloud\"},\"image\":{\"@id\":\"https:\\\/\\\/www.stitcloud.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.stitcloud.com\\\/#\\\/schema\\\/person\\\/f9d98f0f3255478c92ab8a083868edb6\",\"name\":\"Agencia TechD\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/584e06e1e3102f758eddae0bbdafbf40687dd541f9e7c25bc06f4c9200343a6a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/584e06e1e3102f758eddae0bbdafbf40687dd541f9e7c25bc06f4c9200343a6a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/584e06e1e3102f758eddae0bbdafbf40687dd541f9e7c25bc06f4c9200343a6a?s=96&d=mm&r=g\",\"caption\":\"Agencia TechD\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Mitos e Verdades da Tecnologia Parte 3 Data Lake Seguran\u00e7a","description":"A seguran\u00e7a do Data Lake \u00e9 um dos principais aspectos a serem considerados ao criar uma solu\u00e7\u00e3o de armazenamento e processamento de dados.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/stitcloud.com\/blog\/mitos-e-verdades-da-tecnologia-parte-3-data-lake-seguranca\/","og_locale":"en_US","og_type":"article","og_title":"Mitos e Verdades da Tecnologia Parte 3 Data Lake Seguran\u00e7a","og_description":"A seguran\u00e7a do Data Lake \u00e9 um dos principais aspectos a serem considerados ao criar uma solu\u00e7\u00e3o de armazenamento e processamento de dados.","og_url":"https:\/\/stitcloud.com\/blog\/mitos-e-verdades-da-tecnologia-parte-3-data-lake-seguranca\/","og_site_name":"ST IT Cloud","article_published_time":"2023-05-19T13:50:52+00:00","article_modified_time":"2025-07-12T11:34:39+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/stitcloud.com\/wp-content\/uploads\/2023\/07\/governana-de-dados-data-lake.jpg","type":"image\/jpeg"}],"author":"Agencia TechD","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Agencia TechD","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/stitcloud.com\/blog\/mitos-e-verdades-da-tecnologia-parte-3-data-lake-seguranca\/#article","isPartOf":{"@id":"https:\/\/stitcloud.com\/blog\/mitos-e-verdades-da-tecnologia-parte-3-data-lake-seguranca\/"},"author":{"name":"Agencia TechD","@id":"https:\/\/www.stitcloud.com\/#\/schema\/person\/f9d98f0f3255478c92ab8a083868edb6"},"headline":"Mitos e Verdades da Tecnologia Parte 3 Data Lake Seguran\u00e7a","datePublished":"2023-05-19T13:50:52+00:00","dateModified":"2025-07-12T11:34:39+00:00","mainEntityOfPage":{"@id":"https:\/\/stitcloud.com\/blog\/mitos-e-verdades-da-tecnologia-parte-3-data-lake-seguranca\/"},"wordCount":935,"publisher":{"@id":"https:\/\/www.stitcloud.com\/#organization"},"image":{"@id":"https:\/\/stitcloud.com\/blog\/mitos-e-verdades-da-tecnologia-parte-3-data-lake-seguranca\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stitcloud.com\/wp-content\/uploads\/2023\/07\/governana-de-dados-data-lake.jpg","articleSection":["Cloud Laker","Data Analytics"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/stitcloud.com\/blog\/mitos-e-verdades-da-tecnologia-parte-3-data-lake-seguranca\/","url":"https:\/\/stitcloud.com\/blog\/mitos-e-verdades-da-tecnologia-parte-3-data-lake-seguranca\/","name":"Mitos e Verdades da Tecnologia Parte 3 Data Lake Seguran\u00e7a","isPartOf":{"@id":"https:\/\/www.stitcloud.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/stitcloud.com\/blog\/mitos-e-verdades-da-tecnologia-parte-3-data-lake-seguranca\/#primaryimage"},"image":{"@id":"https:\/\/stitcloud.com\/blog\/mitos-e-verdades-da-tecnologia-parte-3-data-lake-seguranca\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stitcloud.com\/wp-content\/uploads\/2023\/07\/governana-de-dados-data-lake.jpg","datePublished":"2023-05-19T13:50:52+00:00","dateModified":"2025-07-12T11:34:39+00:00","description":"A seguran\u00e7a do Data Lake \u00e9 um dos principais aspectos a serem considerados ao criar uma solu\u00e7\u00e3o de armazenamento e processamento de dados.","breadcrumb":{"@id":"https:\/\/stitcloud.com\/blog\/mitos-e-verdades-da-tecnologia-parte-3-data-lake-seguranca\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/stitcloud.com\/blog\/mitos-e-verdades-da-tecnologia-parte-3-data-lake-seguranca\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/stitcloud.com\/blog\/mitos-e-verdades-da-tecnologia-parte-3-data-lake-seguranca\/#primaryimage","url":"https:\/\/www.stitcloud.com\/wp-content\/uploads\/2023\/07\/governana-de-dados-data-lake.jpg","contentUrl":"https:\/\/www.stitcloud.com\/wp-content\/uploads\/2023\/07\/governana-de-dados-data-lake.jpg","width":1920,"height":1080,"caption":"Data Lake - Governan\u00e7a de Dados"},{"@type":"BreadcrumbList","@id":"https:\/\/stitcloud.com\/blog\/mitos-e-verdades-da-tecnologia-parte-3-data-lake-seguranca\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/www.stitcloud.com\/"},{"@type":"ListItem","position":2,"name":"Mitos e Verdades da Tecnologia Parte 3 Data Lake Seguran\u00e7a"}]},{"@type":"WebSite","@id":"https:\/\/www.stitcloud.com\/#website","url":"https:\/\/www.stitcloud.com\/","name":"ST IT Cloud","description":"Especialistas em Data Analytics, IA e Machine Learning","publisher":{"@id":"https:\/\/www.stitcloud.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stitcloud.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.stitcloud.com\/#organization","name":"ST IT Cloud","url":"https:\/\/www.stitcloud.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stitcloud.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.stitcloud.com\/wp-content\/uploads\/2024\/02\/logo-ST-IT-CLOUD.svg","contentUrl":"https:\/\/www.stitcloud.com\/wp-content\/uploads\/2024\/02\/logo-ST-IT-CLOUD.svg","width":70,"height":79,"caption":"ST IT Cloud"},"image":{"@id":"https:\/\/www.stitcloud.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.stitcloud.com\/#\/schema\/person\/f9d98f0f3255478c92ab8a083868edb6","name":"Agencia TechD","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/584e06e1e3102f758eddae0bbdafbf40687dd541f9e7c25bc06f4c9200343a6a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/584e06e1e3102f758eddae0bbdafbf40687dd541f9e7c25bc06f4c9200343a6a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/584e06e1e3102f758eddae0bbdafbf40687dd541f9e7c25bc06f4c9200343a6a?s=96&d=mm&r=g","caption":"Agencia TechD"}}]}},"_links":{"self":[{"href":"https:\/\/www.stitcloud.com\/en\/wp-json\/wp\/v2\/posts\/2460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stitcloud.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stitcloud.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stitcloud.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stitcloud.com\/en\/wp-json\/wp\/v2\/comments?post=2460"}],"version-history":[{"count":0,"href":"https:\/\/www.stitcloud.com\/en\/wp-json\/wp\/v2\/posts\/2460\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stitcloud.com\/en\/wp-json\/wp\/v2\/media\/4498"}],"wp:attachment":[{"href":"https:\/\/www.stitcloud.com\/en\/wp-json\/wp\/v2\/media?parent=2460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stitcloud.com\/en\/wp-json\/wp\/v2\/categories?post=2460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stitcloud.com\/en\/wp-json\/wp\/v2\/tags?post=2460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}