{"id":5669,"date":"2016-10-25T15:04:58","date_gmt":"2016-10-25T18:04:58","guid":{"rendered":"https:\/\/ostec.blog\/generico\/next-generation-firewall"},"modified":"2020-10-02T11:49:25","modified_gmt":"2020-10-02T14:49:25","slug":"next-generation-firewall","status":"publish","type":"post","link":"https:\/\/ostec.blog\/en\/perimeter\/next-generation-firewall\/","title":{"rendered":"Next Generation Firewall and the impact on corporate security"},"content":{"rendered":"<p>Technology is part of the day-to-day operations in companies of the most varied sizes and segments, assisting in the execution of operational and managerial tasks, adding value to the business. Computerization is part of the strategy of companies that envisage ever more productive and lean structures.<\/p>\n<p>Applications for video conferencing, messaging, social networking, file storage are examples of software widely used by companies, regardless of their size. These applications have specific features, and within the security context, they should receive special attention, avoiding improper use and damage to the business.<\/p>\n<p>In this blog post, we will cover concepts associated to<strong>Next Generation Firewall<\/strong>, including functions that differentiate <em>NGFWs<\/em>from traditional <a href=\"https:\/\/blog.ostec.com.br\/firewall-historia-conceito-e-terminologia\">firewalls<\/a>, especially regarding <a href=\"https:\/\/blog.ostec.com.br\/seguranca-perimetro\/o-que-e-controle-de-aplicacao\"><em>application control<\/em><\/a>. Continue reading and understand a little more about the features of a <strong>Next Generation Firewall<\/strong>.<\/p>\n<h2>Defining Application<\/h2>\n<p>Applications are present in many parts of organizations, even if they often go unnoticed. Applications have emerged to meet timely demands, and are typically used to perform everyday tasks, enhancing productivity and organizational concepts.<\/p>\n<p>In this line, we have a wide range of applications, which are common to most businesses, such as Email applications (Gmail), file exchange (Google drive, Dropbox, etc.), video conferencing and messaging (Skype), CRMs, social networks (Facebook, Linkedin), applications for remote access (Ammy, Team Viewer, etc). All of these applications are designed for personal and corporate purposes and are considered &#8220;safe&#8221;, however, the corporate use of the applications inspires care, and expert assessment is indicated prior to deployment and dissemination as a corporate solution.<\/p>\n<p>Also with regard to applications, it is worth mentioning the existence of apps considered harmful to the corporate environment, such as anonymous proxy cases (Ultrasurf), used for anonymous browsing on the Internet, avoiding the tracing and identification of connections.<\/p>\n<h2>Conceptualizing Next Generation Firewall<\/h2>\n<p>&#8220;Next-generation firewalls integrate three key assets: enterprise firewall capabilities, an intrusion prevention system (IPS) and application control. Like the introduction of stateful inspection in first-generation firewalls, NGFWs bring additional context to the firewall\u2019s decision-making process by providing it with the ability to understand the details of the Web application traffic passing through it and taking action to block traffic that might exploit vulnerabilities.&#8221; (Rouse, 2014).<\/p>\n<p>The differential assigned to <em>NGFW<\/em>s lies in the ability to do everything a traditional Firewall can do, with the ability to combine innovative, high-performance threat identification technologies to provide an efficient and complete enterprise solution.<\/p>\n<p>One of the features most evident in <strong>Next Generation Firewall<\/strong>is the visibility on the applications and possibility of control of them, abstracting IP\/Port, as used in traditional firewalls. In this case, the solution administrator does not need to know the ports nor the range of IP addresses of a service; the application control, present in <em>NGFW<\/em>s &#8220;recognizes&#8221; the services and allows release or blocking of accesses based on the name of the application\/service. This type of control is more effective and facilitates the administration of rules applied in the perimeter of the corporate network.<\/p>\n<p>Still with respect to the recognition of applications, it is important to complement that this feature allows the recognition of &#8220;segments of applications&#8221;, guaranteeing greater depth in the controls. Facebook serves as an example to illustrate how the feature works. With application control, it is possible to free access to <em>Facebook<\/em>and limit access to the tool <em>Chat<\/em>, for example, ensuring customization of social network usage in corporate environments.<\/p>\n<p><strong>Next Generation Firewalls<\/strong>, through the application control module, also allow the management of applications that use encrypted communication protocols with dynamic IPs, such as the Skype instant communicator. For these cases, the control based on IP\/Port becomes complex, with some limitations.<\/p>\n<p>The concept of intrusion prevention (IPS) also has differential treatment in <em>NGFW<\/em>s. Intrusion Prevention System (IPS) features, within the &#8220;<em>Next Generation<\/em>&#8221; concept, include comprehensive visibility capability, which monitors real-time changes in the environment. The prevention system must also have the ability to understand and control threats that act at the application layer, in addition to detecting advanced threats such as malware.<\/p>\n<h2>Key Features of a Next Generation Firewall<\/h2>\n<p>A common question among information security professionals is how to identify &#8220;Next Generation&#8221; solutions. In this sense, some points should be observed, such as:<\/p>\n<ul>\n<li>Identification of applications, regardless of port, protocol or any other technique that increases the degree of complexity of the control;<\/li>\n<li>Providing granular visibility, enabling policy development based on individualized applications;<\/li>\n<li>Possibility of integration with LDAP directories, for user identification and better control;<\/li>\n<li>Providing real-time protection against a significant number of threats, including those operating at the application layer;<\/li>\n<li>Integrate, not just combine, traditional firewall features and intrusion prevention techniques;<\/li>\n<li>Solutions with high degree of performance, without degradation of the hardware resource;<\/li>\n<\/ul>\n<p>The challenges associated with information security in corporate environments are numerous, so companies of all sizes and segments should seek help to organize security structures that add value to the business, being sustainable.<\/p>\n<p>Improve your knowledge by reading our contents and if you need help, feel free to talk to one of our experts.<\/p>\n<h2>Keep reading<\/h2>\n<p>[latest_post type=&#8217;boxes&#8217; number_of_posts=&#8217;3&#8242; number_of_colums=&#8217;3&#8242; order_by=&#8217;date&#8217; order=&#8217;ASC&#8217; category=&#8217;learning-and-discovery&#8217; text_length=&#8217;100&#8242; title_tag=&#8217;h4&#8242; display_category=&#8217;0&#8242; display_time=&#8217;0&#8242; display_comments=&#8217;0&#8242; display_like=&#8217;0&#8242; display_share=&#8217;0&#8242;]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Technology is part of the day-to-day operations in companies of the most varied sizes and segments, assisting in the execution of operational and managerial tasks, adding value to the business. Computerization is part of the strategy of companies that envisage ever more productive and lean structures. Applications for video conferencing, messaging, social networking, file storage [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":12828,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[984,988,991,411,424],"tags":[1598,1599],"class_list":["post-5669","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","category-information-loss-or-leakage","category-internet-productivity","category-perimeter","category-solution-appreciation","tag-next-generation-firewall-en","tag-ngfw-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Next Generation Firewall and the impact on corporate security - OSTEC<\/title>\n<meta name=\"description\" content=\"Learn about Next Generation Firewall features, including features associated with application control, intrusion prediction, and more. Check out!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ostec.blog\/en\/perimeter\/next-generation-firewall\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Next Generation Firewall and the impact on corporate security - OSTEC\" \/>\n<meta property=\"og:description\" content=\"Learn about Next Generation Firewall features, including features associated with application control, intrusion prediction, and more. Check out!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ostec.blog\/en\/perimeter\/next-generation-firewall\/\" \/>\n<meta property=\"og:site_name\" content=\"OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ostec\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-25T18:04:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-02T14:49:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/10\/Escudo-de-seguran\u00e7a.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"928\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Labbo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ostecsecurity\" \/>\n<meta name=\"twitter:site\" content=\"@ostecsecurity\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/next-generation-firewall\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/next-generation-firewall\/\"},\"author\":{\"name\":\"Labbo\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f\"},\"headline\":\"Next Generation Firewall and the impact on corporate security\",\"datePublished\":\"2016-10-25T18:04:58+00:00\",\"dateModified\":\"2020-10-02T14:49:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/next-generation-firewall\/\"},\"wordCount\":883,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/next-generation-firewall\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/10\/Escudo-de-seguran\u00e7a.jpg\",\"keywords\":[\"next generation firewall\",\"ngfw\"],\"articleSection\":[\"General\",\"Information loss or leakage\",\"Internet productivity\",\"Perimeter\",\"Solution appreciation\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ostec.blog\/en\/perimeter\/next-generation-firewall\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/next-generation-firewall\/\",\"url\":\"https:\/\/ostec.blog\/en\/perimeter\/next-generation-firewall\/\",\"name\":\"Next Generation Firewall and the impact on corporate security - OSTEC\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/next-generation-firewall\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/next-generation-firewall\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/10\/Escudo-de-seguran\u00e7a.jpg\",\"datePublished\":\"2016-10-25T18:04:58+00:00\",\"dateModified\":\"2020-10-02T14:49:25+00:00\",\"description\":\"Learn about Next Generation Firewall features, including features associated with application control, intrusion prediction, and more. Check out!\",\"breadcrumb\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/next-generation-firewall\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ostec.blog\/en\/perimeter\/next-generation-firewall\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/next-generation-firewall\/#primaryimage\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/10\/Escudo-de-seguran\u00e7a.jpg\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/10\/Escudo-de-seguran\u00e7a.jpg\",\"width\":928,\"height\":534,\"caption\":\"Imagem vetorizada de escudo de seguran\u00e7a.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/next-generation-firewall\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/ostec.blog\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Next Generation Firewall and the impact on corporate security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ostec.blog\/#website\",\"url\":\"https:\/\/ostec.blog\/\",\"name\":\"OSTEC | Seguran\u00e7a digital de resultados\",\"description\":\"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.\",\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ostec.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ostec.blog\/#organization\",\"name\":\"OSTEC Business Security\",\"url\":\"https:\/\/ostec.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"width\":251,\"height\":67,\"caption\":\"OSTEC Business Security\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ostec\",\"https:\/\/x.com\/ostecsecurity\",\"https:\/\/www.instagram.com\/ostecsecurity\/\",\"https:\/\/linkedin.com\/company\/ostec-security\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f\",\"name\":\"Labbo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g\",\"caption\":\"Labbo\"},\"url\":\"https:\/\/ostec.blog\/en\/author\/labbo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Next Generation Firewall and the impact on corporate security - OSTEC","description":"Learn about Next Generation Firewall features, including features associated with application control, intrusion prediction, and more. Check out!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ostec.blog\/en\/perimeter\/next-generation-firewall\/","og_locale":"en_US","og_type":"article","og_title":"Next Generation Firewall and the impact on corporate security - OSTEC","og_description":"Learn about Next Generation Firewall features, including features associated with application control, intrusion prediction, and more. Check out!","og_url":"https:\/\/ostec.blog\/en\/perimeter\/next-generation-firewall\/","og_site_name":"OSTEC | Seguran\u00e7a digital de resultados","article_publisher":"https:\/\/www.facebook.com\/ostec","article_published_time":"2016-10-25T18:04:58+00:00","article_modified_time":"2020-10-02T14:49:25+00:00","og_image":[{"width":928,"height":534,"url":"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/10\/Escudo-de-seguran\u00e7a.jpg","type":"image\/jpeg"}],"author":"Labbo","twitter_card":"summary_large_image","twitter_creator":"@ostecsecurity","twitter_site":"@ostecsecurity","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ostec.blog\/en\/perimeter\/next-generation-firewall\/#article","isPartOf":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/next-generation-firewall\/"},"author":{"name":"Labbo","@id":"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f"},"headline":"Next Generation Firewall and the impact on corporate security","datePublished":"2016-10-25T18:04:58+00:00","dateModified":"2020-10-02T14:49:25+00:00","mainEntityOfPage":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/next-generation-firewall\/"},"wordCount":883,"commentCount":0,"publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"image":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/next-generation-firewall\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/10\/Escudo-de-seguran\u00e7a.jpg","keywords":["next generation firewall","ngfw"],"articleSection":["General","Information loss or leakage","Internet productivity","Perimeter","Solution appreciation"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ostec.blog\/en\/perimeter\/next-generation-firewall\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ostec.blog\/en\/perimeter\/next-generation-firewall\/","url":"https:\/\/ostec.blog\/en\/perimeter\/next-generation-firewall\/","name":"Next Generation Firewall and the impact on corporate security - OSTEC","isPartOf":{"@id":"https:\/\/ostec.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/next-generation-firewall\/#primaryimage"},"image":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/next-generation-firewall\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/10\/Escudo-de-seguran\u00e7a.jpg","datePublished":"2016-10-25T18:04:58+00:00","dateModified":"2020-10-02T14:49:25+00:00","description":"Learn about Next Generation Firewall features, including features associated with application control, intrusion prediction, and more. Check out!","breadcrumb":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/next-generation-firewall\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ostec.blog\/en\/perimeter\/next-generation-firewall\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/en\/perimeter\/next-generation-firewall\/#primaryimage","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/10\/Escudo-de-seguran\u00e7a.jpg","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/10\/Escudo-de-seguran\u00e7a.jpg","width":928,"height":534,"caption":"Imagem vetorizada de escudo de seguran\u00e7a."},{"@type":"BreadcrumbList","@id":"https:\/\/ostec.blog\/en\/perimeter\/next-generation-firewall\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/ostec.blog\/en\/"},{"@type":"ListItem","position":2,"name":"Next Generation Firewall and the impact on corporate security"}]},{"@type":"WebSite","@id":"https:\/\/ostec.blog\/#website","url":"https:\/\/ostec.blog\/","name":"OSTEC | Seguran\u00e7a digital de resultados","description":"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.","publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ostec.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ostec.blog\/#organization","name":"OSTEC Business Security","url":"https:\/\/ostec.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","width":251,"height":67,"caption":"OSTEC Business Security"},"image":{"@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ostec","https:\/\/x.com\/ostecsecurity","https:\/\/www.instagram.com\/ostecsecurity\/","https:\/\/linkedin.com\/company\/ostec-security"]},{"@type":"Person","@id":"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f","name":"Labbo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g","caption":"Labbo"},"url":"https:\/\/ostec.blog\/en\/author\/labbo\/"}]}},"_links":{"self":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts\/5669","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/comments?post=5669"}],"version-history":[{"count":0,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts\/5669\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/media\/12828"}],"wp:attachment":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/media?parent=5669"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/categories?post=5669"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/tags?post=5669"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}