{"content_customizations":null,"shortcut_customizations":[{"id":5643,"created_at":"2023-04-03T08:56:06.348759Z","updated_at":"2023-04-03T08:56:06.354443Z","action":"DOWNLOAD","color":"#FFFFFF","icon_url":"https://app-media-production.s3.amazonaws.com/client_docs/client_documents/272/shortcut_customizations/f9a7f7f9be994613aeb1d183cc6939b9/download_icon.svg","additional_data":{"download_url":"https://media.celero.io/users/272/content/bb2aad209ff84a30b529b637107af066/_KbY4PnW/original_file.pdf"},"content":6347}],"content_thumbnail":{"original":"/users/272/content/bb2aad209ff84a30b529b637107af066/_KbY4PnW/thumbnails/1.jpg","high_quality":{"small":"/users/272/content/bb2aad209ff84a30b529b637107af066/_KbY4PnW/thumbnails_high_quality/1.jpg","medium":"/users/272/content/bb2aad209ff84a30b529b637107af066/_KbY4PnW/thumbnails_high_quality/1_medium.jpg","large":"/users/272/content/bb2aad209ff84a30b529b637107af066/_KbY4PnW/thumbnails_high_quality/1_large.jpg","microsite_preview":"/users/272/content/bb2aad209ff84a30b529b637107af066/_KbY4PnW/thumbnails_high_quality/preview.jpg"}},"version":{"version_number":2,"version_details":{"uuid":"dfd3379e-05a2-4087-9a33-9560d04d8484","name":"Cognyte_TL_How_Security_Analytics_EB_PT","is_live":true,"access_control":{"min_stage":"EVERYONE_ALLOWED","stage_options":{"UNVERIFIED_CONTACT":{"form_preview":"LANDING_PAGE","form_id":"default"},"VERIFIED_CONTACT":{"form_preview":"LANDING_PAGE"},"GDPR_CONSENT":{},"PRIVATE":{},"EVERYONE_ALLOWED":{}}},"base_shorten":null,"tags":[]},"is_active":true,"type":"DESKTOP","version":"dfd3379e-05a2-4087-9a33-9560d04d8484","content_uuid":"e7c57817-96ab-47dc-91e9-c5abdeb7de88","version_id":"dfd3379e-05a2-4087-9a33-9560d04d8484"},"custom_events":[],"content_action":null,"content_stats":null,"content_meta_tags":null,"keywords":[],"seo_content_version_name":"cognyte-tl-how-security-analytics-eb-pt","html_snippets":null,"is_live":true,"shorten":"https://engage.cognyte.com/s/ed7ae9eb/cognyte-tl-how-security-analytics-eb-pt/","base_url":"/users/272/content/bb2aad209ff84a30b529b637107af066/_KbY4PnW","config":{"pagecount":9,"bounds":[[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286]]},"annotations":{"pages":[{"page":9,"annotations":[{"type":"Link","bounds":[74,1033,122,41],"objref":"251","action":{"type":"URI","uri":"https://www.cognyte.com/"}},{"type":"Link","bounds":[70,1025,132,55],"objref":"252","action":{"type":"URI","uri":"https://www.cognyte.com/contact/"}}]}]},"created_at":"2023-04-03T08:56:06.125986Z","updated_at":"2026-04-17T04:50:30.444192Z","original_name":"How Security Analytics Transforms the Crime & Terror Landscape_PT.pdf","uuid":"e7c57817-96ab-47dc-91e9-c5abdeb7de88","description":"COMO OS ANALÍTICOS DE SEGURANÇA TRANSFORMAM A BATALHA CONTRA O CRIME E O TERRORISMO ","is_high_quality_thumbnails_available":true,"conversion_type":"DOCUMENT"}