{"id":4220,"date":"2021-09-10T12:33:32","date_gmt":"2021-09-10T15:33:32","guid":{"rendered":"https:\/\/greatystudio.com.br\/secure\/?page_id=4220"},"modified":"2021-09-30T10:42:06","modified_gmt":"2021-09-30T13:42:06","slug":"defesa-cibernetica","status":"publish","type":"page","link":"https:\/\/greatystudio.com.br\/secure\/servicos\/defesa-cibernetica\/","title":{"rendered":"Servi\u00e7o de Defesa Cibern\u00e9tica"},"content":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221; content_placement=&#8221;top&#8221; pix_padding_top=&#8221;padding No&#8221; pix_padding_bottom=&#8221;padding No&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631737622102{margin-top: -6px !important;background: rgba(0,0,0,0.7) url(https:\/\/greatystudio.com.br\/secure\/wp-content\/uploads\/2021\/09\/WhatsApp-Image-2021-09-15-at-16.00.46-3.jpeg?id=4412) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;*background-color: rgb(0,0,0) !important;}&#8221;][vc_column][vc_empty_space height=&#8221;300px&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; pix_padding_top=&#8221;padding M&#8221; pix_padding_bottom=&#8221;padding No&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631719710591{padding-right: 40px !important;padding-left: 40px !important;background-color: #000000 !important;}&#8221;][vc_column][common_title title=&#8221;Servi\u00e7os de Defesa Cibern\u00e9tica&#8221; padding=&#8221;off&#8221; color=&#8221;white-heading&#8221;][\/common_title][vc_column_text css=&#8221;.vc_custom_1631902211930{padding-right: 300px !important;padding-left: 300px !important;}&#8221;]<\/p>\n<p style=\"text-align: justify; text-align-last: center; color: white;\">Hoje, as empresas precisam presumir que os ataques cibern\u00e9ticos n\u00e3o apenas ocorrer\u00e3o, mas tamb\u00e9m ser\u00e3o bem-sucedidos. Portanto, medidas eficazes de defesa combinadas com detec\u00e7\u00e3o de incidentes e servi\u00e7os de resposta s\u00e3o cada vez mais importantes. Em nosso Cyber \u200b\u200bDefense Center com certifica\u00e7\u00e3o ISO 27001 e ISAE 3000 Tipo 2, combinamos expertise de primeira classe e tecnologias sofisticadas com os muitos anos de experi\u00eancia de nossos especialistas em seguran\u00e7a e analistas de amea\u00e7as. Nossos abrangentes Servi\u00e7os de Defesa Cibern\u00e9tica protegem suas infraestruturas locais, em nuvem, IoT e OT 24 horas por dia.<\/p>\n<p>[\/vc_column_text][vc_row_inner gap=&#8221;35&#8243; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631719728470{background-color: #000000 !important;}&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][common_title title=&#8221;Servi\u00e7os B\u00e1sicos de Detec\u00e7\u00e3o&#8221; color=&#8221;white-heading&#8221; css=&#8221;.vc_custom_1631902267109{padding-left: 300px !important;}&#8221;]<\/p>\n<p style=\"text-align: justify; color: white;\">A defesa bem-sucedida contra ataques cibern\u00e9ticos come\u00e7a com a elimina\u00e7\u00e3o proativa de vulnerabilidades conhecidas em sua infraestrutura, bem como o registro e an\u00e1lise cont\u00ednuos de informa\u00e7\u00f5es de log de todos os componentes do sistema.<\/p>\n<p>[\/common_title][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1631902287059{padding-right: 300px !important;}&#8221;][common_tab_acc toggle_type=&#8221;accordion&#8221; collapse=&#8221;on&#8221; accordion=&#8221;%5B%7B%22label_a%22%3A%22Gest%C3%A3o%20de%20Vulnerabilidade%22%2C%22content_a%22%3A%22%3Cp%20style%3D%5C%22text-align%3A%20justify%3B%20color%3Awhite%3B%5C%22%3EGerenciar%20o%20cen%C3%A1rio%20de%20amea%C3%A7as%20em%20constante%20mudan%C3%A7a%20inclui%20varredura%20de%20vulnerabilidade%20permanente.%20Nossos%20especialistas%20em%20seguran%C3%A7a%20cibern%C3%A9tica%20monitoram%20e%20examinam%20sua%20infraestrutura%20para%20descobrir%20vulnerabilidades%20e%20configura%C3%A7%C3%B5es%20incorretas%20em%20um%20est%C3%A1gio%20inicial.%3C%2Fp%3E%22%2C%22tab_id_a%22%3A%2210362139%22%7D%2C%7B%22label_a%22%3A%22Informa%C3%A7%C3%B5es%20de%20seguran%C3%A7a%20e%20gerenciamento%20de%20eventos%20(SIEM)%22%2C%22content_a%22%3A%22%3Cp%20style%3D%5C%22text-align%3A%20justify%3B%20color%3Awhite%3B%5C%22%3EA%20an%C3%A1lise%20dos%20logs%20do%20sistema%20de%20sua%20infraestrutura%20%C3%A9%20fundamental%20para%20encontrar%20informa%C3%A7%C3%B5es%20sobre%20eventos%20relevantes%20para%20a%20seguran%C3%A7a.%20Portanto%2C%20todas%20as%20informa%C3%A7%C3%B5es%20de%20log%20s%C3%A3o%20integradas%2C%20correlacionadas%20e%20analisadas%20em%20nosso%20sistema%20SIEM.%20Isso%20nos%20permite%20identificar%20com%20efici%C3%AAncia%20os%20eventos%20que%20indicam%20uso%20indevido%2C%20ataques%20internos%20ou%20externos%20ou%20outras%20amea%C3%A7as%20%C3%A0%20seguran%C3%A7a.%3C%2Fp%3E%22%2C%22tab_id_a%22%3A%22824245947%22%7D%2C%7B%22label_a%22%3A%22Detec%C3%A7%C3%A3o%20e%20resposta%20de%20rede%22%2C%22content_a%22%3A%22%3Cp%20style%3D%5C%22text-align%3A%20justify%3B%20color%3Awhite%3B%5C%22%3EGra%C3%A7as%20ao%20uso%20de%20diferentes%20tecnologias%20de%20an%C3%A1lise%20do%20campo%20da%20intelig%C3%AAncia%20artificial%20(IA)%20e%20aprendizado%20de%20m%C3%A1quina%2C%20bem%20como%20tecnologias%20de%20sandbox%2C%20podemos%20monitorar%20sua%20infraestrutura%20de%20forma%20abrangente%20e%20altamente%20automatizada.%20Se%20uma%20amea%C3%A7a%20for%20detectada%2C%20seus%20especialistas%20ser%C3%A3o%20alertados%20imediatamente.%3C%2Fp%3E%22%2C%22tab_id_a%22%3A%22824245947%22%7D%5D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner gap=&#8221;35&#8243; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631719754911{background-color: #000000 !important;}&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][common_title title=&#8221;Servi\u00e7os de Detec\u00e7\u00e3o Avan\u00e7ada&#8221; color=&#8221;white-heading&#8221; css=&#8221;.vc_custom_1631902401786{padding-left: 300px !important;}&#8221;]<\/p>\n<p style=\"text-align: justify; color: white;\">Os atacantes s\u00e3o pacientes e espertos. N\u00e3o \u00e9 incomum para eles entrarem furtivamente nas opera\u00e7\u00f5es normais por semanas e meses antes de atacarem. Os sistemas de seguran\u00e7a tradicionais atingem seus limites com esses ataques. Nossos servi\u00e7os de detec\u00e7\u00e3o avan\u00e7ada come\u00e7am onde terminam os firewalls, sistemas de detec\u00e7\u00e3o de intrus\u00e3o, filtros de spam, solu\u00e7\u00f5es anti-malware e seguran\u00e7a avan\u00e7ada de \u00faltima gera\u00e7\u00e3o.<\/p>\n<p>[\/common_title][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1631902417269{padding-right: 300px !important;}&#8221;][common_tab_acc toggle_type=&#8221;accordion&#8221; collapse=&#8221;on&#8221; accordion=&#8221;%5B%7B%22label_a%22%3A%22Detec%C3%A7%C3%A3o%20e%20resposta%20de%20endpoint%20(EDR)%22%2C%22content_a%22%3A%22%3Cp%20style%3A%5C%22color%3Awhite%3B%5C%22%3EMuitas%20viola%C3%A7%C3%B5es%20de%20seguran%C3%A7a%20acontecem%20em%20um%20endpoint%20e%2C%20portanto%2C%20os%20incidentes%20s%C3%A3o%20mais%20bem%20detectados%20l%C3%A1.%20Com%20nosso%20servi%C3%A7o%20EDR%2C%20voc%C3%AA%20tem%20muito%20mais%20insights%20sobre%20o%20que%20est%C3%A1%20efetivamente%20acontecendo%20em%20um%20terminal.%20Isso%20significa%20que%20os%20ataques%20s%C3%A3o%20detectados%20com%20muito%20mais%20rapidez%20e%20s%C3%A3o%20muito%20mais%20f%C3%A1ceis%20de%20investigar.%20Al%C3%A9m%20desses%20recursos%20avan%C3%A7ados%20de%20detec%C3%A7%C3%A3o%2C%20nosso%20servi%C3%A7o%20EDR%20nos%20permite%20responder%20muito%20rapidamente%20a%20incidentes%20em%20um%20ou%20mais%20terminais%20afetados.%20%3C%2Fp%3E%22%2C%22tab_id_a%22%3A%221013121%22%7D%2C%7B%22label_a%22%3A%22Ca%C3%A7a%20de%20Amea%C3%A7as%22%2C%22content_a%22%3A%22%3Cp%20style%3A%5C%22color%3Awhite%3B%5C%22%3EA%20Secure%20procura%20proativamente%20por%20APTs%20e%20anomalias%20que%20n%C3%A3o%20s%C3%A3o%20detectadas%20automaticamente.%20Para%20isso%2C%20coletamos%20continuamente%20Indicadores%20de%20Compromisso%20(IOC)%20que%20nos%20ajudam%20a%20identificar%20novas%20amea%C3%A7as%20em%20tempo%20real.%20Al%C3%A9m%20disso%2C%20outros%20eventos%20de%20seguran%C3%A7a%20do%20SIEM%20tamb%C3%A9m%20s%C3%A3o%20correlacionados%20para%20identificar%20e%20descobrir%20correla%C3%A7%C3%B5es%20entre%20atividades%20potencialmente%20suspeitas%20em%20todo%20o%20ambiente.%20Isso%20nos%20permite%20tomar%20as%20medidas%20corretas%20imediatamente%20para%20interromper%20e%20isolar%20o%20ataque.%3C%2Fp%3E%22%2C%22tab_id_a%22%3A%228242454123%22%7D%2C%7B%22label_a%22%3A%22Intelig%C3%AAncia%20de%20amea%C3%A7as%20cibern%C3%A9ticas%22%2C%22content_a%22%3A%22%3Cp%20style%3A%5C%22color%3Awhite%3B%5C%22%3ENossos%20analistas%20de%20amea%C3%A7as%20cibern%C3%A9ticas%20observam%20a%20situa%C3%A7%C3%A3o%20atual%20de%20amea%C3%A7as%2024%20horas%20por%20dia%20e%20analisam%20informa%C3%A7%C3%B5es%20da%20darknet%2C%20feeds%20de%20intelig%C3%AAncia%20de%20amea%C3%A7as%20e%20muitas%20outras%20fontes.%20Voc%C3%AA%20recebe%20um%20relat%C3%B3rio%20de%20amea%C3%A7as%20trimestral%20com%20uma%20an%C3%A1lise%20detalhada%20do%20cen%C3%A1rio%20geral%20de%20amea%C3%A7as%20e%20a%20avalia%C3%A7%C3%A3o%20de%20riscos%20de%20nossos%20especialistas%20para%20sua%20empresa%2C%20para%20que%20possa%20agir%20de%20forma%20proativa.%20Obviamente%2C%20voc%C3%AA%20ser%C3%A1%20alertado%20imediatamente%20se%20encontrarmos%20indicadores%20cr%C3%ADticos%20ou%20informa%C3%A7%C3%B5es%20que%20ameacem%20sua%20reputa%C3%A7%C3%A3o.%3C%2Fp%3E%22%2C%22tab_id_a%22%3A%22123124153%22%7D%5D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;10&#8243; content_placement=&#8221;middle&#8221; pix_padding_top=&#8221;padding S&#8221; pix_padding_bottom=&#8221;padding No&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631288557669{margin-bottom: -1px !important;padding-right: 40px !important;padding-left: 40px !important;background-color: #0a0a0a !important;}&#8221;][vc_column pix_padding_top=&#8221;padding S&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; el_class=&#8221;fundo-escuro&#8221;][vc_empty_space height=&#8221;10%&#8221;][common_title title=&#8221;Centro de Opera\u00e7\u00f5es de Seguran\u00e7a&#8221; color=&#8221;white-heading&#8221; css=&#8221;.vc_custom_1631902520411{padding-right: 300px !important;padding-left: 300px !important;}&#8221;]<\/p>\n<p style=\"text-align: center;\">Oferecemos toda a gama de servi\u00e7os de nosso Secure Cyber \u200b\u200bDefense Center (CDC) com certifica\u00e7\u00e3o ISO \/ IEC 27001 de suporte a nuvem terceirizada e servi\u00e7os de seguran\u00e7a gerenciados a servi\u00e7os SOC, onde nossos analistas de amea\u00e7as cibern\u00e9ticas e especialistas em defesa cibern\u00e9tica cuidam de sua seguran\u00e7a o tempo todo.<\/p>\n<p>[\/common_title][vc_single_image image=&#8221;4164&#8243; img_size=&#8221;800&#215;650&#8243; alignment=&#8221;center&#8221; css=&#8221;.vc_custom_1631903115625{margin-top: -35px !important;}&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631720212155{padding-right: 40px !important;padding-left: 40px !important;background-color: #000000 !important;}&#8221; el_class=&#8221;fundo-escuro&#8221;][vc_column][common_title title=&#8221;Servi\u00e7os de Resposta e<br \/>\nRecupera\u00e7\u00e3o de Incidentes&#8221; padding=&#8221;off&#8221; color=&#8221;white-heading&#8221; css=&#8221;.vc_custom_1631903241120{padding-right: 300px !important;padding-left: 300px !important;}&#8221;]<\/p>\n<p style=\"text-align: center;\">Incidentes de seguran\u00e7a podem ter um impacto significativo nos neg\u00f3cios e, infelizmente, nem sempre podem ser evitados. No entanto, uma resposta r\u00e1pida e profissional de especialistas comprovados \u00e9 crucial. Nossa Resposta a Incidentes de Seguran\u00e7a \u00e9 realizada atrav\u00e9s de um processo padronizado de acordo com o SANS e garante a voc\u00ea um r\u00e1pido restabelecimento das opera\u00e7\u00f5es normais.<\/p>\n<p>[\/common_title][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;15&#8243; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631288593072{padding-right: 40px !important;padding-left: 40px !important;background: rgba(10,10,10,0.95) url(https:\/\/greatystudio.com.br\/secure\/wp-content\/uploads\/2019\/04\/coding-in-dark-RLAZ3VR-copy.jpg?id=4168) !important;*background-color: rgb(10,10,10) !important;}&#8221; el_class=&#8221;fundo-escuro&#8221;][vc_column][vc_row_inner gap=&#8221;35&#8243; pix_padding_bottom=&#8221;padding S&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221;][vc_column_inner][common_title title=&#8221;O que voc\u00ea pode esperar de n\u00f3s?&#8221; padding=&#8221;off&#8221; css=&#8221;.vc_custom_1631902941450{padding-right: 300px !important;padding-left: 300px !important;}&#8221;]<\/p>\n<p style=\"text-align: center;\">Na Secure Cyber \u200b\u200bDefense Center, todo o nosso conhecimento de seguran\u00e7a est\u00e1 dispon\u00edvel para nossos clientes. Voc\u00ea se beneficia em dobro: por um lado, voc\u00ea pode contar com especialistas de primeira classe em todas as \u00e1reas e, por outro lado, conjuntos de conhecimentas pr\u00e1ticos adicionais s\u00e3o criadas por meio da coopera\u00e7\u00e3o de nossos especialistas em equipes de servi\u00e7o. Sejam vulnerabilidades atuais em componentes individuais ou novas estrat\u00e9gias de ataque que circulam na chamada Dark Web: nossos profissionais est\u00e3o sempre atualizados. Adaptados \u00e0s necessidades individuais, as empresas podem usar nossos servi\u00e7os modulares como servi\u00e7os gerenciados de seus sistemas internos ou como servi\u00e7os em nuvem sem seus pr\u00f3prios investimentos em infraestrutura. Para dados e sistemas particularmente expostos, nosso Cyber \u200b\u200bDefense Center (CDC) em S\u00e3o Paulo oferece um n\u00edvel m\u00e1ximo de seguran\u00e7a em condi\u00e7\u00f5es atraentes.<\/p>\n<p>[\/common_title][\/vc_column_inner][\/vc_row_inner][vc_single_image image=&#8221;4169&#8243; img_size=&#8221;800&#215;650&#8243; alignment=&#8221;center&#8221; style=&#8221;vc_box_circle_2&#8243; css_animation=&#8221;fadeIn&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; pix_padding_top=&#8221;padding M&#8221; pix_padding_bottom=&#8221;padding No&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631638180286{padding-right: 40px !important;padding-left: 40px !important;background-color: #000000 !important;}&#8221;][vc_column gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1633008327007{padding-right: 200px !important;padding-left: 200px !important;}&#8221;][common_title title=&#8221;Nossos Servi\u00e7os&#8221; padding=&#8221;off&#8221; color=&#8221;white-heading&#8221;][\/common_title][vc_row_inner pix_padding_bottom=&#8221;padding M&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; el_class=&#8221;icones&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][common_icon_box style=&#8221;pix-ibox-flip&#8221; flip=&#8221;off&#8221; icon_type=&#8221;font&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;flaticon-hacker&#8221; link=&#8221;url:https%3A%2F%2Fgreatystudio.com.br%2Fsecure%2Fservicos%2Fsimulacao-ataque%2F|title:Teste%20de%20Penetra%C3%A7%C3%A3o%20e%20Simula%C3%A7%C3%A3o%20de%20Ataque&#8221; title=&#8221;Teste de Penetra\u00e7\u00e3o e Simula\u00e7\u00e3o de Ataque&#8221;][\/common_icon_box][common_icon_box style=&#8221;pix-ibox-flip&#8221; flip=&#8221;off&#8221; icon_type=&#8221;font&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;flaticon-surveillance&#8221; link=&#8221;url:https%3A%2F%2Fgreatystudio.com.br%2Fsecure%2Fservicos%2Fconsultoria-de-seguranca%2F|title:Servi%C3%A7os%20de%20Consultoria%20de%20Seguran%C3%A7a&#8221; title=&#8221;Servi\u00e7os de Consultoria de Seguran\u00e7a&#8221;][\/common_icon_box][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][common_icon_box style=&#8221;pix-ibox-flip&#8221; flip=&#8221;off&#8221; icon_type=&#8221;font&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;flaticon-shield&#8221; link=&#8221;url:https%3A%2F%2Fgreatystudio.com.br%2Fsecure%2Fservicos%2Fdefesa-cibernetica%2F|title:Servi%C3%A7o%20de%20Defesa%20Cibern%C3%A9tica&#8221; title=&#8221;Servi\u00e7os de Defesa Cibern\u00e9tica&#8221;][\/common_icon_box][common_icon_box style=&#8221;pix-ibox-flip&#8221; flip=&#8221;off&#8221; icon_type=&#8221;font&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;flaticon-firewall&#8221; link=&#8221;url:https%3A%2F%2Fgreatystudio.com.br%2Fsecure%2Fservicos%2Fnuvem-e-ssg%2F|title:Nuvem%20e%20Servi%C3%A7o%20de%20Seguran%C3%A7a%20Gerenciada&#8221; title=&#8221;Nuvem e Servi\u00e7o de Seguran\u00e7a Gerenciada&#8221;][\/common_icon_box][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][common_icon_box style=&#8221;pix-ibox-flip&#8221; flip=&#8221;off&#8221; icon_type=&#8221;font&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;flaticon-detective&#8221; link=&#8221;url:https%3A%2F%2Fgreatystudio.com.br%2Fsecure%2Fservicos%2Fresposta-e-recuperacao%2F|title:Servi%C3%A7os%20de%20Resposta%20e%20Recupera%C3%A7%C3%A3o%20de%20Incidentes&#8221; title=&#8221;Servi\u00e7os de Resposta e Recupera\u00e7\u00e3o de Incidentes&#8221;][\/common_icon_box][common_icon_box style=&#8221;pix-ibox-flip&#8221; flip=&#8221;off&#8221; icon_type=&#8221;font&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;flaticon-hacking&#8221; link=&#8221;url:https%3A%2F%2Fgreatystudio.com.br%2Fsecure%2Fservicos%2Fict-rede-nuvem%2F|title:Solu%C3%A7%C3%B5es%20de%20Seguran%C3%A7a%20de%20ICT%2C%20Rede%20e%20Nuvem&#8221; title=&#8221;Solu\u00e7\u00f5es de Seguran\u00e7a de ICT, Rede e Nuvem&#8221;][\/common_icon_box][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; pix_padding_top=&#8221;padding S&#8221; pix_padding_bottom=&#8221;padding S&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631723572828{background-color: #000000 !important;}&#8221;][vc_column][vc_raw_html]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[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221; content_placement=&#8221;top&#8221; pix_padding_top=&#8221;padding No&#8221; pix_padding_bottom=&#8221;padding No&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631737622102{margin-top: -6px !important;background: rgba(0,0,0,0.7) url(https:\/\/greatystudio.com.br\/secure\/wp-content\/uploads\/2021\/09\/WhatsApp-Image-2021-09-15-at-16.00.46-3.jpeg?id=4412) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;*background-color: rgb(0,0,0) !important;}&#8221;][vc_column][vc_empty_space height=&#8221;300px&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; pix_padding_top=&#8221;padding M&#8221; pix_padding_bottom=&#8221;padding No&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631719710591{padding-right: 40px !important;padding-left: 40px !important;background-color: #000000 !important;}&#8221;][vc_column][common_title title=&#8221;Servi\u00e7os de Defesa Cibern\u00e9tica&#8221; padding=&#8221;off&#8221; color=&#8221;white-heading&#8221;][\/common_title][vc_column_text css=&#8221;.vc_custom_1631902211930{padding-right: 300px !important;padding-left: 300px !important;}&#8221;] Hoje, as empresas precisam presumir que os ataques [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":2430,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-home.php","meta":{"inline_featured_image":false,"loftloader_page_shortcode":""},"_links":{"self":[{"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/pages\/4220"}],"collection":[{"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/comments?post=4220"}],"version-history":[{"count":25,"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/pages\/4220\/revisions"}],"predecessor-version":[{"id":4513,"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/pages\/4220\/revisions\/4513"}],"up":[{"embeddable":true,"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/pages\/2430"}],"wp:attachment":[{"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/media?parent=4220"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}