{"id":4231,"date":"2021-09-10T12:54:07","date_gmt":"2021-09-10T15:54:07","guid":{"rendered":"https:\/\/greatystudio.com.br\/secure\/?page_id=4231"},"modified":"2021-09-30T10:45:17","modified_gmt":"2021-09-30T13:45:17","slug":"nuvem-e-ssg","status":"publish","type":"page","link":"https:\/\/greatystudio.com.br\/secure\/servicos\/nuvem-e-ssg\/","title":{"rendered":"Nuvem e Servi\u00e7o de Seguran\u00e7a Gerenciada"},"content":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221; content_placement=&#8221;top&#8221; pix_padding_top=&#8221;padding No&#8221; pix_padding_bottom=&#8221;padding No&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631738741499{margin-top: -6px !important;background: rgba(0,0,0,0.7) url(https:\/\/greatystudio.com.br\/secure\/wp-content\/uploads\/2021\/09\/WhatsApp-Image-2021-09-15-at-16.00.46-2.jpeg?id=4422) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;*background-color: rgb(0,0,0) !important;}&#8221;][vc_column][vc_empty_space height=&#8221;300px&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; pix_padding_top=&#8221;padding M&#8221; pix_padding_bottom=&#8221;padding No&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631722753573{padding-right: 40px !important;padding-left: 40px !important;background-color: #000000 !important;}&#8221; el_class=&#8221;fundo-escuro&#8221;][vc_column][common_title title=&#8221;Nuvem e Servi\u00e7o de Seguran\u00e7a Gerenciada&#8221; padding=&#8221;off&#8221;][\/common_title][vc_column_text css=&#8221;.vc_custom_1631904312473{padding-right: 300px !important;padding-left: 300px !important;}&#8221;]<\/p>\n<p style=\"text-align: justify; text-align-last: center;\">Uma defesa bem-sucedida contra os ataques cada vez mais sofisticados no espa\u00e7o virtual requer uma abordagem hol\u00edstica e de v\u00e1rios n\u00edveis. Ao mesmo tempo, o alto n\u00edvel de rede aumenta drasticamente as superf\u00edcies de ataque e, portanto, a probabilidade de ser afetado por um ataque cibern\u00e9tico. Devido \u00e0 falta de recursos, or\u00e7amentos de TI reduzidos e requisitos em constante mudan\u00e7a, mais e mais empresas est\u00e3o procurando um parceiro experiente de terceiriza\u00e7\u00e3o ou at\u00e9 mesmo um provedor de servi\u00e7os em nuvem para terceirizar os servi\u00e7os direcionados. A Secure tem o conhecimento e a experi\u00eancia para atender \u00e0s suas necessidades espec\u00edficas de seguran\u00e7a como seguran\u00e7a gerenciada ou servi\u00e7o de nuvem escalon\u00e1vel.<\/p>\n<p>[\/vc_column_text][vc_row_inner gap=&#8221;35&#8243; gradient_colors=&#8221;%5B%7B%7D%5D&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][common_title title=&#8221;Seguran\u00e7a em Nuvem&#8221; color=&#8221;white-heading&#8221; css=&#8221;.vc_custom_1631904386291{padding-left: 300px !important;}&#8221;]<\/p>\n<p style=\"text-align: left;\">A Secure opera sistemas de seguran\u00e7a l\u00edderes como um servi\u00e7o em nuvem em centros de dados redundantes. Voc\u00ea se beneficia da mais alta seguran\u00e7a a custos fixos, sem ter que operar sua pr\u00f3pria infraestrutura de seguran\u00e7a. Nossos servi\u00e7os incluem firewalls de aplicativos da web, seguran\u00e7a de email e web, mas tamb\u00e9m SIEM e solu\u00e7\u00f5es de gerenciamento de vulnerabilidades. Gra\u00e7as aos nossos servi\u00e7os em nuvem escal\u00e1veis, a prote\u00e7\u00e3o pode ser adaptada \u00e0s suas necessidades espec\u00edficas.<\/p>\n<p>[\/common_title][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1631904404606{padding-right: 300px !important;}&#8221;][common_tab_acc toggle_type=&#8221;accordion&#8221; collapse=&#8221;on&#8221; accordion=&#8221;%5B%7B%22label_a%22%3A%22Firewall%20de%20aplicativo%20da%20web%20(WAF)%20%22%2C%22content_a%22%3A%22%3Cp%20style%3D%5C%22text-align%3A%20justify%3B%20color%3Awhite%3B%5C%22%3EFirewall%20de%20aplicativo%20da%20Web%20baseado%20em%20nuvem%20como%20servi%C3%A7o%20para%20prote%C3%A7%C3%A3o%20abrangente%20de%20seus%20aplicativos%20e%20portais%20da%20Web.%3C%2Fp%3E%22%2C%22tab_id_a%22%3A%2246531244141%22%7D%2C%7B%22label_a%22%3A%22Servi%C3%A7o%20de%20SIEM%22%2C%22content_a%22%3A%22%3Cp%20style%3D%5C%22text-align%3A%20justify%3B%20color%3Awhite%3B%5C%22%3EInforma%C3%A7%C3%B5es%20de%20seguran%C3%A7a%20e%20gerenciamento%20de%20eventos%20(SIEM)%2C%20an%C3%A1lise%20de%20seguran%C3%A7a%20pr%C3%B3-ativa%20baseada%20em%20nuvem%20de%20sua%20infraestrutura%20em%20tempo%20real.%3C%2Fp%3E%22%2C%22tab_id_a%22%3A%22124438583%22%7D%2C%7B%22label_a%22%3A%22Servi%C3%A7o%20de%20gerenciamento%20de%20vulnerabilidade%22%2C%22content_a%22%3A%22%3Cp%20style%3D%5C%22text-align%3A%20justify%3B%20color%3Awhite%3B%5C%22%3EA%20Secure%20oferece%20a%20voc%C3%AA%20a%20opera%C3%A7%C3%A3o%20da%20plataforma%20l%C3%ADder%20de%20gerenciamento%20de%20vulnerabilidade%20como%20um%20servi%C3%A7o%20gerenciado%20padronizado%20de%20nosso%20Cyber%20Defense%20Center%20(CDC)%20certificado%20pela%20ISO%2027001.%3C%2Fp%3E%22%2C%22tab_id_a%22%3A%22824245947%22%7D%2C%7B%22label_a%22%3A%22Detec%C3%A7%C3%A3o%20e%20resposta%20de%20endpoint%20(EDR)%20como%20servi%C3%A7o%22%2C%22content_a%22%3A%22%3Cp%20style%3D%5C%22text-align%3A%20justify%3B%20color%3Awhite%3B%5C%22%3EA%20Secure%20oferece%20Tanium%20exclusivamente%20como%20um%20servi%C3%A7o%20come%C3%A7ando%20em%20300%20endpoints.%20Isso%20significa%20que%20as%20PMEs%20tamb%C3%A9m%20se%20beneficiam%20dessa%20tecnologia%20brilhante.%20EDR%20como%20um%20servi%C3%A7o%20%C3%A9%20oferecido%20por%20nossos%20especialistas%20experientes%20no%20Secure%20Cyber%20Defense%20Center.%3C%2Fp%3E%22%2C%22tab_id_a%22%3A%22824245947%22%7D%5D&#8221;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner gap=&#8221;35&#8243; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; el_class=&#8221;fundo-escuro&#8221; css=&#8221;.vc_custom_1631722731168{background-color: #000000 !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1631904438667{padding-right: 300px !important;padding-left: 300px !important;}&#8221;][common_title title=&#8221;Seguran\u00e7a Gerenciada&#8221; padding=&#8221;off&#8221; color=&#8221;white-heading&#8221;]<\/p>\n<p style=\"text-align: center;\">Nossa equipe de especialistas experientes monitora e apoia sua infraestrutura de seguran\u00e7a 24 horas por dia no Secure Cyber Defense Center. No caso de um problema ou se os crit\u00e9rios de medi\u00e7\u00e3o definidos (KPI) forem excedidos, voc\u00ea ser\u00e1 imediatamente alertado e<br \/>\ncontra-medidas eficazes ser\u00e3o sugeridas.<\/p>\n<p>[\/common_title][vc_column_text]<\/p>\n<p style=\"text-align: center;\"><strong style=\"color: white;\">1. Servi\u00e7o de gerenciamento de vulnerabilidade;<\/strong><\/p>\n<p style=\"text-align: center;\"><strong style=\"color: white;\">2. EDR como servi\u00e7o;<\/strong><\/p>\n<p style=\"text-align: center;\"><strong style=\"color: white;\">3. Servi\u00e7os de suporte;<\/strong><\/p>\n<p style=\"text-align: center;\"><strong style=\"color: white;\">4. Plataforma de gerenciamento de seguran\u00e7a de ICT;<\/strong><\/p>\n<p style=\"text-align: center;\"><strong style=\"color: white;\">5. Auto monitoramento de risco cibern\u00e9tico como servi\u00e7o;<\/strong><\/p>\n<p style=\"text-align: center;\"><strong style=\"color: white;\">6. Gest\u00e3o de Risco da Cadeia de Abastecimento;<\/strong><\/p>\n<p>[\/vc_column_text][common_title title=&#8221;Servi\u00e7os de Opera\u00e7\u00f5es de Seguran\u00e7a&#8221;]<\/p>\n<p style=\"text-align: center;\">Nossa equipe de especialistas experientes monitora e apoia sua infraestrutura de seguran\u00e7a 24 horas por dia no Secure Cyber Defense Center. No caso de um problema ou se os crit\u00e9rios de medi\u00e7\u00e3o definidos (KPI) forem excedidos, voc\u00ea ser\u00e1 imediatamente alertado e contra-medidas eficazes ser\u00e3o sugeridas.<\/p>\n<p>[\/common_title][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;15&#8243; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631288593072{padding-right: 40px !important;padding-left: 40px !important;background: rgba(10,10,10,0.95) url(https:\/\/greatystudio.com.br\/secure\/wp-content\/uploads\/2019\/04\/coding-in-dark-RLAZ3VR-copy.jpg?id=4168) !important;*background-color: rgb(10,10,10) !important;}&#8221; el_class=&#8221;fundo-escuro&#8221;][vc_column][vc_row_inner gap=&#8221;35&#8243; pix_padding_bottom=&#8221;padding S&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221;][vc_column_inner][common_title title=&#8221;O que voc\u00ea pode esperar de n\u00f3s?&#8221; padding=&#8221;off&#8221; css=&#8221;.vc_custom_1631904649359{padding-right: 300px !important;padding-left: 300px !important;}&#8221;]<\/p>\n<p style=\"text-align-last: center; text-align: center;\">As infraestruturas de TI est\u00e3o se tornando cada vez mais complexas e, ao mesmo tempo, os requisitos de seguran\u00e7a cibern\u00e9tica e conformidade aumentam. Nossos especialistas cuidam da opera\u00e7\u00e3o e suporte de sua infraestrutura de seguran\u00e7a de TI. Al\u00e9m disso, a Secure opera os principais sistemas de seguran\u00e7a como um servi\u00e7o de nuvem em data centers. Voc\u00ea se beneficia da mais alta seguran\u00e7a a custos fixos, sem ter que operar sua pr\u00f3pria infraestrutura de seguran\u00e7a. Conte com nossos especialistas que entendem seus processos e seus requisitos de seguran\u00e7a. Em vez de expandir constantemente suas pr\u00f3prias capacidades, os Servi\u00e7os Gerenciados e de Seguran\u00e7a em Nuvem s\u00e3o geralmente mais eficazes e econ\u00f4micos &#8211; e voc\u00ea pode se concentrar inteiramente em seu neg\u00f3cio principal.<\/p>\n<p>[\/common_title][\/vc_column_inner][\/vc_row_inner][vc_single_image image=&#8221;4169&#8243; img_size=&#8221;800&#215;650&#8243; alignment=&#8221;center&#8221; style=&#8221;vc_box_circle_2&#8243; css_animation=&#8221;fadeIn&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; pix_padding_top=&#8221;padding M&#8221; pix_padding_bottom=&#8221;padding No&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631638180286{padding-right: 40px !important;padding-left: 40px !important;background-color: #000000 !important;}&#8221;][vc_column gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1633008327007{padding-right: 200px !important;padding-left: 200px !important;}&#8221;][common_title title=&#8221;Nossos Servi\u00e7os&#8221; padding=&#8221;off&#8221; color=&#8221;white-heading&#8221;][\/common_title][vc_row_inner pix_padding_bottom=&#8221;padding M&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; el_class=&#8221;icones&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][common_icon_box style=&#8221;pix-ibox-flip&#8221; flip=&#8221;off&#8221; icon_type=&#8221;font&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;flaticon-hacker&#8221; link=&#8221;url:https%3A%2F%2Fgreatystudio.com.br%2Fsecure%2Fservicos%2Fsimulacao-ataque%2F|title:Teste%20de%20Penetra%C3%A7%C3%A3o%20e%20Simula%C3%A7%C3%A3o%20de%20Ataque&#8221; title=&#8221;Teste de Penetra\u00e7\u00e3o e Simula\u00e7\u00e3o de Ataque&#8221;][\/common_icon_box][common_icon_box style=&#8221;pix-ibox-flip&#8221; flip=&#8221;off&#8221; icon_type=&#8221;font&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;flaticon-surveillance&#8221; link=&#8221;url:https%3A%2F%2Fgreatystudio.com.br%2Fsecure%2Fservicos%2Fconsultoria-de-seguranca%2F|title:Servi%C3%A7os%20de%20Consultoria%20de%20Seguran%C3%A7a&#8221; title=&#8221;Servi\u00e7os de Consultoria de Seguran\u00e7a&#8221;][\/common_icon_box][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][common_icon_box style=&#8221;pix-ibox-flip&#8221; flip=&#8221;off&#8221; icon_type=&#8221;font&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;flaticon-shield&#8221; link=&#8221;url:https%3A%2F%2Fgreatystudio.com.br%2Fsecure%2Fservicos%2Fdefesa-cibernetica%2F|title:Servi%C3%A7o%20de%20Defesa%20Cibern%C3%A9tica&#8221; title=&#8221;Servi\u00e7os de Defesa Cibern\u00e9tica&#8221;][\/common_icon_box][common_icon_box style=&#8221;pix-ibox-flip&#8221; flip=&#8221;off&#8221; icon_type=&#8221;font&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;flaticon-firewall&#8221; link=&#8221;url:https%3A%2F%2Fgreatystudio.com.br%2Fsecure%2Fservicos%2Fnuvem-e-ssg%2F|title:Nuvem%20e%20Servi%C3%A7o%20de%20Seguran%C3%A7a%20Gerenciada&#8221; title=&#8221;Nuvem e Servi\u00e7o de Seguran\u00e7a Gerenciada&#8221;][\/common_icon_box][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][common_icon_box style=&#8221;pix-ibox-flip&#8221; flip=&#8221;off&#8221; icon_type=&#8221;font&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;flaticon-detective&#8221; link=&#8221;url:https%3A%2F%2Fgreatystudio.com.br%2Fsecure%2Fservicos%2Fresposta-e-recuperacao%2F|title:Servi%C3%A7os%20de%20Resposta%20e%20Recupera%C3%A7%C3%A3o%20de%20Incidentes&#8221; title=&#8221;Servi\u00e7os de Resposta e Recupera\u00e7\u00e3o de Incidentes&#8221;][\/common_icon_box][common_icon_box style=&#8221;pix-ibox-flip&#8221; flip=&#8221;off&#8221; icon_type=&#8221;font&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;flaticon-hacking&#8221; link=&#8221;url:https%3A%2F%2Fgreatystudio.com.br%2Fsecure%2Fservicos%2Fict-rede-nuvem%2F|title:Solu%C3%A7%C3%B5es%20de%20Seguran%C3%A7a%20de%20ICT%2C%20Rede%20e%20Nuvem&#8221; title=&#8221;Solu\u00e7\u00f5es de Seguran\u00e7a de ICT, Rede e Nuvem&#8221;][\/common_icon_box][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; pix_padding_top=&#8221;padding S&#8221; pix_padding_bottom=&#8221;padding S&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631723572828{background-color: #000000 !important;}&#8221;][vc_column][vc_raw_html]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[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221; content_placement=&#8221;top&#8221; pix_padding_top=&#8221;padding No&#8221; pix_padding_bottom=&#8221;padding No&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631738741499{margin-top: -6px !important;background: rgba(0,0,0,0.7) url(https:\/\/greatystudio.com.br\/secure\/wp-content\/uploads\/2021\/09\/WhatsApp-Image-2021-09-15-at-16.00.46-2.jpeg?id=4422) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;*background-color: rgb(0,0,0) !important;}&#8221;][vc_column][vc_empty_space height=&#8221;300px&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; pix_padding_top=&#8221;padding M&#8221; pix_padding_bottom=&#8221;padding No&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631722753573{padding-right: 40px !important;padding-left: 40px !important;background-color: #000000 !important;}&#8221; el_class=&#8221;fundo-escuro&#8221;][vc_column][common_title title=&#8221;Nuvem e Servi\u00e7o de Seguran\u00e7a Gerenciada&#8221; padding=&#8221;off&#8221;][\/common_title][vc_column_text css=&#8221;.vc_custom_1631904312473{padding-right: 300px !important;padding-left: 300px !important;}&#8221;] Uma defesa bem-sucedida contra os ataques [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":2430,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-home.php","meta":{"inline_featured_image":false,"loftloader_page_shortcode":""},"_links":{"self":[{"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/pages\/4231"}],"collection":[{"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/comments?post=4231"}],"version-history":[{"count":16,"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/pages\/4231\/revisions"}],"predecessor-version":[{"id":4515,"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/pages\/4231\/revisions\/4515"}],"up":[{"embeddable":true,"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/pages\/2430"}],"wp:attachment":[{"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/media?parent=4231"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}