{"id":4235,"date":"2021-09-10T13:06:43","date_gmt":"2021-09-10T16:06:43","guid":{"rendered":"https:\/\/greatystudio.com.br\/secure\/?page_id=4235"},"modified":"2021-09-30T10:44:43","modified_gmt":"2021-09-30T13:44:43","slug":"resposta-e-recuperacao","status":"publish","type":"page","link":"https:\/\/greatystudio.com.br\/secure\/servicos\/resposta-e-recuperacao\/","title":{"rendered":"Servi\u00e7os de Resposta e Recupera\u00e7\u00e3o de Incidentes"},"content":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221; content_placement=&#8221;top&#8221; pix_padding_top=&#8221;padding No&#8221; pix_padding_bottom=&#8221;padding No&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631738227922{margin-top: -6px !important;background: rgba(0,0,0,0.7) url(https:\/\/greatystudio.com.br\/secure\/wp-content\/uploads\/2021\/09\/WhatsApp-Image-2021-09-15-at-16.02.39.jpeg?id=4416) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;*background-color: rgb(0,0,0) !important;}&#8221;][vc_column][vc_empty_space height=&#8221;300px&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; pix_padding_top=&#8221;padding M&#8221; pix_padding_bottom=&#8221;padding No&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631720780741{padding-right: 40px !important;padding-left: 40px !important;background-color: #000000 !important;}&#8221; el_class=&#8221;fundo-escuro&#8221;][vc_column][common_title title=&#8221;Servi\u00e7os de Resposta e Recupera\u00e7\u00e3o de Incidentes&#8221; padding=&#8221;off&#8221; color=&#8221;white-heading&#8221;][\/common_title][vc_column_text css=&#8221;.vc_custom_1631903381987{padding-right: 300px !important;padding-left: 300px !important;}&#8221;]<\/p>\n<p style=\"text-align: justify; text-align-last: center;\">Quando ocorre um ataque cibern\u00e9tico, a chave \u00e9 analisar o incidente de seguran\u00e7a o mais r\u00e1pido poss\u00edvel e n\u00e3o tomar nenhuma a\u00e7\u00e3o precipitada. \u00c9 aqui que entram os analistas cibern\u00e9ticos da Secure. Eles procuram rastros, pistas e &#8220;impress\u00f5es digitais&#8221;. Nossa Resposta a Incidentes de Seguran\u00e7a \u00e9 realizada por meio de um processo padronizado de acordo com o SANS e garante a voc\u00ea um r\u00e1pido restabelecimento das opera\u00e7\u00f5es ordenadas.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;35&#8243; content_placement=&#8221;middle&#8221; pix_padding_top=&#8221;padding S&#8221; pix_padding_bottom=&#8221;padding S&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631720901367{padding-right: 40px !important;padding-left: 40px !important;background-color: #000000 !important;}&#8221; el_class=&#8221;fundo-escuro&#8221;][vc_column width=&#8221;2\/3&#8243;][common_title title=&#8221;Secure CSIRT&#8221; color=&#8221;white-heading&#8221; css=&#8221;.vc_custom_1631903437934{padding-left: 300px !important;}&#8221;]<\/p>\n<p style=\"text-align: center;\">Nossa Secure CSIRT (Computer Security Incident Response Team) est\u00e1 dispon\u00edvel 24 horas para ajud\u00e1-lo a lidar com incidentes de seguran\u00e7a cr\u00edticos rapidamente. Nossos especialistas experientes assumem a lideran\u00e7a no tratamento desses incidentes de seguran\u00e7a. Eles contam com os recursos necess\u00e1rios de sua empresa, parceiros e, se necess\u00e1rio, autoridades. Nosso conhecimento especializado e grande rede de parceiros oferecem a certeza de que podemos apoi\u00e1-lo de forma r\u00e1pida, competente e eficaz no caso de um incidente de seguran\u00e7a cr\u00edtico.<\/p>\n<p>[\/common_title][\/vc_column][vc_column width=&#8221;1\/3&#8243; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631903465243{padding-right: 300px !important;}&#8221;][common_points image=&#8221;4181&#8243; points=&#8221;%5B%5D&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631720861199{padding-right: 40px !important;padding-left: 40px !important;background-color: #000000 !important;}&#8221;][vc_column gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631903504163{padding-right: 300px !important;padding-left: 300px !important;}&#8221;][common_tab_acc toggle_type=&#8221;accordion&#8221; collapse=&#8221;on&#8221; accordion=&#8221;%5B%7B%22label_a%22%3A%22Retentor%20de%20Resposta%20a%20Incidente%22%2C%22content_a%22%3A%22%3Cp%20style%3A%5C%22text-align%3Ajustify%3B%20color%3Awhite%3B%5C%22%3EUm%20ataque%20cibern%C3%A9tico%20pode%20atingir%20voc%C3%AA%20a%20qualquer%20momento.%20Nosso%20Retentor%20de%20Resposta%20a%20Incidentes%20(IR)%20%C3%A9%20voltado%20para%20empresas%20e%20%C3%A9%20a%20solu%C3%A7%C3%A3o%20ideal%20quando%20se%20trata%20de%20agir%20com%20rapidez%2C%20efici%C3%AAncia%20e%20efic%C3%A1cia.%20%3C%2Fp%3E%22%2C%22tab_id_a%22%3A%221013121%22%7D%2C%7B%22label_a%22%3A%22An%C3%A1lise%20de%20Amea%C3%A7as%22%2C%22content_a%22%3A%22%3Cp%20style%3A%5C%22text-align%3Ajustify%3B%20color%3Awhite%3B%5C%22%3ECom%20nosso%20servi%C3%A7o%20de%20an%C3%A1lise%20de%20amea%C3%A7as%2C%20nossos%20analistas%20de%20seguran%C3%A7a%20analisam%20em%20detalhes%20eventos%20e%20detec%C3%A7%C3%B5es%20de%20seguran%C3%A7a%20cr%C3%ADticos%20que%20n%C3%A3o%20puderam%20ser%20claramente%20classificados%20como%20n%C3%A3o%20cr%C3%ADticos.%20Voc%C3%AA%20se%20beneficia%20do%20conhecimento%20e%20da%20experi%C3%AAncia%20de%20nossos%20analistas%20de%20amea%C3%A7as%2C%20bem%20como%20de%20especialistas%20em%20seguran%C3%A7a%20cibern%C3%A9tica%20ofensiva%20e%20defensiva.%20Para%20otimiza%C3%A7%C3%A3o%20cont%C3%ADnua%2C%20o%20conhecimento%20obtido%20em%20um%20incidente%20de%20seguran%C3%A7a%20%C3%A9%20integrado%20ao%20nosso%20sistema%20de%20intelig%C3%AAncia%20de%20seguran%C3%A7a%20cibern%C3%A9tica.%20Isso%20garante%20que%20todos%20os%20clientes%20possam%20se%20beneficiar%20com%20as%20novas%20descobertas%20e%2C%20assim%2C%20sejam%20protegidos%20de%20forma%20otimizada.%20%3C%2Fp%3E%22%2C%22tab_id_a%22%3A%22153136323%22%7D%2C%7B%22label_a%22%3A%22Servi%C3%A7os%20de%20Resposta%20a%20Incidentes%20e%20Forenses%22%2C%22content_a%22%3A%22%3Cp%20style%3A%5C%22text-align%3Ajustify%3B%20color%3Awhite%3B%5C%22%3EAssim%20que%20um%20ataque%20cibern%C3%A9tico%20%C3%A9%20detectado%2C%20o%20processo%20predefinido%20de%20resposta%20a%20incidentes%20de%20seguran%C3%A7a%20%C3%A9%20iniciado.%20Junto%20com%20seus%20especialistas%2C%20o%20ataque%20%C3%A9%20contido%20e%20combatido.%20Nossos%20especialistas%20em%20seguran%C3%A7a%20cibern%C3%A9tica%20est%C3%A3o%20em%20contato%20permanente%20com%20voc%C3%AA%20para%20que%20uma%20r%C3%A1pida%20restaura%C3%A7%C3%A3o%20da%20infraestrutura%20seja%20garantida.%20Nossos%20especialistas%20tamb%C3%A9m%20auxiliam%20no%20esclarecimento%20de%20incidentes%20de%20seguran%C3%A7a%20com%20an%C3%A1lises%20forenses.%20Ao%20fazer%20isso%2C%20cuidamos%20ativamente%20de%20proteger%2C%20analisar%20e%20avaliar%20vest%C3%ADgios%20digitais%20ou%20poss%C3%ADveis%20evid%C3%AAncias.%3C%2Fp%3E%22%2C%22tab_id_a%22%3A%22153136323%22%7D%5D&#8221;][vc_empty_space height=&#8221;20px&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;15&#8243; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631288593072{padding-right: 40px !important;padding-left: 40px !important;background: rgba(10,10,10,0.95) url(https:\/\/greatystudio.com.br\/secure\/wp-content\/uploads\/2019\/04\/coding-in-dark-RLAZ3VR-copy.jpg?id=4168) !important;*background-color: rgb(10,10,10) !important;}&#8221; el_class=&#8221;fundo-escuro&#8221;][vc_column][vc_row_inner gap=&#8221;35&#8243; pix_padding_bottom=&#8221;padding S&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221;][vc_column_inner][common_title title=&#8221;Experi\u00eancia e Conhecimento de<br \/>\nNossos Analistas&#8221; padding=&#8221;off&#8221; color=&#8221;white-heading&#8221; css=&#8221;.vc_custom_1631903698649{padding-right: 300px !important;padding-left: 300px !important;}&#8221;]<\/p>\n<p style=\"text-align-last: center; text-align: center;\">Nossos analistas de amea\u00e7as cibern\u00e9ticas lidam com a situa\u00e7\u00e3o atual de amea\u00e7as diariamente e analisam informa\u00e7\u00f5es da darknet, feeds de intelig\u00eancia de amea\u00e7as e outras fontes. Eles identificam e analisam as amea\u00e7as \u00e0s quais sua empresa, suas redes e sistemas, bem como aplicativos e servi\u00e7os est\u00e3o expostos diariamente e prop\u00f5em medidas e recomenda\u00e7\u00f5es concretas de a\u00e7\u00e3o antes mesmo de ocorrerem danos. Com o suporte da mais recente intelig\u00eancia de amea\u00e7as cibern\u00e9ticas, nossos analistas est\u00e3o sempre atualizados e voc\u00ea se beneficia das descobertas mais recentes na detec\u00e7\u00e3o de amea\u00e7as cibern\u00e9ticas.<\/p>\n<p>[\/common_title][\/vc_column_inner][\/vc_row_inner][vc_single_image image=&#8221;4169&#8243; img_size=&#8221;800&#215;650&#8243; alignment=&#8221;center&#8221; style=&#8221;vc_box_circle_2&#8243; css_animation=&#8221;fadeIn&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; pix_padding_top=&#8221;padding M&#8221; pix_padding_bottom=&#8221;padding No&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631638180286{padding-right: 40px !important;padding-left: 40px !important;background-color: #000000 !important;}&#8221;][vc_column gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1633008327007{padding-right: 200px !important;padding-left: 200px !important;}&#8221;][common_title title=&#8221;Nossos Servi\u00e7os&#8221; padding=&#8221;off&#8221; color=&#8221;white-heading&#8221;][\/common_title][vc_row_inner pix_padding_bottom=&#8221;padding M&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; el_class=&#8221;icones&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][common_icon_box style=&#8221;pix-ibox-flip&#8221; flip=&#8221;off&#8221; icon_type=&#8221;font&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;flaticon-hacker&#8221; link=&#8221;url:https%3A%2F%2Fgreatystudio.com.br%2Fsecure%2Fservicos%2Fsimulacao-ataque%2F|title:Teste%20de%20Penetra%C3%A7%C3%A3o%20e%20Simula%C3%A7%C3%A3o%20de%20Ataque&#8221; title=&#8221;Teste de Penetra\u00e7\u00e3o e Simula\u00e7\u00e3o de Ataque&#8221;][\/common_icon_box][common_icon_box style=&#8221;pix-ibox-flip&#8221; flip=&#8221;off&#8221; icon_type=&#8221;font&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;flaticon-surveillance&#8221; link=&#8221;url:https%3A%2F%2Fgreatystudio.com.br%2Fsecure%2Fservicos%2Fconsultoria-de-seguranca%2F|title:Servi%C3%A7os%20de%20Consultoria%20de%20Seguran%C3%A7a&#8221; title=&#8221;Servi\u00e7os de Consultoria de Seguran\u00e7a&#8221;][\/common_icon_box][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][common_icon_box style=&#8221;pix-ibox-flip&#8221; flip=&#8221;off&#8221; icon_type=&#8221;font&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;flaticon-shield&#8221; link=&#8221;url:https%3A%2F%2Fgreatystudio.com.br%2Fsecure%2Fservicos%2Fdefesa-cibernetica%2F|title:Servi%C3%A7o%20de%20Defesa%20Cibern%C3%A9tica&#8221; title=&#8221;Servi\u00e7os de Defesa Cibern\u00e9tica&#8221;][\/common_icon_box][common_icon_box style=&#8221;pix-ibox-flip&#8221; flip=&#8221;off&#8221; icon_type=&#8221;font&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;flaticon-firewall&#8221; link=&#8221;url:https%3A%2F%2Fgreatystudio.com.br%2Fsecure%2Fservicos%2Fnuvem-e-ssg%2F|title:Nuvem%20e%20Servi%C3%A7o%20de%20Seguran%C3%A7a%20Gerenciada&#8221; title=&#8221;Nuvem e Servi\u00e7o de Seguran\u00e7a Gerenciada&#8221;][\/common_icon_box][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][common_icon_box style=&#8221;pix-ibox-flip&#8221; flip=&#8221;off&#8221; icon_type=&#8221;font&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;flaticon-detective&#8221; link=&#8221;url:https%3A%2F%2Fgreatystudio.com.br%2Fsecure%2Fservicos%2Fresposta-e-recuperacao%2F|title:Servi%C3%A7os%20de%20Resposta%20e%20Recupera%C3%A7%C3%A3o%20de%20Incidentes&#8221; title=&#8221;Servi\u00e7os de Resposta e Recupera\u00e7\u00e3o de Incidentes&#8221;][\/common_icon_box][common_icon_box style=&#8221;pix-ibox-flip&#8221; flip=&#8221;off&#8221; icon_type=&#8221;font&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;flaticon-hacking&#8221; link=&#8221;url:https%3A%2F%2Fgreatystudio.com.br%2Fsecure%2Fservicos%2Fict-rede-nuvem%2F|title:Solu%C3%A7%C3%B5es%20de%20Seguran%C3%A7a%20de%20ICT%2C%20Rede%20e%20Nuvem&#8221; title=&#8221;Solu\u00e7\u00f5es de Seguran\u00e7a de ICT, Rede e Nuvem&#8221;][\/common_icon_box][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; pix_padding_top=&#8221;padding S&#8221; pix_padding_bottom=&#8221;padding S&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631723572828{background-color: #000000 !important;}&#8221;][vc_column][vc_raw_html]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[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221; content_placement=&#8221;top&#8221; pix_padding_top=&#8221;padding No&#8221; pix_padding_bottom=&#8221;padding No&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631738227922{margin-top: -6px !important;background: rgba(0,0,0,0.7) url(https:\/\/greatystudio.com.br\/secure\/wp-content\/uploads\/2021\/09\/WhatsApp-Image-2021-09-15-at-16.02.39.jpeg?id=4416) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;*background-color: rgb(0,0,0) !important;}&#8221;][vc_column][vc_empty_space height=&#8221;300px&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; pix_padding_top=&#8221;padding M&#8221; pix_padding_bottom=&#8221;padding No&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631720780741{padding-right: 40px !important;padding-left: 40px !important;background-color: #000000 !important;}&#8221; el_class=&#8221;fundo-escuro&#8221;][vc_column][common_title title=&#8221;Servi\u00e7os de Resposta e Recupera\u00e7\u00e3o de Incidentes&#8221; padding=&#8221;off&#8221; color=&#8221;white-heading&#8221;][\/common_title][vc_column_text css=&#8221;.vc_custom_1631903381987{padding-right: 300px !important;padding-left: 300px !important;}&#8221;] Quando ocorre um ataque [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":2430,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-home.php","meta":{"inline_featured_image":false,"loftloader_page_shortcode":""},"_links":{"self":[{"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/pages\/4235"}],"collection":[{"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/comments?post=4235"}],"version-history":[{"count":16,"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/pages\/4235\/revisions"}],"predecessor-version":[{"id":4514,"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/pages\/4235\/revisions\/4514"}],"up":[{"embeddable":true,"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/pages\/2430"}],"wp:attachment":[{"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/media?parent=4235"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}