{"id":4246,"date":"2021-09-10T14:20:21","date_gmt":"2021-09-10T17:20:21","guid":{"rendered":"https:\/\/greatystudio.com.br\/secure\/?page_id=4246"},"modified":"2021-10-04T12:26:05","modified_gmt":"2021-10-04T15:26:05","slug":"simulacao-ataque","status":"publish","type":"page","link":"https:\/\/greatystudio.com.br\/secure\/servicos\/simulacao-ataque\/","title":{"rendered":"Teste de Penetra\u00e7\u00e3o e Simula\u00e7\u00e3o de Ataque"},"content":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221; content_placement=&#8221;top&#8221; pix_padding_top=&#8221;padding No&#8221; pix_padding_bottom=&#8221;padding No&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631735617199{margin-top: -6px !important;background: rgba(0,0,0,0.7) url(https:\/\/greatystudio.com.br\/secure\/wp-content\/uploads\/2021\/09\/WhatsApp-Image-2021-09-15-at-15.52.05.jpeg?id=4410) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;*background-color: rgb(0,0,0) !important;}&#8221;][vc_column][vc_empty_space height=&#8221;300px&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; pix_padding_top=&#8221;padding M&#8221; pix_padding_bottom=&#8221;padding No&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631717275563{padding-right: 40px !important;padding-left: 40px !important;background-color: #000000 !important;}&#8221;][vc_column][common_title title=&#8221;&#8221; size=&#8221;pix-s&#8221; padding=&#8221;off&#8221; color=&#8221;white-heading&#8221;]<\/p>\n<p style=\"text-align: center;\"><strong><span style=\"font-family: Poppins; font-size: 30pt; color: #ffffff;\">Teste de Intrus\u00e3o e Simula\u00e7\u00e3o de Ataque<\/span><\/strong><\/p>\n<p>[\/common_title][vc_column_text css=&#8221;.vc_custom_1631894456982{padding-right: 300px !important;padding-left: 300px !important;}&#8221;]<\/p>\n<p style=\"text-align-last: center; text-align: center;\"><span style=\"color: #ffffff;\">O cen\u00e1rio de risco est\u00e1 mudando constantemente.Novas tecnologias, \u00e1reas de neg\u00f3cio e funcion\u00e1rios s\u00e3o integrados em \u00e1reas que n\u00e3o fazem mais parte do neg\u00f3cio principal e que s\u00e3o desinvestidos. As estrat\u00e9gias dos invasores mudam com a mesma rapidez.<\/span><\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;10&#8243; content_placement=&#8221;middle&#8221; pix_padding_top=&#8221;padding M&#8221; pix_padding_bottom=&#8221;padding S&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1633361129758{margin-bottom: -1px !important;padding-right: 40px !important;padding-left: 40px !important;background-color: #000000 !important;}&#8221;][vc_column pix_padding_top=&#8221;padding S&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; el_class=&#8221;fundo-escuro&#8221; css=&#8221;.vc_custom_1633361058452{background-color: #000000 !important;}&#8221;][common_title title=&#8221;&#8221; padding=&#8221;off&#8221; pix_class=&#8221;fundo-escuro&#8221; css=&#8221;.vc_custom_1631894666730{margin-top: -35px !important;padding-right: 300px !important;padding-left: 300px !important;}&#8221;]<\/p>\n<p style=\"text-align: center;\"><strong><span style=\"font-family: Poppins; font-size: 30pt;\">RED TEAM<\/span><\/strong><\/p>\n<p style=\"text-align: center;\">A Equipe Vermelha da Secure tem uma vasta experi\u00eancia na simula\u00e7\u00e3o de v\u00e1rios atores de amea\u00e7as. Eles variam de ataques simples de &#8220;Script Kiddie&#8221; a encadeamento de vulnerabilidades muito complexas para ataques em n\u00edvel de &#8220;Estado da na\u00e7\u00e3o&#8221;. A coopera\u00e7\u00e3o pr\u00f3xima e cont\u00ednua com o Blue Team interno e a implementa\u00e7\u00e3o de exerc\u00edcios n\u00e3o anunciados da equipe de crise no Cyber Defense Center da Secure resultaram em uma riqueza \u00fanica de experi\u00eancia para ambientes particularmente complexos e bem protegidos.<\/p>\n<p style=\"text-align: center;\">Os ataques tamb\u00e9m chegaram a explorar deliberadamente vulnerabilidades que ainda s\u00e3o desconhecidas do p\u00fablico (desenvolvimento dos chamados exploits de dia zero). Isso tornou poss\u00edvel contornar dispositivos de seguran\u00e7a de \u00faltima gera\u00e7\u00e3o e alcan\u00e7ar um avan\u00e7o em ambientes de alta seguran\u00e7a. Os membros da nossa equipe t\u00eam amplo e profundamente especializado no conjunto de conhecimentos pr\u00e1ticos (por exemplo, fun\u00e7\u00f5es duplas de BlueTeam \/ RedTeam, an\u00e1lises forenses, engenharia reversa, criptografia ou desenvolvimento de exploits), resultando em uma combina\u00e7\u00e3o \u00fanica de seguran\u00e7a de TI ofensiva e defensiva.<\/p>\n<p>[\/common_title][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; pix_padding_bottom=&#8221;padding No&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631717326779{padding-right: 40px !important;padding-left: 40px !important;background-color: #000000 !important;}&#8221;][vc_column][common_title title=&#8221;<span>Simula\u00e7\u00e3o de Ataque Cibern\u00e9tico<\/span>&#8221; size=&#8221;pix-s&#8221; padding=&#8221;off&#8221; color=&#8221;white-heading&#8221; css=&#8221;.vc_custom_1631901404070{padding-right: 300px !important;padding-left: 300px !important;}&#8221;]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #ffffff;\">Ataques cibern\u00e9ticos como WannaCry e Petya mostraram mais uma vez os m\u00e9todos sofisticados que os cibercriminosos usam hoje em dia. Ataques bem sucedidos causam enormes preju\u00edzos, n\u00e3o apenas na \u00e1rea financeira, mas tamb\u00e9m colocam em risco a reputa\u00e7\u00e3o.Voc\u00ea quer saber a que dist\u00e2ncia um hacker pode chegar em sua rede e qual seria o sucesso de um ataque direcionado? Podemos mostrar a voc\u00ea um ataque simulado \u00e0 sua empresa. Nossos especialistas usam m\u00e9todos diferentes, como auditorias t\u00e9cnicas e testes de penetra\u00e7\u00e3o, t\u00e9cnicas de engenharia social (spear phishing, ataque f\u00edsico no local, ataques de malware) ou pesquisa em redes sociais, na Internet, mas tamb\u00e9m na darknet.<\/span><\/p>\n<p>[\/common_title][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;25&#8243; pix_padding_top=&#8221;padding S&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631901460591{border-left-width: 0px !important;padding-right: 40px !important;padding-left: 40px !important;background-color: #000000 !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631901734637{padding-left: 250px !important;}&#8221;][common_tab_acc toggle_type=&#8221;accordion&#8221; collapse=&#8221;on&#8221; accordion=&#8221;%5B%7B%22label_a%22%3A%22Teste%20de%20Penetra%C3%A7%C3%A3o%20Externa%22%2C%22content_a%22%3A%22%3Cp%20style%3A%5C%22text-align%3A%20justified%3B%5C%22%3EComo%20parte%20do%20teste%20de%20penetra%C3%A7%C3%A3o%20externo%2C%20nossos%20testadores%20de%20penetra%C3%A7%C3%A3o%20procuram%20especificamente%20vulnerabilidades%20que%20n%C3%A3o%20podem%20ser%20detectadas%20ou%20exploradas%20por%20ferramentas%20automatizadas.%20Isso%20tamb%C3%A9m%20inclui%20a%20coleta%20de%20informa%C3%A7%C3%B5es%2C%20a%20busca%20de%20informa%C3%A7%C3%B5es%20para%20identificar%20os%20sistemas%20clientes%20que%20est%C3%A3o%20dispon%C3%ADveis%20gratuitamente%20na%20Internet.%20Esses%20sistemas%20dispon%C3%ADveis%20representam%20a%20superf%C3%ADcie%20de%20ataque%20exposta%2C%20que%2C%20em%20princ%C3%ADpio%2C%20est%C3%A1%20dispon%C3%ADvel%20para%20qualquer%20invasor%20an%C3%B4nimo%20pela%20Internet.%20Dependendo%20dos%20servi%C3%A7os%20previamente%20identificados%2C%20os%20demais%20testes%20espec%C3%ADficos%20s%C3%A3o%20adaptados%20e%20realizados.%20%3C%2Fp%3E%22%2C%22tab_id_a%22%3A%221241467889786543%22%7D%2C%7B%22label_a%22%3A%22Teste%20de%20Penetra%C3%A7%C3%A3o%20de%20APP%20M%C3%B3vel%22%2C%22content_a%22%3A%22%3Cp%20style%3A%5C%22text-align%3A%20justified%3B%5C%22%3EO%20teste%20de%20penetra%C3%A7%C3%A3o%20de%20aplicativos%20m%C3%B3veis%20da%20Secure%20%C3%A9%20baseado%20no%20OWASP%20Mobile%20Application%20Security%20Verification%20Standard%20(MASVS)%20e%20para%20a%20API%20de%20back-end%2C%20os%20testes%20s%C3%A3o%20retirados%20do%20OWASP%20Web%20Security%20Testing%20Guide.%20Isso%20garante%20que%20todos%20os%20vetores%20de%20ataque%20t%C3%A9cnico%20relevantes%20sejam%20cobertos%20pelo%20teste%20de%20penetra%C3%A7%C3%A3o.Para%20levar%20em%20considera%C3%A7%C3%A3o%20os%20diferentes%20requisitos%20de%20seguran%C3%A7a%20dos%20aplicativos%20m%C3%B3veis%2C%20o%20MASVS%20divide%20todos%20os%20testes%20em%20dois%20n%C3%ADveis%3A%20O%20n%C3%ADvel%201%20deve%20ser%20atendido%20por%20todos%20os%20aplicativos%20m%C3%B3veis%20e%20confirma%20a%20prote%C3%A7%C3%A3o%20b%C3%A1sica%20contra%20poss%C3%ADveis%20ataques%2C%20tanto%20no%20pr%C3%B3prio%20aplicativo%20quanto%20na%20API%20de%20back-end.O%20N%C3%ADvel%202%20se%20destina%20a%20aplicativos%20com%20maiores%20requisitos%20de%20seguran%C3%A7a%2C%20como%20aplicativos%20de%20e-banking%20ou%20aplicativos%20do%20setor%20de%20sa%C3%BAde.%20Isso%20inclui%2C%20por%20exemplo%2C%20medidas%20de%20defesa%20em%20profundidade%2C%20como%20a%20fixa%C3%A7%C3%A3o%20de%20certificados%20ou%20a%20aplica%C3%A7%C3%A3o%20de%20seguran%C3%A7a%20b%C3%A1sica%20do%20dispositivo.%20%3C%2Fp%3E%22%2C%22tab_id_a%22%3A%223526273212%22%7D%2C%7B%22label_a%22%3A%22Simula%C3%A7%C3%A3o%20de%20Phishing%22%2C%22content_a%22%3A%22%3Cp%20style%3A%5C%22text-align%3A%20justified%3B%5C%22%3EA%20simula%C3%A7%C3%A3o%20de%20phishing%20%C3%A9%20usada%20para%20determinar%20se%20e%20quantos%20funcion%C3%A1rios%20s%C3%A3o%20suscet%C3%ADveis%20a%20um%20e-mail%20de%20phishing%2C%20se%20medidas%20organizacionais%20est%C3%A3o%20em%20vigor%20para%20relatar%20e-mails%20de%20phishing%20e%20se%20elas%20est%C3%A3o%20sendo%20tomadas.%20Os%20funcion%C3%A1rios%20s%C3%A3o%20atra%C3%ADdos%20para%20um%20site%20falso%2C%20onde%20s%C3%A3o%20solicitados%20a%20divulgar%20informa%C3%A7%C3%B5es%20confidenciais.%20Os%20indicadores%20que%20apontam%20para%20um%20e-mail%20de%20phishing%20podem%20variar%20%C3%A0%20vontade.%20%3C%2Fp%3E%22%2C%22tab_id_a%22%3A%225378675543336%22%7D%2C%7B%22label_a%22%3A%22Auditoria%20de%20Engenharia%20Social%22%2C%22content_a%22%3A%22%3Cp%20style%3A%5C%22text-align%3A%20justified%3B%5C%22%3EComo%20parte%20de%20nossas%20auditorias%20de%20engenharia%20social%2C%20verificamos%20o%20comportamento%20de%20seguran%C3%A7a%20de%20seus%20funcion%C3%A1rios.%20Nossos%20engenheiros%20sociais%20tentam%20obter%20informa%C3%A7%C3%B5es%20confidenciais%20de%20seus%20funcion%C3%A1rios%20por%20meio%20de%20contato%20pessoal%2C%20explorando%20sua%20confian%C3%A7a%2C%20credulidade%20e%20prestatividade%20ou%20mesmo%20demandas%20excessivas%20e%20inseguran%C3%A7a.%20Dependendo%20do%20objetivo%20da%20auditoria%20e%20do%20grupo-alvo%2C%20usamos%20diferentes%20m%C3%A9todos%20de%20auditoria%20e%20tipos%20de%20ataques%20de%20engenharia%20social.%20Estes%20v%C3%A3o%20desde%20o%20contacto%20pessoal%20com%20a%20pessoa%20visada%20por%20telefone%20ou%20fisicamente%20no%20local%2C%20ao%20contacto%20electr%C3%B3nico%20atrav%C3%A9s%20de%20e-mail%2C%20chat%20ou%20plataformas%20de%20redes%20sociais%2C%20ao%20contacto%20postal.%20Mas%20tamb%C3%A9m%20a%20entrega%20direcionada%20de%20m%C3%ADdia%20de%20armazenamento%20USB%20manipulada%20ou%20a%20an%C3%A1lise%20sistem%C3%A1tica%20de%20dados%20na%20Internet%20fazem%20parte%20de%20nosso%20repert%C3%B3rio%20de%20ataques.%20%3C%2Fp%3E%22%2C%22tab_id_a%22%3A%2256713247632%22%7D%2C%7B%22label_a%22%3A%22Auditoria%20de%20Infraestrutura%20de%20Email%20%2F%20Proxy%22%2C%22content_a%22%3A%22%3Cp%20style%3A%5C%22text-align%3A%20justified%3B%5C%22%3EDurante%20esta%20auditoria%2C%20ocorre%20uma%20revis%C3%A3o%20t%C3%A9cnica%20do%20e-mail%20ou%20endere%C3%A7o%20de%20e-mail.%20Infraestrutura%20de%20proxy.%20Ele%20verifica%20se%20h%C3%A1%20defici%C3%AAncias%20t%C3%A9cnicas%20ou%20de%20configura%C3%A7%C3%A3o%20que%20permitem%20que%20um%20invasor%20acesse%20inicialmente%20a%20rede%20interna%20com%20a%20ajuda%20de%20anexos%20de%20e-mail%20mal-intencionados%20ou%20links%20de%20download%20ou%20para%20controlar%20sistemas%20de%20TI%20internos%20da%20Internet%20(C2)%2C%20resp.%20permitir%20o%20roubo%20de%20dados%20despercebido.%20%3C%2Fp%3E%22%2C%22tab_id_a%22%3A%225671267632%22%7D%5D&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631901702760{padding-right: 250px !important;}&#8221;][common_tab_acc toggle_type=&#8221;accordion&#8221; collapse=&#8221;on&#8221; accordion=&#8221;%5B%7B%22label_a%22%3A%22OWASP%20TOP-10%20de%20Seguran%C3%A7a%20de%20Aplicativos%20da%20Web%22%2C%22content_a%22%3A%22%3Cp%20style%3A%5C%22text-align%3Ajustified%3B%5C%22%3EEssa%20auditoria%20envolve%20uma%20verifica%C3%A7%C3%A3o%20t%C3%A9cnica%20do%20aplicativo%20da%20web%20(incluindo%20o%20servidor%20no%20qual%20o%20aplicativo%20da%20web%20%C3%A9%20operado)%20da%20perspectiva%20de%20um%20script%20kiddie%20ou%20de%20um%20invasor%20que%20age%20principalmente%20de%20forma%20autom%C3%A1tica.%20O%20objetivo%20da%20auditoria%20de%20seguran%C3%A7a%20de%20aplicativos%20da%20web%20%C3%A9%20identificar%20vulnerabilidades%20obviamente%20cr%C3%ADticas%20(chamadas%20de%20%5C%22frutos%20mais%20f%C3%A1ceis%5C%22)%20e%20avaliar%20a%20superf%C3%ADcie%20de%20ataque%20geral.%20%3C%2Fp%3E%22%2C%22tab_id_a%22%3A%22231056855%22%7D%2C%7B%22label_a%22%3A%22Auditoria%20de%20Seguran%C3%A7a%20de%20Aplicativos%20na%20Web%22%2C%22content_a%22%3A%22%3Cp%20style%3A%5C%22text-align%3Ajustified%3B%5C%22%3EEsse%20teste%20de%20penetra%C3%A7%C3%A3o%20envolve%20um%20exame%20t%C3%A9cnico%20do%20aplicativo%20da%20web%20(incluindo%20o%20servidor%20no%20qual%20o%20aplicativo%20da%20web%20%C3%A9%20operado)%20do%20ponto%20de%20vista%20de%20um%20invasor%20experiente%20-%20opcionalmente%2C%20o%20c%C3%B3digo-fonte%20tamb%C3%A9m%20%C3%A9%20analisado.%20O%20objetivo%20da%20auditoria%20de%20seguran%C3%A7a%20de%20aplicativos%20da%20web%20%C3%A9%20identificar%20vulnerabilidades%20que%20podem%20amea%C3%A7ar%20o%20aplicativo%20imediatamente%20ou%20podem%20levar%20a%20um%20problema%20de%20seguran%C3%A7a%20no%20futuro%20(por%20exemplo%2C%20atrav%C3%A9s%20da%20combina%C3%A7%C3%A3o%20de%20outras%20vulnerabilidades).%20A%20auditoria%20%C3%A9%20realizada%20de%20forma%20estruturada%20com%20base%20no%20OWASP%20Web%20Security%20Testing%20Guide%20(WSTG)%20e%20no%20OWASP%20Top%2010%20Web%20Application%20Security%20Risks%20e%20complementada%20com%20testes%20espec%C3%ADficos%20da%20Secure.%3C%2Fp%3E%22%2C%22tab_id_a%22%3A%222310552523855%22%7D%2C%7B%22label_a%22%3A%22Auditoria%20de%20Seguran%C3%A7a%20da%20Web%20API%22%2C%22content_a%22%3A%22%3Cp%20style%3A%5C%22text-align%3Ajustified%3B%5C%22%3EEssa%20auditoria%20envolve%20uma%20revis%C3%A3o%20t%C3%A9cnica%20da%20API%20da%20Web%20(incluindo%20o%20servidor%20no%20qual%20a%20API%20da%20Web%20%C3%A9%20operada)%20da%20perspectiva%20de%20um%20invasor%20experiente.%20A%20auditoria%20%C3%A9%20realizada%20de%20forma%20estruturada%20com%20base%20no%20OWASP%20Web%20Security%20Testing%20Guide%20(WSTG)%2C%20bem%20como%20no%20OWASP%20API%20Top%2010%20Security%20Risks%20e%20complementada%20com%20testes%20espec%C3%ADficos%20da%20Secure%2C%20para%20que%20todas%20as%20possibilidades%20de%20ataque%2C%20bem%20como%20o%20potencial%20perigo%20de%20atacantes%20avan%C3%A7ados%20s%C3%A3o%20levados%20em%20considera%C3%A7%C3%A3o.%3C%2Fp%3E%22%2C%22tab_id_a%22%3A%22163457876453%22%7D%2C%7B%22label_a%22%3A%22Auditoria%20WLAN%22%2C%22content_a%22%3A%22%3Cp%20style%3A%5C%22text-align%3Ajustified%3B%5C%22%3EA%20auditoria%20WLAN%20verifica%20todos%20os%20par%C3%A2metros%20relevantes%20para%20a%20seguran%C3%A7a%20da%20infraestrutura%20WLAN.%20O%20objetivo%20da%20auditoria%20%C3%A9%20verificar%20as%20medidas%20de%20seguran%C3%A7a%20existentes%20e%20a%20aplica%C3%A7%C3%A3o%20dos%20padr%C3%B5es%20da%20ind%C3%BAstria%20e%20identificar%20poss%C3%ADveis%20vetores%20de%20ataque.%20Assim%2C%20o%20perigo%20de%20um%20ataque%20externo%20%C3%A9%20avaliado%20de%20forma%20realista%2C%20tanto%20da%20perspectiva%20de%20um%20invasor%20an%C3%B4nimo%20quanto%20em%20um%20contexto%20autenticado%20conectado%20%C3%A0%20rede.%3C%2Fp%3E%22%2C%22tab_id_a%22%3A%22123434678987654%22%7D%2C%7B%22label_a%22%3A%22Auditoria%20de%20Seguran%C3%A7a%20de%20Cliente%2FServidor%20do%20Windows%22%2C%22content_a%22%3A%22%3Cp%20style%3A%5C%22text-align%3Ajustified%3B%5C%22%3EEssa%20auditoria%20envolve%20uma%20revis%C3%A3o%20t%C3%A9cnica%20de%20um%20cliente%20Windows%2010%20f%C3%ADsico%20ou%20virtual%20ou%20de%20um%20servidor%20de%20terminal%20do%20Windows%20Server%202016.%20A%20auditoria%20identifica%20vulnerabilidades%20nas%20%C3%A1reas%20de%20ataque%20relevantes%20(f%C3%ADsicas%2C%20de%20rede%20e%20semelhantes)%20e%20verifica%20medidas%20de%20prote%C3%A7%C3%A3o%20importantes%20que%20impedem%20significativamente%20o%20uso%20de%20t%C3%A9cnicas%20de%20ataque.%20O%20cat%C3%A1logo%20de%20verifica%C3%A7%C3%A3o%20desenvolvido%20pela%20Secure%20%C3%A9%20baseado%20em%20padr%C3%B5es%20de%20seguran%C3%A7a%20reconhecidos%2C%20como%20os%20benchmarks%20%5C%22Center%20for%20Information%20Security%5C%22%20(CIS)%20e%20os%20Microsoft%20Security%20Baselines.%3C%2Fp%3E%22%2C%22tab_id_a%22%3A%225134154%22%7D%5D&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;15&#8243; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631288593072{padding-right: 40px !important;padding-left: 40px !important;background: rgba(10,10,10,0.95) url(https:\/\/greatystudio.com.br\/secure\/wp-content\/uploads\/2019\/04\/coding-in-dark-RLAZ3VR-copy.jpg?id=4168) !important;*background-color: rgb(10,10,10) !important;}&#8221; el_class=&#8221;fundo-escuro&#8221;][vc_column][vc_row_inner gap=&#8221;35&#8243; pix_padding_bottom=&#8221;padding S&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221;][vc_column_inner][common_title title=&#8221;<span>O que voc\u00ea pode esperar de n\u00f3s?<\/span>&#8221; padding=&#8221;off&#8221; css=&#8221;.vc_custom_1631901881215{padding-right: 300px !important;padding-left: 300px !important;}&#8221;]<\/p>\n<p style=\"text-align: center;\">A Secure oferece auditorias de seguran\u00e7a direcionadas para verificar seus processos de seguran\u00e7a, infraestrutura de TI e funcion\u00e1rios. Os cibercriminosos est\u00e3o constantemente mudando suas t\u00e1ticas e sua pr\u00f3pria infraestrutura de ICT muda com a mesma rapidez. As amea\u00e7as e vulnerabilidades atuais fazem parte da agenda de nossos especialistas em seguran\u00e7a. Nossas auditorias de seguran\u00e7a, testes de penetra\u00e7\u00e3o e simula\u00e7\u00f5es de ataque cibern\u00e9tico fornecem uma base ideal para aumentar a seguran\u00e7a da sua informa\u00e7\u00e3o a longo prazo e ajudam a identificar, avaliar e eliminar os riscos em um est\u00e1gio inicial.<\/p>\n<p>[\/common_title][\/vc_column_inner][\/vc_row_inner][vc_single_image image=&#8221;4257&#8243; img_size=&#8221;1200&#215;720&#8243; alignment=&#8221;center&#8221; style=&#8221;vc_box_circle_2&#8243; css_animation=&#8221;fadeIn&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; pix_padding_top=&#8221;padding M&#8221; pix_padding_bottom=&#8221;padding No&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1633008347385{padding-right: 40px !important;padding-left: 40px !important;background-color: #000000 !important;}&#8221;][vc_column gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1633008327007{padding-right: 200px !important;padding-left: 200px !important;}&#8221;][common_title title=&#8221;Nossos Servi\u00e7os&#8221; padding=&#8221;off&#8221; color=&#8221;white-heading&#8221;][\/common_title][vc_row_inner pix_padding_bottom=&#8221;padding M&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; el_class=&#8221;icones&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][common_icon_box style=&#8221;pix-ibox-flip&#8221; flip=&#8221;off&#8221; icon_type=&#8221;font&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;flaticon-hacker&#8221; link=&#8221;url:https%3A%2F%2Fgreatystudio.com.br%2Fsecure%2Fservicos%2Fsimulacao-ataque%2F|title:Teste%20de%20Penetra%C3%A7%C3%A3o%20e%20Simula%C3%A7%C3%A3o%20de%20Ataque&#8221; title=&#8221;Teste de Penetra\u00e7\u00e3o e Simula\u00e7\u00e3o de Ataque&#8221;][\/common_icon_box][common_icon_box style=&#8221;pix-ibox-flip&#8221; flip=&#8221;off&#8221; icon_type=&#8221;font&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;flaticon-surveillance&#8221; link=&#8221;url:https%3A%2F%2Fgreatystudio.com.br%2Fsecure%2Fservicos%2Fconsultoria-de-seguranca%2F|title:Servi%C3%A7os%20de%20Consultoria%20de%20Seguran%C3%A7a&#8221; title=&#8221;Servi\u00e7os de Consultoria de Seguran\u00e7a&#8221;][\/common_icon_box][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][common_icon_box style=&#8221;pix-ibox-flip&#8221; flip=&#8221;off&#8221; icon_type=&#8221;font&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;flaticon-shield&#8221; link=&#8221;url:https%3A%2F%2Fgreatystudio.com.br%2Fsecure%2Fservicos%2Fdefesa-cibernetica%2F|title:Servi%C3%A7o%20de%20Defesa%20Cibern%C3%A9tica&#8221; title=&#8221;Servi\u00e7os de Defesa Cibern\u00e9tica&#8221;][\/common_icon_box][common_icon_box style=&#8221;pix-ibox-flip&#8221; flip=&#8221;off&#8221; icon_type=&#8221;font&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;flaticon-firewall&#8221; link=&#8221;url:https%3A%2F%2Fgreatystudio.com.br%2Fsecure%2Fservicos%2Fnuvem-e-ssg%2F|title:Nuvem%20e%20Servi%C3%A7o%20de%20Seguran%C3%A7a%20Gerenciada&#8221; title=&#8221;Nuvem e Servi\u00e7o de Seguran\u00e7a Gerenciada&#8221;][\/common_icon_box][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][common_icon_box style=&#8221;pix-ibox-flip&#8221; flip=&#8221;off&#8221; icon_type=&#8221;font&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;flaticon-detective&#8221; link=&#8221;url:https%3A%2F%2Fgreatystudio.com.br%2Fsecure%2Fservicos%2Fresposta-e-recuperacao%2F|title:Servi%C3%A7os%20de%20Resposta%20e%20Recupera%C3%A7%C3%A3o%20de%20Incidentes&#8221; title=&#8221;Servi\u00e7os de Resposta e Recupera\u00e7\u00e3o de Incidentes&#8221;][\/common_icon_box][common_icon_box style=&#8221;pix-ibox-flip&#8221; flip=&#8221;off&#8221; icon_type=&#8221;font&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;flaticon-hacking&#8221; link=&#8221;url:https%3A%2F%2Fgreatystudio.com.br%2Fsecure%2Fservicos%2Fict-rede-nuvem%2F|title:Solu%C3%A7%C3%B5es%20de%20Seguran%C3%A7a%20de%20ICT%2C%20Rede%20e%20Nuvem&#8221; title=&#8221;Solu\u00e7\u00f5es de Seguran\u00e7a de ICT, Rede e Nuvem&#8221;][\/common_icon_box][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; pix_padding_top=&#8221;padding S&#8221; pix_padding_bottom=&#8221;padding S&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631723572828{background-color: #000000 !important;}&#8221;][vc_column][vc_raw_html]JTNDc3R5bGUlM0UlMjAlNDBtZWRpYSUyMG9ubHklMjBzY3JlZW4lMjBhbmQlMjAlMjhtYXgtd2lkdGglM0ElMjA0ODRweCUyOSUyMCU3Qi5pY29uZXMlMjAucGl4LWJveCUyMC5waXgtaXRlbS10aXRsZSUyMCU3QnRleHQtYWxpZ24lM0Etd2Via2l0LWF1dG8lM0IlN0QlMjAuaWNvbmVzJTIwLnNlcnZpY2UtYm94LTNfX2NvbnRhaW5lciUyMCU3QndpZHRoJTNBMTAwJTI1JTNCJTdEJTBBJTNDJTJGc3R5bGUlM0UlMEElM0NzY3JpcHQlMjBzcmMlM0RodHRwcyUzQSUyRiUyRmNoYXQuYXBpLm1pbHZ1cy5jb20uYnIlMkZhcGljaGF0JTJGd2lkZ2V0JTJGc2NyaXB0JTJGYTdjMjRhODclMkZkNWFlNDNmNTMxNDdkMWYxZjBhMGU2YTQ1MzNhN2MxYzJiNGIzMzExYmIwNjQ3NWZhZTgxNDg5NWVlYmQ3ZDE0NjRhMTg4ODI4NmNjZjQ4MjVkMjU3MTQ1Mjc5MDNkOTdkZGI3NWNlMzY4ZjFmNzhjN2MwNTkxNDU2YWY3Y2YwZjVjMDg4YzZmNzk4MmU4ZjVkMzZlOGZhZDhmOGRlZDY4OGE5MWM2MTBjOGQ3ZDc3YjA3MTAwY2Y4MDhlNGViYmJkNTY4MTQxYTllJTNFJTNDJTJGc2NyaXB0JTNFJTBBJTNDc2NyaXB0JTIwc3JjJTNEJTI3aHR0cHMlM0ElMkYlMkZwcml2YWNpZGFkZS5hcGkubWlsdnVzLmNvbS5iciUyRmFwaSUyRmNvbmZpZ3VyYWNhbyUyRnNjcmlwdCUyRmE3YzI0YTg3JTJGZDE4NzQwZDQwMDZkZWVjZmNiODBlODkwMmUyZDFmMWIxYjU2MjYyZmIzMjUwZDVkZTU4MjEwYmE5Y2E3MmM2NzQ3ZGJiZGYzOWNiMGQ0YmQ3NTM2NjQ2ZDNkYzk3ZmNjY2ZlYTNmYzI1ZTkzYzY4MTcyN2ZjYjcwNTNiMmZmMTI2MDI3ZGYxMjczYjhmMWI0ZmU2MDlmOWFlN2JlYjE2N2U1OWZmNTY2YThkMmNkNjAzOTcyNzZjMDE0ZjY5NGQ3ZTU2ODYzMTlmNCUyNyUzRSUzQyUyRnNjcmlwdCUzRSUwQSUyMCUyMCUyMCUyMCUyMCUyMCUyMCUyMA==[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221; content_placement=&#8221;top&#8221; pix_padding_top=&#8221;padding No&#8221; pix_padding_bottom=&#8221;padding No&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631735617199{margin-top: -6px !important;background: rgba(0,0,0,0.7) url(https:\/\/greatystudio.com.br\/secure\/wp-content\/uploads\/2021\/09\/WhatsApp-Image-2021-09-15-at-15.52.05.jpeg?id=4410) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;*background-color: rgb(0,0,0) !important;}&#8221;][vc_column][vc_empty_space height=&#8221;300px&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; pix_padding_top=&#8221;padding M&#8221; pix_padding_bottom=&#8221;padding No&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631717275563{padding-right: 40px !important;padding-left: 40px !important;background-color: #000000 !important;}&#8221;][vc_column][common_title title=&#8221;&#8221; size=&#8221;pix-s&#8221; padding=&#8221;off&#8221; color=&#8221;white-heading&#8221;] Teste de Intrus\u00e3o e Simula\u00e7\u00e3o de Ataque [\/common_title][vc_column_text css=&#8221;.vc_custom_1631894456982{padding-right: 300px !important;padding-left: 300px !important;}&#8221;] O cen\u00e1rio [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":2430,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-home.php","meta":{"inline_featured_image":false,"loftloader_page_shortcode":""},"_links":{"self":[{"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/pages\/4246"}],"collection":[{"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/comments?post=4246"}],"version-history":[{"count":41,"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/pages\/4246\/revisions"}],"predecessor-version":[{"id":4530,"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/pages\/4246\/revisions\/4530"}],"up":[{"embeddable":true,"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/pages\/2430"}],"wp:attachment":[{"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/media?parent=4246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}