{"id":4267,"date":"2021-09-10T15:59:40","date_gmt":"2021-09-10T18:59:40","guid":{"rendered":"https:\/\/greatystudio.com.br\/secure\/?page_id=4267"},"modified":"2021-09-30T10:30:24","modified_gmt":"2021-09-30T13:30:24","slug":"consultoria-de-seguranca","status":"publish","type":"page","link":"https:\/\/greatystudio.com.br\/secure\/servicos\/consultoria-de-seguranca\/","title":{"rendered":"Servi\u00e7os de Consultoria de Seguran\u00e7a"},"content":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221; content_placement=&#8221;top&#8221; pix_padding_top=&#8221;padding No&#8221; pix_padding_bottom=&#8221;padding No&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631738487102{margin-top: -6px !important;background: rgba(0,0,0,0.7) url(https:\/\/greatystudio.com.br\/secure\/wp-content\/uploads\/2021\/09\/WhatsApp-Image-2021-09-15-at-16.02.39-1.jpeg?id=4419) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;*background-color: rgb(0,0,0) !important;}&#8221;][vc_column][vc_empty_space height=&#8221;300px&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; pix_padding_top=&#8221;padding M&#8221; pix_padding_bottom=&#8221;padding No&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631722277913{padding-right: 40px !important;padding-left: 40px !important;background-color: #000000 !important;}&#8221; el_class=&#8221;fundo-escuro&#8221;][vc_column][common_title title=&#8221;Servi\u00e7os de Consultoria de Seguran\u00e7a&#8221; padding=&#8221;off&#8221;][\/common_title][vc_column_text css=&#8221;.vc_custom_1631903921789{padding-right: 300px !important;padding-left: 300px !important;}&#8221;]<\/p>\n<p style=\"text-align: justify; text-align-last: center;\">Seja seguran\u00e7a cibern\u00e9tica, resili\u00eancia a riscos cibern\u00e9ticos, governan\u00e7a, risco e conformidade, digitaliza\u00e7\u00e3o ou nuvem: os desafios crescentes s\u00f3 podem ser superados com uma estrat\u00e9gia de seguran\u00e7a cibern\u00e9tica hol\u00edstica. A gama modular de servi\u00e7os da Secure leva em considera\u00e7\u00e3o as tecnologias, processos e seus funcion\u00e1rios. Muitos anos de experi\u00eancia no campo da consultoria de seguran\u00e7a de acordo com a ISO 27001 e NIST, testes de penetra\u00e7\u00e3o, simula\u00e7\u00e3o de ataque, bem como conscientiza\u00e7\u00e3o de seguran\u00e7a e as habilidades de primeira classe de nossos especialistas garantem a intera\u00e7\u00e3o harmoniosa de todos os elementos.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;25&#8243; pix_padding_top=&#8221;padding S&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631722309609{padding-right: 40px !important;padding-left: 40px !important;background-color: #000000 !important;}&#8221; el_class=&#8221;fundo-escuro&#8221;][vc_column width=&#8221;1\/2&#8243; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631903938698{padding-left: 250px !important;}&#8221;][common_tab_acc toggle_type=&#8221;accordion&#8221; collapse=&#8221;on&#8221; accordion=&#8221;%5B%7B%22label_a%22%3A%22DPO%2FCISO%20como%20um%20Servi%C3%A7o%22%2C%22content_a%22%3A%22%3Cp%20style%3A%5C%22text-align%3A%20justified%3B%5C%22%3ESua%20empresa%20carece%20de%20recursos%20internos%20para%20ocupar%20com%20compet%C3%AAncia%20a%20posi%C3%A7%C3%A3o%20de%20um%20oficial%20de%20seguran%C3%A7a%20e%20%2F%20ou%20oficial%20de%20prote%C3%A7%C3%A3o%20de%20dados%3F%20Podemos%20assumir%20essa%20tarefa%20no%20%C3%A2mbito%20de%20uma%20rela%C3%A7%C3%A3o%20de%20terceiriza%C3%A7%C3%A3o.%20Voc%C3%AA%20se%20beneficia%20da%20experi%C3%AAncia%20e%20do%20conjunto%20de%20conhecimentos%20pr%C3%A1ticos%20abrangente%20de%20nossos%20especialistas%20nas%20%C3%A1reas%20de%20tecnologia%2C%20organiza%C3%A7%C3%A3o%2C%20conformidade%20e%20auditoria.%20N%C3%B3s%20definimos%20a%20%C3%A1rea%20espec%C3%ADfica%20de%20responsabilidade%20junto%20com%20voc%C3%AA%20e%20fornecemos%20a%20voc%C3%AA%20os%20especialistas%20relevantes.%3C%2Fp%3E%22%2C%22tab_id_a%22%3A%221241467889786543%22%7D%2C%7B%22label_a%22%3A%22Servi%C3%A7os%20de%20ISMS%20%2F%20DSMS%22%2C%22content_a%22%3A%22%3Cp%20style%3A%5C%22text-align%3A%20justified%3B%5C%22%3EVoc%C3%AA%20quer%20ter%20certeza%20de%20que%20sua%20seguran%C3%A7a%20foi%20constru%C3%ADda%20sobre%20uma%20base%20s%C3%B3lida%20e%20confi%C3%A1vel%20de%20longo%20prazo%20e%20tamb%C3%A9m%20pode%20ser%20adaptada%20de%20forma%20r%C3%A1pida%20e%20f%C3%A1cil%20a%20requisitos%20futuros%3F%20Nossos%20especialistas%20apoiam%20voc%C3%AA%20na%20formula%C3%A7%C3%A3o%20de%20uma%20estrat%C3%A9gia%20de%20seguran%C3%A7a%20de%20longo%20prazo%20ou%20no%20estabelecimento%20de%20uma%20estrutura%20flex%C3%ADvel%20para%20o%20gerenciamento%20estruturado%20e%20minimiza%C3%A7%C3%A3o%20direcionada%20de%20todos%20os%20riscos%20de%20ICT.%20Uma%20estrutura%20de%20seguran%C3%A7a%20cibern%C3%A9tica%20n%C3%A3o%20apenas%20ajuda%20voc%C3%AA%20a%20gerenciar%20melhor%20seus%20riscos%20internos.%20A%20implementa%C3%A7%C3%A3o%20de%20requisitos%20de%20conformidade%20e%20gerenciamento%20de%20risco%20tamb%C3%A9m%20%C3%A9%20enormemente%20simplificada%20pela%20estrutura%20estruturada.%3C%2Fp%3E%22%2C%22tab_id_a%22%3A%223526273212%22%7D%2C%7B%22label_a%22%3A%22Auditoria%20de%20Seguran%C3%A7a%20Cibern%C3%A9tica%20e%20Avalia%C3%A7%C3%A3o%20de%20Conformidade%22%2C%22content_a%22%3A%22%3Cp%20style%3A%5C%22text-align%3A%20justified%3B%5C%22%3ENossa%20auditoria%20de%20seguran%C3%A7a%20independente%20examina%20a%20seguran%C3%A7a%20da%20sua%20informa%C3%A7%C3%A3o%20e%20informa%20sobre%20as%20defici%C3%AAncias%20organizacionais%2C%20pessoais%2C%20f%C3%ADsicas%20e%20t%C3%A9cnicas%20da%20sua%20empresa.%20Nosso%20plano%20de%20a%C3%A7%C3%A3o%20detalhado%20fornece%20a%20voc%C3%AA%20a%20base%20para%20um%20aumento%20sustent%C3%A1vel%20na%20seguran%C3%A7a%20da%20sua%20informa%C3%A7%C3%A3o.%20Inclui%20tamb%C3%A9m%20recomenda%C3%A7%C3%B5es%20de%20medidas%20t%C3%A9cnicas%20e%20organizacionais%2C%20bem%20como%20sugest%C3%B5es%20de%20sensibiliza%C3%A7%C3%A3o%20e%20forma%C3%A7%C3%A3o%20para%20os%20seus%20colaboradores.%3C%2Fp%3E%22%2C%22tab_id_a%22%3A%225378675543336%22%7D%2C%7B%22label_a%22%3A%22An%C3%A1lise%20da%20Falha%20do%20Quadro%20de%20Seguran%C3%A7a%20do%20NIST%20CYBER%22%2C%22content_a%22%3A%22%3Cp%20style%3A%5C%22text-align%3A%20justified%3B%5C%22%3EUma%20an%C3%A1lise%20de%20lacunas%20em%20rela%C3%A7%C3%A3o%20ao%20NIST%20Cyber%20Security%20Framework%20(CSF)%20reconhecido%20internacionalmente%20fornece%20a%20transpar%C3%AAncia%20necess%C3%A1ria%20para%20sua%20seguran%C3%A7a%20cibern%C3%A9tica.%20Nossos%20especialistas%20em%20seguran%C3%A7a%20descobrem%20desvios%20em%20todas%20as%20%C3%A1reas%20tem%C3%A1ticas%20do%20NIST%20CSF%2C%20avaliam-nas%20e%20fornecem%20recomenda%C3%A7%C3%B5es%20priorit%C3%A1rias%20para%20a%C3%A7%C3%A3o.%3C%2Fp%3E%5Cn%3Cbr%3E%5Cn%3Ch4%3E%C3%89%20assim%20que%20voc%C3%AA%20se%20beneficia%20de%20nossa%20an%C3%A1lise%20de%20lacunas%20NIST%20CSF%3A%3C%2Fh4%3E%5Cn%3Cp%20style%3A%5C%22text-align%3A%20justified%3B%5C%22%3EVis%C3%A3o%20geral%20de%20sua%20situa%C3%A7%C3%A3o%20atual%20de%20seguran%C3%A7a%20cibern%C3%A9tica%20-%20identificando%2C%20protegendo%20contra%20riscos%2C%20detectando%20e%20respondendo%20a%20eventos%20e%20restaurando%20opera%C3%A7%C3%B5es%20ap%C3%B3s%20um%20incidente.%3C%2Fp%3E%5Cn%3Cp%20style%3A%5C%22text-align%3A%20justified%3B%5C%22%3EOs%20principais%20riscos%20s%C3%A3o%20conhecidos%20e%20avaliados%20por%20especialistas%20independentes.%3C%2Fp%3E%5Cn%3Cp%20style%3A%5C%22text-align%3A%20justified%3B%5C%22%3EVoc%C3%AA%20conhece%20seu%20perfil%20de%20pontos%20fortes%20%2F%20fracos%20em%20rela%C3%A7%C3%A3o%20ao%20NIST%20CSF.%3C%2Fp%3E%5Cn%3Cp%20style%3A%5C%22text-align%3A%20justified%3B%5C%22%3ERecomenda%C3%A7%C3%B5es%20concretas%20para%20medidas%20priorizadas%20de%20acordo%20com%20a%20avalia%C3%A7%C3%A3o%20de%20risco.%3C%2Fp%3E%5Cn%3Cp%20style%3A%5C%22text-align%3A%20justified%3B%5C%22%3ETodas%20as%20descobertas%20da%20an%C3%A1lise%20de%20lacunas%20do%20NIST%20CSF%20s%C3%A3o%20registradas%20em%20um%20relat%C3%B3rio%20detalhado.%3C%2Fp%3E%22%2C%22tab_id_a%22%3A%2256713247632%22%7D%2C%7B%22label_a%22%3A%22Scan%20de%20Vulnerabilidades%20%2F%20Servi%C3%A7os%20de%20Gest%C3%A3o%22%2C%22content_a%22%3A%22%3Cp%20style%3A%5C%22text-align%3Ajustified%3B%5C%22%3ECom%20nosso%20Gerenciamento%20de%20Vulnerabilidades%2C%20voc%C3%AA%20tem%20uma%20maneira%20eficiente%20de%20identificar%2C%20analisar%20e%20avaliar%20as%20vulnerabilidades%20de%20TI.%20A%20varredura%20de%20vulnerabilidade%20fornece%20resultados%20fundamentais%20para%20avaliar%20a%20situa%C3%A7%C3%A3o%20de%20risco%20atual%20e%20a%20efic%C3%A1cia%20das%20medidas%20implementadas.%20O%20monitoramento%20proativo%20de%20sua%20infraestrutura%20de%20TI%20revela%20mudan%C3%A7as%20nos%20sistemas%20e%2C%20portanto%2C%20n%C3%A3o%20apenas%20encontra%20vulnerabilidades%20de%20fabricantes%2C%20mas%20tamb%C3%A9m%20sistemas%20configurados%20incorretamente%2C%20o%20que%20por%20sua%20vez%20pode%20levar%20a%20um%20risco%20de%20seguran%C3%A7a.%3C%2Fp%3E%22%2C%22tab_id_a%22%3A%225671267632%22%7D%5D&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631903957376{padding-right: 250px !important;}&#8221;][common_tab_acc toggle_type=&#8221;accordion&#8221; collapse=&#8221;on&#8221; accordion=&#8221;%5B%7B%22label_a%22%3A%22Consci%C3%AAncia%20de%20Seguran%C3%A7a%22%2C%22content_a%22%3A%22%3Cp%20style%3A%5C%22text-align%3Ajustified%3B%5C%22%3EAs%20pessoas%20s%C3%A3o%20um%20fator%20chave%20decisivo%20para%20a%20seguran%C3%A7a%20da%20sua%20informa%C3%A7%C3%A3o%2C%20por%20isso%20a%20conscientiza%C3%A7%C3%A3o%20sobre%20a%20seguran%C3%A7a%20%C3%A9%20um%20elemento%20importante%20de%20qualquer%20estrat%C3%A9gia%20de%20seguran%C3%A7a%20cibern%C3%A9tica.%20Nossos%20especialistas%20t%C3%AAm%20muitos%20anos%20de%20experi%C3%AAncia%20pr%C3%A1tica%20na%20sensibiliza%C3%A7%C3%A3o%20direcionada%20de%20funcion%C3%A1rios%20para%20o%20manuseio%20de%20informa%C3%A7%C3%B5es%20com%20consci%C3%AAncia%20de%20risco%20e%20seguran%C3%A7a%20nos%20neg%C3%B3cios%20do%20dia%20a%20dia.%20Com%20base%20nas%20diretrizes%20existentes%20e%20em%20suas%20necessidades%20espec%C3%ADficas%2C%20desenvolvemos%20um%20conceito%20detalhado%20de%20conscientiza%C3%A7%C3%A3o%20de%20seguran%C3%A7a.%20Isso%20inclui%20as%20mensagens%20centrais%20mais%20importantes%2C%20um%20cat%C3%A1logo%20apropriado%20de%20medidas%20e%20um%20plano%20de%20comunica%C3%A7%C3%A3o%20orientado%20para%20o%20objetivo.%3C%2Fp%3E%22%2C%22tab_id_a%22%3A%22231056855%22%7D%2C%7B%22label_a%22%3A%22Avalia%C3%A7%C3%A3o%20SWIFT%22%2C%22content_a%22%3A%22%3Cp%20style%3A%5C%22text-align%3Ajustified%3B%5C%22%3EEste%20ano%2C%20a%20SWIFT%20mais%20uma%20vez%20endureceu%20seus%20regulamentos%20para%20provedores%20de%20servi%C3%A7os%20financeiros.%20N%C3%A3o%20apenas%20foram%20adicionados%20novos%20controles%20SWIFT%2C%20mas%20v%C3%A1rios%20foram%20atualizados%20de%20consultivos%20para%20obrigat%C3%B3rios.%20E%20um%20problema%20para%20muitas%20empresas%3A%20o%20prazo%20de%20um%20ano%20em%20que%20os%20ajustes%20devem%20ser%20feitos.%20Como%20est%C3%A3o%20as%20coisas%20para%20voc%C3%AA%3FA%20Secure%20%C3%A9%20um%20avaliador%20SWIFT%20e%20provedor%20de%20seguran%C3%A7a%20cibern%C3%A9tica%20confirmado.%20Com%20a%20nossa%20avalia%C3%A7%C3%A3o%20SWIFT%2C%20voc%C3%AA%20recebe%20uma%20vis%C3%A3o%20geral%20abrangente%20de%20seu%20status%20atual%2C%20bem%20como%20medidas%20recomendadas%20para%20cumprir%20o%20Compliance%20v2020.%3C%2Fp%3E%22%2C%22tab_id_a%22%3A%222310552523855%22%7D%2C%7B%22label_a%22%3A%22Arquitetura%20de%20Seguran%C3%A7a%22%2C%22content_a%22%3A%22%3Cp%20style%3A%5C%22text-align%3Ajustified%3B%5C%22%3EN%C3%B3s%20o%20ajudamos%20a%20construir%20uma%20rede%20apropriada%20e%20arquitetura%20de%20seguran%C3%A7a.%20Com%20base%20no%20padr%C3%A3o%20ISO%2027001%20e%20no%20NIST%20CSF%2C%20identificamos%20os%20elementos%20que%20faltam%20em%20uma%20an%C3%A1lise%20de%20GAP%20e%20mostramos%20os%20riscos%20associados.%20Como%20base%20para%20a%20implementa%C3%A7%C3%A3o%20operacional%2C%20um%20plano%20de%20a%C3%A7%C3%A3o%20%C3%A9%20ent%C3%A3o%20elaborado%20e%20priorizado%20de%20acordo%20com%20o%20risco.%20Dessa%20forma%2C%20garantimos%20que%20voc%C3%AA%20possa%20continuar%20a%20reagir%20rapidamente%20%C3%A0s%20novas%20necessidades%20e%20obter%20medidas%20de%20seguran%C3%A7a%20de%20TI%20ideais.%20Com%20o%20conjunto%20de%20conhecimetos%20pr%C3%A1ticos%20de%20nossos%20especialistas%2C%20voc%C3%AA%20pode%20expandir%20as%20compet%C3%AAncias%20de%20sua%20organiza%C3%A7%C3%A3o%20e%20aumentar%20o%20desempenho%20de%20suas%20informa%C3%A7%C3%B5es%20e%20seguran%C3%A7a%20de%20ICT%20de%20forma%20direcionada.%3C%2Fp%3E%22%2C%22tab_id_a%22%3A%22163457876453%22%7D%2C%7B%22label_a%22%3A%22Consultoria%20de%20Seguran%C3%A7a%20SAP%20%2F%20OT%20%2F%20DLT%22%2C%22content_a%22%3A%22%3Cp%20style%3A%5C%22text-align%3Ajustified%3B%5C%22%3ECom%20a%20digitaliza%C3%A7%C3%A3o%20avan%C3%A7ando%20cada%20vez%20mais%20r%C3%A1pido%2C%20o%20n%C3%BAmero%20de%20tecnologias%20de%20seguran%C3%A7a%20necess%C3%A1rias%20para%20proteger%20aplicativos%20e%20usu%C3%A1rios%20tamb%C3%A9m%20est%C3%A1%20aumentando.%20Nossos%20especialistas%20est%C3%A3o%20sempre%20atualizados%20com%20os%20conhecimentos%20mais%20recentes.%20Dependendo%20de%20suas%20necessidades%20espec%C3%ADficas%2C%20oferecemos%20suporte%20a%20voc%C3%AA%20e%20a%20seus%20departamentos%20especializados%20de%20forma%20seletiva%20em%20processos%20individuais%20ou%20disciplinas%20de%20tecnologia%2C%20bem%20como%20de%20forma%20abrangente%20em%20%C3%A1reas%20de%20aplica%C3%A7%C3%A3o%20inteiras.%3C%2Fp%3E%22%2C%22tab_id_a%22%3A%22123434678987654%22%7D%2C%7B%22label_a%22%3A%22Monitoramento%2FGest%C3%A3o%20de%20Risco%20da%20Cadeia%20de%20Fornecimento%22%2C%22content_a%22%3A%22%3Cp%20style%3A%5C%22text-align%3A%20justified%3B%5C%22%3ECom%20nossos%20muitos%20anos%20de%20experi%C3%AAncia%20em%20seguran%C3%A7a%20cibern%C3%A9tica%2C%20temos%20a%20expertise%20para%20apoi%C3%A1-lo%20na%20configura%C3%A7%C3%A3o%20ou%20otimiza%C3%A7%C3%A3o%20de%20seu%20gerenciamento%20de%20risco%20da%20cadeia%20de%20suprimentos%20cibern%C3%A9tica%20(C-SCRM).%20Um%20C-SCRM%20sistem%C3%A1tico%20melhora%20seu%20n%C3%ADvel%20de%20seguran%C3%A7a%20em%20sua%20cadeia%20de%20suprimentos%2C%20reduz%20os%20pr%C3%B3prios%20riscos%20cibern%C3%A9ticos%20e%20garante%20os%20requisitos%20de%20conformidade.%3C%2Fp%3E%22%2C%22tab_id_a%22%3A%225134154%22%7D%5D&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;15&#8243; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631288593072{padding-right: 40px !important;padding-left: 40px !important;background: rgba(10,10,10,0.95) url(https:\/\/greatystudio.com.br\/secure\/wp-content\/uploads\/2019\/04\/coding-in-dark-RLAZ3VR-copy.jpg?id=4168) !important;*background-color: rgb(10,10,10) !important;}&#8221; el_class=&#8221;fundo-escuro&#8221;][vc_column][vc_row_inner gap=&#8221;35&#8243; pix_padding_bottom=&#8221;padding S&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221;][vc_column_inner][common_title title=&#8221;O que voc\u00ea pode esperar de n\u00f3s?&#8221; padding=&#8221;off&#8221; color=&#8221;white-heading&#8221; css=&#8221;.vc_custom_1631904012465{padding-right: 300px !important;padding-left: 300px !important;}&#8221;]<\/p>\n<p style=\"text-align: center;\">Seguran\u00e7a de ICT, conformidade e resili\u00eancia a riscos cibern\u00e9ticos s\u00e3o nossas principais compet\u00eancias. Independentemente de voc\u00ea n\u00e3o ter recursos internos em \u00e1reas especializadas individuais, se voc\u00ea est\u00e1 procurando suporte estrat\u00e9gico ou precisa de conjunto de conhecimento pr\u00e1tico adicional para o desenvolvimento de uma estrutura de seguran\u00e7a cibern\u00e9tica ou sistema de gest\u00e3o de seguran\u00e7a da informa\u00e7\u00e3o (SGSI): Nossos especialistas s\u00e3o proficientes em todos os elementos e processos e tem ampla experi\u00eancia em v\u00e1rios setores em uma ampla gama de setores. Nossas ofertas de servi\u00e7os modulares podem ser adaptadas precisamente \u00e0s suas necessidades individuais.<\/p>\n<p>[\/common_title][\/vc_column_inner][\/vc_row_inner][vc_single_image image=&#8221;4261&#8243; img_size=&#8221;800&#215;650&#8243; alignment=&#8221;center&#8221; style=&#8221;vc_box_circle_2&#8243; css_animation=&#8221;fadeIn&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; pix_padding_top=&#8221;padding M&#8221; pix_padding_bottom=&#8221;padding No&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631638180286{padding-right: 40px !important;padding-left: 40px !important;background-color: #000000 !important;}&#8221;][vc_column gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1633008327007{padding-right: 200px !important;padding-left: 200px !important;}&#8221;][common_title title=&#8221;Nossos Servi\u00e7os&#8221; padding=&#8221;off&#8221; color=&#8221;white-heading&#8221;][\/common_title][vc_row_inner pix_padding_bottom=&#8221;padding M&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; el_class=&#8221;icones&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][common_icon_box style=&#8221;pix-ibox-flip&#8221; flip=&#8221;off&#8221; icon_type=&#8221;font&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;flaticon-hacker&#8221; link=&#8221;url:https%3A%2F%2Fgreatystudio.com.br%2Fsecure%2Fservicos%2Fsimulacao-ataque%2F|title:Teste%20de%20Penetra%C3%A7%C3%A3o%20e%20Simula%C3%A7%C3%A3o%20de%20Ataque&#8221; title=&#8221;Teste de Penetra\u00e7\u00e3o e Simula\u00e7\u00e3o de Ataque&#8221;][\/common_icon_box][common_icon_box style=&#8221;pix-ibox-flip&#8221; flip=&#8221;off&#8221; icon_type=&#8221;font&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;flaticon-surveillance&#8221; link=&#8221;url:https%3A%2F%2Fgreatystudio.com.br%2Fsecure%2Fservicos%2Fconsultoria-de-seguranca%2F|title:Servi%C3%A7os%20de%20Consultoria%20de%20Seguran%C3%A7a&#8221; title=&#8221;Servi\u00e7os de Consultoria de Seguran\u00e7a&#8221;][\/common_icon_box][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][common_icon_box style=&#8221;pix-ibox-flip&#8221; flip=&#8221;off&#8221; icon_type=&#8221;font&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;flaticon-shield&#8221; link=&#8221;url:https%3A%2F%2Fgreatystudio.com.br%2Fsecure%2Fservicos%2Fdefesa-cibernetica%2F|title:Servi%C3%A7o%20de%20Defesa%20Cibern%C3%A9tica&#8221; title=&#8221;Servi\u00e7os de Defesa Cibern\u00e9tica&#8221;][\/common_icon_box][common_icon_box style=&#8221;pix-ibox-flip&#8221; flip=&#8221;off&#8221; icon_type=&#8221;font&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;flaticon-firewall&#8221; link=&#8221;url:https%3A%2F%2Fgreatystudio.com.br%2Fsecure%2Fservicos%2Fnuvem-e-ssg%2F|title:Nuvem%20e%20Servi%C3%A7o%20de%20Seguran%C3%A7a%20Gerenciada&#8221; title=&#8221;Nuvem e Servi\u00e7o de Seguran\u00e7a Gerenciada&#8221;][\/common_icon_box][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][common_icon_box style=&#8221;pix-ibox-flip&#8221; flip=&#8221;off&#8221; icon_type=&#8221;font&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;flaticon-detective&#8221; link=&#8221;url:https%3A%2F%2Fgreatystudio.com.br%2Fsecure%2Fservicos%2Fresposta-e-recuperacao%2F|title:Servi%C3%A7os%20de%20Resposta%20e%20Recupera%C3%A7%C3%A3o%20de%20Incidentes&#8221; title=&#8221;Servi\u00e7os de Resposta e Recupera\u00e7\u00e3o de Incidentes&#8221;][\/common_icon_box][common_icon_box style=&#8221;pix-ibox-flip&#8221; flip=&#8221;off&#8221; icon_type=&#8221;font&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;flaticon-hacking&#8221; link=&#8221;url:https%3A%2F%2Fgreatystudio.com.br%2Fsecure%2Fservicos%2Fict-rede-nuvem%2F|title:Solu%C3%A7%C3%B5es%20de%20Seguran%C3%A7a%20de%20ICT%2C%20Rede%20e%20Nuvem&#8221; title=&#8221;Solu\u00e7\u00f5es de Seguran\u00e7a de ICT, Rede e Nuvem&#8221;][\/common_icon_box][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; pix_padding_top=&#8221;padding S&#8221; pix_padding_bottom=&#8221;padding S&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631723572828{background-color: #000000 !important;}&#8221;][vc_column][vc_raw_html]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[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221; content_placement=&#8221;top&#8221; pix_padding_top=&#8221;padding No&#8221; pix_padding_bottom=&#8221;padding No&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631738487102{margin-top: -6px !important;background: rgba(0,0,0,0.7) url(https:\/\/greatystudio.com.br\/secure\/wp-content\/uploads\/2021\/09\/WhatsApp-Image-2021-09-15-at-16.02.39-1.jpeg?id=4419) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;*background-color: rgb(0,0,0) !important;}&#8221;][vc_column][vc_empty_space height=&#8221;300px&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; pix_padding_top=&#8221;padding M&#8221; pix_padding_bottom=&#8221;padding No&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1631722277913{padding-right: 40px !important;padding-left: 40px !important;background-color: #000000 !important;}&#8221; el_class=&#8221;fundo-escuro&#8221;][vc_column][common_title title=&#8221;Servi\u00e7os de Consultoria de Seguran\u00e7a&#8221; padding=&#8221;off&#8221;][\/common_title][vc_column_text css=&#8221;.vc_custom_1631903921789{padding-right: 300px !important;padding-left: 300px !important;}&#8221;] Seja seguran\u00e7a cibern\u00e9tica, resili\u00eancia a riscos cibern\u00e9ticos, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":2430,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-home.php","meta":{"inline_featured_image":false,"loftloader_page_shortcode":""},"_links":{"self":[{"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/pages\/4267"}],"collection":[{"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/comments?post=4267"}],"version-history":[{"count":12,"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/pages\/4267\/revisions"}],"predecessor-version":[{"id":4507,"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/pages\/4267\/revisions\/4507"}],"up":[{"embeddable":true,"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/pages\/2430"}],"wp:attachment":[{"href":"https:\/\/greatystudio.com.br\/secure\/wp-json\/wp\/v2\/media?parent=4267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}