{"id":785,"date":"2014-08-16T23:08:54","date_gmt":"2014-08-16T23:08:54","guid":{"rendered":"http:\/\/evosec.eu\/?page_id=785"},"modified":"2016-09-11T00:57:42","modified_gmt":"2016-09-11T00:57:42","slug":"what-we-do","status":"publish","type":"page","link":"https:\/\/evosec.eu\/pt\/what-we-do\/","title":{"rendered":"O Que Fazemos"},"content":{"rendered":"<h2><a href=\"\/security\"><i class=\"fa fa-shield fa-fw\"><\/i>SEGURAN\u00c7A DE TI<\/a><\/h2>\n<ul class=\"fa-ul\" style=\"list-style-type: none\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i><a href=\"http:\/\/evosec.eu\/smbs-fast-cyber-security-checklist\/\">Sele\u00e7\u00e3o r\u00e1pida de SMB<\/a><\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Auditoria de seguran\u00e7a do site<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Auditoria de seguran\u00e7a de rede<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Auditoria de seguran\u00e7a do servidor<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Auditoria de seguran\u00e7a de dispositivo incorporado<\/li>\n<\/ul>\n<h2><a href=\"\/operations\"><i class=\"fa fa-heartbeat fa-fw\"><\/i>OPERA\u00c7\u00d5ES DE TI<\/a><\/h2>\n<ul class=\"fa-ul\" style=\"list-style-type: none\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Cria\u00e7\u00e3o de redes<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Servidores Linux<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Os backUPs \/ Ransomware-prova os backups<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Monitoriza\u00e7\u00e3o de websites, intervalos de IP\/IPs, dispositivos, etc<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>3 atualiza\u00e7\u00e3o de protocolos obsoletos\/festa\/integra\u00e7\u00f5es<\/li>\n<\/ul>\n<h2><a href=\"\/automation\"><i class=\"fa fa-cogs fa-fw\"><\/i>AUTOMA\u00c7\u00c3O \u00c9<\/a><\/h2>\n<ul class=\"fa-ul\" style=\"list-style-type: none\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Rastreamento\/an\u00e1lise de dados<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Automatizado de E-mails<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Aplicativos desenvolvidos, scripts ou solu\u00e7\u00f5es para ser executado em placas incorporadas geralmente-dispon\u00edvel &#8211; Raspberry PI, Arduino etc<\/li>\n<\/ul>\n<h2><a href=\"\/web-support\"><i class=\"fa fa-user fa-fw\"><\/i>SUPORTE WEB<\/a><\/h2>\n<ul class=\"fa-ul\" style=\"list-style-type: none\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Atualiza\u00e7\u00e3o, Monitor &#038; Patch: Sites baseados em WordPress &#038; Plugins<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Atualiza\u00e7\u00e3o, Monitor &#038; Patch: Sites baseados em Joomla, Plugins &#038; componentes<\/li>\n<\/ul>\n<h2><a href=\"\/iot-devices-security-assessment\"><i class=\"fa fa-wifi fa-fw\"><\/i>Muitos dispositivos de seguran\u00e7a<\/a><\/h2>\n<ul class=\"fa-ul\" style=\"list-style-type: none\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Sele\u00e7\u00e3o de configura\u00e7\u00e3o\/solu\u00e7\u00e3o de problemas<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Senhas de texto sem formata\u00e7\u00e3o\/protocolos inseguros<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Protocolos de engenharia reversa<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Senhas fixas, backdoors, configura\u00e7\u00f5es padr\u00e3o<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>SEGURAN\u00c7A DE TI Sele\u00e7\u00e3o r\u00e1pida de SMB Auditoria de seguran\u00e7a do site Auditoria de seguran\u00e7a de rede Auditoria de seguran\u00e7a do servidor Auditoria de seguran\u00e7a de dispositivo incorporado OPERA\u00c7\u00d5ES DE TI Cria\u00e7\u00e3o de redes Servidores Linux Os backUPs \/ Ransomware-prova os backups Monitoriza\u00e7\u00e3o de websites, intervalos de IP\/IPs, dispositivos, etc &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-785","page","type-page","status-publish","hentry"],"translation":{"provider":"WPGlobus","version":"3.0.2","language":"pt","enabled_languages":["en","da","de","es","fi","fr","it","hu","nl","no","pl","pt","ru","sv"],"languages":{"en":{"title":true,"content":true,"excerpt":false},"da":{"title":true,"content":true,"excerpt":false},"de":{"title":true,"content":true,"excerpt":false},"es":{"title":true,"content":true,"excerpt":false},"fi":{"title":true,"content":true,"excerpt":false},"fr":{"title":true,"content":true,"excerpt":false},"it":{"title":true,"content":true,"excerpt":false},"hu":{"title":true,"content":true,"excerpt":false},"nl":{"title":true,"content":true,"excerpt":false},"no":{"title":true,"content":true,"excerpt":false},"pl":{"title":true,"content":true,"excerpt":false},"pt":{"title":true,"content":true,"excerpt":false},"ru":{"title":true,"content":true,"excerpt":false},"sv":{"title":true,"content":true,"excerpt":false}}},"_links":{"self":[{"href":"https:\/\/evosec.eu\/pt\/wp-json\/wp\/v2\/pages\/785","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evosec.eu\/pt\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/evosec.eu\/pt\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/evosec.eu\/pt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/evosec.eu\/pt\/wp-json\/wp\/v2\/comments?post=785"}],"version-history":[{"count":3,"href":"https:\/\/evosec.eu\/pt\/wp-json\/wp\/v2\/pages\/785\/revisions"}],"predecessor-version":[{"id":2132,"href":"https:\/\/evosec.eu\/pt\/wp-json\/wp\/v2\/pages\/785\/revisions\/2132"}],"wp:attachment":[{"href":"https:\/\/evosec.eu\/pt\/wp-json\/wp\/v2\/media?parent=785"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}