{"id":2264,"date":"2020-09-02T21:57:36","date_gmt":"2020-09-03T00:57:36","guid":{"rendered":"https:\/\/www.sphereit.com.br\/novidades\/nova-conquista-microsoft-copy\/"},"modified":"2021-03-04T14:11:53","modified_gmt":"2021-03-04T17:11:53","slug":"ethical-hacking","status":"publish","type":"post","link":"https:\/\/www.sphereit.com.br\/en\/news\/ethical-hacking\/","title":{"rendered":"Ethical Hacking, Application Security and SOC to control threats to IT environments"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; admin_label=&#8221;Header &#8211; N\u00c3O EDITAR&#8221; _builder_version=&#8221;4.4.8&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#004183&#8243; background_color_gradient_end=&#8221;#001f4c&#8221; background_color_gradient_type=&#8221;radial&#8221; background_image=&#8221;https:\/\/www.sphereit.com.br\/wp-content\/uploads\/2020\/06\/cyber-security-18.png&#8221; parallax=&#8221;on&#8221; custom_padding=&#8221;10vw||64px|||&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;23vw||64px||false|false&#8221; bottom_divider_style=&#8221;slant&#8221; bottom_divider_color=&#8221;#f1fafe&#8221; bottom_divider_height=&#8221;40px&#8221; bottom_divider_flip=&#8221;vertical&#8221; locked=&#8221;off&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221; da_disable_devices=&#8221;off|off|off&#8221;][et_pb_row _builder_version=&#8221;4.4.8&#8243; z_index=&#8221;1&#8243; custom_margin=&#8221;-104px|auto||auto||&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25.1&#8243;][et_pb_post_title author=&#8221;off&#8221; date_format=&#8221;d\/m\/Y&#8221; comments=&#8221;off&#8221; featured_image=&#8221;off&#8221; _builder_version=&#8221;4.5.0&#8243; title_font=&#8221;eurostile|700||on|||||&#8221; title_text_align=&#8221;center&#8221; title_text_color=&#8221;#ffffff&#8221; title_font_size=&#8221;37px&#8221; meta_font=&#8221;||||||||&#8221; meta_text_align=&#8221;center&#8221; meta_text_color=&#8221;#ffffff&#8221; meta_font_size=&#8221;18px&#8221;][\/et_pb_post_title][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;EDITAR AQUI&#8221; _builder_version=&#8221;4.4.8&#8243; background_color=&#8221;#f1fafe&#8221; z_index=&#8221;10&#8243; bottom_divider_height=&#8221;26vw&#8221; bottom_divider_flip=&#8221;horizontal&#8221; locked=&#8221;off&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221; da_disable_devices=&#8221;off|off|off&#8221;][et_pb_row _builder_version=&#8221;4.4.8&#8243; custom_padding=&#8221;19px|||||&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.4.8&#8243;][et_pb_text _builder_version=&#8221;4.5.8&#8243; text_font=&#8221;eurostile||||||||&#8221; text_font_size=&#8221;16px&#8221; custom_padding=&#8221;||75px|||&#8221;]<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2266 aligncenter size-large\" src=\"https:\/\/www.sphereit.com.br\/wp-content\/uploads\/2020\/09\/testeira-NEWSLETTER-1024x601.jpg\" alt=\"\" width=\"1024\" height=\"601\" srcset=\"https:\/\/www.sphereit.com.br\/wp-content\/uploads\/2020\/09\/testeira-NEWSLETTER-980x576.jpg 980w, https:\/\/www.sphereit.com.br\/wp-content\/uploads\/2020\/09\/testeira-NEWSLETTER-480x282.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Ethical Hacking<\/em><\/strong><strong>, Seguran\u00e7a de Aplica\u00e7\u00f5es e SOC no controle de amea\u00e7as aos ambientes de TI<\/strong><\/p>\n<p style=\"text-align: justify;\"><em>Seguran\u00e7a sempre foi tema essencial para a TI e, nesse momento estrat\u00e9gico, empresas precisam estar fortemente empenhadas em manter equipes certificadas para um conjunto de opera\u00e7\u00f5es que garantam maior controle de riscos bem como o cumprimento \u00e0s regras da LGPD.<\/em><\/p>\n<p style=\"text-align: justify;\">Os constantes avan\u00e7os da TI trazem, al\u00e9m de benef\u00edcios, uma enorme preocupa\u00e7\u00e3o com a seguran\u00e7a de dados. Durante a pandemia, com a modifica\u00e7\u00e3o de necessidades e rotinas de trabalho, essas preocupa\u00e7\u00f5es se intensificaram e os recursos tecnol\u00f3gicos cresceram em import\u00e2ncia. Afinal, s\u00e3o eles que permitem contornar muitos dos impactos do Covid-19 na economia, viabilizando solu\u00e7\u00f5es remotas que atenuam limita\u00e7\u00f5es impostas pela crise. Num contexto em que o uso generalizado da tecnologia faz aumentar a circula\u00e7\u00e3o de dados, aumentam tamb\u00e9m os cuidados com a seguran\u00e7a desses dados, levando a TI a atuar em novas infraestruturas que enfrentem o momento presente, mas tamb\u00e9m se adaptem ao que vir\u00e1 a seguir, visto que a circula\u00e7\u00e3o de dados s\u00f3 tende a se intensificar. E as empresas devem contar com centros de opera\u00e7\u00f5es de seguran\u00e7a que controlem as amea\u00e7as em seus ambientes de TI, a partir de uma s\u00e9rie integrada de recursos, tais como:<\/p>\n<p style=\"text-align: justify;\">&#8211; <strong><em>Ethical Hacking<\/em><\/strong> \u2013 Forte aliado da ciberseguran\u00e7a, onde os profissionais (<em>hacking<\/em> \u00e9ticos ou <em>white hat hackers<\/em>), partindo dos mesmos conhecimentos tecnol\u00f3gicos e t\u00e1ticos dos temidos <em>black hat hackers<\/em>, atuam no sentido oposto, detectando vulnerabilidades dos sistemas, antecipando-se a poss\u00edveis ataques e buscando solu\u00e7\u00f5es preventivas que refor\u00e7am os protocolos de seguran\u00e7a, melhoram os processos internos e protegem a integridade das informa\u00e7\u00f5es.<\/p>\n<p style=\"text-align: justify;\">&#8211; <strong>Seguran\u00e7a de Aplica\u00e7\u00f5es<\/strong> \u2013 Diante da improv\u00e1vel exist\u00eancia de sistemas n\u00e3o vulner\u00e1veis, \u00e9 importante a ado\u00e7\u00e3o de recursos que protejam lacunas na seguran\u00e7a em aplica\u00e7\u00f5es que, muitas vezes, por serem comuns, podem ser tidas como inofensivas. Um sistema de seguran\u00e7a deve garantir confidencialidade, integridade e disponibilidade dos dados, de modo a preservar informa\u00e7\u00f5es, permitir acessos autorizados, recuperar eventuais danos e possuir um controle de manuten\u00e7\u00e3o que evite a incid\u00eancia de falhas.<\/p>\n<p style=\"text-align: justify;\">&#8211; <strong>Security Operation Center (SOC)\u00a0\u2013 <\/strong>Instala\u00e7\u00e3o que abriga equipes de seguran\u00e7a da informa\u00e7\u00e3o respons\u00e1veis por monitorar os processos continuamente para detectar, analisar e responder a incidentes em redes, servidores, terminais, bancos de dados, aplicativos, sites e outros sistemas, procurando irregularidades.\u00a0 Sua atua\u00e7\u00e3o, alinhada a equipes de resposta a incidentes, garante resolu\u00e7\u00f5es mais r\u00e1pidas e efetivas.<\/p>\n<p style=\"text-align: justify;\">Para implementar a infraestrutura de um controle de opera\u00e7\u00f5es de seguran\u00e7a (firewalls, IDS\/IPS, solu\u00e7\u00f5es de detec\u00e7\u00e3o de viola\u00e7\u00f5es e um\u00a0<a href=\"https:\/\/www.diariodeti.com.br\/siem-gestao-de-eventos-de-seguranca\/\">sistema de gest\u00e3o de informa\u00e7\u00f5es e eventos de seguran\u00e7a<\/a> (SIEM), as empresas devem definir uma\u00a0 estrat\u00e9gia adequada aos seus neg\u00f3cios n\u00e3o s\u00f3 em busca de vulnerabilidades, mas, sobretudo, visando cumprir as regulamenta\u00e7\u00f5es da LGPD em rela\u00e7\u00e3o \u00e0 coleta,\u00a0 armazenamento e tratamento de dados sob sua responsabilidade. A pandemia aponta medidas a serem tomadas pelos profissionais de TI para que, na adequa\u00e7\u00e3o a novos padr\u00f5es de tr\u00e1fego, estejam atentos \u00e0 arquitetura e seguran\u00e7a dos projetos, numa verdadeira gest\u00e3o de risco.<\/p>\n<p><a href=\"https:\/\/www.strongsecurity.com.br\/blog\/lgpd-e-seus-reflexos-na-ti-tudo-o-que-voce-precisa-saber\/\">https:\/\/www.strongsecurity.com.br\/blog\/lgpd-e-seus-reflexos-na-ti-tudo-o-que-voce-precisa-saber\/<\/a>\u00a0\u00a0 <a href=\"https:\/\/www.iberdrola.com\/inovacao\/hacking-etico\"><\/a><\/p>\n<p><a href=\"https:\/\/www.iberdrola.com\/inovacao\/hacking-etico\">https:\/\/www.iberdrola.com\/inovacao\/hacking-etico<\/a><\/p>\n<p><span style=\"font-size: 16px;\"><\/span><a href=\"https:\/\/blog.tecnospeed.com.br\/seguranca-em-aplicacoes-web\/\" style=\"font-size: 16px;\">https:\/\/blog.tecnospeed.com.br\/seguranca-em-aplicacoes-web\/<\/a><\/p>\n<p><a href=\"https:\/\/blog.algartelecom.com.br\/mpe\/o-que-e-security-operation-center-soc-saiba-tudo-sobre\/\">https:\/\/blog.algartelecom.com.br\/mpe\/o-que-e-security-operation-center-soc-saiba-tudo-sobre\/<\/a><\/p>\n<div style=\"text-align: justify;\">\n<div>\n<div><\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Footer&#8221; _builder_version=&#8221;4.4.8&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#004183&#8243; background_color_gradient_end=&#8221;#001f4c&#8221; background_color_gradient_type=&#8221;radial&#8221; background_color_gradient_direction_radial=&#8221;top right&#8221; background_color_gradient_start_position=&#8221;42%&#8221; background_image=&#8221;https:\/\/www.sphereit.com.br\/wp-content\/uploads\/2020\/06\/cyber-security-17.png&#8221; z_index=&#8221;10&#8243; min_height=&#8221;545px&#8221; height=&#8221;446px&#8221; overflow-x=&#8221;visible&#8221; overflow-y=&#8221;visible&#8221; custom_margin=&#8221;-2px||-2px||true|false&#8221; custom_padding=&#8221;||0vw||false|false&#8221; global_module=&#8221;215&#8243; locked=&#8221;off&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221; da_disable_devices=&#8221;off|off|off&#8221;][et_pb_row column_structure=&#8221;2_5,3_5&#8243; make_equal=&#8221;on&#8221; disabled_on=&#8221;on|on|off&#8221; _builder_version=&#8221;4.4.8&#8243; background_color=&#8221;#ffffff&#8221; min_height=&#8221;421px&#8221; custom_margin=&#8221;-137px|auto|-2px|auto|false|false&#8221; custom_padding=&#8221;0px||0px||true&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_vertical=&#8221;40px&#8221; box_shadow_blur=&#8221;60px&#8221; box_shadow_spread=&#8221;-8px&#8221; box_shadow_color=&#8221;rgba(10,45,97,0.48)&#8221; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;3.25.3&#8243; custom_padding=&#8221;60px|40px|60px|40px|true|true&#8221;][et_pb_text _builder_version=&#8221;4.4.9&#8243; text_font=&#8221;||||||||&#8221; header_2_font=&#8221;eurostile|900|||||||&#8221; header_2_font_size=&#8221;56px&#8221; header_2_line_height=&#8221;1.1em&#8221; text_orientation=&#8221;center&#8221; width=&#8221;100%&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;-40px||7px||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;38px&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; text_text_align=&#8221;center&#8221; locked=&#8221;off&#8221;]<\/p>\n<h2 style=\"text-align: left;\">Fale com nossa equipe<\/h2>\n<p>[\/et_pb_text][et_pb_blurb title=&#8221;+55 11 4178-8811&#8243; use_icon=&#8221;on&#8221; font_icon=&#8221;%%264%%&#8221; icon_color=&#8221;#006ac1&#8243; icon_placement=&#8221;left&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;24px&#8221; _builder_version=&#8221;4.4.8&#8243; header_font=&#8221;Overpass|900|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Overpass|300|||||||&#8221; body_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;||0px||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;4px|||||&#8221; locked=&#8221;off&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;sphere@sphereit.com.br&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;%%238%%&#8221; icon_color=&#8221;#006ac1&#8243; icon_placement=&#8221;left&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;24px&#8221; title_last_edited=&#8221;off|phone&#8221; _builder_version=&#8221;4.4.8&#8243; header_font=&#8221;Overpass|900|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Overpass|300|||||||&#8221; body_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;||4px||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;4px|||||&#8221; locked=&#8221;off&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Endere\u00e7o: Rua Jos\u00e9 Versolato, 111 &#8211; 18\u00ba Andar \u2013 S\u00e3o Bernardo do Campo&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;%%249%%&#8221; icon_color=&#8221;#006ac1&#8243; icon_placement=&#8221;left&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;24px&#8221; _builder_version=&#8221;4.4.8&#8243; header_font=&#8221;Overpass|900|||||||&#8221; header_text_align=&#8221;left&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Overpass|300|||||||&#8221; body_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||-99px|||&#8221; locked=&#8221;off&#8221;][\/et_pb_blurb][et_pb_social_media_follow _builder_version=&#8221;4.4.8&#8243; custom_margin=&#8221;100px||||false|false&#8221;][et_pb_social_media_follow_network social_network=&#8221;linkedin&#8221; url=&#8221;https:\/\/www.linkedin.com\/company\/sphere-it-solutions\/&#8221; icon_color=&#8221;#004183&#8243; _builder_version=&#8221;4.4.8&#8243; background_enable_color=&#8221;off&#8221; border_radii=&#8221;on|22px|22px|22px|22px&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#004183&#8243; follow_button=&#8221;off&#8221; url_new_window=&#8221;on&#8221;]linkedin[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=&#8221;facebook&#8221; url=&#8221;https:\/\/www.facebook.com\/sphereitsolutions&#8221; icon_color=&#8221;#004183&#8243; _builder_version=&#8221;4.4.8&#8243; background_color=&#8221;#3b5998&#8243; background_enable_color=&#8221;off&#8221; border_radii=&#8221;on|22px|22px|22px|22px&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#004183&#8243; follow_button=&#8221;off&#8221; url_new_window=&#8221;on&#8221;]facebook[\/et_pb_social_media_follow_network][\/et_pb_social_media_follow][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.4.8&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#004183&#8243; background_color_gradient_end=&#8221; #001c4c&#8221; background_color_gradient_type=&#8221;radial&#8221; background_image=&#8221;https:\/\/www.sphereit.com.br\/wp-content\/uploads\/2020\/06\/cyber-security-010-1.png&#8221; background_size=&#8221;contain&#8221; background_position=&#8221;bottom_left&#8221; transform_translate_linked=&#8221;off&#8221; custom_padding=&#8221;60px|40px|60px|20%|true&#8221; custom_padding_tablet=&#8221;80px|||40px&#8221; custom_padding_phone=&#8221;&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; background_last_edited=&#8221;on|desktop&#8221; background_image_tablet=&#8221;http:\/\/zaib.sandbox.etdevs.com\/divi\/wp-content\/uploads\/sites\/2\/2019\/06\/cyber-security-11.png&#8221; background_enable_image_tablet=&#8221;on&#8221; background_position_tablet=&#8221;top_left&#8221;][et_pb_image src=&#8221;https:\/\/www.sphereit.com.br\/wp-content\/uploads\/2020\/07\/Logos_Sphere_branco_vertical-1.png&#8221; title_text=&#8221;Logos_Sphere_branco_vertical&#8221; _builder_version=&#8221;4.4.9&#8243; width=&#8221;80%&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;57%&#8221; width_last_edited=&#8221;on|phone&#8221; filter_saturate=&#8221;127%&#8221; filter_brightness=&#8221;95%&#8221; filter_contrast=&#8221;131%&#8221; module_alignment_tablet=&#8221;&#8221; module_alignment_phone=&#8221;center&#8221; module_alignment_last_edited=&#8221;on|phone&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row make_equal=&#8221;on&#8221; disabled_on=&#8221;off|off|on&#8221; _builder_version=&#8221;4.4.8&#8243; background_color=&#8221;#ffffff&#8221; min_height=&#8221;526px&#8221; custom_margin=&#8221;-137px|auto|-2px|auto|false|false&#8221; custom_padding=&#8221;0px||0px||true&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_vertical=&#8221;40px&#8221; box_shadow_blur=&#8221;60px&#8221; box_shadow_spread=&#8221;-8px&#8221; box_shadow_color=&#8221;rgba(10,45,97,0.48)&#8221; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25.3&#8243; custom_padding=&#8221;60px|40px|60px|40px|true|true&#8221;][et_pb_image src=&#8221;https:\/\/www.sphereit.com.br\/wp-content\/uploads\/2020\/06\/LogoV.png&#8221; title_text=&#8221;LogoV&#8221; _builder_version=&#8221;4.4.8&#8243; width_tablet=&#8221;&#8221; width_phone=&#8221;57%&#8221; width_last_edited=&#8221;on|phone&#8221; custom_margin=&#8221;-42px|||||&#8221; filter_saturate=&#8221;127%&#8221; filter_brightness=&#8221;95%&#8221; filter_contrast=&#8221;131%&#8221; module_alignment_tablet=&#8221;&#8221; module_alignment_phone=&#8221;center&#8221; module_alignment_last_edited=&#8221;on|phone&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.4.8&#8243; text_font=&#8221;||||||||&#8221; header_2_font=&#8221;Overpass|900|||||||&#8221; header_2_font_size=&#8221;56px&#8221; header_2_line_height=&#8221;1.1em&#8221; text_orientation=&#8221;center&#8221; width=&#8221;100%&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;-23px||7px||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;38px&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; text_text_align=&#8221;center&#8221; locked=&#8221;off&#8221;]<\/p>\n<h2 style=\"text-align: left;\">Fale com nossa equipe<\/h2>\n<p>[\/et_pb_text][et_pb_blurb title=&#8221;+55 11 4178-8811&#8243; use_icon=&#8221;on&#8221; font_icon=&#8221;%%264%%&#8221; icon_color=&#8221;#006ac1&#8243; icon_placement=&#8221;left&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;24px&#8221; _builder_version=&#8221;4.5.0&#8243; header_font=&#8221;Overpass|900|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Overpass|300|||||||&#8221; body_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;||0px||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;4px|||||&#8221; locked=&#8221;off&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;sphere@sphereit.com.br&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;%%238%%&#8221; icon_color=&#8221;#006ac1&#8243; icon_placement=&#8221;left&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;24px&#8221; title_last_edited=&#8221;off|phone&#8221; _builder_version=&#8221;4.4.8&#8243; header_font=&#8221;Overpass|900|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Overpass|300|||||||&#8221; body_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;||4px||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;4px|||||&#8221; locked=&#8221;off&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Endere\u00e7o: Rua Jos\u00e9 Versolato, 111 &#8211; 18\u00ba Andar \u2013 S\u00e3o Bernardo do Campo&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;%%249%%&#8221; icon_color=&#8221;#006ac1&#8243; icon_placement=&#8221;left&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;24px&#8221; _builder_version=&#8221;4.4.8&#8243; header_font=&#8221;Overpass|900|||||||&#8221; header_text_align=&#8221;left&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Overpass|300|||||||&#8221; body_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||-99px|||&#8221; locked=&#8221;off&#8221;][\/et_pb_blurb][et_pb_social_media_follow _builder_version=&#8221;4.4.8&#8243; custom_margin=&#8221;100px||||false|false&#8221;][et_pb_social_media_follow_network social_network=&#8221;linkedin&#8221; url=&#8221;https:\/\/www.linkedin.com\/company\/sphere-it-solutions\/&#8221; icon_color=&#8221;#004183&#8243; _builder_version=&#8221;4.4.8&#8243; background_enable_color=&#8221;off&#8221; border_radii=&#8221;on|22px|22px|22px|22px&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#004183&#8243; follow_button=&#8221;off&#8221; url_new_window=&#8221;on&#8221;]linkedin[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=&#8221;facebook&#8221; url=&#8221;https:\/\/www.facebook.com\/sphereitsolutions&#8221; icon_color=&#8221;#004183&#8243; _builder_version=&#8221;4.4.8&#8243; background_color=&#8221;#3b5998&#8243; background_enable_color=&#8221;off&#8221; border_radii=&#8221;on|22px|22px|22px|22px&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#004183&#8243; follow_button=&#8221;off&#8221; url_new_window=&#8221;on&#8221;]facebook[\/et_pb_social_media_follow_network][\/et_pb_social_media_follow][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Thanks to the commitment and commitment of our employees, we have achieved yet another important goal in our partnership with Microsoft. Before we had the Gold Datacenter partnership level, now we are Gold Data Platform and Gold Data Analytics, aiming at our technical commitment to our customers.<\/p>","protected":false},"author":4,"featured_media":2266,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[13],"tags":[],"class_list":["post-2264","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ethical Hacking, Seguran\u00e7a de Aplica\u00e7\u00f5es e SOC no controle de amea\u00e7as aos ambientes de TI - Sphere IT<\/title>\n<meta name=\"description\" content=\"Nas \u00faltimas d\u00e9cadas, assistimos \u00e0 uma verdadeira revolu\u00e7\u00e3o: a era\u00a0digital. Novas empresas surgiram, dentro de novos modelos de neg\u00f3cios.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sphereit.com.br\/en\/news\/ethical-hacking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ethical Hacking, Seguran\u00e7a de Aplica\u00e7\u00f5es e SOC no controle de amea\u00e7as aos ambientes de TI - Sphere IT\" \/>\n<meta property=\"og:description\" content=\"Nas \u00faltimas d\u00e9cadas, assistimos \u00e0 uma verdadeira revolu\u00e7\u00e3o: a era\u00a0digital. Novas empresas surgiram, dentro de novos modelos de neg\u00f3cios.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sphereit.com.br\/en\/news\/ethical-hacking\/\" \/>\n<meta property=\"og:site_name\" content=\"Sphereit\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-03T00:57:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-04T17:11:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sphereit.com.br\/wp-content\/uploads\/2020\/09\/testeira-NEWSLETTER.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1667\" \/>\n\t<meta property=\"og:image:height\" content=\"979\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fernando Takashi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fernando Takashi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.sphereit.com.br\\\/news\\\/ethical-hacking\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sphereit.com.br\\\/news\\\/ethical-hacking\\\/\"},\"author\":{\"name\":\"Fernando Takashi\",\"@id\":\"https:\\\/\\\/www.sphereit.com.br\\\/pt_br\\\/#\\\/schema\\\/person\\\/af3b780c5dd1e269bce8a95376e0e1ea\"},\"headline\":\"Ethical Hacking, Seguran\u00e7a de Aplica\u00e7\u00f5es e SOC no controle de amea\u00e7as aos ambientes de TI\",\"datePublished\":\"2020-09-03T00:57:36+00:00\",\"dateModified\":\"2021-03-04T17:11:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.sphereit.com.br\\\/news\\\/ethical-hacking\\\/\"},\"wordCount\":2238,\"image\":{\"@id\":\"https:\\\/\\\/www.sphereit.com.br\\\/news\\\/ethical-hacking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.sphereit.com.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/testeira-NEWSLETTER.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.sphereit.com.br\\\/news\\\/ethical-hacking\\\/\",\"url\":\"https:\\\/\\\/www.sphereit.com.br\\\/news\\\/ethical-hacking\\\/\",\"name\":\"Ethical Hacking, Seguran\u00e7a de Aplica\u00e7\u00f5es e SOC no controle de amea\u00e7as aos ambientes de TI - Sphere IT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sphereit.com.br\\\/pt_br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.sphereit.com.br\\\/news\\\/ethical-hacking\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sphereit.com.br\\\/news\\\/ethical-hacking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.sphereit.com.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/testeira-NEWSLETTER.jpg\",\"datePublished\":\"2020-09-03T00:57:36+00:00\",\"dateModified\":\"2021-03-04T17:11:53+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.sphereit.com.br\\\/pt_br\\\/#\\\/schema\\\/person\\\/af3b780c5dd1e269bce8a95376e0e1ea\"},\"description\":\"Nas \u00faltimas d\u00e9cadas, assistimos \u00e0 uma verdadeira revolu\u00e7\u00e3o: a era\u00a0digital. Novas empresas surgiram, dentro de novos modelos de neg\u00f3cios.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.sphereit.com.br\\\/news\\\/ethical-hacking\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.sphereit.com.br\\\/news\\\/ethical-hacking\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.sphereit.com.br\\\/news\\\/ethical-hacking\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.sphereit.com.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/testeira-NEWSLETTER.jpg\",\"contentUrl\":\"https:\\\/\\\/www.sphereit.com.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/testeira-NEWSLETTER.jpg\",\"width\":1667,\"height\":979},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.sphereit.com.br\\\/news\\\/ethical-hacking\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/www.sphereit.com.br\\\/pt_br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ethical Hacking, Seguran\u00e7a de Aplica\u00e7\u00f5es e SOC no controle de amea\u00e7as aos ambientes de TI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.sphereit.com.br\\\/pt_br\\\/#website\",\"url\":\"https:\\\/\\\/www.sphereit.com.br\\\/pt_br\\\/\",\"name\":\"Sphereit\",\"description\":\"Sphere IT Solutions\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.sphereit.com.br\\\/pt_br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.sphereit.com.br\\\/pt_br\\\/#\\\/schema\\\/person\\\/af3b780c5dd1e269bce8a95376e0e1ea\",\"name\":\"Fernando Takashi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e67927226813e24994f3cd160fd560d5ee9846b835b71ca4bc2fdbf73fcb4778?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e67927226813e24994f3cd160fd560d5ee9846b835b71ca4bc2fdbf73fcb4778?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e67927226813e24994f3cd160fd560d5ee9846b835b71ca4bc2fdbf73fcb4778?s=96&d=mm&r=g\",\"caption\":\"Fernando Takashi\"},\"sameAs\":[\"https:\\\/\\\/www.sphereit.com.br\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ethical Hacking, Seguran\u00e7a de Aplica\u00e7\u00f5es e SOC no controle de amea\u00e7as aos ambientes de TI - Sphere IT","description":"Nas \u00faltimas d\u00e9cadas, assistimos \u00e0 uma verdadeira revolu\u00e7\u00e3o: a era\u00a0digital. Novas empresas surgiram, dentro de novos modelos de neg\u00f3cios.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sphereit.com.br\/en\/news\/ethical-hacking\/","og_locale":"en_US","og_type":"article","og_title":"Ethical Hacking, Seguran\u00e7a de Aplica\u00e7\u00f5es e SOC no controle de amea\u00e7as aos ambientes de TI - Sphere IT","og_description":"Nas \u00faltimas d\u00e9cadas, assistimos \u00e0 uma verdadeira revolu\u00e7\u00e3o: a era\u00a0digital. Novas empresas surgiram, dentro de novos modelos de neg\u00f3cios.","og_url":"https:\/\/www.sphereit.com.br\/en\/news\/ethical-hacking\/","og_site_name":"Sphereit","article_published_time":"2020-09-03T00:57:36+00:00","article_modified_time":"2021-03-04T17:11:53+00:00","og_image":[{"width":1667,"height":979,"url":"https:\/\/www.sphereit.com.br\/wp-content\/uploads\/2020\/09\/testeira-NEWSLETTER.jpg","type":"image\/jpeg"}],"author":"Fernando Takashi","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fernando Takashi","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sphereit.com.br\/news\/ethical-hacking\/#article","isPartOf":{"@id":"https:\/\/www.sphereit.com.br\/news\/ethical-hacking\/"},"author":{"name":"Fernando Takashi","@id":"https:\/\/www.sphereit.com.br\/pt_br\/#\/schema\/person\/af3b780c5dd1e269bce8a95376e0e1ea"},"headline":"Ethical Hacking, Seguran\u00e7a de Aplica\u00e7\u00f5es e SOC no controle de amea\u00e7as aos ambientes de TI","datePublished":"2020-09-03T00:57:36+00:00","dateModified":"2021-03-04T17:11:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sphereit.com.br\/news\/ethical-hacking\/"},"wordCount":2238,"image":{"@id":"https:\/\/www.sphereit.com.br\/news\/ethical-hacking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.sphereit.com.br\/wp-content\/uploads\/2020\/09\/testeira-NEWSLETTER.jpg","articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.sphereit.com.br\/news\/ethical-hacking\/","url":"https:\/\/www.sphereit.com.br\/news\/ethical-hacking\/","name":"Ethical Hacking, Seguran\u00e7a de Aplica\u00e7\u00f5es e SOC no controle de amea\u00e7as aos ambientes de TI - Sphere IT","isPartOf":{"@id":"https:\/\/www.sphereit.com.br\/pt_br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sphereit.com.br\/news\/ethical-hacking\/#primaryimage"},"image":{"@id":"https:\/\/www.sphereit.com.br\/news\/ethical-hacking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.sphereit.com.br\/wp-content\/uploads\/2020\/09\/testeira-NEWSLETTER.jpg","datePublished":"2020-09-03T00:57:36+00:00","dateModified":"2021-03-04T17:11:53+00:00","author":{"@id":"https:\/\/www.sphereit.com.br\/pt_br\/#\/schema\/person\/af3b780c5dd1e269bce8a95376e0e1ea"},"description":"Nas \u00faltimas d\u00e9cadas, assistimos \u00e0 uma verdadeira revolu\u00e7\u00e3o: a era\u00a0digital. Novas empresas surgiram, dentro de novos modelos de neg\u00f3cios.","breadcrumb":{"@id":"https:\/\/www.sphereit.com.br\/news\/ethical-hacking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sphereit.com.br\/news\/ethical-hacking\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sphereit.com.br\/news\/ethical-hacking\/#primaryimage","url":"https:\/\/www.sphereit.com.br\/wp-content\/uploads\/2020\/09\/testeira-NEWSLETTER.jpg","contentUrl":"https:\/\/www.sphereit.com.br\/wp-content\/uploads\/2020\/09\/testeira-NEWSLETTER.jpg","width":1667,"height":979},{"@type":"BreadcrumbList","@id":"https:\/\/www.sphereit.com.br\/news\/ethical-hacking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/www.sphereit.com.br\/pt_br\/"},{"@type":"ListItem","position":2,"name":"Ethical Hacking, Seguran\u00e7a de Aplica\u00e7\u00f5es e SOC no controle de amea\u00e7as aos ambientes de TI"}]},{"@type":"WebSite","@id":"https:\/\/www.sphereit.com.br\/pt_br\/#website","url":"https:\/\/www.sphereit.com.br\/pt_br\/","name":"Sphereit","description":"Sphere IT Solutions","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sphereit.com.br\/pt_br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sphereit.com.br\/pt_br\/#\/schema\/person\/af3b780c5dd1e269bce8a95376e0e1ea","name":"Fernando Takashi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e67927226813e24994f3cd160fd560d5ee9846b835b71ca4bc2fdbf73fcb4778?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e67927226813e24994f3cd160fd560d5ee9846b835b71ca4bc2fdbf73fcb4778?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e67927226813e24994f3cd160fd560d5ee9846b835b71ca4bc2fdbf73fcb4778?s=96&d=mm&r=g","caption":"Fernando Takashi"},"sameAs":["https:\/\/www.sphereit.com.br"]}]}},"_links":{"self":[{"href":"https:\/\/www.sphereit.com.br\/en\/wp-json\/wp\/v2\/posts\/2264","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sphereit.com.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sphereit.com.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sphereit.com.br\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sphereit.com.br\/en\/wp-json\/wp\/v2\/comments?post=2264"}],"version-history":[{"count":0,"href":"https:\/\/www.sphereit.com.br\/en\/wp-json\/wp\/v2\/posts\/2264\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sphereit.com.br\/en\/wp-json\/wp\/v2\/media\/2266"}],"wp:attachment":[{"href":"https:\/\/www.sphereit.com.br\/en\/wp-json\/wp\/v2\/media?parent=2264"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sphereit.com.br\/en\/wp-json\/wp\/v2\/categories?post=2264"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sphereit.com.br\/en\/wp-json\/wp\/v2\/tags?post=2264"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}