{"id":3561,"date":"2021-10-15T16:46:24","date_gmt":"2021-10-15T19:46:24","guid":{"rendered":"https:\/\/new.krugertech.com.br\/?page_id=3561"},"modified":"2022-09-06T23:59:09","modified_gmt":"2022-09-07T02:59:09","slug":"seguranca-da-informacao","status":"publish","type":"page","link":"https:\/\/www.krugertech.com.br\/?page_id=3561","title":{"rendered":"Seguran\u00e7a da Informa\u00e7\u00e3o"},"content":{"rendered":"<p><section class=\"kc-elm kc-css-552924 kc_row slider-two\"><div class=\"kc-row-container  kc-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-372761 kc_col-sm-12 kc_column kc_col-sm-12\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-493730\" style=\"height: 65px; clear: both; width:100%;\"><\/div><div class=\"kc-elm kc-css-267661 kc_row kc_row_inner\"><div class=\"kc-elm kc-css-919960 kc_col-sm-12 kc_column_inner kc_col-sm-12\"><div class=\"kc_wrapper kc-col-inner-container\">\t\r\r\t<div class=\"kc-elm kc-css-109932 \">\r\r\t\t<div class=\"section-title  t_center\">\r\t\t\t\t\t\t\t<h5>\/\/ Foco na prote\u00e7\u00e3o de seu neg\u00f3cio<\/h5>\r\t\t\t\t\t\t<h2>Seguran\u00e7a da Informa\u00e7\u00e3o<\/h2>\r\t\t\t<h2>Defesa <span>Cibern\u00e9tica<\/span><\/h2>\r\t\t\t\r\t\t\t\t\t\t\r\t\t\t\t\t\t\r\t\t\t\t<div class=\"em-bar-main\">\r\t\t\t\t\t<div class=\"em-bar em-bar-big\"><\/div>\r\t\t\t\t<\/div>\r\t\t\t\t\r\t\t\t\r\r\t\t\t\t\t\t\r\t\t\t\t\r\r\t\t<\/div>\t\r\r\t<\/div>\t\r\r\t<\/div><\/div><\/div><div class=\"kc-elm kc-css-780542 kc_row kc_row_inner\"><div class=\"kc-elm kc-css-321332 kc_col-sm-12 kc_column_inner kc_col-sm-12\"><div class=\"kc_wrapper kc-col-inner-container\">\n<div class=\"kc-elm kc-css-547207 kc-title-wrap \">\n\n\t<h2 class=\"kc_title\">A Kruger Tecnologia oferece solu\u00e7\u00f5es completas para a seguran\u00e7a da informa\u00e7\u00e3o, minimizando riscos e garantindo a continuidade do neg\u00f3cio.<\/h2>\n<\/div>\n<\/div><\/div><\/div><div class=\"kc-elm kc-css-572831\" style=\"height: 35px; clear: both; width:100%;\"><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"kc-elm kc-css-969837 kc_row\"><div class=\"kc-row-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-225368 kc_col-sm-12 kc_column kc_col-sm-12\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-958803 kc_row kc_row_inner\"><div class=\"kc-elm kc-css-377150 kc_col-sm-12 kc_column_inner kc_col-sm-12\"><div class=\"kc_wrapper kc-col-inner-container\">\t  <div class=\"hero-single-slide hero-section hero-style-five hero-style-eight align-items-center d-flex kc-elm kc-css-684746\" style=\"background-image:url(https:\/\/www.krugertech.com.br\/wp-content\/uploads\/2021\/10\/hacker-working-in-the-darkness-scaled.jpg)\t\">\r\n            <div class=\"circles\">\r\n                <div class=\"point animated-point-1\"><\/div>\r\n                <div class=\"point animated-point-2\"><\/div>\r\n                <div class=\"point animated-point-3\"><\/div>\r\n                <div class=\"point animated-point-4\"><\/div>\r\n                <div class=\"point animated-point-5\"><\/div>\r\n                <div class=\"point animated-point-6\"><\/div>\r\n                <div class=\"point animated-point-7\"><\/div>\r\n                <div class=\"point animated-point-8\"><\/div>\r\n                <div class=\"point animated-point-9\"><\/div>\r\n            <\/div>\r\n\t\t\t<div class=\"container\">\r\n\t\t\t\t<div class=\"row align-items-center justify-content-between \">\r\n                    <div class=\"col-md-6 col-lg-6\">\r\n                        \t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"col-md-6 col-lg-6\">\r\n\t\t\t\t\t\t<div class=\"hero-content-left text-white\"> \r\n\t\t\t\t\t    \t<h3>Seguran\u00e7a da Informa\u00e7\u00e3o<\/h3>\r\n\t\t\t\t\t\t\t<h1>DEFESA CIBERN\u00c9TICA<span class=\"redX\"><\/span><\/h1>\r\n\t\t\t\t\t\t\t<h2><\/h2>\r\n\t\t\t\t\t\t\t<p class=\"lead\">A Kruger Tecnologia oferece solu\u00e7\u00f5es completas para a seguran\u00e7a da informa\u00e7\u00e3o, minimizando riscos e garantindo a prote\u00e7\u00e3o de dados e continuidade de seu neg\u00f3cio.<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"slider-video-icon\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>  \t\t\r\n      <\/div>\r\n\t<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"kc-elm kc-css-845775 kc_row\"><div class=\"kc-row-container  kc-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-539201 kc_col-sm-12 kc_column kc_col-sm-12\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-470924\" style=\"height: 60px; clear: both; width:100%;\"><\/div><div class=\"kc-elm kc-css-972575 kc_row kc_row_inner\"><div class=\"kc-elm kc-css-261041 kc_col-sm-6 kc_column_inner kc_col-sm-6 techno_about\"><div class=\"kc_wrapper kc-col-inner-container\">\t\r\n\t<div class=\"em_about_us kc-elm kc-css-667620\">\r\n\t\t\r\n\t\t \r\n\t\t\t\t<div class=\"col-md-12 col-sm-12 col-xs-12\">\r\n\t\t\t\t\t<div class=\"em_about_us_thumb\">\r\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.krugertech.com.br\/wp-content\/uploads\/2021\/10\/computer-hacker-WJRUSNQ-scaled.jpg\" alt=\"\">\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\t\r\n\t<\/div><\/div><div class=\"kc-elm kc-css-436875 kc_col-sm-6 kc_column_inner kc_col-sm-6\"><div class=\"kc_wrapper kc-col-inner-container\">\t\r\r\t<div class=\"kc-elm kc-css-943288 \">\r\r\t\t<div class=\"section-title  t_left\">\r\t\t\t\t\t\t<h2>O que \u00e9 seguran\u00e7a da informa\u00e7\u00e3o?<\/h2>\r\t\t\t<h2><\/h2>\r\t\t\t\r\t\t\t\t\t\t\r\t\t\t\t\r\t\t\t\r\r\t\t\t\t\t\t\r\t\t\t\t\r\r\t\t<\/div>\t\r\r\t<\/div>\t\r\r\t<div class=\"kc-elm kc-css-535042 kc_text_block\"><\/p>\n<p><span style=\"font-weight: 400;\">Seguran\u00e7a da Informa\u00e7\u00e3o \u00e9 um ramo da ci\u00eancia que se preocupa com a prote\u00e7\u00e3o de informa\u00e7\u00f5es sigilosas ou n\u00e3o e tamb\u00e9m de dados sens\u00edveis, no mundo f\u00edsico e no mundo digital.\u00a0<\/span><\/p>\n<p>\n<\/div><div class=\"kc-elm kc-css-761878 kc_text_block\"><\/p>\n<p>O principal o objetivo da seguran\u00e7a da informa\u00e7\u00e3o \u00e9 garantir que a informa\u00e7\u00e3o esteja dispon\u00edvel apenas a quem ela precise estar, evitando que outras pessoas tenham acesso a elas de forma n\u00e3o autorizada. Os principais pilares da seguran\u00e7a s\u00e3o: autenticidade, confidencialidade, integridade e disponibilidade.<\/p>\n<p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"kc-elm kc-css-66202 kc_row service_details\"><div class=\"kc-row-container  kc-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-769523 kc_col-sm-12 kc_column kc_col-sm-12\"><div class=\"kc-col-container\">\n<div class=\"kc-elm kc-css-24078 kc-pro-button kc-button-main\">\n\t<a href=\"https:\/\/api.whatsapp.com\/send?phone=554832200695&#038;text=Ol%C3%A1%2C%20estou%20vindo%20atrav%C3%A9s%20do%20site%20da%20Kruger%20Tech%20e%20gostaria%20de%20receber%20uma%20consultoria%20gratuita%20com%20dura%C3%A7%C3%A3o%20de%201h.\" target=\"_blank\" rel=\"noopener\">\n\t\t<span class=\"creative_title\">Fale agora com um especialista<\/span>\t<\/a>\n<\/div>\n<div class=\"kc-elm kc-css-676499\" style=\"height: 35px; clear: both; width:100%;\"><\/div><div class=\"kc-elm kc-css-862068 kc_row kc_row_inner\"><div class=\"kc-elm kc-css-268282 kc_col-sm-12 kc_column_inner kc_col-sm-12\"><div class=\"kc_wrapper kc-col-inner-container\"><div class=\"kc-elm kc-css-262196 kc_row kc_row_inner\"><div class=\"kc-elm kc-css-341683 kc_col-sm-12 kc_column_inner kc_col-sm-12\"><div class=\"kc_wrapper kc-col-inner-container\">\n<div class=\"kc-elm kc-css-969202 kc-title-wrap \">\n\n\t<h1 class=\"kc_title\">Mas e o que \u00e9 informa\u00e7\u00e3o?<\/h1>\n<\/div>\n<div class=\"kc-elm kc-css-551180 kc_text_block\"><\/p>\n<p>Informa\u00e7\u00e3o \u00e9 qualquer dado que tenha sentido dentro de um contexto, ou seja, de acordo com o contexto que est\u00e1 sendo analisado, um dado pode ser \u00fatil ou n\u00e3o, se for um dado \u00fatil, \u00e9 considerado como informa\u00e7\u00e3o e deve ser protegido. Como por exemplo: informa\u00e7\u00f5es confidenciais de sua empresa, dados de seus colaboradores, de seus clientes, segredos industrias, entre outros. Importante ressaltar que os dados pessoais e sens\u00edveis tamb\u00e9m devem ser protegidos.<\/p>\n<p>\n<\/div>\n<div class=\"kc-elm kc-css-732222 kc-title-wrap \">\n\n\t<h1 class=\"kc_title\">Como resolvemos?<\/h1>\n<\/div>\n<div class=\"kc-elm kc-css-959078 kc_text_block\"><\/p>\n<p>Ciberseguran\u00e7a \u00e9 a pr\u00e1tica de proteger sistemas cr\u00edticos e informa\u00e7\u00f5es confidenciais dos ataques cibern\u00e9ticos. Essa pr\u00e1tica possui medidas desenhadas para combater amea\u00e7as contra sistemas e aplica\u00e7\u00f5es, infraestruturas de rede, bancos de dados e servidores. As amea\u00e7as podem surgir de fatores internos ou externos e podem gerar vazamentos de dados ou levar para um cen\u00e1rio de desastre, perda ou at\u00e9 mesmo sequestro de dados.<\/p>\n<p>\n<\/div><div class=\"kc-elm kc-css-423662 kc_row kc_row_inner\"><div class=\"kc-elm kc-css-86384 kc_col-sm-4 kc_column_inner kc_col-sm-4\"><div class=\"kc_wrapper kc-col-inner-container\">    \t<div class=\"em_work_progress style-two kc-elm kc-css-866255\">\r\n    \t\t    \t\t\t<div class=\"em_work_progress_icon\">\r\n    \t\t\t\t<span><i class=\"et-target\"><\/i><\/span>\r\n    \t\t\t\t<div class=\"em_work_progress-number\"><span>01<\/span><\/div>    \t\t\t<\/div>\t\t\t\r\n    \t\t    \t\t<div class=\"em_progress_content\">\r\n    \t\t\t<div class=\"em_work_progress-title\"><h2>Avalia\u00e7\u00e3o e Diagn\u00f3stico<\/h2><\/div>    \t\t\t<div class=\"em_work_progress-desc\"><p>Nossa equipe elaborar\u00e1 an\u00e1lises para encontrar poss\u00edveis vulnerabilidades atrav\u00e9s de ferramentas e testes de intrus\u00e3o e assim, mapear todos os riscos que podem causar preju\u00edzos \u00e0 organiza\u00e7\u00e3o. <\/p><\/div>    \t\t<\/div>\r\n    \t<\/div>\r\n\t\t<\/div><\/div><div class=\"kc-elm kc-css-103400 kc_col-sm-4 kc_column_inner kc_col-sm-4\"><div class=\"kc_wrapper kc-col-inner-container\">    \t<div class=\"em_work_progress style-two kc-elm kc-css-927637\">\r\n    \t\t    \t\t\t<div class=\"em_work_progress_icon\">\r\n    \t\t\t\t<span><i class=\"flaticon-analysis\"><\/i><\/span>\r\n    \t\t\t\t<div class=\"em_work_progress-number\"><span>02<\/span><\/div>    \t\t\t<\/div>\t\t\t\r\n    \t\t    \t\t<div class=\"em_progress_content\">\r\n    \t\t\t<div class=\"em_work_progress-title\"><h2>Solu\u00e7\u00e3o<\/h2><\/div>    \t\t\t<div class=\"em_work_progress-desc\"><p>Com base nas informa\u00e7\u00f5es coletadas, indicaremos as melhores solu\u00e7\u00f5es para garantir uma prote\u00e7\u00e3o eficaz contra incidentes de seguran\u00e7a, como ataques, cat\u00e1strofes ou falhas humana no tratamento de dados.<\/p><\/div>    \t\t<\/div>\r\n    \t<\/div>\r\n\t\t<\/div><\/div><div class=\"kc-elm kc-css-79530 kc_col-sm-4 kc_column_inner kc_col-sm-4\"><div class=\"kc_wrapper kc-col-inner-container\">    \t<div class=\"em_work_progress style-two kc-elm kc-css-894428 last-item\">\r\n    \t\t    \t\t\t<div class=\"em_work_progress_icon\">\r\n    \t\t\t\t<span><i class=\"sl-bulb\"><\/i><\/span>\r\n    \t\t\t\t<div class=\"em_work_progress-number\"><span>03<\/span><\/div>    \t\t\t<\/div>\t\t\t\r\n    \t\t    \t\t<div class=\"em_progress_content\">\r\n    \t\t\t<div class=\"em_work_progress-title\"><h2>Melhoria Continua<\/h2><\/div>    \t\t\t<div class=\"em_work_progress-desc\"><p>Nossa equipe especializada faz o monitoramento e gerenciamento das ferramentas e par\u00e2metros de seguran\u00e7a para mitigar qualquer risco de incidentes, evitando preju\u00edzos para sua empresa.<\/p><\/div>    \t\t<\/div>\r\n    \t<\/div>\r\n\t\t<\/div><\/div><\/div>\n<div class=\"kc-elm kc-css-251843 kc-title-wrap \">\n\n\t<h1 class=\"kc_title\">O que oferecemos?<\/h1>\n<\/div>\n<div data-kc-equalheight=\"true\" data-kc-row-action=\"true\" data-kc-equalheight-align=\"top\" class=\"kc-elm kc-css-825229 kc_row kc_row_inner\"><div class=\"kc-elm kc-css-99184 kc_col-sm-6 kc_column_inner kc_col-sm-6\"><div class=\"kc_wrapper kc-col-inner-container\"><div class=\"kc-elm kc-css-302833 kc-feature-boxes kc-fb-layout-3\">\n\n\t<div class=\"content-icon\"><i class=\"sl-badge\"><\/i><\/div><div class=\"box-right\"><div class=\"content-title\">An\u00e1lise de Vulnerabilidades<\/div><div class=\"content-desc\">Atualmente, manter um ambiente de TI seguro \u00e9 um fator essencial para o sucesso de qualquer empresa, dessa forma, buscamos fazer um diagn\u00f3stico e levantamento de vulnerabilidades e amea\u00e7as, identifica\u00e7\u00e3o e classifica\u00e7\u00e3o dos riscos, baseados nos crit\u00e9rios t\u00e9cnicos de normas e boas pr\u00e1ticas de seguran\u00e7a da informa\u00e7\u00e3o. <\/div><\/div>\n<\/div>\n<div class=\"kc-elm kc-css-973788 kc-feature-boxes kc-fb-layout-3\">\n\n\t<div class=\"content-icon\"><i class=\"et-gears\"><\/i><\/div><div class=\"box-right\"><div class=\"content-title\">Auditorias de Seguran\u00e7a<\/div><div class=\"content-desc\">Olhamos para a organiza\u00e7\u00e3o como um todo, avaliando as rotinas e a cadeia de processos existentes na \u00e1rea de T.I da organiza\u00e7\u00e3o, para avaliar se as normas e boas pr\u00e1ticas est\u00e3o sendo seguidas. O processo de auditoria \u00e9 independente e avalia a empresa com base nas normas da fam\u00edlia ISO 27000, contando com um resultado transparente e fiel ao estado da organiza\u00e7\u00e3o. <\/div><\/div>\n<\/div>\n<div class=\"kc-elm kc-css-358034 kc-feature-boxes kc-fb-layout-3\">\n\n\t<div class=\"content-icon\"><i class=\"sl-badge\"><\/i><\/div><div class=\"box-right\"><div class=\"content-title\">Antiv\u00edrus, Anti Ransomware e Anti Malwares<\/div><div class=\"content-desc\">S\u00e3o ferramentas desenvolvidas para evitar qualquer problema com v\u00edrus, programas maliciosos, sequestro de dados e ataques maliciosos. Disponibilizamos solu\u00e7\u00f5es eficazes, a fim de garantir maior seguran\u00e7a ao usu\u00e1rio, protegendo das diversas formas de contamina\u00e7\u00e3o por softwares maliciosos, uma vez que e-mails, pendrives e sites duvidosos podem ser a ponta de entrada para eles. <\/div><\/div>\n<\/div>\n<div class=\"kc-elm kc-css-353365 kc-feature-boxes kc-fb-layout-3\">\n\n\t<div class=\"content-icon\"><i class=\"sl-share-alt\"><\/i><\/div><div class=\"box-right\"><div class=\"content-title\">Gest\u00e3o de Seguran\u00e7a  e de Riscos<\/div><div class=\"content-desc\">Para manter a ciberseguran\u00e7a em dia, \u00e9  fundamental que um profissional capacitado esteja acompanhando as solu\u00e7\u00f5es de seguran\u00e7a empregadas dentro do neg\u00f3cio e verifique se tudo est\u00e1 sendo aplicado corretamente. Realizamos a gest\u00e3o de todas as ferramentas de seguran\u00e7a do ambiente do cliente, e tomamos todas atitudes necess\u00e1rias para garantir que incidentes n\u00e3o ocorram.<\/div><\/div>\n<\/div>\n<div class=\"kc-elm kc-css-969951 kc-feature-boxes kc-fb-layout-3\">\n\n\t<div class=\"content-icon\"><i class=\"sl-badge\"><\/i><\/div><div class=\"box-right\"><div class=\"content-title\">Conformidade com Normas<\/div><div class=\"content-desc\">A tecnologia n\u00e3o \u00e9 um mundo sem leis, onde cada pessoa segue seu pr\u00f3prio regimento. As empresas brasileiras precisam respeitar a LGPD, Marco Civil da Internet, C\u00f3digo de Defesa do Consumidor, Propriedade Intelectual e Industrial, al\u00e9m de outras normas. Tamb\u00e9m existem normas que ditam boas pr\u00e1ticas como fam\u00edlia ISO 27000,<\/div><\/div>\n<\/div>\n<\/div><\/div><div class=\"kc-elm kc-css-815199 kc_col-sm-6 kc_column_inner kc_col-sm-6\"><div class=\"kc_wrapper kc-col-inner-container\"><div class=\"kc-elm kc-css-691447 kc-feature-boxes kc-fb-layout-3\">\n\n\t<div class=\"content-icon\"><i class=\"sl-badge\"><\/i><\/div><div class=\"box-right\"><div class=\"content-title\">Solu\u00e7\u00f5es de Firewall<\/div><div class=\"content-desc\">O Firewall \u00e9 um mecanismo respons\u00e1vel pelo monitoramento do tr\u00e1fego de entrada e sa\u00edda de uma determinada rede, sistema ou aplica\u00e7\u00e3o. Atrav\u00e9s de regras e par\u00e2metros estipuladas pelos especialistas em seguran\u00e7a, esse sistema filtra o trafego e realiza a prote\u00e7\u00e3o desejada, sendo respons\u00e1vel pela detec\u00e7\u00e3o de tentativas de ataques externos.<\/div><\/div>\n<\/div>\n<div class=\"kc-elm kc-css-39683 kc-feature-boxes kc-fb-layout-3\">\n\n\t<div class=\"content-icon\"><i class=\"sl-share-alt\"><\/i><\/div><div class=\"box-right\"><div class=\"content-title\">Prote\u00e7\u00e3o de Sistemas<\/div><div class=\"content-desc\">Para tamb\u00e9m garantir a prote\u00e7\u00e3o dos sistemas e aplica\u00e7\u00f5es utilizados pela organiza\u00e7\u00e3o, \u00e9 fundamental ter uma pol\u00edtica de acesso aos sistemas utilizados, al\u00e9m da utiliza\u00e7\u00e3o de ferramentas de defesa implementadas por especialistas. Tamb\u00e9m realizamos an\u00e1lises de seguran\u00e7a desses softwares, e quando necess\u00e1rio apontamos as solu\u00e7\u00f5es necess\u00e1rias para mant\u00ea-los seguros. <\/div><\/div>\n<\/div>\n<div class=\"kc-elm kc-css-768342 kc-feature-boxes kc-fb-layout-3\">\n\n\t<div class=\"content-icon\"><i class=\"et-genius\"><\/i><\/div><div class=\"box-right\"><div class=\"content-title\">Prote\u00e7\u00e3o de Endpoints e Filtro de Conte\u00fado<\/div><div class=\"content-desc\">Os dispositivos utilizados pelos usu\u00e1rios, como: computadores, notebooks, tablets e smartphones s\u00e3o chamados de endpoints. Geralmente s\u00e3o alvos iniciais de ataques, \u00e9 necess\u00e1rio a ado\u00e7\u00e3o de solu\u00e7\u00f5es eficazes quando se trata de manter todos os dispositivos seguros. Tamb\u00e9m \u00e9 necess\u00e1rio realizar o controle e filtro de conte\u00fado acessado, atrav\u00e9s de mecanismos de Proxy. <\/div><\/div>\n<\/div>\n<div class=\"kc-elm kc-css-608651 kc-feature-boxes kc-fb-layout-3\">\n\n\t<div class=\"content-icon\"><i class=\"sl-badge\"><\/i><\/div><div class=\"box-right\"><div class=\"content-title\">Pol\u00edticas de Seguran\u00e7a<\/div><div class=\"content-desc\">Para uma organiza\u00e7\u00e3o ser considerada segura do ponto de vista cibern\u00e9tico, precisa ter incorporado no seu dia a dia a cultura de boas pr\u00e1ticas por todos que utilizam sua infraestrutura de tecnologia da informa\u00e7\u00e3o. \u00c9 necess\u00e1rio desenvolver pol\u00edticas de seguran\u00e7a da informa\u00e7\u00e3o claras, objetivas e eficazes, visto que precisa ser acess\u00edvel e compreens\u00edvel por todos que fazem parte da organiza\u00e7\u00e3o.<\/div><\/div>\n<\/div>\n<div class=\"kc-elm kc-css-550006 kc-feature-boxes kc-fb-layout-3\">\n\n\t<div class=\"content-icon\"><i class=\"sl-badge\"><\/i><\/div><div class=\"box-right\"><div class=\"content-title\">Treinamentos e Capacita\u00e7\u00e3o<\/div><div class=\"content-desc\">Com o avan\u00e7o da tecnologia e da alta conectividade, seguran\u00e7a da informa\u00e7\u00e3o agora \u00e9 um pr\u00e9-requisito b\u00e1sico para que qualquer organiza\u00e7\u00e3o tenha sucesso no meio digital, sendo necess\u00e1rio capacitar suas equipes visando a mitiga\u00e7\u00e3o de riscos causados por vulnerabilidades e reduzindo as possibilidades de erros humanos ou vazamentos indesejados.<\/div><\/div>\n<\/div>\n<\/div><\/div><\/div>\n<div class=\"kc-elm kc-css-347514 kc-title-wrap \">\n\n\t<h1 class=\"kc_title\">O que esperar dos nossos servi\u00e7os?<\/h1>\n<\/div>\n<div class=\"kc-elm kc-css-512401 kc_text_block\"><\/p>\n<p>As an\u00e1lises de seguran\u00e7a permitem entender os riscos existentes, possibilitando a ado\u00e7\u00e3o de medidas para mitigar esses, evitando grandes preju\u00edzos gerados por incidentes causados por terceiros mal intencionados. Cultivamos a transpar\u00eancia, caso seja identificado qualquer incidente que possa colocar em risco a estrutura ou opera\u00e7\u00e3o da sua organiza\u00e7\u00e3o, comunicaremos imediatamente o respons\u00e1vel e iremos trabalhar em conjunto para evitar preju\u00edzos e outros danos.<\/p>\n<p>\n<\/div><div class=\"kc-elm kc-css-200307 kc_row kc_row_inner\"><div class=\"kc-elm kc-css-238365 kc_col-sm-4 kc_column_inner kc_col-sm-4\"><div class=\"kc_wrapper kc-col-inner-container\">\t\t\r\n\t\t<div class=\"em-feature default-style kc-elm kc-css-502404\">\r\n\t\t\t\t\t\t\t<div class=\"em_feature-icon\">\r\n\t\t\t\t\t<span><i class=\"sl-rocket\"><\/i><\/span>\r\n\t\t\t\t<\/div>\t\t\t\r\n\t\t\t\t\t\t<div class=\"em_content_text\">\r\n\t\t\t\t<div class=\"em-feature-title\"><h2>Redu\u00e7\u00e3o de Riscos<\/h2><\/div>\t\t\t\t<div class=\"em-feature-desc\">Redu\u00e7\u00e3o de riscos operacionais nos processos de seu neg\u00f3cios, atrav\u00e9s do gerenciamento adequado dos riscos tecnol\u00f3gicos diretos e indiretos.<\/div>\t\t\t\t\t\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<\/div><\/div><div class=\"kc-elm kc-css-26451 kc_col-sm-4 kc_column_inner kc_col-sm-4\"><div class=\"kc_wrapper kc-col-inner-container\">\t\t\r\n\t\t<div class=\"em-feature default-style kc-elm kc-css-23741\">\r\n\t\t\t\t\t\t\t<div class=\"em_feature-icon\">\r\n\t\t\t\t\t<span><i class=\"sl-rocket\"><\/i><\/span>\r\n\t\t\t\t<\/div>\t\t\t\r\n\t\t\t\t\t\t<div class=\"em_content_text\">\r\n\t\t\t\t<div class=\"em-feature-title\"><h2>M\u00e9todos Eficientes<\/h2><\/div>\t\t\t\t<div class=\"em-feature-desc\">Para evitar acesso indevido a sistemas, informa\u00e7\u00f5es, infraestruturas de tecnologia, e tamb\u00e9m preven\u00e7\u00e3o contra vazamento e roubo de dados.<\/div>\t\t\t\t\t\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<\/div><\/div><div class=\"kc-elm kc-css-776808 kc_col-sm-4 kc_column_inner kc_col-sm-4\"><div class=\"kc_wrapper kc-col-inner-container\">\t\t\r\n\t\t<div class=\"em-feature default-style kc-elm kc-css-544177\">\r\n\t\t\t\t\t\t\t<div class=\"em_feature-icon\">\r\n\t\t\t\t\t<span><i class=\"sl-rocket\"><\/i><\/span>\r\n\t\t\t\t<\/div>\t\t\t\r\n\t\t\t\t\t\t<div class=\"em_content_text\">\r\n\t\t\t\t<div class=\"em-feature-title\"><h2>Capacita\u00e7\u00e3o<\/h2><\/div>\t\t\t\t<div class=\"em-feature-desc\">Educa\u00e7\u00e3o, conscientiza\u00e7\u00e3o e condicionamento das pessoas para estarem aptas a n\u00e3o ca\u00edrem nas armadilhas deixadas por criminosos.\r\n<\/div>\t\t\t\t\t\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<\/div><\/div><\/div><div class=\"kc-elm kc-css-672142\" style=\"height: 20px; clear: both; width:100%;\"><\/div><div class=\"kc-elm kc-css-348356 kc_row kc_row_inner srv-dtl-inner\"><div class=\"kc-elm kc-css-307293 kc_col-sm-6 kc_column_inner kc_col-sm-6\"><div class=\"kc_wrapper kc-col-inner-container\">\n<div class=\"kc-elm kc-css-719749 kc-flipbox kc-flip-container\" ontouchstart=\"this.classList.toggle('hover');\">\n\t<div class=\"flipper\">\n\t\t<div class=\"front\">\n\t\t\t<div class=\"front-content\">\n\t\t\t\t<h3>Seguran\u00e7a em Primeiro Lugar<\/h3><p>As an\u00e1lises de seguran\u00e7a permitem entender os riscos existentes, possibilitando a ado\u00e7\u00e3o de medidas para mitigar esses, evitando grandes preju\u00edzos gerados por incidentes causados por terceiros mal intencionados. <\/p>\t\t\t<\/div>\n\t\t<\/div>\n\t\t<div class=\"back\">\n\t\t\t<div class=\"des\">\n\t\t\t\t<h3>Seguran\u00e7a em Primeiro Lugar<\/h3><p>As an\u00e1lises de seguran\u00e7a permitem entender os riscos existentes, possibilitando a ado\u00e7\u00e3o de medidas para mitigar esses, evitando grandes preju\u00edzos gerados por incidentes causados por terceiros mal intencionados. <\/p>\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div><\/div><div class=\"kc-elm kc-css-872068 kc_col-sm-6 kc_column_inner kc_col-sm-6\"><div class=\"kc_wrapper kc-col-inner-container\">\n<div class=\"kc-elm kc-css-270054 kc-flipbox kc-flip-container\" ontouchstart=\"this.classList.toggle('hover');\">\n\t<div class=\"flipper\">\n\t\t<div class=\"front\">\n\t\t\t<div class=\"front-content\">\n\t\t\t\t<h3>Resultado Garantido<\/h3><p>Contamos com a cultura da transpar\u00eancia, caso seja identificado qualquer incidente que possa colocar em risco a estrutura da organiza\u00e7\u00e3o ou a sua opera\u00e7\u00e3o, comunicaremos imediatamente o respons\u00e1vel e trabalhar em conjunto para mitigar os riscos. <\/p>\t\t\t<\/div>\n\t\t<\/div>\n\t\t<div class=\"back\">\n\t\t\t<div class=\"des\">\n\t\t\t\t<h3>Resultado Garantido<\/h3><p>Contamos com a cultura da transpar\u00eancia, caso seja identificado qualquer incidente que possa colocar em risco a estrutura da organiza\u00e7\u00e3o ou a sua opera\u00e7\u00e3o, comunicaremos imediatamente o respons\u00e1vel e trabalhar em conjunto para mitigar os riscos. <\/p>\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div><\/div><\/div>\n<div class=\"kc-elm kc-css-773297 kc-title-wrap \">\n\n\t<h2 class=\"kc_title\">N\u00f3s garantimos excelentes resultados para o seu neg\u00f3cio, atrav\u00e9s da utiliza\u00e7\u00e3o correta das diferentes solu\u00e7\u00f5es em Tecnologia da Informa\u00e7\u00e3o dispon\u00edveis no mercado.<\/h2>\n<\/div>\n\n<div class=\"kc-elm kc-css-128080 kc-pro-button kc-button-main\">\n\t<a href=\"https:\/\/api.whatsapp.com\/send?phone=554832200695&#038;text=Ol%C3%A1%2C%20estou%20vindo%20atrav%C3%A9s%20do%20site%20da%20Kruger%20Tech%20e%20gostaria%20de%20receber%20uma%20consultoria%20gratuita%20com%20dura%C3%A7%C3%A3o%20de%201h.\" target=\"_blank\" rel=\"noopener\">\n\t\t<span class=\"creative_title\">Fale agora com um especialista<\/span>\t<\/a>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"kc-elm kc-css-553820\" style=\"height: 100px; clear: both; width:100%;\"><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"kc-elm kc-css-461289 kc_row\"><div class=\"kc-row-container  kc-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-329122 kc_col-sm-12 kc_column kc_col-sm-12\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-334992\" style=\"height: 84px; clear: both; width:100%;\"><\/div><div class=\"kc-elm kc-css-258105 kc_row kc_row_inner\"><div class=\"kc-elm kc-css-281457 kc_col-sm-12 kc_column_inner kc_col-sm-12\"><div class=\"kc_wrapper kc-col-inner-container\">            \t<div class=\"em-call-to-action em-call-to-action2 kc-elm kc-css-432088\">\r\n            \t\t<div class=\"em_single_call-to-action_text\">\r\n            \t\t\t<div class=\"call-to-action_top_text\">\r\n            \t\t\t\t<div class=\"em-call-to-action-title\"><h2><span class=\"subtitlespan\">Visite nosso FAQ e tire suas d\u00favidas<\/span><\/h2><\/div>            \t\t\t<\/div>\r\n            \t\t\t<div class=\"em-call-to-action-inner\">\t\t\t\t\r\n            \t\t\t\t\t\t\t\t\t\t\t\r\n            \t\t\t<\/div>\r\n            \t\t\t\r\n            \t\t\t <div class=\"call-to-action-btn\"><a href=\"\/faqs\">Ver FAQ <i class=\"fa fa-angle-right\"><\/i><\/a><\/div>            \t\t<\/div>\t            \t\t\r\n            \t<\/div>\r\n\t    \t<\/div><\/div><\/div><div class=\"kc-elm kc-css-965972\" style=\"height: 180px; clear: both; width:100%;\"><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"kc-elm kc-css-831503 kc_row\"><div class=\"kc-row-container  kc-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-640689 kc_col-sm-12 kc_column kc_col-sm-12\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-106680 kc_row kc_row_inner\"><div class=\"kc-elm kc-css-640679 kc_col-sm-12 kc_column_inner kc_col-sm-12\"><div class=\"kc_wrapper kc-col-inner-container\">\t<div class=\"kc-elm kc-css-550212 \">\r\r\t\t<div class=\"title_in_area\">\r\t\t<div class=\"title_in\">\r\t\t\t<div class=\"title_tx\">\r\t\t\t\t<h2>Tecnologia descomplicada, objetiva e clara<\/h2>\r\t\t\t\t<h2><\/h2>\r\t\t\t\t\r\t\t\t<\/div>\r\t\t<\/div>\r\t\t<div class=\"title_p\">\r\r\t\t\t<div class=\"title_ptx\">\r\t\t\t\t\t\t<\/div>\r\t\t\t\r\t\t<\/div>\r\t\t<\/div>\r\r\t<\/div>\r\t\r\t\r\t\r\t\t\t<div class=\"kc-elm kc-css-319604 kc_text_block\"><\/p>\n<p>A Kruger Tecnologia ensina \u00e0s empresas sobre a import\u00e2ncia da tecnologia, sem distanci\u00e1-las com termos t\u00e9cnicos dif\u00edceis, complexos e pouco abrangentes.<\/p>\n<p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"kc-elm kc-css-925210 kc_row\"><div class=\"kc-row-container  kc-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-826984 kc_col-sm-12 kc_column kc_col-sm-12\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-295793 kc_row kc_row_inner\"><div class=\"kc-elm kc-css-409841 kc_col-sm-12 kc_column_inner kc_col-sm-12\"><div class=\"kc_wrapper kc-col-inner-container\">\t<div class=\"kc-elm kc-css-747964 \">\r\r\t\t<div class=\"title_in_area\">\r\t\t<div class=\"title_in\">\r\t\t\t<div class=\"title_tx\">\r\t\t\t\t<h2>Tecnologia descomplicada, objetiva e clara<\/h2>\r\t\t\t\t<h2><\/h2>\r\t\t\t\t\r\t\t\t<\/div>\r\t\t<\/div>\r\t\t<div class=\"title_p\">\r\r\t\t\t<div class=\"title_ptx\">\r\t\t\t\t\t\t<\/div>\r\t\t\t\r\t\t<\/div>\r\t\t<\/div>\r\r\t<\/div>\r\t\r\t\r\t\r\t\t\t<div class=\"kc-elm kc-css-769865 kc_text_block\"><\/p>\n<p>A Kruger Tecnologia ensina \u00e0s empresas sobre a import\u00e2ncia da tecnologia, sem distanci\u00e1-las com termos t\u00e9cnicos dif\u00edceis, complexos e pouco abrangentes.<\/p>\n<p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/template-default.php","meta":{"_acf_changed":false,"_joinchat":[],"footnotes":""},"class_list":["post-3561","page","type-page","status-publish","hentry"],"acf":[],"rankMath":{"parentDomain":"krugertech.com.br","noFollowDomains":[],"noFollowExcludeDomains":[],"noFollowExternalLinks":false,"featuredImageNotice":"A imagem destacada deve ter pelo menos 200 por 200 pixels para ser reconhecida pelo Facebook e outros sites de m\u00eddia social.","pluginReviewed":true,"postSettings":{"linkSuggestions":true,"useFocusKeyword":false},"frontEndScore":false,"postName":"seguranca-da-informacao","permalinkFormat":"https:\/\/www.krugertech.com.br\/?page_id=3561","showLockModifiedDate":true,"assessor":{"focusKeywordLink":"https:\/\/www.krugertech.com.br\/wp-admin\/edit.php?focus_keyword=%focus_keyword%&post_type=%post_type%","hasTOCPlugin":true,"primaryTaxonomy":false,"serpData":{"title":"","description":"","focusKeywords":"","pillarContent":false,"canonicalUrl":"","breadcrumbTitle":"","advancedRobots":[],"facebookTitle":"","facebookDescription":"","facebookImage":"","facebookImageID":"","facebookHasOverlay":false,"facebookImageOverlay":"","facebookAuthor":"","twitterCardType":"","twitterUseFacebook":true,"twitterTitle":"","twitterDescription":"","twitterImage":"","twitterImageID":"","twitterHasOverlay":false,"twitterImageOverlay":"","twitterPlayerUrl":"","twitterPlayerSize":"","twitterPlayerStream":"","twitterPlayerStreamCtype":"","twitterAppDescription":"","twitterAppIphoneName":"","twitterAppIphoneID":"","twitterAppIphoneUrl":"","twitterAppIpadName":"","twitterAppIpadID":"","twitterAppIpadUrl":"","twitterAppGoogleplayName":"","twitterAppGoogleplayID":"","twitterAppGoogleplayUrl":"","twitterAppCountry":"","robots":{"index":true},"twitterAuthor":"nome de usu\u00e1rio","primaryTerm":0,"authorName":"krugertech","titleTemplate":"%title% %sep% %sitename%","descriptionTemplate":"%excerpt%","showScoreFrontend":true,"lockModifiedDate":false},"powerWords":[],"diacritics":{"A":"[\\u0041\\u24B6\\uFF21\\u00C0\\u00C1\\u00C2\\u1EA6\\u1EA4\\u1EAA\\u1EA8\\u00C3\\u0100\\u0102\\u1EB0\\u1EAE\\u1EB4\\u1EB2\\u0226\\u01E0\\u00C4\\u01DE\\u1EA2\\u00C5\\u01FA\\u01CD\\u0200\\u0202\\u1EA0\\u1EAC\\u1EB6\\u1E00\\u0104\\u023A\\u2C6F]","AA":"[\\uA732]","AE":"[\\u00C6\\u01FC\\u01E2]","AO":"[\\uA734]","AU":"[\\uA736]","AV":"[\\uA738\\uA73A]","AY":"[\\uA73C]","B":"[\\u0042\\u24B7\\uFF22\\u1E02\\u1E04\\u1E06\\u0243\\u0182\\u0181]","C":"[\\u0043\\u24B8\\uFF23\\u0106\\u0108\\u010A\\u010C\\u00C7\\u1E08\\u0187\\u023B\\uA73E]","D":"[\\u0044\\u24B9\\uFF24\\u1E0A\\u010E\\u1E0C\\u1E10\\u1E12\\u1E0E\\u0110\\u018B\\u018A\\u0189\\uA779]","DZ":"[\\u01F1\\u01C4]","Dz":"[\\u01F2\\u01C5]","E":"[\\u0045\\u24BA\\uFF25\\u00C8\\u00C9\\u00CA\\u1EC0\\u1EBE\\u1EC4\\u1EC2\\u1EBC\\u0112\\u1E14\\u1E16\\u0114\\u0116\\u00CB\\u1EBA\\u011A\\u0204\\u0206\\u1EB8\\u1EC6\\u0228\\u1E1C\\u0118\\u1E18\\u1E1A\\u0190\\u018E]","F":"[\\u0046\\u24BB\\uFF26\\u1E1E\\u0191\\uA77B]","G":"[\\u0047\\u24BC\\uFF27\\u01F4\\u011C\\u1E20\\u011E\\u0120\\u01E6\\u0122\\u01E4\\u0193\\uA7A0\\uA77D\\uA77E]","H":"[\\u0048\\u24BD\\uFF28\\u0124\\u1E22\\u1E26\\u021E\\u1E24\\u1E28\\u1E2A\\u0126\\u2C67\\u2C75\\uA78D]","I":"[\\u0049\\u24BE\\uFF29\\u00CC\\u00CD\\u00CE\\u0128\\u012A\\u012C\\u0130\\u00CF\\u1E2E\\u1EC8\\u01CF\\u0208\\u020A\\u1ECA\\u012E\\u1E2C\\u0197]","J":"[\\u004A\\u24BF\\uFF2A\\u0134\\u0248]","K":"[\\u004B\\u24C0\\uFF2B\\u1E30\\u01E8\\u1E32\\u0136\\u1E34\\u0198\\u2C69\\uA740\\uA742\\uA744\\uA7A2]","L":"[\\u004C\\u24C1\\uFF2C\\u013F\\u0139\\u013D\\u1E36\\u1E38\\u013B\\u1E3C\\u1E3A\\u0141\\u023D\\u2C62\\u2C60\\uA748\\uA746\\uA780]","LJ":"[\\u01C7]","Lj":"[\\u01C8]","M":"[\\u004D\\u24C2\\uFF2D\\u1E3E\\u1E40\\u1E42\\u2C6E\\u019C]","N":"[\\u004E\\u24C3\\uFF2E\\u01F8\\u0143\\u00D1\\u1E44\\u0147\\u1E46\\u0145\\u1E4A\\u1E48\\u0220\\u019D\\uA790\\uA7A4]","NJ":"[\\u01CA]","Nj":"[\\u01CB]","O":"[\\u004F\\u24C4\\uFF2F\\u00D2\\u00D3\\u00D4\\u1ED2\\u1ED0\\u1ED6\\u1ED4\\u00D5\\u1E4C\\u022C\\u1E4E\\u014C\\u1E50\\u1E52\\u014E\\u022E\\u0230\\u00D6\\u022A\\u1ECE\\u0150\\u01D1\\u020C\\u020E\\u01A0\\u1EDC\\u1EDA\\u1EE0\\u1EDE\\u1EE2\\u1ECC\\u1ED8\\u01EA\\u01EC\\u00D8\\u01FE\\u0186\\u019F\\uA74A\\uA74C]","OI":"[\\u01A2]","OO":"[\\uA74E]","OU":"[\\u0222]","P":"[\\u0050\\u24C5\\uFF30\\u1E54\\u1E56\\u01A4\\u2C63\\uA750\\uA752\\uA754]","Q":"[\\u0051\\u24C6\\uFF31\\uA756\\uA758\\u024A]","R":"[\\u0052\\u24C7\\uFF32\\u0154\\u1E58\\u0158\\u0210\\u0212\\u1E5A\\u1E5C\\u0156\\u1E5E\\u024C\\u2C64\\uA75A\\uA7A6\\uA782]","S":"[\\u0053\\u24C8\\uFF33\\u1E9E\\u015A\\u1E64\\u015C\\u1E60\\u0160\\u1E66\\u1E62\\u1E68\\u0218\\u015E\\u2C7E\\uA7A8\\uA784]","T":"[\\u0054\\u24C9\\uFF34\\u1E6A\\u0164\\u1E6C\\u021A\\u0162\\u1E70\\u1E6E\\u0166\\u01AC\\u01AE\\u023E\\uA786]","TZ":"[\\uA728]","U":"[\\u0055\\u24CA\\uFF35\\u00D9\\u00DA\\u00DB\\u0168\\u1E78\\u016A\\u1E7A\\u016C\\u00DC\\u01DB\\u01D7\\u01D5\\u01D9\\u1EE6\\u016E\\u0170\\u01D3\\u0214\\u0216\\u01AF\\u1EEA\\u1EE8\\u1EEE\\u1EEC\\u1EF0\\u1EE4\\u1E72\\u0172\\u1E76\\u1E74\\u0244]","V":"[\\u0056\\u24CB\\uFF36\\u1E7C\\u1E7E\\u01B2\\uA75E\\u0245]","VY":"[\\uA760]","W":"[\\u0057\\u24CC\\uFF37\\u1E80\\u1E82\\u0174\\u1E86\\u1E84\\u1E88\\u2C72]","X":"[\\u0058\\u24CD\\uFF38\\u1E8A\\u1E8C]","Y":"[\\u0059\\u24CE\\uFF39\\u1EF2\\u00DD\\u0176\\u1EF8\\u0232\\u1E8E\\u0178\\u1EF6\\u1EF4\\u01B3\\u024E\\u1EFE]","Z":"[\\u005A\\u24CF\\uFF3A\\u0179\\u1E90\\u017B\\u017D\\u1E92\\u1E94\\u01B5\\u0224\\u2C7F\\u2C6B\\uA762]","a":"[\\u0061\\u24D0\\uFF41\\u1E9A\\u00E0\\u00E1\\u00E2\\u1EA7\\u1EA5\\u1EAB\\u1EA9\\u00E3\\u0101\\u0103\\u1EB1\\u1EAF\\u1EB5\\u1EB3\\u0227\\u01E1\\u00E4\\u01DF\\u1EA3\\u00E5\\u01FB\\u01CE\\u0201\\u0203\\u1EA1\\u1EAD\\u1EB7\\u1E01\\u0105\\u2C65\\u0250]","aa":"[\\uA733]","ae":"[\\u00E6\\u01FD\\u01E3]","ao":"[\\uA735]","au":"[\\uA737]","av":"[\\uA739\\uA73B]","ay":"[\\uA73D]","b":"[\\u0062\\u24D1\\uFF42\\u1E03\\u1E05\\u1E07\\u0180\\u0183\\u0253]","c":"[\\u0063\\u24D2\\uFF43\\u0107\\u0109\\u010B\\u010D\\u00E7\\u1E09\\u0188\\u023C\\uA73F\\u2184]","d":"[\\u0064\\u24D3\\uFF44\\u1E0B\\u010F\\u1E0D\\u1E11\\u1E13\\u1E0F\\u0111\\u018C\\u0256\\u0257\\uA77A]","dz":"[\\u01F3\\u01C6]","e":"[\\u0065\\u24D4\\uFF45\\u00E8\\u00E9\\u00EA\\u1EC1\\u1EBF\\u1EC5\\u1EC3\\u1EBD\\u0113\\u1E15\\u1E17\\u0115\\u0117\\u00EB\\u1EBB\\u011B\\u0205\\u0207\\u1EB9\\u1EC7\\u0229\\u1E1D\\u0119\\u1E19\\u1E1B\\u0247\\u025B\\u01DD]","f":"[\\u0066\\u24D5\\uFF46\\u1E1F\\u0192\\uA77C]","g":"[\\u0067\\u24D6\\uFF47\\u01F5\\u011D\\u1E21\\u011F\\u0121\\u01E7\\u0123\\u01E5\\u0260\\uA7A1\\u1D79\\uA77F]","h":"[\\u0068\\u24D7\\uFF48\\u0125\\u1E23\\u1E27\\u021F\\u1E25\\u1E29\\u1E2B\\u1E96\\u0127\\u2C68\\u2C76\\u0265]","hv":"[\\u0195]","i":"[\\u0069\\u24D8\\uFF49\\u00EC\\u00ED\\u00EE\\u0129\\u012B\\u012D\\u00EF\\u1E2F\\u1EC9\\u01D0\\u0209\\u020B\\u1ECB\\u012F\\u1E2D\\u0268\\u0131]","j":"[\\u006A\\u24D9\\uFF4A\\u0135\\u01F0\\u0249]","k":"[\\u006B\\u24DA\\uFF4B\\u1E31\\u01E9\\u1E33\\u0137\\u1E35\\u0199\\u2C6A\\uA741\\uA743\\uA745\\uA7A3]","l":"[\\u006C\\u24DB\\uFF4C\\u0140\\u013A\\u013E\\u1E37\\u1E39\\u013C\\u1E3D\\u1E3B\\u017F\\u0142\\u019A\\u026B\\u2C61\\uA749\\uA781\\uA747]","lj":"[\\u01C9]","m":"[\\u006D\\u24DC\\uFF4D\\u1E3F\\u1E41\\u1E43\\u0271\\u026F]","n":"[\\u006E\\u24DD\\uFF4E\\u01F9\\u0144\\u00F1\\u1E45\\u0148\\u1E47\\u0146\\u1E4B\\u1E49\\u019E\\u0272\\u0149\\uA791\\uA7A5]","nj":"[\\u01CC]","o":"[\\u006F\\u24DE\\uFF4F\\u00F2\\u00F3\\u00F4\\u1ED3\\u1ED1\\u1ED7\\u1ED5\\u00F5\\u1E4D\\u022D\\u1E4F\\u014D\\u1E51\\u1E53\\u014F\\u022F\\u0231\\u00F6\\u022B\\u1ECF\\u0151\\u01D2\\u020D\\u020F\\u01A1\\u1EDD\\u1EDB\\u1EE1\\u1EDF\\u1EE3\\u1ECD\\u1ED9\\u01EB\\u01ED\\u00F8\\u01FF\\u0254\\uA74B\\uA74D\\u0275]","oi":"[\\u01A3]","ou":"[\\u0223]","oo":"[\\uA74F]","p":"[\\u0070\\u24DF\\uFF50\\u1E55\\u1E57\\u01A5\\u1D7D\\uA751\\uA753\\uA755]","q":"[\\u0071\\u24E0\\uFF51\\u024B\\uA757\\uA759]","r":"[\\u0072\\u24E1\\uFF52\\u0155\\u1E59\\u0159\\u0211\\u0213\\u1E5B\\u1E5D\\u0157\\u1E5F\\u024D\\u027D\\uA75B\\uA7A7\\uA783]","s":"[\\u0073\\u24E2\\uFF53\\u015B\\u1E65\\u015D\\u1E61\\u0161\\u1E67\\u1E63\\u1E69\\u0219\\u015F\\u023F\\uA7A9\\uA785\\u1E9B]","ss":"[\\u00DF]","t":"[\\u0074\\u24E3\\uFF54\\u1E6B\\u1E97\\u0165\\u1E6D\\u021B\\u0163\\u1E71\\u1E6F\\u0167\\u01AD\\u0288\\u2C66\\uA787]","tz":"[\\uA729]","u":"[\\u0075\\u24E4\\uFF55\\u00F9\\u00FA\\u00FB\\u0169\\u1E79\\u016B\\u1E7B\\u016D\\u00FC\\u01DC\\u01D8\\u01D6\\u01DA\\u1EE7\\u016F\\u0171\\u01D4\\u0215\\u0217\\u01B0\\u1EEB\\u1EE9\\u1EEF\\u1EED\\u1EF1\\u1EE5\\u1E73\\u0173\\u1E77\\u1E75\\u0289]","v":"[\\u0076\\u24E5\\uFF56\\u1E7D\\u1E7F\\u028B\\uA75F\\u028C]","vy":"[\\uA761]","w":"[\\u0077\\u24E6\\uFF57\\u1E81\\u1E83\\u0175\\u1E87\\u1E85\\u1E98\\u1E89\\u2C73]","x":"[\\u0078\\u24E7\\uFF58\\u1E8B\\u1E8D]","y":"[\\u0079\\u24E8\\uFF59\\u1EF3\\u00FD\\u0177\\u1EF9\\u0233\\u1E8F\\u00FF\\u1EF7\\u1E99\\u1EF5\\u01B4\\u024F\\u1EFF]","z":"[\\u007A\\u24E9\\uFF5A\\u017A\\u1E91\\u017C\\u017E\\u1E93\\u1E95\\u01B6\\u0225\\u0240\\u2C6C\\uA763]"},"researchesTests":["contentHasTOC","contentHasShortParagraphs","contentHasAssets","keywordInTitle","keywordInMetaDescription","keywordInPermalink","keywordIn10Percent","keywordInContent","keywordInSubheadings","keywordInImageAlt","keywordDensity","keywordNotUsed","lengthContent","lengthPermalink","linksHasInternal","linksHasExternals","linksNotAllExternals","titleStartWithKeyword","titleSentiment","titleHasPowerWords","titleHasNumber","hasContentAI"],"hasRedirection":true,"hasBreadcrumb":false},"homeUrl":"https:\/\/www.krugertech.com.br","objectID":3561,"objectType":"post","locale":"pt","localeFull":"pt_BR","overlayImages":{"play":{"name":"\u00cdcone de reprodu\u00e7\u00e3o","url":"https:\/\/www.krugertech.com.br\/wp-content\/plugins\/seo-by-rank-math\/assets\/admin\/img\/icon-play.png","path":"\/www\/wwwroot\/krugertech.com.br\/wp-content\/plugins\/seo-by-rank-math\/assets\/admin\/img\/icon-play.png","position":"middle_center"},"gif":{"name":"\u00cdcone GIF","url":"https:\/\/www.krugertech.com.br\/wp-content\/plugins\/seo-by-rank-math\/assets\/admin\/img\/icon-gif.png","path":"\/www\/wwwroot\/krugertech.com.br\/wp-content\/plugins\/seo-by-rank-math\/assets\/admin\/img\/icon-gif.png","position":"middle_center"}},"defautOgImage":"https:\/\/www.krugertech.com.br\/wp-content\/uploads\/2022\/06\/servidores.png","customPermalinks":false,"isUserRegistered":true,"autoSuggestKeywords":true,"connectSiteUrl":"https:\/\/rankmath.com\/auth?site=https%3A%2F%2Fwww.krugertech.com.br&r=https%3A%2F%2Fwww.krugertech.com.br%2Findex.php%3Frest_route%3D%252Fwp%252Fv2%252Fpages%252F3561%26nonce%3D91057ffbf2","maxTags":5,"trendsIcon":"<svg viewBox=\"0 0 610 610\"><path d=\"M18.85,446,174.32,290.48l58.08,58.08L76.93,504a14.54,14.54,0,0,1-20.55,0L18.83,466.48a14.54,14.54,0,0,1,0-20.55Z\" style=\"fill:#4285f4\"\/><path d=\"M242.65,242.66,377.59,377.6l-47.75,47.75a14.54,14.54,0,0,1-20.55,0L174.37,290.43l47.75-47.75A14.52,14.52,0,0,1,242.65,242.66Z\" style=\"fill:#ea4335\"\/><polygon points=\"319.53 319.53 479.26 159.8 537.34 217.88 377.61 377.62 319.53 319.53\" style=\"fill:#fabb05\"\/><path d=\"M594.26,262.73V118.61h0a16.94,16.94,0,0,0-16.94-16.94H433.2a16.94,16.94,0,0,0-12,28.92L565.34,274.71h0a16.94,16.94,0,0,0,28.92-12Z\" style=\"fill:#34a853\"\/><rect width=\"610\" height=\"610\" style=\"fill:none\"\/><\/svg>","showScore":true,"siteFavIcon":"https:\/\/www.krugertech.com.br\/wp-content\/uploads\/2022\/05\/cropped-Icone-Redondo-Kruger-32x32.png","canUser":{"general":false,"advanced":false,"snippet":false,"social":false,"analysis":false,"analytics":false,"content_ai":false},"showKeywordIntent":true,"isPro":false,"is_front_page":false,"trendsUpgradeLink":"https:\/\/rankmath.com\/pricing\/?utm_source=Plugin&utm_medium=CE%20General%20Tab%20Trends&utm_campaign=WP","trendsUpgradeLabel":"Atualizar","trendsPreviewImage":"https:\/\/www.krugertech.com.br\/wp-content\/plugins\/seo-by-rank-math\/assets\/admin\/img\/trends-preview.jpg","currentEditor":false,"homepageData":{"assessor":{"powerWords":[],"diacritics":true,"researchesTests":["contentHasTOC","contentHasShortParagraphs","contentHasAssets","keywordInTitle","keywordInMetaDescription","keywordInPermalink","keywordIn10Percent","keywordInContent","keywordInSubheadings","keywordInImageAlt","keywordDensity","keywordNotUsed","lengthContent","lengthPermalink","linksHasInternal","linksHasExternals","linksNotAllExternals","titleStartWithKeyword","titleSentiment","titleHasPowerWords","titleHasNumber","hasContentAI"],"hasBreadcrumb":false,"serpData":{"title":"%sitename% %page% %sep% %sitedesc%","description":"","titleTemplate":"%sitename% %page% %sep% %sitedesc%","descriptionTemplate":"","focusKeywords":"","breadcrumbTitle":"Home","robots":{"index":true},"advancedRobots":[],"facebookTitle":"","facebookDescription":"","facebookImage":"","facebookImageID":""}}},"tocTitle":"Table of Contents","tocExcludeHeadings":[],"listStyle":"ul"},"_links":{"self":[{"href":"https:\/\/www.krugertech.com.br\/index.php?rest_route=\/wp\/v2\/pages\/3561","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.krugertech.com.br\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.krugertech.com.br\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.krugertech.com.br\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.krugertech.com.br\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3561"}],"version-history":[{"count":167,"href":"https:\/\/www.krugertech.com.br\/index.php?rest_route=\/wp\/v2\/pages\/3561\/revisions"}],"predecessor-version":[{"id":5210,"href":"https:\/\/www.krugertech.com.br\/index.php?rest_route=\/wp\/v2\/pages\/3561\/revisions\/5210"}],"wp:attachment":[{"href":"https:\/\/www.krugertech.com.br\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3561"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}