{"id":1866,"date":"2022-08-12T09:11:49","date_gmt":"2022-08-12T16:11:49","guid":{"rendered":"https:\/\/32dd069598.nxcli.io\/servicos\/ciber-seguranca\/pacotes-de-seguranca\/"},"modified":"2025-08-28T07:16:15","modified_gmt":"2025-08-28T14:16:15","slug":"pacotes-de-seguranca","status":"publish","type":"page","link":"https:\/\/www.ethosvirtual.com\/pt-br\/servicos\/ciber-seguranca\/pacotes-de-seguranca\/","title":{"rendered":"Pacotes de seguran\u00e7a"},"content":{"rendered":"<p><div id='layer_slider_1'  class='avia-layerslider main_color avia-shadow  avia-builder-el-0  el_before_av_section  avia-builder-el-first  container_wrap sidebar_right'  style='height: 101px;'  ><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-ocbiog-8507cdc452676b0923ba1c87a4cc45fd\">\n.avia-section.av-ocbiog-8507cdc452676b0923ba1c87a4cc45fd{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/www.ethosvirtual.com\/wp-content\/uploads\/2022\/07\/bg-E.png);\nbackground-position:0% 100%;\nbackground-attachment:scroll;\n}\n<\/style>\n<div id='av_section_1'  class='avia-section av-ocbiog-8507cdc452676b0923ba1c87a4cc45fd main_color avia-section-default avia-no-border-styling  avia-builder-el-1  el_after_av_layerslider  el_before_av_table  avia-bg-style-scroll container_wrap sidebar_right'  data-section-bg-repeat='no-repeat'><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-1866'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l6qfg1ov-62464fbc25a4716109ba48e3e85767f0\">\n#top .av-special-heading.av-l6qfg1ov-62464fbc25a4716109ba48e3e85767f0{\npadding-bottom:0;\n}\nbody .av-special-heading.av-l6qfg1ov-62464fbc25a4716109ba48e3e85767f0 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-l6qfg1ov-62464fbc25a4716109ba48e3e85767f0 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-l6qfg1ov-62464fbc25a4716109ba48e3e85767f0 av-special-heading-h1 blockquote modern-quote modern-centered  avia-builder-el-2  el_before_av_hr  avia-builder-el-first '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Pacotes de seguran\u00e7a<\/h1><div class='av-subheading av-subheading_below'><p>Choose the best package to ensure your organizations security<\/p>\n<\/div><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div>\n<div  class='hr av-lallbtbb-5c93f85a6770d6842d998c8d8ad5f635 hr-short  avia-builder-el-3  el_after_av_heading  el_before_av_textblock  hr-center'><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<section  class='av_textblock_section av-lalkqj9y-01ba9c2ca4d78f22a92fbc9db1f3f2dc '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><blockquote>\n<h3 style=\"text-align: center;\"><strong>It&#8217;s never too late to start.<\/strong><\/h3>\n<p style=\"text-align: center;\">Whether you are just getting started on your journey towards organizational security, or you have a team of IT professionals who could use the insight of a data protection specialist&#8230; Ethos has the tools and expertise to keep your business safe from attack.\u00a0 Understanding your state of exposure is essential to successfully pre-empting disaster, and if it happens&#8230;\u00a0 disaster recovery should be a mere inconvenience rather than weeks or months of trying to get back on your feet.<\/p>\n<p style=\"text-align: center;\"><strong>Remember&#8230;. social engineering bypasses all technologies, including firewalls.<br \/>\n<\/strong><\/p>\n<\/blockquote>\n<\/div><\/section>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lall8v18-df6a1348d938809a98c344bd908d14a8\">\n.avia-image-container.av-lall8v18-df6a1348d938809a98c344bd908d14a8 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-lall8v18-df6a1348d938809a98c344bd908d14a8 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-lall8v18-df6a1348d938809a98c344bd908d14a8 av-styling- avia-align-center  avia-builder-el-5  el_after_av_textblock  el_before_av_one_half '   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-1715 avia-img-lazy-loading-not-1715 avia_image ' src=\"https:\/\/www.ethosvirtual.com\/wp-content\/uploads\/2022\/08\/Ethos-Security-Package-sm.png\" alt='' title='Ethos Security Packages'  height=\"305\" width=\"300\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/www.ethosvirtual.com\/wp-content\/uploads\/2022\/08\/Ethos-Security-Package-sm.png 300w, https:\/\/www.ethosvirtual.com\/wp-content\/uploads\/2022\/08\/Ethos-Security-Package-sm-295x300.png 295w, https:\/\/www.ethosvirtual.com\/wp-content\/uploads\/2022\/08\/Ethos-Security-Package-sm-80x80.png 80w, https:\/\/www.ethosvirtual.com\/wp-content\/uploads\/2022\/08\/Ethos-Security-Package-sm-36x36.png 36w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/div><\/div>\n<div  class='flex_column av-219u80-718ad8ef090e93ccdceddab79788fe47 av_one_half  avia-builder-el-6  el_after_av_image  avia-builder-el-last  first flex_column_div  '     ><\/div><\/div><\/div><\/div><!-- close content main div --><\/div><\/div><div id='after_section_1'  class='main_color av_default_container_wrap container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-1866'><div class='entry-content-wrapper clearfix'><div  class='avia-table av-luf2c0-08ed3281aaf1a307677215ad3168f4a5 main_color avia-pricing-table-container avia_show_empty_cells avia_pricing_default  avia-builder-el-7  el_after_av_section  avia-builder-el-no-sibling  avia-table-1'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Table\" ><div class=\"pricing-table-wrap\"><ul class='pricing-table '><li class='avia-heading-row'><div class='first-table-item'>Basic<\/div><span class='pricing-extra'><\/span><\/li><li class=''>Diagn\u00f3stico da ISO 270001<br \/>\n(f\u00edsico\/sistema\/organizacional)<\/li><li class=''>Programa de educa\u00e7\u00e3o em seguran\u00e7a cibern\u00e9tica<\/li><li class=''>Programa de Conscientiza\u00e7\u00e3o sobre Seguran\u00e7a Cibern\u00e9tica<\/li><li class=''>LGPD \u2013 Projeto de Legisla\u00e7\u00e3o de Privacidade de Dados<\/li><li class=''>Documenta\u00e7\u00e3o de Seguran\u00e7a da Informa\u00e7\u00e3o<\/li><li class=''>DPO como servi\u00e7o*<\/li><li class=''>&#8211;<\/li><li class=''>&#8211;<\/li><li class=''>&#8211;<\/li><li class=''>&#8211;<\/li><li class=''>&#8211;<\/li><li class=''>&#8211;<\/li><li class=''>&#8211;<\/li><li class=''>&#8211;<\/li><li class=''>&#8211;<\/li><li class=''>&#8211;<\/li><li class=''>&#8211;<\/li><li class=''>&#8211;<\/li><li class=''>&#8211;<\/li><\/ul><\/div><div class=\"pricing-table-wrap\"><ul class='pricing-table '><li class='avia-heading-row'><div class='first-table-item'>Intermediate<\/div><span class='pricing-extra'><\/span><\/li><li class=''>Diagn\u00f3stico da ISO 270001<br \/>\n(f\u00edsico\/sistema\/organizacional)<\/li><li class=''>Programa de educa\u00e7\u00e3o em seguran\u00e7a cibern\u00e9tica<\/li><li class=''>Programa de Conscientiza\u00e7\u00e3o sobre Seguran\u00e7a Cibern\u00e9tica<\/li><li class=''>LGPD \u2013 Projeto de Legisla\u00e7\u00e3o de Privacidade de Dados<\/li><li class=''>Documenta\u00e7\u00e3o de Seguran\u00e7a da Informa\u00e7\u00e3o<\/li><li class=''>DPO como servi\u00e7o*<\/li><li class=''>Monitoramento e gerenciamento remoto (RMM) para servidores e m\u00e1quinas virtuais<\/li><li class=''>Atualiza\u00e7\u00f5es de servidor e gerenciamento de patches<\/li><li class=''>Monitoramento e gerenciamento de firewall<\/li><li class=''>Backup de dados*<\/li><li class=''>Antiv\u00edrus para Servidores e M\u00e1quinas Virtuais<\/li><li class=''>Security Information Advisor<br \/>\n&#8211; Implementa\u00e7\u00e3o di\u00e1ria de pol\u00edticas.<br \/>\n&#8211; Relat\u00f3rios mensais de seguran\u00e7a<br \/>\n&#8211; Orienta\u00e7\u00e3o de an\u00e1lise de amea\u00e7as para sua equipe interna de TI<\/li><li class=''>&#8211;<\/li><li class=''>&#8211;<\/li><li class=''>&#8211;<\/li><li class=''>&#8211;<\/li><li class=''>&#8211;<\/li><li class=''>&#8211;<\/li><li class=''>&#8211;<\/li><\/ul><\/div><div class=\"pricing-table-wrap\"><ul class='pricing-table '><li class='avia-heading-row'><div class='first-table-item'>Prote\u00e7\u00e3o Completa<\/div><span class='pricing-extra'><\/span><\/li><li class=''>Diagn\u00f3stico da ISO 270001<br \/>\n(f\u00edsico\/sistema\/organizacional)<\/li><li class=''>Programa de educa\u00e7\u00e3o em seguran\u00e7a cibern\u00e9tica<\/li><li class=''>Programa de Conscientiza\u00e7\u00e3o sobre Seguran\u00e7a Cibern\u00e9tica<\/li><li class=''>LGPD \u2013 Projeto de Legisla\u00e7\u00e3o de Privacidade de Dados<\/li><li class=''>Documenta\u00e7\u00e3o de Seguran\u00e7a da Informa\u00e7\u00e3o<\/li><li class=''>DPO como servi\u00e7o*<\/li><li class=''>Monitoramento e gerenciamento remoto (RMM) para servidores e m\u00e1quinas virtuais<\/li><li class=''>Atualiza\u00e7\u00f5es de servidor e gerenciamento de patches<\/li><li class=''>Monitoramento e gerenciamento de firewall<\/li><li class=''>Backup de dados*<\/li><li class=''>Antiv\u00edrus para Servidores e M\u00e1quinas Virtuais<\/li><li class=''>Security Information Advisor<br \/>\n&#8211; Implementa\u00e7\u00e3o di\u00e1ria de pol\u00edticas.<br \/>\n&#8211; Relat\u00f3rios mensais de seguran\u00e7a<br \/>\n&#8211; Orienta\u00e7\u00e3o de an\u00e1lise de amea\u00e7as para sua equipe interna de TI<\/li><li class=''>Monitoramento de rede em tempo real pelo nosso Security Operation Center (SOC)<\/li><li class=''>Fun\u00e7\u00e3o de gerente de seguran\u00e7a da informa\u00e7\u00e3o<\/li><li class=''>Monitoramento e gerenciamento remoto (RMM) para endpoints<\/li><li class=''>Antiv\u00edrus para endpoints<\/li><li class=''>Monitoramento de e-mail<\/li><li class=''>Preven\u00e7\u00e3o contra perda de dados (DLP*)<\/li><li class=''>Gerenciamento de eventos e informa\u00e7\u00f5es de seguran\u00e7a (SIEM)<\/li><\/ul><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":0,"parent":1850,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1866","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.ethosvirtual.com\/pt-br\/wp-json\/wp\/v2\/pages\/1866","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ethosvirtual.com\/pt-br\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ethosvirtual.com\/pt-br\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ethosvirtual.com\/pt-br\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ethosvirtual.com\/pt-br\/wp-json\/wp\/v2\/comments?post=1866"}],"version-history":[{"count":6,"href":"https:\/\/www.ethosvirtual.com\/pt-br\/wp-json\/wp\/v2\/pages\/1866\/revisions"}],"predecessor-version":[{"id":2469,"href":"https:\/\/www.ethosvirtual.com\/pt-br\/wp-json\/wp\/v2\/pages\/1866\/revisions\/2469"}],"up":[{"embeddable":true,"href":"https:\/\/www.ethosvirtual.com\/pt-br\/wp-json\/wp\/v2\/pages\/1850"}],"wp:attachment":[{"href":"https:\/\/www.ethosvirtual.com\/pt-br\/wp-json\/wp\/v2\/media?parent=1866"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}