{"id":6418,"date":"2018-05-31T06:49:44","date_gmt":"2018-05-31T06:49:44","guid":{"rendered":"https:\/\/tiqs.wpengine.com\/?page_id=6418"},"modified":"2021-06-01T01:30:09","modified_gmt":"2021-05-31T21:30:09","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/www.tiqs.com.br\/en\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"<section data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_section vc_custom_1618583931492 vc_section-o-content-top vc_section-flex\"><div class=\"vc_row wpb_row vc_row-fluid vc_row-o-equal-height vc_row-o-content-top vc_row-flex\"><div class=\"wpb_column vc_column_container vc_col-sm-12 vc_col-lg-7 vc_col-md-7 vc_col-xs-12\"><div class=\"vc_column-inner vc_custom_1528353169576\"><div class=\"wpb_wrapper\"><h6 style=\"font-size: 20px;color: #949599;line-height: 26px;text-align: left;font-family:Roboto Condensed;font-weight:400;font-style:normal\" class=\"vc_custom_heading font-weight-medium letter-spacing-1 vc_custom_1618586300253\" >SECURITY AS A SERVICE<\/h6><h3 style=\"font-size: 25px;color: #abd405;line-height: 35px;text-align: left;font-family:Krona One;font-weight:400;font-style:normal\" class=\"vc_custom_heading font-weight-bold vc_custom_1618433497914\" >KEEP YOUR COMPANY SAFE IN DIGITAL ENVIRONMENTS<\/h3><p style=\"font-size: 16px;color: #000000;line-height: 25px;text-align: left;font-family:Roboto Condensed;font-weight:400;font-style:normal\" class=\"vc_custom_heading vc_custom_1618484340234\" >Cybernetic crimes have become more usual and can cause irreversible damage to your business. System invasion, virus dissemination, data theft and access to confidential information are just a few of the possible digital felonies. That is why it is fundamental for your company to guarantee an effective cybersecurity management, preventing all of these activities.<\/p><div class=\"vc_row wpb_row vc_inner vc_row-fluid vc_custom_1618584007887 vc_column-gap-30\"><div class=\"wpb_column vc_column_container vc_col-sm-1\"><div class=\"vc_column-inner vc_custom_1527765281845\"><div class=\"wpb_wrapper\"><div class=\"radiantthemes-iconbox element-one  rt760656363\"  data-border-radius=\"square\"><div class=\"radiantthemes-iconbox-holder   vc_custom_1618433569368\"><i class=\"icofont icofont-eye-alt\"><\/i> <\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-5\"><div class=\"vc_column-inner vc_custom_1527765711869\"><div class=\"wpb_wrapper\"><h3 style=\"font-size: 18px;color: #abd405;line-height: 28px;text-align: left;font-family:Krona One;font-weight:400;font-style:normal\" class=\"vc_custom_heading letter-spacing-0 vc_custom_1618440454655\" >CONSTANT SURVEILLANCE<\/h3><p style=\"font-size: 16px;color: #000000;line-height: 25px;text-align: left;font-family:Roboto Condensed;font-weight:400;font-style:normal\" class=\"vc_custom_heading vc_custom_1618484028040\" >Our specialized team provides 24\/7 proactive monitoring, making sure your company operates with most availability as possible.<\/p><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-1 vc_col-xs-12\"><div class=\"vc_column-inner vc_custom_1618445741027\"><div class=\"wpb_wrapper\"><div class=\"radiantthemes-iconbox element-one  rt721444620\"  data-border-radius=\"square\"><div class=\"radiantthemes-iconbox-holder   vc_custom_1618433604181\"><i class=\"icofont icofont-hand-drag1\"><\/i> <\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-5\"><div class=\"vc_column-inner vc_custom_1618583978862\"><div class=\"wpb_wrapper\"><h3 style=\"font-size: 18px;color: #abd405;line-height: 28px;text-align: left;font-family:Krona One;font-weight:400;font-style:normal\" class=\"vc_custom_heading letter-spacing-0 vc_custom_1618440429354\" >CUSTOM-MADE SOLUTION<\/h3><p style=\"font-size: 16px;color: #000000;line-height: 25px;text-align: left;font-family:Roboto Condensed;font-weight:400;font-style:normal\" class=\"vc_custom_heading vc_custom_1618484046206\" >We analyze your business\u2019 needs to guarantee a customized and effective solution in vulnerability management.<\/p><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid vc_custom_1527766084430 vc_column-gap-30\"><div class=\"wpb_column vc_column_container vc_col-sm-1\"><div class=\"vc_column-inner vc_custom_1527765281845\"><div class=\"wpb_wrapper\"><div class=\"radiantthemes-iconbox element-one  rt584708286\"  data-border-radius=\"square\"><div class=\"radiantthemes-iconbox-holder   vc_custom_1618433655600\"><i class=\"icofont icofont-wheel\"><\/i> <\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-5\"><div class=\"vc_column-inner vc_custom_1527765711869\"><div class=\"wpb_wrapper\"><h3 style=\"font-size: 18px;color: #abd405;line-height: 28px;text-align: left;font-family:Krona One;font-weight:400;font-style:normal\" class=\"vc_custom_heading letter-spacing-0 vc_custom_1618440403412\" >STRATEGY CONTROL<\/h3><p style=\"font-size: 16px;color: #0c121f;line-height: 25px;text-align: left;font-family:Roboto Condensed;font-weight:400;font-style:normal\" class=\"vc_custom_heading vc_custom_1618484078857\" >Our platform allows the monitoring of activities and generation of customized reports.<\/p><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-1\"><div class=\"vc_column-inner vc_custom_1527765293472\"><div class=\"wpb_wrapper\"><div class=\"radiantthemes-iconbox element-one  rt2131411879\"  data-border-radius=\"square\"><div class=\"radiantthemes-iconbox-holder   vc_custom_1618433671921\"><i class=\"icofont icofont-ui-lock\"><\/i> <\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-5\"><div class=\"vc_column-inner vc_custom_1527765745556\"><div class=\"wpb_wrapper\"><h3 style=\"font-size: 18px;color: #abd405;line-height: 28px;text-align: left;font-family:Krona One;font-weight:400;font-style:normal\" class=\"vc_custom_heading letter-spacing-0 vc_custom_1618440366925\" >CONFIDENTIALITY AND INTEGRITY<\/h3><p style=\"font-size: 16px;color: #000000;line-height: 25px;text-align: left;font-family:Roboto Condensed;font-weight:400;font-style:normal\" class=\"vc_custom_heading vc_custom_1618484095561\" >We ensure the information control, keeping your original features and allowing exclusive access.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-12 vc_col-lg-5 vc_col-md-5 vc_col-xs-12\"><div class=\"vc_column-inner vc_custom_1528353192355\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center  vc_custom_1620826780752\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper vc_box_shadow_circle  vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" class=\"vc_single_image-img\" src=\"https:\/\/www.tiqs.com.br\/wp-content\/uploads\/2021\/05\/Ativo-12-8-200x200.png\" width=\"200\" height=\"200\" alt=\"Ativo 12-8\" title=\"Ativo 12-8\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center  vc_custom_1620826795803\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper vc_box_shadow_circle  vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" class=\"vc_single_image-img\" src=\"https:\/\/www.tiqs.com.br\/wp-content\/uploads\/2021\/05\/Ativo-10-8-200x200.png\" width=\"200\" height=\"200\" alt=\"Ativo 10-8\" title=\"Ativo 10-8\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper vc_box_circle  vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" class=\"vc_single_image-img\" src=\"https:\/\/www.tiqs.com.br\/wp-content\/uploads\/2021\/05\/Ativo-11-8-200x200.png\" width=\"200\" height=\"200\" alt=\"Ativo 11-8\" title=\"Ativo 11-8\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/section><div class=\"vc_row-full-width vc_clearfix\"><\/div><section data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" data-vc-parallax=\"1.5\" class=\"vc_section vc_custom_1618584176462 vc_section-has-fill vc_general vc_parallax vc_parallax-content-moving\"><div data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid vc_custom_1527759038466\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h6 style=\"font-size: 20px;color: #949599;line-height: 26px;text-align: center;font-family:Roboto Condensed;font-weight:400;font-style:normal\" class=\"vc_custom_heading font-weight-medium letter-spacing-1 vc_custom_1618586419753\" >WHY SHOULD YOU CHOOSE TIQS?<\/h6><h5 style=\"font-size: 25px;color: #abd405;line-height: 35px;text-align: center;font-family:Krona One;font-weight:400;font-style:normal\" class=\"vc_custom_heading font-weight-bold vc_custom_1621708371909\" >GET TO KNOW OUR SECaaS SERVICE<br \/>\n(SECURITY AS A SERVICE)<\/h5><\/div><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><\/section><div class=\"vc_row-full-width vc_clearfix\"><\/div><div class=\"vc_row wpb_row vc_row-fluid visible-lg visible-md hidden-sm hidden-xs vc_custom_1537346089679 vc_row-has-fill\"><div class=\"wpb_column vc_column_container vc_col-sm-5 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1527769678142\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_left  vc_custom_1620826826387\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"1101\" height=\"1589\" src=\"https:\/\/www.tiqs.com.br\/wp-content\/uploads\/2021\/05\/grafismodna-8.png\" class=\"vc_single_image-img attachment-full\" alt=\"\" srcset=\"https:\/\/www.tiqs.com.br\/wp-content\/uploads\/2021\/05\/grafismodna-8.png 1101w, https:\/\/www.tiqs.com.br\/wp-content\/uploads\/2021\/05\/grafismodna-8-600x866.png 600w, https:\/\/www.tiqs.com.br\/wp-content\/uploads\/2021\/05\/grafismodna-8-208x300.png 208w, https:\/\/www.tiqs.com.br\/wp-content\/uploads\/2021\/05\/grafismodna-8-710x1024.png 710w, https:\/\/www.tiqs.com.br\/wp-content\/uploads\/2021\/05\/grafismodna-8-768x1108.png 768w, https:\/\/www.tiqs.com.br\/wp-content\/uploads\/2021\/05\/grafismodna-8-1064x1536.png 1064w\" sizes=\"(max-width: 1101px) 100vw, 1101px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-7 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1527769703036\"><div class=\"wpb_wrapper\"><h3 style=\"font-size: 20px;color: #abd405;line-height: 30px;text-align: left;font-family:Krona One;font-weight:400;font-style:normal\" class=\"vc_custom_heading vc_custom_1618437692168\" >ENSURE HIGHER PERFORMANCES, LOWER COMPLEXITY AND LOWER COSTS.<\/h3><p style=\"font-size: 16px;color: #000000;line-height: 25px;text-align: left;font-family:Roboto Condensed;font-weight:400;font-style:normal\" class=\"vc_custom_heading vc_custom_1618484118651\" >Security as a service provides application safety operating as a protection layer in your digital environments. With SECaaS, your company acquires focused solutions and high standards safety minus the costs from traditional models.<\/p><div class=\"vc_tta-container vc_tta-o-non-responsive\" data-vc-action=\"collapse\"><div class=\"vc_general vc_tta vc_tta-tabs vc_tta-o-shape-group vc_tta-has-pagination vc_tta-o-no-fill vc_tta-tabs-position-top  vc_tta-pageable vc_custom_1618445585792\"><div class=\"vc_tta-panels-container\"><ul class=\"vc_general vc_pagination vc_pagination-style-outline vc_pagination-shape-round vc_pagination-color-grey\"><li class=\"vc_pagination-item vc_active\" data-vc-tab><a href=\"#1618431292937-bfc91c7b-49cf\" class=\"vc_pagination-trigger\" data-vc-tabs data-vc-container=\".vc_tta\"><\/a><\/li><li class=\"vc_pagination-item\" data-vc-tab><a href=\"#1618431292937-3a17f06a-35db\" class=\"vc_pagination-trigger\" data-vc-tabs data-vc-container=\".vc_tta\"><\/a><\/li><li class=\"vc_pagination-item\" data-vc-tab><a href=\"#1618431803022-872579e3-aa40\" class=\"vc_pagination-trigger\" data-vc-tabs data-vc-container=\".vc_tta\"><\/a><\/li><\/ul><div class=\"vc_tta-panels\"><div  class=\"vc_tta-panel vc_active\" id=\"1618431292937-bfc91c7b-49cf\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-body\">\n\t\t\t<span class=\"vc_tta-panel-title\">\n\t\t\t\t<a  data-vc-container=\".vc_tta-container\" data-vc-accordion=\"\" data-vc-target=\"#1618431292937-bfc91c7b-49cf\"><\/a>\n\t\t\t<\/span>\n\t\t<div class=\"radiantthemes-iconbox element-one  rt1293715609\"  data-border-radius=\"square\"><div class=\"radiantthemes-iconbox-holder   vc_custom_1618438129898\"><i class=\"icofont icofont-time\"><\/i> <\/div><\/div><h2 style=\"font-size: 20px;color: #abd405;line-height: 30PX;text-align: center;font-family:Krona One;font-weight:400;font-style:normal\" class=\"vc_custom_heading vc_custom_1618438320078\" >HIGHER SPEED<\/h2><h2 style=\"font-size: 16px;color: #ffffff;line-height: 25px;text-align: center;font-family:Roboto Condensed;font-weight:400;font-style:normal\" class=\"vc_custom_heading vc_custom_1618484136124\" >MODERNIZED NETWORK, INCLUDING ALL DEVICES FROM FINAL USERS<\/h2><\/div><\/div><div  class=\"vc_tta-panel\" id=\"1618431292937-3a17f06a-35db\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-body\">\n\t\t\t<span class=\"vc_tta-panel-title\">\n\t\t\t\t<a  data-vc-container=\".vc_tta-container\" data-vc-accordion=\"\" data-vc-target=\"#1618431292937-3a17f06a-35db\"><\/a>\n\t\t\t<\/span>\n\t\t<div class=\"radiantthemes-iconbox element-one  rt1098521069\"  data-border-radius=\"square\"><div class=\"radiantthemes-iconbox-holder   vc_custom_1618438709524\"><i class=\"icofont icofont-chart-bar-graph\"><\/i> <\/div><\/div><h2 style=\"font-size: 20px;color: #abd405;line-height: 30px;text-align: center;font-family:Krona One;font-weight:400;font-style:normal\" class=\"vc_custom_heading vc_custom_1618445643557\" >LOWER COSTS<\/h2><h2 style=\"font-size: 16px;color: #ffffff;line-height: 25px;text-align: center;font-family:Roboto Condensed;font-weight:400;font-style:normal\" class=\"vc_custom_heading vc_custom_1618484154003\" >ADVANCED RESOURCES, NO MATTER WHAT IS THE SIZE OF YOUR BUSINESS.<\/h2><\/div><\/div><div  class=\"vc_tta-panel\" id=\"1618431803022-872579e3-aa40\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-body\">\n\t\t\t<span class=\"vc_tta-panel-title\">\n\t\t\t\t<a  data-vc-container=\".vc_tta-container\" data-vc-accordion=\"\" data-vc-target=\"#1618431803022-872579e3-aa40\"><\/a>\n\t\t\t<\/span>\n\t\t<div class=\"radiantthemes-iconbox element-one  rt612336013\"  data-border-radius=\"square\"><div class=\"radiantthemes-iconbox-holder   vc_custom_1618438656855\"><i class=\"icofont icofont-help-robot\"><\/i> <\/div><\/div><h2 style=\"font-size: 20px;color: #abd405;line-height: 30px;text-align: center;font-family:Krona One;font-weight:400;font-style:normal\" class=\"vc_custom_heading vc_custom_1618445672499\" >HIGHER PRACTICITY<\/h2><h2 style=\"font-size: 16px;color: #ffffff;line-height: 20px;text-align: center;font-family:Roboto Condensed;font-weight:400;font-style:normal\" class=\"vc_custom_heading vc_custom_1618484174756\" >Simple management with centralized infrastructure.<\/h2><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid vc_custom_1618438975763 vc_row-has-fill\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner vc_custom_1527830934075\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center  vc_custom_1620826859818\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"2763\" height=\"1833\" src=\"https:\/\/www.tiqs.com.br\/wp-content\/uploads\/2021\/05\/Ativo-9-8.png\" class=\"vc_single_image-img attachment-full\" alt=\"\" srcset=\"https:\/\/www.tiqs.com.br\/wp-content\/uploads\/2021\/05\/Ativo-9-8.png 2763w, https:\/\/www.tiqs.com.br\/wp-content\/uploads\/2021\/05\/Ativo-9-8-600x398.png 600w, https:\/\/www.tiqs.com.br\/wp-content\/uploads\/2021\/05\/Ativo-9-8-300x199.png 300w, https:\/\/www.tiqs.com.br\/wp-content\/uploads\/2021\/05\/Ativo-9-8-1024x679.png 1024w, https:\/\/www.tiqs.com.br\/wp-content\/uploads\/2021\/05\/Ativo-9-8-768x509.png 768w, https:\/\/www.tiqs.com.br\/wp-content\/uploads\/2021\/05\/Ativo-9-8-1536x1019.png 1536w, https:\/\/www.tiqs.com.br\/wp-content\/uploads\/2021\/05\/Ativo-9-8-2048x1359.png 2048w\" sizes=\"(max-width: 2763px) 100vw, 2763px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner vc_custom_1618439532982\"><div class=\"wpb_wrapper\"><h6 style=\"font-size: 20px;color: #949599;line-height: 26px;text-align: left;font-family:Roboto Condensed;font-weight:400;font-style:normal\" class=\"vc_custom_heading font-weight-medium letter-spacing-1 vc_custom_1618586483110\" >BITARMOR<\/h6><h3 style=\"font-size: 25px;color: #556df4;line-height: 35px;text-align: left;font-family:Krona One;font-weight:400;font-style:normal\" class=\"vc_custom_heading font-weight-bold vc_custom_1618439074543\" >COUNT ON THE BEST TECH PARTNERS TO PROTECT YOUR BUSINESS<\/h3><p style=\"font-size: 16px;color: #000000;line-height: 25px;text-align: left;font-family:Roboto Condensed;font-weight:400;font-style:normal\" class=\"vc_custom_heading vc_custom_1618484212011 translation-block\" >BitArmor platform redefines the cloud information security delivery, adapting your business needs to a customized and intelligent model. <br>Besides that, the solution validates any investment in data protection, since it operates in four levels of maturity: compliance, politics, change management and application security.<\/p>\r<!-- radiantthemes-custom-button -->\r<div class=\"radiantthemes-custom-button hover-style-two rt862984361  font-weight-medium letter-spacing-0\"  data-button-direction=\"center\" data-button-fullwidth=\"true\" ><a style=\" color: #ffffff; line-height: 23px; font-size: 14px;font-family:Roboto; font-weight:400; font-style:normal; \" class=\"radiantthemes-custom-button-main  vc_custom_1621263797197\" href=\"\/en\/bit-armor\/\"  title=\"\" target=\"_blank\"><div class=\"overlay\"><\/div><div class=\"placeholder\">LEARN MORE<\/div><\/a><\/div>\r<!-- radiantthemes-custom-button -->\r<\/div><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div><div data-vc-full-width=\"true\" data-vc-full-width-init=\"false\" class=\"vc_row wpb_row vc_row-fluid vc_custom_1618433101786 vc_row-has-fill vc_row-o-equal-height vc_row-o-content-middle vc_row-flex\"><div class=\"wpb_column vc_column_container vc_col-sm-8 vc_col-lg-10 vc_col-md-10 vc_col-xs-12 vc_col-has-fill\"><div class=\"vc_column-inner vc_custom_1618433060238\"><div class=\"wpb_wrapper\"><h2 style=\"font-size: 25px;color: #ffffff;line-height: 35px;text-align: left;font-family:Krona One;font-weight:400;font-style:normal\" class=\"vc_custom_heading\" ><b>PROTECT YOUR COMPANY WITH CUSTOMIZED ASSISTANCE.<\/b> TALK TO TIQS!<\/h2><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4 vc_col-lg-2 vc_col-md-2 vc_col-xs-12\"><div class=\"vc_column-inner vc_custom_1528353825142\"><div class=\"wpb_wrapper\">\r<!-- radiantthemes-custom-button -->\r<div class=\"radiantthemes-custom-button hover-style-two rt1446552698  font-weight-medium letter-spacing-0\"  data-button-direction=\"center\" data-button-fullwidth=\"false\"  data-button-icon-position=\"right\"><a style=\" color: #ffffff; line-height: 16px; font-size: 15px;font-family:Roboto; font-weight:400; font-style:normal; \" class=\"radiantthemes-custom-button-main  vc_custom_1620848686570\" href=\"\/en\/contato\/\"  title=\"\" target=\"_self\"><div class=\"overlay\"><\/div><div class=\"placeholder\">TALK TO TIQS<i class=\"\"><\/i><\/div><\/a><\/div>\r<!-- radiantthemes-custom-button -->\r<\/div><\/div><\/div><\/div><div class=\"vc_row-full-width vc_clearfix\"><\/div>","protected":false},"excerpt":{"rendered":"SECURITY AS A SERVICEGARANTA A SEGURAN\u00c7A DA SUA EMPRESA NO AMBIENTE VIRTUALOs crimes cibern\u00e9ticos est\u00e3o cada vez mais comuns, e podem causar danos irrepar\u00e1veis ao seu neg\u00f3cio. Invas\u00e3o de sistemas, dissemina\u00e7\u00e3o de v\u00edrus, roubo de dados e acesso a informa\u00e7\u00f5es confidenciais s\u00e3o apenas alguns dos crimes virtuais poss\u00edveis. Por isso, \u00e9 fundamental que a sua [...]","protected":false},"author":1,"featured_media":8091,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-6418","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CyberSecurity | Preven\u00e7\u00e3o de Cyber Ataques - TIQS<\/title>\n<meta name=\"description\" content=\"seguran\u00e7a cibern\u00e9tica, previna ataques e proteja a integridade dos dados da sua empresa e dos seus clientes com os servi\u00e7os de Cyber Security da TIQS\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tiqs.com.br\/en\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CyberSecurity | Preven\u00e7\u00e3o de Cyber Ataques - TIQS\" \/>\n<meta property=\"og:description\" content=\"seguran\u00e7a cibern\u00e9tica, previna ataques e proteja a integridade dos dados da sua empresa e dos seus clientes com os servi\u00e7os de Cyber Security da TIQS\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tiqs.com.br\/en\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"TIQS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/tiqsconsultoria\/\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-31T21:30:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tiqs.com.br\/wp-content\/uploads\/2021\/05\/Ativo-7-8-e1620249538703-1024x783.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"783\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tiqs.com.br\/cybersecurity\/\",\"url\":\"https:\/\/www.tiqs.com.br\/cybersecurity\/\",\"name\":\"CyberSecurity | Preven\u00e7\u00e3o de Cyber Ataques - TIQS\",\"isPartOf\":{\"@id\":\"https:\/\/www.tiqs.com.br\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tiqs.com.br\/cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tiqs.com.br\/cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tiqs.com.br\/wp-content\/uploads\/2021\/05\/Ativo-7-8-e1620249538703.png\",\"datePublished\":\"2018-05-31T06:49:44+00:00\",\"dateModified\":\"2021-05-31T21:30:09+00:00\",\"description\":\"seguran\u00e7a cibern\u00e9tica, previna ataques e proteja a integridade dos dados da sua empresa e dos seus clientes com os servi\u00e7os de Cyber Security da TIQS\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tiqs.com.br\/cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tiqs.com.br\/cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tiqs.com.br\/cybersecurity\/#primaryimage\",\"url\":\"https:\/\/www.tiqs.com.br\/wp-content\/uploads\/2021\/05\/Ativo-7-8-e1620249538703.png\",\"contentUrl\":\"https:\/\/www.tiqs.com.br\/wp-content\/uploads\/2021\/05\/Ativo-7-8-e1620249538703.png\",\"width\":3647,\"height\":2788,\"caption\":\"cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tiqs.com.br\/cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/www.tiqs.com.br\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tiqs.com.br\/#website\",\"url\":\"https:\/\/www.tiqs.com.br\/\",\"name\":\"TIQS | Ciberseguran\u00e7a - Solu\u00e7\u00f5es digitais\",\"description\":\"Inova\u00e7\u00e3o \u00e9 o nosso DNA\",\"publisher\":{\"@id\":\"https:\/\/www.tiqs.com.br\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tiqs.com.br\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.tiqs.com.br\/#organization\",\"name\":\"TIQS Consultoria em TI\",\"url\":\"https:\/\/www.tiqs.com.br\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tiqs.com.br\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.tiqs.com.br\/wp-content\/uploads\/2021\/05\/cropped-logo_tiqs-3.png\",\"contentUrl\":\"https:\/\/www.tiqs.com.br\/wp-content\/uploads\/2021\/05\/cropped-logo_tiqs-3.png\",\"width\":112,\"height\":109,\"caption\":\"TIQS Consultoria em TI\"},\"image\":{\"@id\":\"https:\/\/www.tiqs.com.br\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/tiqsconsultoria\/\",\"https:\/\/br.linkedin.com\/company\/tiqs-consultoria\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CyberSecurity | Preven\u00e7\u00e3o de Cyber Ataques - TIQS","description":"seguran\u00e7a cibern\u00e9tica, previna ataques e proteja a integridade dos dados da sua empresa e dos seus clientes com os servi\u00e7os de Cyber Security da TIQS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tiqs.com.br\/en\/cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"CyberSecurity | Preven\u00e7\u00e3o de Cyber Ataques - TIQS","og_description":"seguran\u00e7a cibern\u00e9tica, previna ataques e proteja a integridade dos dados da sua empresa e dos seus clientes com os servi\u00e7os de Cyber Security da TIQS","og_url":"https:\/\/www.tiqs.com.br\/en\/cybersecurity\/","og_site_name":"TIQS","article_publisher":"https:\/\/www.facebook.com\/tiqsconsultoria\/","article_modified_time":"2021-05-31T21:30:09+00:00","og_image":[{"width":1024,"height":783,"url":"https:\/\/www.tiqs.com.br\/wp-content\/uploads\/2021\/05\/Ativo-7-8-e1620249538703-1024x783.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tiqs.com.br\/cybersecurity\/","url":"https:\/\/www.tiqs.com.br\/cybersecurity\/","name":"CyberSecurity | Preven\u00e7\u00e3o de Cyber Ataques - TIQS","isPartOf":{"@id":"https:\/\/www.tiqs.com.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tiqs.com.br\/cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.tiqs.com.br\/cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tiqs.com.br\/wp-content\/uploads\/2021\/05\/Ativo-7-8-e1620249538703.png","datePublished":"2018-05-31T06:49:44+00:00","dateModified":"2021-05-31T21:30:09+00:00","description":"seguran\u00e7a cibern\u00e9tica, previna ataques e proteja a integridade dos dados da sua empresa e dos seus clientes com os servi\u00e7os de Cyber Security da TIQS","breadcrumb":{"@id":"https:\/\/www.tiqs.com.br\/cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tiqs.com.br\/cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tiqs.com.br\/cybersecurity\/#primaryimage","url":"https:\/\/www.tiqs.com.br\/wp-content\/uploads\/2021\/05\/Ativo-7-8-e1620249538703.png","contentUrl":"https:\/\/www.tiqs.com.br\/wp-content\/uploads\/2021\/05\/Ativo-7-8-e1620249538703.png","width":3647,"height":2788,"caption":"cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tiqs.com.br\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/www.tiqs.com.br\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.tiqs.com.br\/#website","url":"https:\/\/www.tiqs.com.br\/","name":"TIQS | Ciberseguran\u00e7a - Solu\u00e7\u00f5es digitais","description":"Inova\u00e7\u00e3o \u00e9 o nosso DNA","publisher":{"@id":"https:\/\/www.tiqs.com.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tiqs.com.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.tiqs.com.br\/#organization","name":"TIQS Consultoria em TI","url":"https:\/\/www.tiqs.com.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tiqs.com.br\/#\/schema\/logo\/image\/","url":"https:\/\/www.tiqs.com.br\/wp-content\/uploads\/2021\/05\/cropped-logo_tiqs-3.png","contentUrl":"https:\/\/www.tiqs.com.br\/wp-content\/uploads\/2021\/05\/cropped-logo_tiqs-3.png","width":112,"height":109,"caption":"TIQS Consultoria em TI"},"image":{"@id":"https:\/\/www.tiqs.com.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/tiqsconsultoria\/","https:\/\/br.linkedin.com\/company\/tiqs-consultoria"]}]}},"_links":{"self":[{"href":"https:\/\/www.tiqs.com.br\/en\/wp-json\/wp\/v2\/pages\/6418"}],"collection":[{"href":"https:\/\/www.tiqs.com.br\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.tiqs.com.br\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.tiqs.com.br\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tiqs.com.br\/en\/wp-json\/wp\/v2\/comments?post=6418"}],"version-history":[{"count":0,"href":"https:\/\/www.tiqs.com.br\/en\/wp-json\/wp\/v2\/pages\/6418\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tiqs.com.br\/en\/wp-json\/wp\/v2\/media\/8091"}],"wp:attachment":[{"href":"https:\/\/www.tiqs.com.br\/en\/wp-json\/wp\/v2\/media?parent=6418"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}