{"id":115351,"date":"2021-03-10T12:43:29","date_gmt":"2021-03-10T17:43:29","guid":{"rendered":"https:\/\/www.een.com\/recursos-ciberneticos-e-de-seguranca\/"},"modified":"2021-03-11T09:14:19","modified_gmt":"2021-03-11T14:14:19","slug":"recursos-ciberneticos-e-de-seguranca","status":"publish","type":"page","link":"https:\/\/www.een.com\/pt-br\/recursos-ciberneticos-e-de-seguranca\/","title":{"rendered":"Eagle Eye Networks Recursos de Seguran\u00e7a Cibern\u00e9tica"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"115351\" class=\"elementor elementor-115351 elementor-115180\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-206122fa elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"206122fa\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-202a6d8f\" data-id=\"202a6d8f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-386191e1 elementor-widget elementor-widget-heading\" data-id=\"386191e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Recursos de Ciber-seguran\u00e7a\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30d0c6f3 elementor-widget elementor-widget-text-editor\" data-id=\"30d0c6f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6005711 elementor-widget elementor-widget-text-editor\" data-id=\"6005711\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-text-editor elementor-clearfix\">\n<p dir=\"ltr\">Cybersecurity est\u00e1 no DNA da Eagle Eye Networks. Desde a nossa funda\u00e7\u00e3o, a Eagle Eye Networks dedicou recursos significativos \u00e0 constru\u00e7\u00e3o e manuten\u00e7\u00e3o de um n\u00edvel muito elevado de seguran\u00e7a cibern\u00e9tica. Abaixo voc\u00ea encontrar\u00e1 recursos para ajud\u00e1-lo a implementar nossa solu\u00e7\u00e3o segura de vigil\u00e2ncia por v\u00eddeo em nuvem.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5c1c2a09\" data-id=\"5c1c2a09\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1776af84 elementor-widget elementor-widget-image\" data-id=\"1776af84\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"846\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2021\/03\/camera-cybersecurity-v2-1024x846.png\" class=\"attachment-large size-large wp-image-115260\" alt=\"security camera cybersecurity\" srcset=\"https:\/\/www.een.com\/wp-content\/uploads\/2021\/03\/camera-cybersecurity-v2-1024x846.png 1024w, https:\/\/www.een.com\/wp-content\/uploads\/2021\/03\/camera-cybersecurity-v2-300x248.png 300w, https:\/\/www.een.com\/wp-content\/uploads\/2021\/03\/camera-cybersecurity-v2.png 1129w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" title=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-58165f60 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"58165f60\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-79a90a1b\" data-id=\"79a90a1b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-39ea622 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"39ea622\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3ac8f51\" data-id=\"3ac8f51\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3e43948 elementor-widget elementor-widget-text-editor\" data-id=\"3e43948\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>LIVRO<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ed7f296 elementor-widget elementor-widget-text-editor\" data-id=\"ed7f296\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #606e81;\">Ciber-seguran\u00e7a e Vigil\u00e2ncia por V\u00eddeo em Nuvem<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fdcb9f4 elementor-widget elementor-widget-text-editor\" data-id=\"fdcb9f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-size: 16px; font-style: normal; font-weight: 400;\">A seguran\u00e7a do sistema de vigil\u00e2ncia por v\u00eddeo pode e deve ser tratada de forma mais completa dentro da ind\u00fastria para que a seguran\u00e7a cibern\u00e9tica n\u00e3o seja deixada como um problema para os instaladores ou clientes resolverem. Saiba como a Eagle Eye Networks atenua as preocupa\u00e7\u00f5es com a seguran\u00e7a desde o ponto de pesquisa, desenvolvimento e implanta\u00e7\u00e3o do produto.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9f63fc elementor-widget elementor-widget-button\" data-id=\"c9f63fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.een.com\/wp-content\/uploads\/2021\/03\/Eagle-Eye-Networks-Cyber-Security-and-Cloud-Video-Surveillance-Whitepaper-20210308.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Leia Agora<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8672a64\" data-id=\"8672a64\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4d3711b elementor-widget elementor-widget-text-editor\" data-id=\"4d3711b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>LIVRO<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74a8a17 elementor-widget elementor-widget-text-editor\" data-id=\"74a8a17\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #606e81;\">Reduzir Amea\u00e7as com o Cyber Lockdown da C\u00e2mera<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e8036a elementor-widget elementor-widget-text-editor\" data-id=\"6e8036a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A Eagle Eye Networks lan\u00e7ou a funcionalidade Eagle Eye Camera Cyber Lockdown em 2017.<span style=\"color: #000000;\">  Este recurso isola as c\u00e2meras da Internet e protege contra a intrus\u00e3o ou intercepta\u00e7\u00e3o de hackers.<\/span><\/p>\n<div class=\"yj6qo ajU\"> <\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18ef820 elementor-widget elementor-widget-button\" data-id=\"18ef820\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.een.com\/wp-content\/uploads\/2019\/02\/Eagle-Eye-Networks-Camera-Cyber-Lockdown-White-Paper-20190201.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Leia Agora<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-51c9a8f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"51c9a8f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-57df9bc\" data-id=\"57df9bc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f48419e elementor-widget elementor-widget-text-editor\" data-id=\"f48419e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>RELAT\u00d3RIO<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e9457b elementor-widget elementor-widget-text-editor\" data-id=\"7e9457b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #606e81;\">12 Melhores Pr\u00e1ticas do Sistema de C\u00e2mera de Seguran\u00e7a<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-91403e3 elementor-widget elementor-widget-text-editor\" data-id=\"91403e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-size: 16px; font-style: normal; font-weight: 400;\">As c\u00e2meras de seguran\u00e7a est\u00e3o cada vez mais conectadas \u00e0 Internet, impulsionadas em grande parte pela demanda dos clientes por acesso remoto ao v\u00eddeo. Com a acelera\u00e7\u00e3o dos ataques cibern\u00e9ticos, os integradores de seguran\u00e7a f\u00edsica e a equipe de suporte interno devem se manter atualizados sobre os vetores de ataque de ciberseguran\u00e7a que podem impactar os sistemas de gerenciamento de v\u00eddeo da c\u00e2mera que eles vendem e\/ou suportam.  <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb53b82 elementor-widget elementor-widget-button\" data-id=\"fb53b82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.een.com\/wp-content\/uploads\/2021\/03\/12-Best-Practices-White-Paper-20210308-1.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Leia Agora<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c98cb39\" data-id=\"c98cb39\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-56deb8a elementor-widget elementor-widget-text-editor\" data-id=\"56deb8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>PORTAL DE APOIO<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-896f062 elementor-widget elementor-widget-text-editor\" data-id=\"896f062\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #606e81;\">Activar o Modo de Privacidade<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eda7506 elementor-widget elementor-widget-text-editor\" data-id=\"eda7506\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\" align-left\"><span style=\"color: #000000;\">O prop\u00f3sito do modo de privacidade \u00e9 bloquear o acesso \u00e0 sua c\u00e2mera a qualquer administrador, incluindo revendedores ou funcion\u00e1rios da Eagle Eye, que possam acessar a sua conta. O modo de privacidade \u00e9 uma funcionalidade popular para clientes que querem ajuda administrativa, mas t\u00eam preocupa\u00e7\u00f5es de privacidade ou legais sobre quem pode ver o v\u00eddeo real.<\/span><\/p>\n<div class=\"yj6qo ajU\"> <\/div>\n<\/div>\n<div> <\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5102086 elementor-widget elementor-widget-button\" data-id=\"5102086\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/support.een.com\/portal\/en\/kb\/articles\/enabling-privacy-mode-10-3-2021\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Leia Agora<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Resources Cybersecurity is in Eagle Eye Networks DNA. From our founding, Eagle Eye Networks devoted significant resources to building and maintaining a very high level of cybersecurity. Below you &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.een.com\/pt-br\/recursos-ciberneticos-e-de-seguranca\/\"> <span class=\"screen-reader-text\">Eagle Eye Networks Recursos de Seguran\u00e7a Cibern\u00e9tica<\/span> Leia mais &raquo;<\/a><\/p>\n","protected":false},"author":1633,"featured_media":0,"parent":0,"menu_order":433,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"class_list":["post-115351","page","type-page","status-publish","hentry"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/pages\/115351","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/users\/1633"}],"replies":[{"embeddable":true,"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/comments?post=115351"}],"version-history":[{"count":0,"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/pages\/115351\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/media?parent=115351"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}