{"id":1938,"date":"2019-08-18T12:28:04","date_gmt":"2019-08-18T17:28:04","guid":{"rendered":"https:\/\/integrityisr.com\/?page_id=1938"},"modified":"2019-08-18T12:28:04","modified_gmt":"2019-08-18T17:28:04","slug":"monitoring-services","status":"publish","type":"page","link":"https:\/\/integrityisr.com\/pt\/monitoring-services\/","title":{"rendered":"SERVI\u00c7OS DE MONITORAMENTO"},"content":{"rendered":"<p class=\"wp-block-paragraph\"><strong> O Integrity ISR usa plataformas propriet\u00e1rias baseadas em nuvem para\u00a0<\/strong><em><strong>fornecer monitoramento persistente,\u00a0<\/strong><\/em><strong>usando informa\u00e7\u00f5es publicamente dispon\u00edveis (PAI) e informa\u00e7\u00f5es de c\u00f3digo aberto para desenvolver acesso confi\u00e1vel e cont\u00ednuo a espa\u00e7os de informa\u00e7\u00f5es negados e contestados. Isso inclui sites de m\u00eddia social, plataformas de mensagens e at\u00e9 mesmo o profundo <em>Dark Web<\/em>. <\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Esses recursos, quando aproveitados para a sua organiza\u00e7\u00e3o, permitem insights at\u00e9 ent\u00e3o inexplorados, relat\u00f3rios de t\u00f3picos e an\u00e1lises profundas do conjunto de problemas de amea\u00e7as internas. O Integrity ISR pode fornecer insumos oportunos para apoiar a conscientiza\u00e7\u00e3o da situa\u00e7\u00e3o corporativa, o gerenciamento de marcas, a prote\u00e7\u00e3o executiva, a mitiga\u00e7\u00e3o de amea\u00e7as internas, a seguran\u00e7a f\u00edsica e o contraterrorismo.<\/strong><\/p>\n\n\n\n<p style=\"background-color:#506d85;font-size:24px\" class=\"has-text-color has-background has-very-light-gray-color wp-block-paragraph\"><strong>CONSCI\u00caNCIA SITUACIONAL GLOBAL<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Os recursos do Integrity ISR para dar suporte \u00e0s suas opera\u00e7\u00f5es globais proporcionam consci\u00eancia situacional diretamente de fontes terrestres na velocidade da Internet - muitas vezes mais r\u00e1pido do que relat\u00f3rios confidenciais em \u00e1reas n\u00e3o cobertas por fontes confidenciais. Por meio do uso de recursos entre dom\u00ednios e de um mecanismo configurado de forma personalizada, os dados derivados do PAI podem ser combinados com sua rede fechada ou confidencial. Isso permite a explora\u00e7\u00e3o segura de dados e a colabora\u00e7\u00e3o para discernir padr\u00f5es de dispositivos de interesse e pode descobrir novas \u00e1reas de interesse por meios n\u00e3o intrusivos e n\u00e3o atribu\u00edveis. <\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Nossos recursos t\u00eam sido usados para dar suporte \u00e0 Opera\u00e7\u00e3o de Seguran\u00e7a (OPSEC), monitorando a pegada digital geral em locais sens\u00edveis e tamb\u00e9m sendo aplicados \u00e0 valida\u00e7\u00e3o de ativos. Esses recursos apoiam a investiga\u00e7\u00e3o de atos terroristas, o fornecimento de apoio material ou recursos a terroristas ou organiza\u00e7\u00f5es terroristas, o financiamento do terrorismo, a amea\u00e7a ou o uso de armas biol\u00f3gicas, nucleares, qu\u00edmicas ou outras armas de destrui\u00e7\u00e3o em massa e amea\u00e7as de atividades militares estrangeiras.<\/strong><\/p>\n\n\n\n<p style=\"background-color:#506d85;font-size:24px\" class=\"has-text-color has-background has-very-light-gray-color wp-block-paragraph\"><strong>MITIGA\u00c7\u00c3O DE RISCOS<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>A ISR de integridade pode <\/strong><em><strong>Desenvolver e implementar um plano de mitiga\u00e7\u00e3o de riscos\u00a0<\/strong><\/em><strong>que introduz mecanismos de controle (virtuais, f\u00edsicos e processuais) juntamente com o treinamento de funcion\u00e1rios para criar uma defesa de primeira linha contra amea\u00e7as internas. Ter uma for\u00e7a de trabalho pronta e treinada \u00e9 um elemento essencial para mitigar a oportunidade de amea\u00e7as internas, reduzir as perspectivas de roubo de propriedade intelectual e propriet\u00e1ria e controlar as chances de agentes malignos interromperem a produ\u00e7\u00e3o ou sabotarem ativos, processos ou instala\u00e7\u00f5es da empresa. Os exemplos incluem o desenvolvimento de mecanismos para limitar o acesso dos funcion\u00e1rios com base na \"necessidade de conhecimento\"; o desenvolvimento de mecanismos altamente eficazes de registro, monitoramento e auditoria; e a capacidade de monitorar e responder a atividades potencialmente perturbadoras ou suspeitas.<\/strong><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img fetchpriority=\"high\" decoding=\"async\" data-attachment-id=\"1945\" data-permalink=\"https:\/\/integrityisr.com\/pt\/monitoring-services\/monitor\/\" data-orig-file=\"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/monitor.jpeg\" data-orig-size=\"1000,635\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1566129793&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"monitor\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/monitor-300x191.jpeg\" data-large-file=\"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/monitor.jpeg\" src=\"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/monitor.jpeg\" alt=\"\" class=\"wp-image-1945\" width=\"500\" height=\"318\" srcset=\"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/monitor.jpeg 1000w, https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/monitor-300x191.jpeg 300w, https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/monitor-768x488.jpeg 768w, https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/monitor-700x445.jpeg 700w, https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/monitor-630x400.jpeg 630w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/figure><\/div>\n\n\n\n<p style=\"color:#c1da6c;text-align:center\" class=\"has-text-color has-large-font-size wp-block-paragraph\">#CombatProven<\/p>","protected":false},"excerpt":{"rendered":"<p>Integrity ISR uses proprietary cloud-based platforms to\u00a0provide persistent monitoring,\u00a0using Publicly Available Information (PAI) and open source information to develop dependable and continued access to both denied and contested information spaces. This includes social media sites, messaging platforms, and even the deep Dark Web. These capabilities, when harnessed for your organization, allow for previously unexplored insights, [&hellip;]<\/p>","protected":false},"author":145379797,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","_crdt_document":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"jetpack_post_was_ever_published":false,"footnotes":""},"class_list":["post-1938","page","type-page","status-publish","hentry"],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>MONITORING SERVICES - Integrity ISR<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/integrityisr.com\/pt\/monitoring-services\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MONITORING SERVICES - Integrity ISR\" \/>\n<meta property=\"og:description\" content=\"Integrity ISR uses proprietary cloud-based platforms to\u00a0provide persistent monitoring,\u00a0using Publicly Available Information (PAI) and open source information to develop dependable and continued access to both denied and contested information spaces. This includes social media sites, messaging platforms, and even the deep Dark Web. These capabilities, when harnessed for your organization, allow for previously unexplored insights, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"http:\/\/integrityisr.com\/pt\/monitoring-services\/\" \/>\n<meta property=\"og:site_name\" content=\"Integrity ISR\" \/>\n<meta property=\"og:image\" content=\"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/monitor.jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"http:\\\/\\\/integrityisr.com\\\/monitoring-services\\\/\",\"url\":\"http:\\\/\\\/integrityisr.com\\\/monitoring-services\\\/\",\"name\":\"MONITORING SERVICES - Integrity ISR\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/integrityisr.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\\\/\\\/integrityisr.com\\\/monitoring-services\\\/#primaryimage\"},\"image\":{\"@id\":\"http:\\\/\\\/integrityisr.com\\\/monitoring-services\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/integrityisr.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/monitor.jpeg\",\"datePublished\":\"2019-08-18T17:28:04+00:00\",\"breadcrumb\":{\"@id\":\"http:\\\/\\\/integrityisr.com\\\/monitoring-services\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\\\/\\\/integrityisr.com\\\/monitoring-services\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"http:\\\/\\\/integrityisr.com\\\/monitoring-services\\\/#primaryimage\",\"url\":\"https:\\\/\\\/integrityisr.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/monitor.jpeg\",\"contentUrl\":\"https:\\\/\\\/integrityisr.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/monitor.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\\\/\\\/integrityisr.com\\\/monitoring-services\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/integrityisr.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"MONITORING SERVICES\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/integrityisr.com\\\/#website\",\"url\":\"https:\\\/\\\/integrityisr.com\\\/\",\"name\":\"Integrity ISR\",\"description\":\"Global Innovative Solutions for C4ISR, Space, and Cyberspace Strategy, Training, and Operations\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/integrityisr.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"MONITORING SERVICES - Integrity ISR","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/integrityisr.com\/pt\/monitoring-services\/","og_locale":"pt_BR","og_type":"article","og_title":"MONITORING SERVICES - Integrity ISR","og_description":"Integrity ISR uses proprietary cloud-based platforms to\u00a0provide persistent monitoring,\u00a0using Publicly Available Information (PAI) and open source information to develop dependable and continued access to both denied and contested information spaces. This includes social media sites, messaging platforms, and even the deep Dark Web. These capabilities, when harnessed for your organization, allow for previously unexplored insights, [&hellip;]","og_url":"http:\/\/integrityisr.com\/pt\/monitoring-services\/","og_site_name":"Integrity ISR","og_image":[{"url":"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/monitor.jpeg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. tempo de leitura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"http:\/\/integrityisr.com\/monitoring-services\/","url":"http:\/\/integrityisr.com\/monitoring-services\/","name":"MONITORING SERVICES - Integrity ISR","isPartOf":{"@id":"https:\/\/integrityisr.com\/#website"},"primaryImageOfPage":{"@id":"http:\/\/integrityisr.com\/monitoring-services\/#primaryimage"},"image":{"@id":"http:\/\/integrityisr.com\/monitoring-services\/#primaryimage"},"thumbnailUrl":"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/monitor.jpeg","datePublished":"2019-08-18T17:28:04+00:00","breadcrumb":{"@id":"http:\/\/integrityisr.com\/monitoring-services\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["http:\/\/integrityisr.com\/monitoring-services\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"http:\/\/integrityisr.com\/monitoring-services\/#primaryimage","url":"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/monitor.jpeg","contentUrl":"https:\/\/integrityisr.com\/wp-content\/uploads\/2019\/08\/monitor.jpeg"},{"@type":"BreadcrumbList","@id":"http:\/\/integrityisr.com\/monitoring-services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/integrityisr.com\/"},{"@type":"ListItem","position":2,"name":"MONITORING SERVICES"}]},{"@type":"WebSite","@id":"https:\/\/integrityisr.com\/#website","url":"https:\/\/integrityisr.com\/","name":"Integridade ISR","description":"Solu\u00e7\u00f5es inovadoras globais para estrat\u00e9gia, treinamento e opera\u00e7\u00f5es de C4ISR, espa\u00e7o e ciberespa\u00e7o","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/integrityisr.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"}]}},"jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/PaiUyX-vg","_links":{"self":[{"href":"https:\/\/integrityisr.com\/pt\/wp-json\/wp\/v2\/pages\/1938","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/integrityisr.com\/pt\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/integrityisr.com\/pt\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/integrityisr.com\/pt\/wp-json\/wp\/v2\/users\/145379797"}],"replies":[{"embeddable":true,"href":"https:\/\/integrityisr.com\/pt\/wp-json\/wp\/v2\/comments?post=1938"}],"version-history":[{"count":0,"href":"https:\/\/integrityisr.com\/pt\/wp-json\/wp\/v2\/pages\/1938\/revisions"}],"wp:attachment":[{"href":"https:\/\/integrityisr.com\/pt\/wp-json\/wp\/v2\/media?parent=1938"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}