{"id":15660,"date":"2024-03-04T07:56:20","date_gmt":"2024-03-04T07:56:20","guid":{"rendered":"https:\/\/ramsdata.com.pl\/seguranca-web-da-proxima-geracao\/"},"modified":"2025-06-19T02:59:27","modified_gmt":"2025-06-19T02:59:27","slug":"seguranca-web-da-proxima-geracao","status":"publish","type":"page","link":"https:\/\/ramsdata.com.pl\/pt-pt\/oferta\/tecnologias\/seguranca-web-da-proxima-geracao\/","title":{"rendered":"Seguran\u00e7a Web da pr\u00f3xima gera\u00e7\u00e3o"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"15660\" class=\"elementor elementor-15660 elementor-11378\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5156a531 e-flex e-con-boxed e-con e-parent\" data-id=\"5156a531\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2c16f8d2 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"2c16f8d2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInDown&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-275eeb4a elementor-widget elementor-widget-heading\" data-id=\"275eeb4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SEGURAN\u00c7A NA WEB\nNOVA GERA\u00c7\u00c3O\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6ae0a117 e-flex e-con-boxed e-con e-parent\" data-id=\"6ae0a117\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1f211f5c e-con-full e-flex e-con e-child\" data-id=\"1f211f5c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d0e8a02 elementor-widget elementor-widget-image\" data-id=\"d0e8a02\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"213\" height=\"200\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/producenci_f5.png.webp\" class=\"attachment-large size-large wp-image-14448\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6959c1e1 e-con-full e-flex e-con e-child\" data-id=\"6959c1e1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5c1f92c elementor-widget elementor-widget-heading\" data-id=\"5c1f92c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">BIG-IP Application Security Manager<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-92f0f23 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"92f0f23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As amea\u00e7as mais perigosas para as infra-estruturas de TI est\u00e3o relacionadas com ataques que visam as vulnerabilidades das aplica\u00e7\u00f5es. As medidas de seguran\u00e7a convencionais, como as firewalls e os sistemas de dete\u00e7\u00e3o de intrus\u00f5es, t\u00eam grande dificuldade em detetar este tipo de intrus\u00e3o.<br>O Application Security Manager (ASM) fornece prote\u00e7\u00e3o total para aplica\u00e7\u00f5es Web e servi\u00e7os baseados em XML. A utiliza\u00e7\u00e3o de uma firewall de aplica\u00e7\u00e3o oferece aos clientes grandes benef\u00edcios, incluindo: prote\u00e7\u00e3o contra ataques a aplica\u00e7\u00f5es, conformidade com regulamentos (por exemplo, PCI DSS) e aprova\u00e7\u00e3o em auditorias de seguran\u00e7a sem interferir com o c\u00f3digo da aplica\u00e7\u00e3o.<\/p><p>Uma abordagem auto-adapt\u00e1vel para proteger as aplica\u00e7\u00f5es Web permite criar e manter uma pol\u00edtica de seguran\u00e7a baseada na observa\u00e7\u00e3o de padr\u00f5es de tr\u00e1fego, pelo que \u00e9 utilizado um modelo de seguran\u00e7a positivo. Qualquer tr\u00e1fego que n\u00e3o esteja em conformidade com a pol\u00edtica criada \u00e9 rejeitado, protegendo assim os recursos da empresa n\u00e3o s\u00f3 de tipos de ataque conhecidos, mas tamb\u00e9m desconhecidos. Uma segunda grande vantagem desta abordagem \u00e9 que minimiza o tempo administrativo necess\u00e1rio para configurar o sistema ASM.<br>Application Security Manager est\u00e1 dispon\u00edvel como um sistema separado e como um m\u00f3dulo de licen\u00e7a para a fam\u00edlia de dispositivos BIG-IP.<\/p><p>Com base na sua vasta experi\u00eancia no desenvolvimento de solu\u00e7\u00f5es Application Delivery Controller, a F5 Networks prop\u00f5e uma combina\u00e7\u00e3o de elevada seguran\u00e7a e disponibilidade de aplica\u00e7\u00f5es para proteger as infra-estruturas de servidores e centros de dados.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a9a9ad elementor-widget elementor-widget-heading\" data-id=\"7a9a9ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">BIG-IP AFM (Application Firewall Manager)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ce7345 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"5ce7345\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>constitui o n\u00facleo da solu\u00e7\u00e3o F5 &#8211; Application Delivery Firewall, combinando uma firewall com gest\u00e3o de tr\u00e1fego, seguran\u00e7a de aplica\u00e7\u00f5es, gest\u00e3o de acesso de utilizadores e seguran\u00e7a DNS. Ao consolidar as fun\u00e7\u00f5es de seguran\u00e7a de v\u00e1rios m\u00f3dulos BIG-IP numa \u00fanica plataforma, a complexidade de gest\u00e3o \u00e9 reduzida, mantendo um elevado desempenho e escalabilidade.<br>Ao contr\u00e1rio das firewalls tradicionais, o BIG-IP AFM \u00e9 constru\u00eddo numa arquitetura de proxy completo, o que significa que as liga\u00e7\u00f5es de entrada s\u00e3o totalmente inspeccionadas e verificadas quanto a amea\u00e7as e, no passo seguinte, encaminhadas para o servidor adequado. No sentido inverso, no caso da comunica\u00e7\u00e3o servidor-cliente, utilizando um proxy em conjunto com o AFM, \u00e9 poss\u00edvel verificar os dados para proteger contra a fuga de informa\u00e7\u00f5es sens\u00edveis, tais como n\u00fameros de cart\u00f5es de cr\u00e9dito ou n\u00fameros de seguran\u00e7a social.<\/p><p>O F5 AFM facilita uma s\u00e9rie de funcionalidades relacionadas com a seguran\u00e7a que j\u00e1 estavam anteriormente dispon\u00edveis no BIG-IP, mas cuja implementa\u00e7\u00e3o implicava, por exemplo, a cria\u00e7\u00e3o de regras apropriadas (iRule).<\/p><p>Uma carater\u00edstica especial do F5 AFM \u00e9 que as regras de seguran\u00e7a s\u00e3o atribu\u00eddas a um servidor virtual espec\u00edfico (Servidor Virtual) &#8211; de modo que antes que o tr\u00e1fego seja autorizado a entrar no recurso ao qual o servidor virtual est\u00e1 atribu\u00eddo, ele \u00e9 verificado quanto \u00e0 seguran\u00e7a por uma s\u00e9rie de regras predefinidas. \u00c9 tamb\u00e9m de salientar o m\u00f3dulo melhorado de relat\u00f3rios e registo, que fornece estat\u00edsticas e informa\u00e7\u00f5es sobre todas as tentativas de viola\u00e7\u00e3o das regras de seguran\u00e7a.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b15544 elementor-widget elementor-widget-heading\" data-id=\"6b15544\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Acelerador Web BIG-IP  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-988ee0a elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"988ee0a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>oferece funcionalidades para otimizar o desempenho e eliminar os problemas dos navegadores Web, das plataformas de aplica\u00e7\u00f5es ou da lat\u00eancia da WAN. A utiliza\u00e7\u00e3o de um \u00fanico sistema WA pode resultar num aumento do desempenho da aplica\u00e7\u00e3o entre 2x e 10x atrav\u00e9s da utiliza\u00e7\u00e3o de, entre outras coisas. mecanismos: controlo din\u00e2mico de conte\u00fados, descarregamento SSL, referencia\u00e7\u00e3o inteligente entre navegadores, compress\u00e3o din\u00e2mica e armazenamento em cache, gest\u00e3o da largura de banda e muito mais.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5508f05 e-flex e-con-boxed e-con e-parent\" data-id=\"5508f05\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-0b3e4b4 e-con-full e-flex e-con e-child\" data-id=\"0b3e4b4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1014469 elementor-widget elementor-widget-image\" data-id=\"1014469\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"54\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/OPSWAT_Logo_CMYKwhite-300x54.png.webp\" class=\"attachment-large size-large wp-image-14048\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-924c3f1 e-con-full e-flex e-con e-child\" data-id=\"924c3f1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1703332 elementor-widget elementor-widget-heading\" data-id=\"1703332\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Servidor ICAP MetaDefender<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c5f8fa8 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"c5f8fa8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O Servidor MetaDefender ICAP utiliza o Protocolo de Adapta\u00e7\u00e3o de Conte\u00fados da Internet (ICAP) para se integrar com os dispositivos de rede para proteger contra amea\u00e7as avan\u00e7adas no tr\u00e1fego de rede e dispositivos de armazenamento. Utiliza a an\u00e1lise m\u00faltipla, a an\u00e1lise de vulnerabilidades e a limpeza de dados l\u00edderes do sector &#8211; tamb\u00e9m conhecida como &#8220;desarmamento e reconstru\u00e7\u00e3o de conte\u00fados&#8221; (CDR). Al\u00e9m disso, efectua a avalia\u00e7\u00e3o de vulnerabilidades e a preven\u00e7\u00e3o da perda de dados (DLP).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c51b9d elementor-widget elementor-widget-heading\" data-id=\"3c51b9d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Proteger os Proxies Inversos\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c112047 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"c112047\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ao integrar o servidor ICAP da MetaDefender com os chamados &#8220;servidores ICAP&#8221;, a empresa \u00e9 capaz de fornecer as seguintes informa\u00e7\u00f5es. Atrav\u00e9s de proxies inversos, como balanceadores de carga, controladores de aplica\u00e7\u00f5es e firewalls (WAFs), podemos elevar o n\u00edvel de seguran\u00e7a da aplica\u00e7\u00e3o ao m\u00e1ximo. Com o ICAP, todas as aplica\u00e7\u00f5es por detr\u00e1s do dispositivo de rede est\u00e3o protegidas. Juntas, a F5 e a OPSWAT oferecem uma solu\u00e7\u00e3o de seguran\u00e7a atraente e integrada para reduzir a superf\u00edcie de ataque das aplica\u00e7\u00f5es e a seguran\u00e7a da rede.<\/p><p>A plataforma de ciberseguran\u00e7a MetaDefender da OPSWAT analisa os ficheiros com mais de 30 motores antiv\u00edrus l\u00edderes, bem como dados de limpeza (Desarmar e Reconstruir). A plataforma F5 BIG-IP \u00e9 uma evolu\u00e7\u00e3o inteligente da tecnologia de controlador de aplica\u00e7\u00f5es. Oferece a intelig\u00eancia superior de que os administradores necessitam para garantir que as aplica\u00e7\u00f5es est\u00e3o dispon\u00edveis de forma r\u00e1pida e segura<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f20eae1 elementor-widget elementor-widget-heading\" data-id=\"f20eae1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Solu\u00e7\u00f5es conjuntas<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29583ba elementor-widget elementor-widget-image\" data-id=\"29583ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"567\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/shema-1024x542-1.jpg\" class=\"attachment-large size-large wp-image-14553\" alt=\"\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/shema-1024x542-1.jpg 1024w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/shema-1024x542-1-300x213.jpg 300w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/shema-1024x542-1-768x545.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>SEGURAN\u00c7A NA WEB NOVA GERA\u00c7\u00c3O BIG-IP Application Security Manager As amea\u00e7as mais perigosas para as infra-estruturas de TI est\u00e3o relacionadas com ataques que visam as vulnerabilidades das aplica\u00e7\u00f5es. As medidas de seguran\u00e7a convencionais, como as firewalls e os sistemas de dete\u00e7\u00e3o de intrus\u00f5es, t\u00eam grande dificuldade em detetar este tipo de intrus\u00e3o.O Application Security Manager [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":15662,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-15660","page","type-page","status-publish","hentry"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/pages\/15660","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/comments?post=15660"}],"version-history":[{"count":2,"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/pages\/15660\/revisions"}],"predecessor-version":[{"id":38952,"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/pages\/15660\/revisions\/38952"}],"up":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/pages\/15662"}],"wp:attachment":[{"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/media?parent=15660"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}