{"id":15668,"date":"2024-03-04T07:45:52","date_gmt":"2024-03-04T07:45:52","guid":{"rendered":"https:\/\/ramsdata.com.pl\/oferta\/tecnologias\/nac-endpoint-security-nova-geracao\/"},"modified":"2025-06-23T17:29:21","modified_gmt":"2025-06-23T17:29:21","slug":"nac-endpoint-security-nova-geracao","status":"publish","type":"page","link":"https:\/\/ramsdata.com.pl\/pt-pt\/oferta\/tecnologias\/nac-endpoint-security-nova-geracao\/","title":{"rendered":"Nac Endpoint Security Nova Gera\u00e7\u00e3o"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"15668\" class=\"elementor elementor-15668 elementor-11357\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-56ecedad e-flex e-con-boxed e-con e-parent\" data-id=\"56ecedad\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-de0e85e e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"de0e85e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInDown&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1aaddd3e elementor-widget elementor-widget-heading\" data-id=\"1aaddd3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SEGURAN\u00c7A NAC &amp; ENDPOINT DE PR\u00d3XIMA GERA\u00c7\u00c3O\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2161080 e-flex e-con-boxed e-con e-parent\" data-id=\"2161080\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6f97420d e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"6f97420d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5d857cb6 elementor-widget elementor-widget-text-editor\" data-id=\"5d857cb6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A AddNet protege o acesso \u00e0 rede atrav\u00e9s do suporte integrado para autentica\u00e7\u00e3o e autoriza\u00e7\u00e3o 802.1x com base no endere\u00e7o MAC. A AddNet pode ativar a comunica\u00e7\u00e3o de rede com um dispositivo autenticado e atribuir o dispositivo \u00e0s VLANs adequadas, dependendo das pol\u00edticas implementadas com base no endere\u00e7o MAC. A funcionalidade NAC na solu\u00e7\u00e3o da Novicom \u00e9 independente do fornecedor e permite a implementa\u00e7\u00e3o de acesso seguro \u00e0 rede, independentemente da origem dos switches. No entanto, para tirar o m\u00e1ximo proveito do AddNet NAC, \u00e9 necess\u00e1rio que a infraestrutura de rede suporte o padr\u00e3o de autentica\u00e7\u00e3o 802.1x \/ MAC. Este requisito \u00e9 atualmente cumprido pela maioria dos comutadores de todos os principais fornecedores.<\/p><p>A vantagem do AddNet NAC \u00e9 a implementa\u00e7\u00e3o simples em redes grandes e distribu\u00eddas. Tamb\u00e9m \u00e9 poss\u00edvel implementar o NAC em localiza\u00e7\u00f5es remotas, permitindo um acesso seguro mesmo que a localiza\u00e7\u00e3o central n\u00e3o esteja acess\u00edvel. Isto foi conseguido atrav\u00e9s da integra\u00e7\u00e3o do servidor Radius em servidores de trabalho remotos da AddNet.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4f3fe8ec e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"4f3fe8ec\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInRight&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-635f69f3 elementor-widget elementor-widget-image\" data-id=\"635f69f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"241\" height=\"200\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/02\/producenci_novicom.png.webp\" class=\"attachment-full size-full wp-image-12823\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d686db5 e-flex e-con-boxed e-con e-parent\" data-id=\"d686db5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-27c4aa47 e-flex e-con-boxed elementor-invisible e-con e-child\" data-id=\"27c4aa47\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInDown&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-520f7eed elementor-widget elementor-widget-heading\" data-id=\"520f7eed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Autentica\u00e7\u00e3o 802.1x\/mac<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-46cdd919 e-flex e-con-boxed elementor-invisible e-con e-child\" data-id=\"46cdd919\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c4b5f0 e-con-full e-flex e-con e-child\" data-id=\"c4b5f0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-219c8eb elementor-widget elementor-widget-text-editor\" data-id=\"219c8eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Para a funcionalidade NAC, a AddNet utiliza o protocolo RADIUS padr\u00e3o, que suporta a op\u00e7\u00e3o de autentica\u00e7\u00e3o 802.1x \/ MAC. A implementa\u00e7\u00e3o completa do 802.1x da forma tradicional acarreta muitas dificuldades adicionais relacionadas com os requerentes para todos os dispositivos de rede e a manuten\u00e7\u00e3o de certificados actualizados. H\u00e1 tamb\u00e9m riscos adicionais, como a necessidade de gerir excep\u00e7\u00f5es &#8211; nem todas as plataformas e dispositivos t\u00eam suplicantes dispon\u00edveis para eles. Muitas vezes, por esta raz\u00e3o, as portas de rede desses dispositivos s\u00e3o colocadas fora do servi\u00e7o 802.1x. A eventual liga\u00e7\u00e3o de outro dispositivo a esta porta implica a exposi\u00e7\u00e3o a um acesso n\u00e3o autorizado aos recursos de rede da organiza\u00e7\u00e3o.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8526f18 e-con-full e-flex e-con e-child\" data-id=\"8526f18\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d455946 elementor-widget elementor-widget-text-editor\" data-id=\"d455946\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A maioria dos utilizadores da AddNet prefere poder utilizar mecanismos NAC sob a forma de autentica\u00e7\u00e3o de endere\u00e7os MAC com prote\u00e7\u00e3o adicional. Isto significa que os dispositivos s\u00e3o autenticados pelos seus endere\u00e7os MAC. Uma monitoriza\u00e7\u00e3o eficaz \u00e9 capaz de acompanhar muitos par\u00e2metros em tempo real e, assim, notificar o administrador de um dispositivo com um MAC alterado. Esta abordagem para o NAC est\u00e1 muito pr\u00f3xima da funcionalidade completa do 802.1x sem a necessidade de implementar a administra\u00e7\u00e3o e gest\u00e3o de excep\u00e7\u00f5es a longo prazo.<\/p><p> <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5e9d46d e-con-full e-flex e-con e-child\" data-id=\"5e9d46d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c7df510 elementor-widget elementor-widget-text-editor\" data-id=\"c7df510\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A implementa\u00e7\u00e3o da autentica\u00e7\u00e3o MAC AddNet faz parte da implementa\u00e7\u00e3o DDI padr\u00e3o e n\u00e3o h\u00e1 requisitos adicionais para al\u00e9m da configura\u00e7\u00e3o do hardware de rede. A adi\u00e7\u00e3o de algumas linhas extra na configura\u00e7\u00e3o do equipamento de rede permite que a funcionalidade NAC seja utilizada imediatamente. Do ponto de vista da AddNet, s\u00f3 \u00e9 necess\u00e1rio definir os par\u00e2metros de comunica\u00e7\u00e3o para os servidores RADIUS.<\/p><p> <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-231213b e-flex e-con-boxed e-con e-parent\" data-id=\"231213b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-904f8ef e-flex e-con-boxed elementor-invisible e-con e-child\" data-id=\"904f8ef\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInDown&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5e6777d elementor-widget elementor-widget-heading\" data-id=\"5e6777d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">autoriza\u00e7\u00e3o\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b45668f e-flex e-con-boxed elementor-invisible e-con e-child\" data-id=\"b45668f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ef35e40 e-con-full e-flex e-con e-child\" data-id=\"ef35e40\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5c60380 elementor-widget elementor-widget-text-editor\" data-id=\"5c60380\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Outra carater\u00edstica importante da AddNet \u00e9 a gest\u00e3o de autoriza\u00e7\u00f5es. Depois de o dispositivo ter sido autenticado &#8211; o acesso do dispositivo \u00e0 comunica\u00e7\u00e3o em rede baseia-se na sua identidade &#8211; o passo seguinte \u00e9 o processo de autoriza\u00e7\u00e3o, que determina a rede (VLAN) \u00e0 qual o dispositivo deve ser atribu\u00eddo.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6027bba e-con-full e-flex e-con e-child\" data-id=\"6027bba\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-99d9a94 elementor-widget elementor-widget-text-editor\" data-id=\"99d9a94\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A porta de comuta\u00e7\u00e3o relevante assume as configura\u00e7\u00f5es como a porta de acesso para a VLAN correspondente. Por conseguinte, o dispositivo s\u00f3 pode comunicar com a VLAN que lhe foi atribu\u00edda.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-87b9dcf e-con-full e-flex e-con e-child\" data-id=\"87b9dcf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-469aaeb elementor-widget elementor-widget-text-editor\" data-id=\"469aaeb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A autoriza\u00e7\u00e3o, tal como a autentica\u00e7\u00e3o 802.1 \/MAC, \u00e9 controlada pelo Radius, que faz parte do servidor de trabalho AddNet. A vantagem deste modelo \u00e9 que n\u00e3o \u00e9 necess\u00e1rio configurar uma VLAN para cada switch. Os comutadores s\u00e3o controlados dinamicamente pela AddNet e o dispositivo \u00e9 adicionado a uma rede espec\u00edfica conforme necess\u00e1rio.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cf0ee57 e-con-full e-flex e-con e-child\" data-id=\"cf0ee57\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e88bb40 elementor-widget elementor-widget-text-editor\" data-id=\"e88bb40\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Desta forma, conseguimos um estado em que n\u00e3o importa a que switch um dispositivo est\u00e1 ligado, mas esse dispositivo obter\u00e1 sempre o seu endere\u00e7o IP e ser\u00e1 atribu\u00eddo \u00e0 VLAN adequada.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d45be37 e-flex e-con-boxed e-con e-parent\" data-id=\"d45be37\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-98fdbf1 e-flex e-con-boxed elementor-invisible e-con e-child\" data-id=\"98fdbf1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInDown&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8991eb1 elementor-widget elementor-widget-image\" data-id=\"8991eb1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"54\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/OPSWAT_Logo_CMYKwhite-300x54.png.webp\" class=\"attachment-large size-large wp-image-14048\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-971e888 e-flex e-con-boxed elementor-invisible e-con e-child\" data-id=\"971e888\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-af4638e e-con-full e-flex e-con e-child\" data-id=\"af4638e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d582104 elementor-widget elementor-widget-heading\" data-id=\"d582104\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Controlo de acesso \u00e0 rede da pr\u00f3xima gera\u00e7\u00e3o<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8646717 elementor-widget elementor-widget-text-editor\" data-id=\"8646717\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O MetaAccess impede que dispositivos de risco acedam a redes locais e a aplica\u00e7\u00f5es na nuvem, como o Office 365, o Salesforce e o Dropbox. Utilizando a tecnologia avan\u00e7ada de preven\u00e7\u00e3o de amea\u00e7as &#8211; prote\u00e7\u00e3o de terminais l\u00edder da ind\u00fastria &#8211; o MetaAccess efectua testes exaustivos de seguran\u00e7a e conformidade em dispositivos terminais antes de permitir que estes acedam aos dados da empresa, oferecendo contramedidas na eventualidade de um problema.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6a1b2a8 e-con-full e-flex e-con e-child\" data-id=\"6a1b2a8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e4da2cb elementor-widget elementor-widget-heading\" data-id=\"e4da2cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Garantir a seguran\u00e7a e a conformidade do dispositivo<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-331951b elementor-widget elementor-widget-text-editor\" data-id=\"331951b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Com o crescimento e a popularidade do (BYOD) e do (SDP), os dados empresariais est\u00e3o a ser cada vez mais acedidos por dispositivos n\u00e3o geridos e potencialmente incompat\u00edveis ou arriscados. Nesta situa\u00e7\u00e3o, o MetaAccess permite que as organiza\u00e7\u00f5es apliquem normas de seguran\u00e7a internas e cumpram os requisitos de seguran\u00e7a e conformidade em todos os dispositivos que acedem a dados empresariais, independentemente de os dispositivos serem ou n\u00e3o propriedade da empresa.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e8fe239 e-flex e-con-boxed e-con e-child\" data-id=\"e8fe239\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-861db08 elementor-widget elementor-widget-heading\" data-id=\"861db08\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Garantir a seguran\u00e7a e a conformidade do dispositivo<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f5ba2a0 e-flex e-con-boxed e-con e-child\" data-id=\"f5ba2a0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-58868bf e-flex e-con-boxed e-con e-child\" data-id=\"58868bf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-86388a0 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"86388a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-dot-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 56c110.532 0 200 89.451 200 200 0 110.532-89.451 200-200 200-110.532 0-200-89.451-200-200 0-110.532 89.451-200 200-200m0-48C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 168c-44.183 0-80 35.817-80 80s35.817 80 80 80 80-35.817 80-80-35.817-80-80-80z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Dete\u00e7\u00e3o de infec\u00e7\u00f5es em dispositivos com m\u00faltiplos motores antiv\u00edrus utilizando a plataforma MetaDefender<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-dot-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 56c110.532 0 200 89.451 200 200 0 110.532-89.451 200-200 200-110.532 0-200-89.451-200-200 0-110.532 89.451-200 200-200m0-48C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 168c-44.183 0-80 35.817-80 80s35.817 80 80 80 80-35.817 80-80-35.817-80-80-80z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Verifica\u00e7\u00e3o exaustiva da conformidade com as pol\u00edticas de seguran\u00e7a<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-dot-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 56c110.532 0 200 89.451 200 200 0 110.532-89.451 200-200 200-110.532 0-200-89.451-200-200 0-110.532 89.451-200 200-200m0-48C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 168c-44.183 0-80 35.817-80 80s35.817 80 80 80 80-35.817 80-80-35.817-80-80-80z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Dete\u00e7\u00e3o e etiquetagem de mais de 5.000 aplica\u00e7\u00f5es autorizadas pelo fabricante<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-62f86c6 e-flex e-con-boxed e-con e-child\" data-id=\"62f86c6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-94036f1 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"94036f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-dot-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 56c110.532 0 200 89.451 200 200 0 110.532-89.451 200-200 200-110.532 0-200-89.451-200-200 0-110.532 89.451-200 200-200m0-48C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 168c-44.183 0-80 35.817-80 80s35.817 80 80 80 80-35.817 80-80-35.817-80-80-80z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Autentica\u00e7\u00e3o do utilizador e controlo do bloqueio do ecr\u00e3<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-dot-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 56c110.532 0 200 89.451 200 200 0 110.532-89.451 200-200 200-110.532 0-200-89.451-200-200 0-110.532 89.451-200 200-200m0-48C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 168c-44.183 0-80 35.817-80 80s35.817 80 80 80 80-35.817 80-80-35.817-80-80-80z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Verifica\u00e7\u00e3o exaustiva da conformidade com as pol\u00edticas de seguran\u00e7a<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-dot-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 56c110.532 0 200 89.451 200 200 0 110.532-89.451 200-200 200-110.532 0-200-89.451-200-200 0-110.532 89.451-200 200-200m0-48C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 168c-44.183 0-80 35.817-80 80s35.817 80 80 80 80-35.817 80-80-35.817-80-80-80z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Dete\u00e7\u00e3o de lacunas e vulnerabilidades no dispositivo<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>SEGURAN\u00c7A NAC &amp; ENDPOINT DE PR\u00d3XIMA GERA\u00c7\u00c3O A AddNet protege o acesso \u00e0 rede atrav\u00e9s do suporte integrado para autentica\u00e7\u00e3o e autoriza\u00e7\u00e3o 802.1x com base no endere\u00e7o MAC. A AddNet pode ativar a comunica\u00e7\u00e3o de rede com um dispositivo autenticado e atribuir o dispositivo \u00e0s VLANs adequadas, dependendo das pol\u00edticas implementadas com base no endere\u00e7o [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":15662,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-15668","page","type-page","status-publish","hentry"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/pages\/15668","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/comments?post=15668"}],"version-history":[{"count":6,"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/pages\/15668\/revisions"}],"predecessor-version":[{"id":39173,"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/pages\/15668\/revisions\/39173"}],"up":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/pages\/15662"}],"wp:attachment":[{"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/media?parent=15668"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}