{"id":5362,"date":"2024-08-07T00:22:41","date_gmt":"2024-08-07T03:22:41","guid":{"rendered":"https:\/\/pegasussecurity.com.br\/solutions\/"},"modified":"2025-02-23T21:02:16","modified_gmt":"2025-02-24T00:02:16","slug":"solutions","status":"publish","type":"page","link":"https:\/\/pegasussecurity.com.br\/en\/solutions\/","title":{"rendered":"Solutions"},"content":{"rendered":"<div class=\"gb-container gb-container-12cc8727 alignfull\">\n<div class=\"gb-container gb-container-8fa8053a\">\n<div class=\"gb-container gb-container-0b79e162\">\n\n<p class=\"gb-headline gb-headline-293825d6 gb-headline-text\">In a<br><mark class=\"gb-highlight\">data-driven world,<\/mark><br>every modern company&nbsp;<br>needs SecOps<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-1e6b177d\">\n\n<h2 class=\"gb-headline gb-headline-c7d6b103\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M352 0c-12.9 0-24.6 7.8-29.6 19.8s-2.2 25.7 6.9 34.9L370.7 96 201.4 265.4c-12.5 12.5-12.5 32.8 0 45.3s32.8 12.5 45.3 0L416 141.3l41.4 41.4c9.2 9.2 22.9 11.9 34.9 6.9s19.8-16.6 19.8-29.6l0-128c0-17.7-14.3-32-32-32L352 0zM80 32C35.8 32 0 67.8 0 112L0 432c0 44.2 35.8 80 80 80l320 0c44.2 0 80-35.8 80-80l0-112c0-17.7-14.3-32-32-32s-32 14.3-32 32l0 112c0 8.8-7.2 16-16 16L80 448c-8.8 0-16-7.2-16-16l0-320c0-8.8 7.2-16 16-16l112 0c17.7 0 32-14.3 32-32s-14.3-32-32-32L80 32z\"><\/path><\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/pegasussecurity.com.br\/en\/solutions\/framework\/\">Framework<\/a><\/span><\/h2>\n\n\n\n<h3 class=\"gb-headline gb-headline-3b62a77a gb-headline-text\">Assess, Identify &amp; Prepare<\/h3>\n\n\n\n<p>Who are we up against, what do we need to protect ourselves, how?<\/p>\n\n\n\n<h3 class=\"gb-headline gb-headline-791a68a9 gb-headline-text\">Protect<\/h3>\n\n\n\n<p>Deploy and manage our defenses.<\/p>\n\n\n\n<h3 class=\"gb-headline gb-headline-511408d7 gb-headline-text\">Detect<\/h3>\n\n\n\n<p>Safe networks for when protection measures fail.<\/p>\n\n\n\n<h3 class=\"gb-headline gb-headline-1bca9aaf gb-headline-text\">Reply \/ Recover<\/h3>\n\n\n\n<p>To gain response time when a security breach occurs.<\/p>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-fda0a368 alignfull\">\n<div class=\"gb-container gb-container-dc0b5db9\">\n\n<h2 class=\"gb-headline gb-headline-04396a88 gb-headline-text\">Portfolio of Products and Services<\/h2>\n\n<\/div>\n\n<div class=\"gb-container gb-container-d4b6d22c\">\n<div class=\"gb-container gb-container-1034c732\">\n\n<figure class=\"gb-block-image gb-block-image-049edcba\"><a href=\"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-soc\/\"><img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"125\" class=\"gb-image gb-image-049edcba hide-on-mobile\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/2024\/05\/icone04.webp\" alt=\"\" title=\"icon04\"><\/a><\/figure>\n\n\n\n<h3 class=\"gb-headline gb-headline-24f0781e\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M352 0c-12.9 0-24.6 7.8-29.6 19.8s-2.2 25.7 6.9 34.9L370.7 96 201.4 265.4c-12.5 12.5-12.5 32.8 0 45.3s32.8 12.5 45.3 0L416 141.3l41.4 41.4c9.2 9.2 22.9 11.9 34.9 6.9s19.8-16.6 19.8-29.6l0-128c0-17.7-14.3-32-32-32L352 0zM80 32C35.8 32 0 67.8 0 112L0 432c0 44.2 35.8 80 80 80l320 0c44.2 0 80-35.8 80-80l0-112c0-17.7-14.3-32-32-32s-32 14.3-32 32l0 112c0 8.8-7.2 16-16 16L80 448c-8.8 0-16-7.2-16-16l0-320c0-8.8 7.2-16 16-16l112 0c17.7 0 32-14.3 32-32s-14.3-32-32-32L80 32z\"><\/path><\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-soc\/\">X-SOC<\/a><\/span><\/h3>\n\n\n\n<ul style=\"font-size:16px\" class=\"wp-block-list produto\">\n<li style=\"font-size:15px\">Managed Security (iSOC).<\/li>\n\n\n\n<li style=\"font-size:15px\">Service model for monitoring your company&#8217;s technological environment.<\/li>\n\n\n\n<li style=\"font-size:15px\">24&#215;7 operation \/ N1, N2 and N3 support.<\/li>\n<\/ul>\n\n<\/div>\n\n<div class=\"gb-container gb-container-3474c1d6\">\n\n<figure class=\"gb-block-image gb-block-image-738c7866\"><a href=\"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-secure\/\"><img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"125\" class=\"gb-image gb-image-738c7866 hide-on-mobile\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/2024\/05\/icone01.webp\" alt=\"\" title=\"icon01\"><\/a><\/figure>\n\n\n\n<h3 class=\"gb-headline gb-headline-a2ed4837\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M352 0c-12.9 0-24.6 7.8-29.6 19.8s-2.2 25.7 6.9 34.9L370.7 96 201.4 265.4c-12.5 12.5-12.5 32.8 0 45.3s32.8 12.5 45.3 0L416 141.3l41.4 41.4c9.2 9.2 22.9 11.9 34.9 6.9s19.8-16.6 19.8-29.6l0-128c0-17.7-14.3-32-32-32L352 0zM80 32C35.8 32 0 67.8 0 112L0 432c0 44.2 35.8 80 80 80l320 0c44.2 0 80-35.8 80-80l0-112c0-17.7-14.3-32-32-32s-32 14.3-32 32l0 112c0 8.8-7.2 16-16 16L80 448c-8.8 0-16-7.2-16-16l0-320c0-8.8 7.2-16 16-16l112 0c17.7 0 32-14.3 32-32s-14.3-32-32-32L80 32z\"><\/path><\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-secure\/\">X-SECURE<\/a><\/span><\/h3>\n\n\n\n<ul style=\"font-size:15px\" class=\"wp-block-list produto\">\n<li style=\"font-size:15px\">Managed Detection and Response (MDR).<\/li>\n\n\n\n<li>Actions for remediation and impact containment.<\/li>\n\n\n\n<li style=\"font-size:15px\">Digital Forensics.<\/li>\n<\/ul>\n\n<\/div>\n\n<div class=\"gb-container gb-container-723179f1\">\n\n<figure class=\"gb-block-image gb-block-image-760d8a85\"><a href=\"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-vrm\/\"><img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"125\" class=\"gb-image gb-image-760d8a85 hide-on-mobile\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/2024\/05\/icone02.webp\" alt=\"\" title=\"icon02\"><\/a><\/figure>\n\n\n\n<h3 class=\"gb-headline gb-headline-f20ced6e\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M352 0c-12.9 0-24.6 7.8-29.6 19.8s-2.2 25.7 6.9 34.9L370.7 96 201.4 265.4c-12.5 12.5-12.5 32.8 0 45.3s32.8 12.5 45.3 0L416 141.3l41.4 41.4c9.2 9.2 22.9 11.9 34.9 6.9s19.8-16.6 19.8-29.6l0-128c0-17.7-14.3-32-32-32L352 0zM80 32C35.8 32 0 67.8 0 112L0 432c0 44.2 35.8 80 80 80l320 0c44.2 0 80-35.8 80-80l0-112c0-17.7-14.3-32-32-32s-32 14.3-32 32l0 112c0 8.8-7.2 16-16 16L80 448c-8.8 0-16-7.2-16-16l0-320c0-8.8 7.2-16 16-16l112 0c17.7 0 32-14.3 32-32s-14.3-32-32-32L80 32z\"><\/path><\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-vrm\/\">X-VRM<\/a><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list produto\">\n<li style=\"font-size:15px\">Identifying and managing vulnerabilities to prevent cyber attacks.<\/li>\n\n\n\n<li style=\"font-size:15px\">Penetration Tests &amp; Offensive Security.<\/li>\n\n\n\n<li style=\"font-size:15px\">Managed Threat Hunting.<\/li>\n<\/ul>\n\n<\/div>\n\n<div class=\"gb-container gb-container-1893e2fa\">\n\n<figure class=\"gb-block-image gb-block-image-cc3d388b\"><a href=\"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-threats\/\"><img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"125\" class=\"gb-image gb-image-cc3d388b hide-on-mobile\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/2024\/05\/icone03.webp\" alt=\"\" title=\"icon03\"><\/a><\/figure>\n\n\n\n<h3 class=\"gb-headline gb-headline-e30ac81d\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M352 0c-12.9 0-24.6 7.8-29.6 19.8s-2.2 25.7 6.9 34.9L370.7 96 201.4 265.4c-12.5 12.5-12.5 32.8 0 45.3s32.8 12.5 45.3 0L416 141.3l41.4 41.4c9.2 9.2 22.9 11.9 34.9 6.9s19.8-16.6 19.8-29.6l0-128c0-17.7-14.3-32-32-32L352 0zM80 32C35.8 32 0 67.8 0 112L0 432c0 44.2 35.8 80 80 80l320 0c44.2 0 80-35.8 80-80l0-112c0-17.7-14.3-32-32-32s-32 14.3-32 32l0 112c0 8.8-7.2 16-16 16L80 448c-8.8 0-16-7.2-16-16l0-320c0-8.8 7.2-16 16-16l112 0c17.7 0 32-14.3 32-32s-14.3-32-32-32L80 32z\"><\/path><\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-threats\/\">X-THREATS<\/a><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list produto\">\n<li style=\"font-size:15px\">Comprehensive service that monitors the entire lifecycle of digital threats that can impact your company:  <br\/><\/li>\n\n\n\n<li style=\"font-size:15px\">reputation and image;  <\/li>\n\n\n\n<li style=\"font-size:15px\">operation and business;  <\/li>\n\n\n\n<li style=\"font-size:15px\">and online fraud involving your company&#8217;s name.<\/li>\n<\/ul>\n\n<\/div>\n\n<div class=\"gb-container gb-container-31595797\">\n\n<figure class=\"gb-block-image gb-block-image-e7013a8a\"><a href=\"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-cloud\/\"><img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"125\" class=\"gb-image gb-image-e7013a8a hide-on-mobile\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/2024\/05\/icone06.webp\" alt=\"\" title=\"icon06\"><\/a><\/figure>\n\n\n\n<h3 class=\"gb-headline gb-headline-5a2d2877\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M352 0c-12.9 0-24.6 7.8-29.6 19.8s-2.2 25.7 6.9 34.9L370.7 96 201.4 265.4c-12.5 12.5-12.5 32.8 0 45.3s32.8 12.5 45.3 0L416 141.3l41.4 41.4c9.2 9.2 22.9 11.9 34.9 6.9s19.8-16.6 19.8-29.6l0-128c0-17.7-14.3-32-32-32L352 0zM80 32C35.8 32 0 67.8 0 112L0 432c0 44.2 35.8 80 80 80l320 0c44.2 0 80-35.8 80-80l0-112c0-17.7-14.3-32-32-32s-32 14.3-32 32l0 112c0 8.8-7.2 16-16 16L80 448c-8.8 0-16-7.2-16-16l0-320c0-8.8 7.2-16 16-16l112 0c17.7 0 32-14.3 32-32s-14.3-32-32-32L80 32z\"><\/path><\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-cloud\/\">X-CLOUD<\/a><\/span><\/h3>\n\n\n\n<ul style=\"font-size:16px\" class=\"wp-block-list produto\">\n<li style=\"font-size:15px\">Cloud Security Posture Management (CSPM).<\/li>\n\n\n\n<li>Cloud Workload Protection (CWPP).<\/li>\n\n\n\n<li style=\"font-size:15px\">Cloud Security Assessment: assesses whether the configurations of cloud solutions are being properly applied and indicates improvements.<\/li>\n<\/ul>\n\n<\/div>\n\n<div class=\"gb-container gb-container-8f2a50c7\">\n\n<h3 class=\"gb-headline gb-headline-e05ab74d\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M352 0c-12.9 0-24.6 7.8-29.6 19.8s-2.2 25.7 6.9 34.9L370.7 96 201.4 265.4c-12.5 12.5-12.5 32.8 0 45.3s32.8 12.5 45.3 0L416 141.3l41.4 41.4c9.2 9.2 22.9 11.9 34.9 6.9s19.8-16.6 19.8-29.6l0-128c0-17.7-14.3-32-32-32L352 0zM80 32C35.8 32 0 67.8 0 112L0 432c0 44.2 35.8 80 80 80l320 0c44.2 0 80-35.8 80-80l0-112c0-17.7-14.3-32-32-32s-32 14.3-32 32l0 112c0 8.8-7.2 16-16 16L80 448c-8.8 0-16-7.2-16-16l0-320c0-8.8 7.2-16 16-16l112 0c17.7 0 32-14.3 32-32s-14.3-32-32-32L80 32z\"><\/path><\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/pegasussecurity.com.br\/en\/solutions\/consultingimplementation\/\">CONSULTING<\/a><\/span><\/h3>\n\n\n\n<ul style=\"font-size:15px\" class=\"wp-block-list produto\">\n<li>Professional Services in Information Security, Gap Analysis, DPO as a Service and LGPD are some of the jobs carried out by our consulting team.<\/li>\n<\/ul>\n\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>In adata-driven world,every modern company&nbsp;needs SecOps Framework Assess, Identify &amp; Prepare Who are we up against, what do we need to protect ourselves, how? Protect Deploy and manage our defenses. Detect Safe networks for when protection measures fail. Reply \/ Recover To gain response time when a security breach occurs. Portfolio of Products and Services &#8230; <a title=\"Solutions\" class=\"read-more\" href=\"https:\/\/pegasussecurity.com.br\/en\/solutions\/\" aria-label=\"Read more about Solutions\">Read more<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-5362","page","type-page","status-publish"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Solutions - Pegasus Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pegasussecurity.com.br\/en\/solutions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Solutions - Pegasus Security\" \/>\n<meta property=\"og:description\" content=\"In adata-driven world,every modern company&nbsp;needs SecOps Framework Assess, Identify &amp; Prepare Who are we up against, what do we need to protect ourselves, how? Protect Deploy and manage our defenses. Detect Safe networks for when protection measures fail. Reply \/ Recover To gain response time when a security breach occurs. Portfolio of Products and Services ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pegasussecurity.com.br\/en\/solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"Pegasus Security\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-24T00:02:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/2024\/05\/icone04.webp\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/solutions\\\/\",\"url\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/solutions\\\/\",\"name\":\"Solutions - Pegasus Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/solutions\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/solutions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pegasussecurity.com.br\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/icone04.webp\",\"datePublished\":\"2024-08-07T03:22:41+00:00\",\"dateModified\":\"2025-02-24T00:02:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/solutions\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/solutions\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/solutions\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pegasussecurity.com.br\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/icone04.webp\",\"contentUrl\":\"https:\\\/\\\/pegasussecurity.com.br\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/icone04.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/solutions\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/\",\"name\":\"Pegasus Security\",\"description\":\"Cybersecurity for All\",\"publisher\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/#organization\"},\"alternateName\":\"Pegasus\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/#organization\",\"name\":\"Pegasus Security\",\"alternateName\":\"Pegasus Security\",\"url\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/pegasussecurity.com.br\\\/wp-content\\\/uploads\\\/cropped-pegasus-white-logo.webp\",\"contentUrl\":\"https:\\\/\\\/pegasussecurity.com.br\\\/wp-content\\\/uploads\\\/cropped-pegasus-white-logo.webp\",\"width\":392,\"height\":328,\"caption\":\"Pegasus Security\"},\"image\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Solutions - Pegasus Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pegasussecurity.com.br\/en\/solutions\/","og_locale":"en_US","og_type":"article","og_title":"Solutions - Pegasus Security","og_description":"In adata-driven world,every modern company&nbsp;needs SecOps Framework Assess, Identify &amp; Prepare Who are we up against, what do we need to protect ourselves, how? Protect Deploy and manage our defenses. Detect Safe networks for when protection measures fail. Reply \/ Recover To gain response time when a security breach occurs. Portfolio of Products and Services ... Read more","og_url":"https:\/\/pegasussecurity.com.br\/en\/solutions\/","og_site_name":"Pegasus Security","article_modified_time":"2025-02-24T00:02:16+00:00","og_image":[{"url":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/2024\/05\/icone04.webp","type":"","width":"","height":""}],"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/pegasussecurity.com.br\/en\/solutions\/","url":"https:\/\/pegasussecurity.com.br\/en\/solutions\/","name":"Solutions - Pegasus Security","isPartOf":{"@id":"https:\/\/pegasussecurity.com.br\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pegasussecurity.com.br\/en\/solutions\/#primaryimage"},"image":{"@id":"https:\/\/pegasussecurity.com.br\/en\/solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/2024\/05\/icone04.webp","datePublished":"2024-08-07T03:22:41+00:00","dateModified":"2025-02-24T00:02:16+00:00","breadcrumb":{"@id":"https:\/\/pegasussecurity.com.br\/en\/solutions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pegasussecurity.com.br\/en\/solutions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pegasussecurity.com.br\/en\/solutions\/#primaryimage","url":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/2024\/05\/icone04.webp","contentUrl":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/2024\/05\/icone04.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/pegasussecurity.com.br\/en\/solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pegasussecurity.com.br\/en\/"},{"@type":"ListItem","position":2,"name":"Solutions"}]},{"@type":"WebSite","@id":"https:\/\/pegasussecurity.com.br\/en\/#website","url":"https:\/\/pegasussecurity.com.br\/en\/","name":"Pegasus Security","description":"Cybersecurity for All","publisher":{"@id":"https:\/\/pegasussecurity.com.br\/en\/#organization"},"alternateName":"Pegasus","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pegasussecurity.com.br\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/pegasussecurity.com.br\/en\/#organization","name":"Pegasus Security","alternateName":"Pegasus Security","url":"https:\/\/pegasussecurity.com.br\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pegasussecurity.com.br\/en\/#\/schema\/logo\/image\/","url":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/cropped-pegasus-white-logo.webp","contentUrl":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/cropped-pegasus-white-logo.webp","width":392,"height":328,"caption":"Pegasus Security"},"image":{"@id":"https:\/\/pegasussecurity.com.br\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/pages\/5362","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/comments?post=5362"}],"version-history":[{"count":6,"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/pages\/5362\/revisions"}],"predecessor-version":[{"id":5588,"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/pages\/5362\/revisions\/5588"}],"wp:attachment":[{"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/media?parent=5362"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}