{"id":5517,"date":"2024-08-06T17:26:38","date_gmt":"2024-08-06T20:26:38","guid":{"rendered":"https:\/\/pegasussecurity.com.br\/solutions\/x-secure\/"},"modified":"2025-02-19T12:37:32","modified_gmt":"2025-02-19T15:37:32","slug":"x-secure","status":"publish","type":"page","link":"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-secure\/","title":{"rendered":"X-Secure"},"content":{"rendered":"<div class=\"gb-container gb-container-31d0c4d1 alignfull\">\n<div class=\"gb-container gb-container-ae5c886b\">\n\n<h2 class=\"gb-headline gb-headline-3ef3c545 gb-headline-text\">Detect, Respond and Recover<\/h2>\n\n\n\n<p>Pegasus&#8217; mission as an Intelligent Security Service Provider (iSSP) is to offer our customers complete solutions associated with the best and most specialized professionals, processes and technologies.<\/p>\n\n\n\n<p><strong>Our solution is based on 3 pillars:<\/strong><br\/><\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-77748045\">\n<div class=\"gb-container gb-container-a0084182\">\n\n<h3 class=\"gb-headline gb-headline-e190ba31 gb-headline-text\">X-VRM<\/h3>\n\n\n\n<p class=\"gb-headline gb-headline-dfeb057e gb-headline-text\">Vulnerability and Threat Management<\/p>\n\n\n<div class=\"gb-container gb-container-5d296dad\">\n<div class=\"gb-container gb-container-9cfaf22c\">\n<div class=\"gb-container gb-container-437ebc58\">\n\n<figure class=\"gb-block-image gb-block-image-1374f93c\"><img loading=\"lazy\" decoding=\"async\" width=\"96\" height=\"96\" class=\"gb-image gb-image-1374f93c\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0030.jpg\" alt=\"\" title=\"icon-0030\"><\/figure>\n\n<\/div>\n<\/div>\n<\/div>\n\n\n<p class=\"gb-headline gb-headline-2628f4be gb-headline-text\">Vulnerability Scanning<br>Benchmarking &amp; Third Party Risks<br>Penetration Testing<br>Red Team<br>Threat Hunting Management<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-47cb1948\">\n\n<h3 class=\"gb-headline gb-headline-73848a9b gb-headline-text\">X-THREATS<\/h3>\n\n\n\n<p class=\"gb-headline gb-headline-eb8a87c0 gb-headline-text\">Threat Intelligence<\/p>\n\n\n<div class=\"gb-container gb-container-f3895535\">\n<div class=\"gb-container gb-container-3f9fc072\">\n<div class=\"gb-container gb-container-7c672bd4\">\n\n<figure class=\"gb-block-image gb-block-image-f5d3a9a2\"><img loading=\"lazy\" decoding=\"async\" width=\"96\" height=\"96\" class=\"gb-image gb-image-f5d3a9a2\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0026-1.jpg\" alt=\"\" title=\"icon-0026\"><\/figure>\n\n<\/div>\n<\/div>\n<\/div>\n\n\n<p class=\"gb-headline gb-headline-3305e204 gb-headline-text\">Data Protection Risk<br>Threat Intelligence Feeds<br>Custom Intelligence Projects<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-2588e31e\">\n\n<h3 class=\"gb-headline gb-headline-dacc0392 gb-headline-text\">X-SECURE<\/h3>\n\n\n\n<p class=\"gb-headline gb-headline-610cd96a gb-headline-text\">Detection &amp; Response<\/p>\n\n\n<div class=\"gb-container gb-container-089661aa\">\n<div class=\"gb-container gb-container-9186c172\">\n<div class=\"gb-container gb-container-fd9bd31b\">\n\n<figure class=\"gb-block-image gb-block-image-1a4961e2\"><img loading=\"lazy\" decoding=\"async\" width=\"96\" height=\"96\" class=\"gb-image gb-image-1a4961e2\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0031.jpg\" alt=\"\" title=\"icon-0031\"><\/figure>\n\n<\/div>\n<\/div>\n<\/div>\n\n\n<p class=\"gb-headline gb-headline-8a8f30c7 gb-headline-text\">Asset Protection<br>Detection and Response Management<br>Incident Response &amp; Digital Forensics<\/p>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-0ea7c5a1 alignfull\">\n<div class=\"gb-container gb-container-38653c35\">\n\n<h2 class=\"gb-headline gb-headline-846de857 gb-headline-text\">Managed Security<\/h2>\n\n<\/div>\n\n<div class=\"gb-container gb-container-a114872d\">\n<div class=\"gb-container gb-container-4a04af96\">\n\n<p class=\"gb-headline gb-headline-a1b27784 gb-headline-text\">Now that the boundaries of information and data within companies have disappeared due to <mark class=\"gb-highlight\">digital transformation<\/mark>, it is essential to adapt to a new approach to security.<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-74a44f68 gb-headline-text\">Pegasus Security, as a <mark class=\"gb-highlight\">security service provider<\/mark>, has a holistic view: we must help our customers maximize the protection of their business against cybersecurity threats and minimize the risk according to their needs and capabilities.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-dbd2fc3c\">\n\n<p class=\"gb-headline gb-headline-35cb0c7d gb-headline-text\">Pegasus Security <strong>manages all security elements<\/strong> that are used to limit or prevent threats and attacks from succeeding.&nbsp;<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-6aab69e5 gb-headline-text\">It is important to cover the different possible attack vectors and ensure that all basic protection mechanisms are in place, helping to minimize the risk associated especially with the most vulnerable, such as employees, email or mobile terminals.<\/p>\n\n\n\n<figure class=\"gb-block-image gb-block-image-24ab7e12\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"199\" class=\"gb-image gb-image-24ab7e12\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/seguranca-gerenciada.webp\" alt=\"\" title=\"managed-security\" srcset=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/seguranca-gerenciada.webp 600w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/seguranca-gerenciada-300x100.webp 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-9106c964 alignfull\">\n<div class=\"gb-container gb-container-39f9c666\">\n\n<h2 class=\"gb-headline gb-headline-c3f5dd43 gb-headline-text\">Device Security<\/h2>\n\n<\/div>\n\n<div class=\"gb-container gb-container-1d4629a4\">\n<div class=\"gb-container gb-container-37f6091c\">\n\n<p class=\"gb-headline gb-headline-8c159377 gb-headline-text\">The device is the primary gateway used by attackers to compromise an organization.<br>Traditional security solutions protect the network (firewalls, IDS, DLP, etc.), but do not protect against risks arising from the new digital ecosystem, such as: employees working outside the corporate network, obfuscated traffic or Shadow IT \/ IoT.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-563cdf31\">\n\n<p class=\"gb-headline gb-headline-e017d172 gb-headline-text\">As <mark class=\"gb-highlight\">traditional signature-based antivirus is insufficient for today\u2019s attacks<\/mark>, we need new strategies to effectively fight sophisticated attacks that employ advanced malware, exploits, or APTs.<\/p>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-80f52c4e alignfull\">\n<div class=\"gb-container gb-container-0da7f42c\">\n\n<h2 class=\"gb-headline gb-headline-f9f968ac gb-headline-text\">Network Security<\/h2>\n\n<\/div>\n\n<div class=\"gb-container gb-container-04faa831\">\n<div class=\"gb-container gb-container-ad5f5137\">\n\n<p class=\"gb-headline gb-headline-5f53b89c gb-headline-text\">The concept of network security no longer works alone due to the drastic challenges of digital transformation: Pegasus Security is the perfect partner to offer a single network and security solution to its customers.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>User mobility<\/li>\n\n\n\n<li>Migration to the Cloud<\/li>\n\n\n\n<li>The evolution of threats<\/li>\n\n\n\n<li>SD-WAN Adoption<\/li>\n<\/ul>\n\n<\/div>\n\n<div class=\"gb-container gb-container-1f939124\">\n\n<p class=\"gb-headline gb-headline-3a55db74 gb-headline-text\"><mark class=\"gb-highlight\">At Pegasus Security<\/mark>,<br>we understand these issues and have adapted our solutions to this complex landscape of diffuse edge ecosystems.<\/p>\n\n\n<div class=\"gb-container gb-container-727b80bf\">\n<div class=\"gb-container gb-container-495ae53c\">\n<div class=\"gb-container gb-container-f178e500\">\n<div class=\"gb-container gb-container-03b6466e\">\n<div class=\"gb-container gb-container-8d958375\">\n<div class=\"gb-container gb-container-21c8af30\">\n\n<figure class=\"gb-block-image gb-block-image-ff8ccb2c\"><img loading=\"lazy\" decoding=\"async\" width=\"96\" height=\"96\" class=\"gb-image gb-image-ff8ccb2c\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0042.jpg\" alt=\"\" title=\"icon-0042\"><\/figure>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-80817a78\">\n\n<p class=\"gb-headline gb-headline-d5cb094c gb-headline-text\">Secure access to and use of corporate application services.<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-7d187801\">\n<div class=\"gb-container gb-container-52ea368a\">\n<div class=\"gb-container gb-container-414a2a3c\">\n<div class=\"gb-container gb-container-67ec0bab\">\n<div class=\"gb-container gb-container-1b9dc381\">\n<div class=\"gb-container gb-container-6e522b20\">\n\n<figure class=\"gb-block-image gb-block-image-7e607d00\"><img loading=\"lazy\" decoding=\"async\" width=\"2048\" height=\"2048\" class=\"gb-image gb-image-7e607d00\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0041.jpg\" alt=\"\" title=\"icon-0041\" srcset=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0041.jpg 2048w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0041-300x300.jpg 300w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0041-1024x1024.jpg 1024w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0041-150x150.jpg 150w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0041-768x768.jpg 768w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0041-1536x1536.jpg 1536w\" sizes=\"auto, (max-width: 2048px) 100vw, 2048px\" \/><\/figure>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-5e61cb04\">\n\n<p class=\"gb-headline gb-headline-1031db1c gb-headline-text\">Secure Internet browsing services<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-05129b15\">\n<div class=\"gb-container gb-container-894f9934\">\n<div class=\"gb-container gb-container-d3adb96f\">\n<div class=\"gb-container gb-container-1decb0c5\">\n<div class=\"gb-container gb-container-89bbdf21\">\n<div class=\"gb-container gb-container-47395b85\">\n\n<figure class=\"gb-block-image gb-block-image-7562a432\"><img loading=\"lazy\" decoding=\"async\" width=\"2048\" height=\"2048\" class=\"gb-image gb-image-7562a432\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0040.jpg\" alt=\"\" title=\"icon-0040\" srcset=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0040.jpg 2048w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0040-300x300.jpg 300w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0040-1024x1024.jpg 1024w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0040-150x150.jpg 150w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0040-768x768.jpg 768w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0040-1536x1536.jpg 1536w\" sizes=\"auto, (max-width: 2048px) 100vw, 2048px\" \/><\/figure>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-a0766048\">\n\n<p class=\"gb-headline gb-headline-eaddfb82 gb-headline-text\">Secure access to and use of corporate application services.<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-f0f5e880 alignfull\">\n<div class=\"gb-container gb-container-2332065c\">\n\n<h2 class=\"gb-headline gb-headline-d71718de gb-headline-text\">Data Protection<\/h2>\n\n<\/div>\n\n<div class=\"gb-container gb-container-684741ed\">\n<div class=\"gb-container gb-container-e1ad07c1\">\n\n<p class=\"gb-headline gb-headline-d58604c3 gb-headline-text\">Information is one of the most valuable assets of any company and represents a challenge when it must be protected:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Where is it?<\/li>\n\n\n\n<li>Who accesses what?<\/li>\n\n\n\n<li>Is it sent?<\/li>\n\n\n\n<li>To whom?<\/li>\n<\/ul>\n\n\n\n<p>What to protect\u2026<br\/>User? Device? <\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-52fa0569\">\n\n<p class=\"gb-headline gb-headline-8ba2b750 gb-headline-text\">Managed Security Services:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>SOCs with professionals specialized in the main technologies<\/li>\n\n\n\n<li>With Major Incident Response (CSIRT) capabilities<\/li>\n\n\n\n<li>Specialized Analysts<\/li>\n<\/ul>\n\n\n\n<p class=\"gb-headline gb-headline-bf3be180 gb-headline-text\">Security controls:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Security tools<\/li>\n\n\n\n<li>Cutting-edge technology agreements and knowledge<\/li>\n<\/ul>\n\n\n\n<p class=\"gb-headline gb-headline-f89e71bb gb-headline-text\">Professional services:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Auditing and Consulting<\/li>\n\n\n\n<li>Training<\/li>\n\n\n\n<li>Integration<\/li>\n<\/ul>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-dd85960d alignfull\">\n<div class=\"gb-container gb-container-12ed10c1\">\n\n<h2 class=\"gb-headline gb-headline-e16744a2 gb-headline-text\">Cloud Security<\/h2>\n\n<\/div>\n\n<div class=\"gb-container gb-container-895a1bec\">\n<div class=\"gb-container gb-container-66ab62ee\">\n\n<p class=\"gb-headline gb-headline-474443aa gb-headline-text\">Public Cloud is an enabler for Digital Transformation, but its adoption brings different challenges for the business, of which Security is one of the most important.<br><br>As in public cloud environments, <mark class=\"gb-highlight\">the responsibility for security is shared<\/mark> between the cloud provider and the customer, companies need a reliable partner like Pegasus Security in this complex journey.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-448a0915\">\n\n<p class=\"gb-headline gb-headline-a5755af7 gb-headline-text\">A capabilities-based proposition for the entire cloud journey\u200b<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>CWPP<\/strong> | Cloud Workload Protection Platform<\/li>\n\n\n\n<li><strong>CSPM<\/strong> | Cloud Security Posture Management<\/li>\n\n\n\n<li><strong>CASB<\/strong> | Cloud Access Service Broker<\/li>\n<\/ul>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-8b865444 alignfull\">\n<div class=\"gb-container gb-container-22a0d195\">\n\n<h2 class=\"gb-headline gb-headline-d1c5b797 gb-headline-text\">Identity and Access Protection<\/h2>\n\n<\/div>\n\n<div class=\"gb-container gb-container-476ae234\">\n<div class=\"gb-container gb-container-46dc9ba3\">\n\n<p class=\"gb-headline gb-headline-3beb852c gb-headline-text\">Identity and access protection is a <mark class=\"gb-highlight\">cross-cutting need in the cybersecurity chain<\/mark>.<br><br>It is not only about who has access or not, but also <mark class=\"gb-highlight\">how<\/mark> and <mark class=\"gb-highlight\">when<\/mark> that access is granted.<br><mark class=\"gb-highlight\">Identification and authorized access<\/mark> must be granted based on an updated and ongoing risk assessment allocated to this access, password\/certification lifecycle, digital signatures\u2026 which is sometimes overwhelming for organizations.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-c682d204\">\n\n<p class=\"gb-headline gb-headline-6abc2828 gb-headline-text\">Our specialized consulting team<br>along with our portfolio of solutions support companies in building and implementing a customized Strategic Identity Plan.<\/p>\n\n\n<div class=\"gb-container gb-container-65419199\">\n<div class=\"gb-container gb-container-1373506c\">\n\n<p class=\"gb-headline gb-headline-f436d547 gb-headline-text\">Analysis and Design<\/p>\n\n\n<div class=\"gb-container gb-container-471b49cd\">\n\n<h2 class=\"gb-headline gb-headline-3394bdad\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M334.5 414c8.8 3.8 19 2 26-4.6l144-136c4.8-4.5 7.5-10.8 7.5-17.4s-2.7-12.9-7.5-17.4l-144-136c-7-6.6-17.2-8.4-26-4.6s-14.5 12.5-14.5 22l0 72L32 192c-17.7 0-32 14.3-32 32l0 64c0 17.7 14.3 32 32 32l288 0 0 72c0 9.6 5.7 18.2 14.5 22z\"><\/path><\/svg><\/span><\/h2>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-90f27a8c\">\n\n<p class=\"gb-headline gb-headline-f5b5674e gb-headline-text\">Implementation<\/p>\n\n\n<div class=\"gb-container gb-container-82b63683\">\n\n<h2 class=\"gb-headline gb-headline-d5a73f73\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M334.5 414c8.8 3.8 19 2 26-4.6l144-136c4.8-4.5 7.5-10.8 7.5-17.4s-2.7-12.9-7.5-17.4l-144-136c-7-6.6-17.2-8.4-26-4.6s-14.5 12.5-14.5 22l0 72L32 192c-17.7 0-32 14.3-32 32l0 64c0 17.7 14.3 32 32 32l288 0 0 72c0 9.6 5.7 18.2 14.5 22z\"><\/path><\/svg><\/span><\/h2>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-7ceb701f\">\n\n<p class=\"gb-headline gb-headline-f13a4da4 gb-headline-text\">Monitoring<\/p>\n\n\n<div class=\"gb-container gb-container-3fc9e3d7\">\n\n<h2 class=\"gb-headline gb-headline-e425a534\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M334.5 414c8.8 3.8 19 2 26-4.6l144-136c4.8-4.5 7.5-10.8 7.5-17.4s-2.7-12.9-7.5-17.4l-144-136c-7-6.6-17.2-8.4-26-4.6s-14.5 12.5-14.5 22l0 72L32 192c-17.7 0-32 14.3-32 32l0 64c0 17.7 14.3 32 32 32l288 0 0 72c0 9.6 5.7 18.2 14.5 22z\"><\/path><\/svg><\/span><\/h2>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-bf7a48ff alignfull\">\n<div class=\"gb-container gb-container-840f7edf\">\n\n<h2 class=\"gb-headline gb-headline-78066009 gb-headline-text\">Enhanced Detection and Response Capability<\/h2>\n\n<\/div>\n\n<div class=\"gb-container gb-container-db8b0c37\">\n<div class=\"gb-container gb-container-993bd6da\">\n\n<h3 class=\"gb-headline gb-headline-de58cc30 gb-headline-text\">Changing traditional security:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Focus on behavior and post-breach via AI\/ML<\/li>\n\n\n\n<li>EPP Extension \ud83e\udc6a EDR and attack surface<\/li>\n\n\n\n<li>IDPS\/FW extension \ud83e\udc6a NTA\/NDR capability<\/li>\n<\/ul>\n\n\n\n<h3 class=\"gb-headline gb-headline-680886b4 gb-headline-text\">New \u201cfrontiers\u201d to protect:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cloud Workload Protection, CASB, CSPM<\/li>\n\n\n\n<li>IoT \/ ICS Networks. Mobility. SD-Wan  <\/li>\n\n\n\n<li>Digital risk protection (brand, reputation)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"gb-headline gb-headline-e9760e9e gb-headline-text\">Extended Mission:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Facilitate breach investigation, remote containment, and forensics<\/li>\n\n\n\n<li>Analytics layer with telemetry to enable AI detection &amp; Hunting<\/li>\n<\/ul>\n\n<\/div>\n\n<div class=\"gb-container gb-container-80608737\">\n\n<p class=\"gb-headline gb-headline-f575fcac gb-headline-text\">Integrate parts and expand capabilities<\/p>\n\n\n<div class=\"gb-container gb-container-1a108530\">\n\n<figure class=\"gb-block-image gb-block-image-b7f85eb4\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"450\" class=\"gb-image gb-image-b7f85eb4\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/deteccao-resposta.webp\" alt=\"\" title=\"detection-response\" srcset=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/deteccao-resposta.webp 800w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/deteccao-resposta-300x169.webp 300w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/deteccao-resposta-768x432.webp 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-41b42fb7 alignfull\">\n<div class=\"gb-container gb-container-8a3b6f14\">\n<div class=\"gb-container gb-container-1755c5bf\">\n\n<h2 class=\"gb-headline gb-headline-0ff1dbde gb-headline-text\">X-Secure: Managed Detection and Response<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-ef801e79 gb-headline-text\">Benefit from 24\/7 continuous threat monitoring, breach investigation, and rapid remote response<\/p>\n\n\n<div class=\"gb-container gb-container-b1d112fb\">\n<div class=\"gb-container gb-container-fe1e2c4b\">\n<div class=\"gb-container gb-container-c1e299fd\">\n<div class=\"gb-container gb-container-cbe3c9a8\">\n<div class=\"gb-container gb-container-efe5221b\">\n\n<figure class=\"gb-block-image gb-block-image-4abbc73b\"><img loading=\"lazy\" decoding=\"async\" width=\"96\" height=\"96\" class=\"gb-image gb-image-4abbc73b\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0019.jpg\" alt=\"\" title=\"icon-0019\"><\/figure>\n\n<\/div>\n<\/div>\n<\/div>\n\n\n<p class=\"gb-headline gb-headline-e901fa52 gb-headline-text\">Outsource 24\/7 threat monitoring,<br>and breach detection and investigation efforts to our expert teams<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-3a8035df\">\n<div class=\"gb-container gb-container-e7e2ab7e\">\n<div class=\"gb-container gb-container-ce25614d\">\n<div class=\"gb-container gb-container-f265b84a\">\n\n<figure class=\"gb-block-image gb-block-image-6cd6ab83\"><img loading=\"lazy\" decoding=\"async\" width=\"96\" height=\"96\" class=\"gb-image gb-image-6cd6ab83\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0014.jpg\" alt=\"\" title=\"icon-0014\"><\/figure>\n\n<\/div>\n<\/div>\n<\/div>\n\n\n<p class=\"gb-headline gb-headline-7a0150f7 gb-headline-text\">Enhanced detection with X-Secure, including endpoint protection, deployed and maintained by our team<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-d6581b25\">\n<div class=\"gb-container gb-container-40162ba3\">\n<div class=\"gb-container gb-container-0b6b40f6\">\n<div class=\"gb-container gb-container-79d21f66\">\n\n<figure class=\"gb-block-image gb-block-image-67404f22\"><img loading=\"lazy\" decoding=\"async\" width=\"96\" height=\"96\" class=\"gb-image gb-image-67404f22\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0013.jpg\" alt=\"\" title=\"icon-0013\"><\/figure>\n\n<\/div>\n<\/div>\n<\/div>\n\n\n<p class=\"gb-headline gb-headline-0419257f gb-headline-text\">Our experts provide practical guidance on incident eradication and recovery, as well as rapid breach containment actions.<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-d7e848af\">\n\n<h3 class=\"gb-headline gb-headline-0f2c8785 gb-headline-text\">Our Differentiators<\/h3>\n\n\n\n<h4 class=\"gb-headline gb-headline-fbfb5cb3 gb-headline-text\">BEST ENDPOINT PROTECTION TECHNOLOGY<\/h4>\n\n\n\n<p>Extend your security investment with an advanced EPP solution, including EDR and attack surface capabilities, resulting from our premium agreements with best-in-class vendors<\/p>\n\n\n\n<h4 class=\"gb-headline gb-headline-e81526f1 gb-headline-text\">24&#215;7 CENTER OF EXCELLENCE<\/h4>\n\n\n\n<p>The service is delivered by our 24\/7 Global Centers of Excellence, leveraging global threat visibility and standardized automation of response, supported by our local capability <\/p>\n\n\n\n<h4 class=\"gb-headline gb-headline-3428760c gb-headline-text\">ADVANCED DETECTION AND CTI CAPABILITY<\/h4>\n\n\n\n<p>Our MDR platform extends the EPP protection layer through advanced detection analytics, orchestration capabilities, and the application of our proprietary intelligence<\/p>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-56983304 alignfull\">\n<div class=\"gb-container gb-container-be44af2e\">\n<div class=\"gb-container gb-container-620f0ad8\">\n\n<h2 class=\"gb-headline gb-headline-ea389114 gb-headline-text\">X-Secure: Managed Detection and Response<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-1926cf13 gb-headline-text\">Leverage synthetic environments that attract and misdirect attackers while gaining intelligence<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Distract the adversary from the Client&#8217;s real assets and consume their resources for data.<\/li>\n\n\n\n<li>Identify vulnerable assets and shield infrastructure from targeted attacks.<\/li>\n\n\n\n<li>Discover internal or external threats<\/li>\n\n\n\n<li>Deploy security resources and budgets more efficiently<\/li>\n<\/ul>\n\n\n\n<figure class=\"gb-block-image gb-block-image-fd0eba1c\"><img loading=\"lazy\" decoding=\"async\" width=\"650\" height=\"318\" class=\"gb-image gb-image-fd0eba1c\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/ambientes-sinteticos.webp\" alt=\"\" title=\"synthetic-environments\" srcset=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/ambientes-sinteticos.webp 650w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/ambientes-sinteticos-300x147.webp 300w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/figure>\n\n<\/div>\n\n<div class=\"gb-container gb-container-3f037af8\">\n\n<h3 class=\"gb-headline gb-headline-73f871d8 gb-headline-text\">Our Differentiators<\/h3>\n\n\n\n<h4 class=\"gb-headline gb-headline-7e2069df gb-headline-text\">LEVERAGING COUNTERINTELLIGENCE TECHNOLOGY<\/h4>\n\n\n\n<p>We provide the technology to design and implement deception systems<\/p>\n\n\n\n<h4 class=\"gb-headline gb-headline-5b9a0297 gb-headline-text\">CUSTOMIZABLE DECOY ENVIRONMENTS<\/h4>\n\n\n\n<p>Our deception services provide a wide range of deception environments capable of replicating different internal and external public-facing and DMZ networks.<\/p>\n\n\n\n<h4 class=\"gb-headline gb-headline-be1ca855 gb-headline-text\">CTI COLLECTION AND THIRD PARTY INTEGRATION<\/h4>\n\n\n\n<p>Counterintelligence technology leverages mapping with the ATT&amp;CK framework and enables the consumption and recovery of attacker techniques\/patterns to enable hunting efforts. Additionally, alerts can be easily exported to your SIEM <\/p>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-c59c8e0c alignfull\">\n<div class=\"gb-container gb-container-e9a96164\">\n<div class=\"gb-container gb-container-6c334cc2\">\n\n<h2 class=\"gb-headline gb-headline-3b873745 gb-headline-text\">X-Secure: DFIR<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-26357c0e gb-headline-text\">Expand your CSIRT capability with 24\/7 assistance in breaches and complex crises<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ack Inquiry Assign Incid. Handler <\/li>\n\n\n\n<li>Evidence Collection 1st Contains<\/li>\n\n\n\n<li>Analysis &amp; Initial Report<\/li>\n\n\n\n<li>Commitment Assessment Remediation Guidance<\/li>\n\n\n\n<li>Lessons learned and hardening<\/li>\n<\/ul>\n\n\n<div class=\"gb-container gb-container-576dfd4e\">\n<div class=\"gb-container gb-container-b8d02d95\">\n\n<p class=\"gb-headline gb-headline-e74d53af gb-headline-text\"><mark class=\"gb-highlight\">24\/7 availability and support<\/mark> from our experts in malware remediation, digital forensics, threat intelligence, and crisis management<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-c714359b\">\n<div class=\"gb-container gb-container-34edb431\">\n\n<p class=\"gb-headline gb-headline-14bc4837 gb-headline-text\">Dedicated <mark class=\"gb-highlight\">incident handler<\/mark>, onsite\/remote, coordinated response<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-52135cf4\">\n\n<p class=\"gb-headline gb-headline-ff20848f gb-headline-text\"><mark class=\"gb-highlight\">Comprehensive guidance<\/mark> on remediation, lessons learned and legal support<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-f6cdf63d\">\n\n<h3 class=\"gb-headline gb-headline-0c1a8b3c gb-headline-text\">Our Differentiators<\/h3>\n\n\n\n<h4 class=\"gb-headline gb-headline-24d8a73f gb-headline-text\">LOCAL RESPONSE CAPACITY<\/h4>\n\n\n\n<p>Local presence for on-site crisis coordination and evidence management, supported by our global rapid analysis capability<\/p>\n\n\n\n<h4 class=\"gb-headline gb-headline-7f7b3dea gb-headline-text\">END-TO-END INCIDENT ASSISTANCE<\/h4>\n\n\n\n<p>Support your team throughout the life of the incident, including full guidance on implementing remediation actions, system recovery, backup and protection<\/p>\n\n\n\n<h4 class=\"gb-headline gb-headline-ec1b64b6 gb-headline-text\">THREAT INTELLIGENCE<br>FORENSICS &amp; ANALYSIS TOOLING<\/h4>\n\n\n\n<p>To support threat contextualization and CoAs for threat eradication, including our forensic tools for rapid deployment, evidence collection, and full IoC scanning<\/p>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-9ebcdbb8 alignfull\">\n<div class=\"gb-container gb-container-3d628bc1\">\n<div class=\"gb-container gb-container-3474c1d6\">\n\n<figure class=\"gb-block-image gb-block-image-738c7866\"><a href=\"https:\/\/pegasussecurity.com.br\/solutions\/x-secure\/\"><img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"125\" class=\"gb-image gb-image-738c7866 hide-on-mobile\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/2024\/05\/icone01.webp\" alt=\"\" title=\"icon01\"><\/a><\/figure>\n\n\n\n<h3 class=\"gb-headline gb-headline-a2ed4837\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M352 0c-12.9 0-24.6 7.8-29.6 19.8s-2.2 25.7 6.9 34.9L370.7 96 201.4 265.4c-12.5 12.5-12.5 32.8 0 45.3s32.8 12.5 45.3 0L416 141.3l41.4 41.4c9.2 9.2 22.9 11.9 34.9 6.9s19.8-16.6 19.8-29.6l0-128c0-17.7-14.3-32-32-32L352 0zM80 32C35.8 32 0 67.8 0 112L0 432c0 44.2 35.8 80 80 80l320 0c44.2 0 80-35.8 80-80l0-112c0-17.7-14.3-32-32-32s-32 14.3-32 32l0 112c0 8.8-7.2 16-16 16L80 448c-8.8 0-16-7.2-16-16l0-320c0-8.8 7.2-16 16-16l112 0c17.7 0 32-14.3 32-32s-14.3-32-32-32L80 32z\"><\/path><\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/pegasussecurity.com.br\/solutions\/x-secure\/\">X-SECURE<\/a><\/span><\/h3>\n\n\n\n<ul style=\"font-size:15px\" class=\"wp-block-list produto\">\n<li style=\"font-size:15px\">Managed Detection and Response (MDR)<\/li>\n\n\n\n<li>Actions for remediation and impact containment<\/li>\n\n\n\n<li style=\"font-size:15px\">Digital Forensics<\/li>\n<\/ul>\n\n<\/div>\n\n<div class=\"gb-container gb-container-9414705c\">\n\n<h2 class=\"gb-headline gb-headline-c3ea7d7b gb-headline-text\">Pegasus Security Offer<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-432b8a92 gb-headline-text\"><mark class=\"gb-highlight\">Delivery models<\/mark> to adapt our SECOPS capacity to your needs.<br><\/p>\n\n\n<div class=\"gb-container gb-container-9def3147\">\n<div class=\"gb-container gb-container-7e50bb9d\">\n\n<p class=\"gb-headline gb-headline-efc49d6c gb-headline-text\"><mark class=\"gb-highlight\">Outsource 24\/7 threat monitoring<\/mark>,<br>and breach detection and investigation efforts to our expert teams<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-f65b0a2a\">\n\n<p class=\"gb-headline gb-headline-6299817c gb-headline-text\"><mark class=\"gb-highlight\">Enhanced detection with X-Secure<\/mark>, including <mark class=\"gb-highlight\">endpoint and network protection<\/mark>, deployed and maintained by our team<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-72b5ddbc\">\n\n<a class=\"gb-button gb-button-cfa11b91\" href=\"https:\/\/pegasussecurity.com.br\/contact\/\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" role=\"img\" height=\"1em\" width=\"1em\" viewbox=\"0 0 496 512\"><path fill=\"currentColor\" d=\"M248 8C111 8 0 119 0 256s111 248 248 248 248-111 248-248S385 8 248 8zm0 96c48.6 0 88 39.4 88 88s-39.4 88-88 88-88-39.4-88-88 39.4-88 88-88zm0 344c-58.7 0-111.3-26.6-146.5-68.2 18.8-35.4 55.6-59.8 98.5-59.8 2.4 0 4.8.4 7.1 1.1 13 4.2 26.6 6.9 40.9 6.9 14.3 0 28-2.7 40.9-6.9 2.3-.7 4.7-1.1 7.1-1.1 42.9 0 79.7 24.4 98.5 59.8C359.3 421.4 306.7 448 248 448z\"><\/path><\/svg><\/span><span class=\"gb-button-text\">Talk to a consultant and schedule a demonstration.<\/span><\/a>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Detect, Respond and Recover Pegasus&#8217; mission as an Intelligent Security Service Provider (iSSP) is to offer our customers complete solutions associated with the best and most specialized professionals, processes and technologies. Our solution is based on 3 pillars: X-VRM Vulnerability and Threat Management Vulnerability ScanningBenchmarking &amp; Third Party RisksPenetration TestingRed TeamThreat Hunting Management X-THREATS Threat &#8230; <a title=\"X-Secure\" class=\"read-more\" href=\"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-secure\/\" aria-label=\"Read more about X-Secure\">Read more<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":5362,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-5517","page","type-page","status-publish"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>X-Secure - Pegasus Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-secure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"X-Secure - Pegasus Security\" \/>\n<meta property=\"og:description\" content=\"Detect, Respond and Recover Pegasus&#8217; mission as an Intelligent Security Service Provider (iSSP) is to offer our customers complete solutions associated with the best and most specialized professionals, processes and technologies. Our solution is based on 3 pillars: X-VRM Vulnerability and Threat Management Vulnerability ScanningBenchmarking &amp; Third Party RisksPenetration TestingRed TeamThreat Hunting Management X-THREATS Threat ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-secure\/\" \/>\n<meta property=\"og:site_name\" content=\"Pegasus Security\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-19T15:37:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0030.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/solutions\\\/x-secure\\\/\",\"url\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/solutions\\\/x-secure\\\/\",\"name\":\"X-Secure - Pegasus Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/solutions\\\/x-secure\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/solutions\\\/x-secure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pegasussecurity.com.br\\\/wp-content\\\/uploads\\\/icon-0030.jpg\",\"datePublished\":\"2024-08-06T20:26:38+00:00\",\"dateModified\":\"2025-02-19T15:37:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/solutions\\\/x-secure\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/solutions\\\/x-secure\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/solutions\\\/x-secure\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pegasussecurity.com.br\\\/wp-content\\\/uploads\\\/icon-0030.jpg\",\"contentUrl\":\"https:\\\/\\\/pegasussecurity.com.br\\\/wp-content\\\/uploads\\\/icon-0030.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/solutions\\\/x-secure\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions\",\"item\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/solutions\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"X-Secure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/\",\"name\":\"Pegasus Security\",\"description\":\"Cybersecurity for All\",\"publisher\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/#organization\"},\"alternateName\":\"Pegasus\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/#organization\",\"name\":\"Pegasus Security\",\"alternateName\":\"Pegasus Security\",\"url\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/pegasussecurity.com.br\\\/wp-content\\\/uploads\\\/cropped-pegasus-white-logo.webp\",\"contentUrl\":\"https:\\\/\\\/pegasussecurity.com.br\\\/wp-content\\\/uploads\\\/cropped-pegasus-white-logo.webp\",\"width\":392,\"height\":328,\"caption\":\"Pegasus Security\"},\"image\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"X-Secure - Pegasus Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-secure\/","og_locale":"en_US","og_type":"article","og_title":"X-Secure - Pegasus Security","og_description":"Detect, Respond and Recover Pegasus&#8217; mission as an Intelligent Security Service Provider (iSSP) is to offer our customers complete solutions associated with the best and most specialized professionals, processes and technologies. Our solution is based on 3 pillars: X-VRM Vulnerability and Threat Management Vulnerability ScanningBenchmarking &amp; Third Party RisksPenetration TestingRed TeamThreat Hunting Management X-THREATS Threat ... Read more","og_url":"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-secure\/","og_site_name":"Pegasus Security","article_modified_time":"2025-02-19T15:37:32+00:00","og_image":[{"url":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0030.jpg","type":"","width":"","height":""}],"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-secure\/","url":"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-secure\/","name":"X-Secure - Pegasus Security","isPartOf":{"@id":"https:\/\/pegasussecurity.com.br\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-secure\/#primaryimage"},"image":{"@id":"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-secure\/#primaryimage"},"thumbnailUrl":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0030.jpg","datePublished":"2024-08-06T20:26:38+00:00","dateModified":"2025-02-19T15:37:32+00:00","breadcrumb":{"@id":"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-secure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pegasussecurity.com.br\/en\/solutions\/x-secure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-secure\/#primaryimage","url":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0030.jpg","contentUrl":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/icon-0030.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-secure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pegasussecurity.com.br\/en\/"},{"@type":"ListItem","position":2,"name":"Solutions","item":"https:\/\/pegasussecurity.com.br\/en\/solutions\/"},{"@type":"ListItem","position":3,"name":"X-Secure"}]},{"@type":"WebSite","@id":"https:\/\/pegasussecurity.com.br\/en\/#website","url":"https:\/\/pegasussecurity.com.br\/en\/","name":"Pegasus Security","description":"Cybersecurity for All","publisher":{"@id":"https:\/\/pegasussecurity.com.br\/en\/#organization"},"alternateName":"Pegasus","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pegasussecurity.com.br\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/pegasussecurity.com.br\/en\/#organization","name":"Pegasus Security","alternateName":"Pegasus Security","url":"https:\/\/pegasussecurity.com.br\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pegasussecurity.com.br\/en\/#\/schema\/logo\/image\/","url":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/cropped-pegasus-white-logo.webp","contentUrl":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/cropped-pegasus-white-logo.webp","width":392,"height":328,"caption":"Pegasus Security"},"image":{"@id":"https:\/\/pegasussecurity.com.br\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/pages\/5517","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/comments?post=5517"}],"version-history":[{"count":1,"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/pages\/5517\/revisions"}],"predecessor-version":[{"id":5518,"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/pages\/5517\/revisions\/5518"}],"up":[{"embeddable":true,"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/pages\/5362"}],"wp:attachment":[{"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/media?parent=5517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}