{"id":5520,"date":"2024-08-06T17:26:39","date_gmt":"2024-08-06T20:26:39","guid":{"rendered":"https:\/\/pegasussecurity.com.br\/solutions\/x-vrm\/"},"modified":"2025-02-19T13:14:06","modified_gmt":"2025-02-19T16:14:06","slug":"x-vrm","status":"publish","type":"page","link":"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-vrm\/","title":{"rendered":"X-VRM"},"content":{"rendered":"<div class=\"gb-container gb-container-7afdb014 alignfull\">\n<div class=\"gb-container gb-container-3bbb8919\">\n<div class=\"gb-container gb-container-825dd645\">\n\n<h2 class=\"gb-headline gb-headline-15d91eaf gb-headline-text\">X-VRM: Vulnerability Management<\/h2>\n\n\n\n<h3 class=\"gb-headline gb-headline-914b850d gb-headline-text\"><mark class=\"gb-highlight\">TestX-VRM: Application Security Testing<br>and automated testing to identify IT assets and applications and assess their vulnerabilities. Our Portal will help you prioritize your remediation <\/mark><\/h3>\n\n\n\n<figure class=\"gb-block-image gb-block-image-3427522f\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"327\" class=\"gb-image gb-image-3427522f\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test.webp\" alt=\"\" title=\"x-vrm-test\" srcset=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test.webp 800w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test-300x123.webp 300w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test-768x314.webp 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n<\/div>\n\n<div class=\"gb-container gb-container-f6d24632\">\n\n<h2 class=\"gb-headline gb-headline-f311d94c gb-headline-text\">Our Differentiators<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-b816845b gb-headline-text\"><mark class=\"gb-highlight\">VULNERABILITY MANAGEMENT LIFECYCLE<br><\/mark>Integrated with our vulnerability management lifecycle. Track your vulnerabilities from a single point of view <\/p>\n\n\n\n<p class=\"gb-headline gb-headline-3c53721f gb-headline-text\"><mark class=\"gb-highlight\">CENTER OF EXCELLENCE<br><\/mark>Highly skilled operations team at our Global Center of Excellence<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-c531105f gb-headline-text\"><mark class=\"gb-highlight\">VA SCANNER SOLUTIONS<br><\/mark>Integration of high-tech VA scanner solutions.<\/p>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-e2506f05 alignfull\">\n<div class=\"gb-container gb-container-4df911ec\">\n<div class=\"gb-container gb-container-0ca18755\">\n\n<h2 class=\"gb-headline gb-headline-15d91eaf gb-headline-text\">X-VRM: Penetration Testing and Red Team Assessment<\/h2>\n\n\n\n<h3 class=\"gb-headline gb-headline-dab47ac5 gb-headline-text\"><mark class=\"gb-highlight\">Gain the knowledge, experience, and efficiency to conduct comprehensive adversarial security testing with actionable results.<br><\/mark><\/h3>\n\n\n<div class=\"gb-container gb-container-f43274c5\">\n<div class=\"gb-container gb-container-36d4acc5\">\n\n<h3 class=\"gb-headline gb-headline-9e82af04 gb-headline-text\">Penetration Test<\/h3>\n\n\n\n<p class=\"gb-headline gb-headline-438eb80c gb-headline-text\">Reveal vulnerabilities that an attacker could exploit to gain access to your environment and systems.<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-a1130dd0 gb-headline-text\">Get equipped with personalized, actionable recommendations and guidance for remediation.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-76f42566\">\n\n<h3 class=\"gb-headline gb-headline-bdbc58d0 gb-headline-text\">Red Team Assessment<\/h3>\n\n\n\n<p class=\"gb-headline gb-headline-4ef2dc18 gb-headline-text\">Test your defensive and response capabilities against a simulated real-life opponent.<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-6c339033 gb-headline-text\">Understand your ability to resist social, physical, network, and application attacks.<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-1c79ce0f\">\n\n<h2 class=\"gb-headline gb-headline-c9fee983 gb-headline-text\">Our Differentiators<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-fb987472 gb-headline-text\"><mark class=\"gb-highlight\">VULNERABILITY MANAGEMENT LIFECYCLE<br><\/mark>Integrated with our vulnerability management lifecycle. Track your vulnerabilities from a single point. <\/p>\n\n\n\n<p class=\"gb-headline gb-headline-9394fac8 gb-headline-text\"><mark class=\"gb-highlight\">RESULTS AND EXECUTIVE SUMMARY<br><\/mark>Final reports containing detailed findings and executive summary<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-8bbe138b gb-headline-text\"><mark class=\"gb-highlight\">SECURITY EXPERTS<br><\/mark>Delivered by a highly qualified team of security experts<\/p>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-643a03f1 alignfull\">\n<div class=\"gb-container gb-container-c0c4e0e3\">\n<div class=\"gb-container gb-container-4ea21334\">\n\n<h2 class=\"gb-headline gb-headline-06d1c4ff gb-headline-text\">Our Differentiators<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-507002bb gb-headline-text\"><mark class=\"gb-highlight\">AST<br><\/mark>Guidance and recommendations from our AST experts to improve your security posture<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-715958a5 gb-headline-text\"><mark class=\"gb-highlight\">WEB SERVICES AND API FRAMEWORKS<br><\/mark>Many support web services and API frameworks<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-1f057784 gb-headline-text\"><mark class=\"gb-highlight\">SECURITY EXPERTS<br><\/mark>End-to-end assurance as a best practice in AST using multiple technologies at different points in the SDLC<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-20441259\">\n\n<h2 class=\"gb-headline gb-headline-2a02057d gb-headline-text\">X-VRM: Application Security Testing<br><\/h2>\n\n\n\n<h3 class=\"gb-headline gb-headline-de78326a gb-headline-text\"><mark class=\"gb-highlight\">Protect your web applications, mobile applications and APIs by improving your security posture by identifying vulnerabilities during the systems development cycle<\/mark><\/h3>\n\n\n<div class=\"gb-container gb-container-d6d4a643\">\n\n<figure class=\"gb-block-image gb-block-image-c7857b28\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"804\" class=\"gb-image gb-image-c7857b28\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test-02.webp\" alt=\"\" title=\"x-vrm-test-02\" srcset=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test-02.webp 800w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test-02-150x150.webp 150w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test-02-768x772.webp 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-c3bd4674 alignfull\">\n<div class=\"gb-container gb-container-85c9d4c4\">\n<div class=\"gb-container gb-container-1f1ec4fd\">\n<div class=\"gb-container gb-container-7c0a7d83\">\n<div class=\"gb-container gb-container-262ab261\">\n\n<h4 class=\"gb-headline gb-headline-39cbf78d gb-headline-text\">Development<\/h4>\n\n<\/div>\n\n<div class=\"gb-container gb-container-ba981b5b\">\n<div class=\"gb-container gb-container-52ddce72\">\n\n<p class=\"gb-headline gb-headline-064d639d gb-headline-text\"><mark class=\"gb-highlight\">Static Code Analysis<br>SAST, SCA<\/mark><\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-9461ed8a\">\n\n<p class=\"gb-headline gb-headline-851836b7 gb-headline-text\">Real-time security feedback as the application is being implemented.<br><\/p>\n\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-060dd47f\">\n<div class=\"gb-container gb-container-98b44d6e\">\n\n<h4 class=\"gb-headline gb-headline-15cf7ee1 gb-headline-text\">Pre-production<\/h4>\n\n<\/div>\n\n<div class=\"gb-container gb-container-064afd8c\">\n<div class=\"gb-container gb-container-82fa4df8\">\n\n<p class=\"gb-headline gb-headline-8c2c598b gb-headline-text\"><mark class=\"gb-highlight\">Dynamic and interactive code analysis<br>DAST, MAST, IAST<\/mark><br><\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-19962cc6\">\n\n<p class=\"gb-headline gb-headline-d3cd25fd gb-headline-text\">Testing the functional requirements of your applications, finding and fixing vulnerabilities in early stages of development before they become security risks.<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-edca9b99\">\n<div class=\"gb-container gb-container-46714a63\">\n\n<h4 class=\"gb-headline gb-headline-3f0436cd gb-headline-text\">Production<\/h4>\n\n<\/div>\n\n<div class=\"gb-container gb-container-930916da\">\n<div class=\"gb-container gb-container-5321ead6\">\n\n<p class=\"gb-headline gb-headline-33a3fad3 gb-headline-text\"><mark class=\"gb-highlight\">Runtime Application<br>Self-Protection<br>SAST, SCA<\/mark><\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-9b0a38dc\">\n\n<p class=\"gb-headline gb-headline-01753df6 gb-headline-text\">Detect and block attacks on your applications in real time without human intervention<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-ee6fa952 alignfull\">\n<div class=\"gb-container gb-container-410459d9\">\n<div class=\"gb-container gb-container-3d323105\">\n\n<h2 class=\"gb-headline gb-headline-a47fc783 gb-headline-text\">Our Differentiators<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-cffdc53a gb-headline-text\">The service leverages <mark class=\"gb-highlight\">our CTI<\/mark> to explore new engagement<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-ccc0a4bb gb-headline-text\">Center of Excellence to Leverage Broad <mark class=\"gb-highlight\">Threat Visibility<\/mark><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-d880d57a gb-headline-text\"><mark class=\"gb-highlight\">Weekly scan<\/mark> for latest unconfirmed IoAs, TTPs and IoCs<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-f985ad23 gb-headline-text\"><mark class=\"gb-highlight\">Integrated<\/mark> with X-Secure portfolio to connect with DFIR and threat monitoring<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-62271ebd\">\n\n<h2 class=\"gb-headline gb-headline-9fadeabb gb-headline-text\">X-VRM: Managed Threat Hunting<\/h2>\n\n\n\n<h3 class=\"gb-headline gb-headline-3bff1f09 gb-headline-text\"><mark class=\"gb-highlight\">Expand your detection capabilities with proactive threat hunting to explore ongoing signs of compromise in your network<\/mark><\/h3>\n\n\n<div class=\"gb-container gb-container-3a4f6e40\">\n<div class=\"gb-container gb-container-908ae425\">\n\n<p class=\"gb-headline gb-headline-e882299a gb-headline-text\">Leverage our CTI malware and hacking experts to detect ongoing breaches unnoticed by your security controls.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background is-style-default\" style=\"background-color:#b7b7b7;color:#b7b7b7\"\/>\n\n\n\n<p class=\"gb-headline gb-headline-ed608ce1 gb-headline-text\">Explore the latest TTPs, helping you reduce breach dwell time, minimize impact, and provide feedback to your detection engineering<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-e26415cd\">\n\n<figure class=\"gb-block-image gb-block-image-f60946db\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"477\" class=\"gb-image gb-image-f60946db\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test-03.webp\" alt=\"\" title=\"x-vrm-test-03\" srcset=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test-03.webp 800w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test-03-300x179.webp 300w, https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test-03-768x458.webp 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-9ebcdbb8 alignfull\">\n<div class=\"gb-container gb-container-3d628bc1\">\n<div class=\"gb-container gb-container-723179f1\">\n\n<figure class=\"gb-block-image gb-block-image-760d8a85\"><a href=\"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-vrm\/\"><img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"125\" class=\"gb-image gb-image-760d8a85 hide-on-mobile\" src=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/2024\/05\/icone02.webp\" alt=\"\" title=\"icon02\"><\/a><\/figure>\n\n\n\n<h3 class=\"gb-headline gb-headline-f20ced6e\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M352 0c-12.9 0-24.6 7.8-29.6 19.8s-2.2 25.7 6.9 34.9L370.7 96 201.4 265.4c-12.5 12.5-12.5 32.8 0 45.3s32.8 12.5 45.3 0L416 141.3l41.4 41.4c9.2 9.2 22.9 11.9 34.9 6.9s19.8-16.6 19.8-29.6l0-128c0-17.7-14.3-32-32-32L352 0zM80 32C35.8 32 0 67.8 0 112L0 432c0 44.2 35.8 80 80 80l320 0c44.2 0 80-35.8 80-80l0-112c0-17.7-14.3-32-32-32s-32 14.3-32 32l0 112c0 8.8-7.2 16-16 16L80 448c-8.8 0-16-7.2-16-16l0-320c0-8.8 7.2-16 16-16l112 0c17.7 0 32-14.3 32-32s-14.3-32-32-32L80 32z\"><\/path><\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/pegasussecurity.com.br\/solutions\/x-vrm\/\">X-VRM<\/a><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list produto\">\n<li style=\"font-size:15px\">Identifying and managing vulnerabilities to prevent cyber attacks.<\/li>\n\n\n\n<li style=\"font-size:15px\">Penetration Tests &amp; Offensive Security<\/li>\n\n\n\n<li style=\"font-size:15px\">Managed Threat Hunting<\/li>\n<\/ul>\n\n<\/div>\n\n<div class=\"gb-container gb-container-9414705c\">\n\n<h2 class=\"gb-headline gb-headline-c3ea7d7b gb-headline-text\">Pegasus Security Offer<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-432b8a92 gb-headline-text\"><mark class=\"gb-highlight\">Delivery models to<\/mark> adapt our SECOPS capacity to your needs.<\/p>\n\n\n<div class=\"gb-container gb-container-9def3147\">\n<div class=\"gb-container gb-container-7e50bb9d\">\n\n<p class=\"gb-headline gb-headline-efc49d6c gb-headline-text\">Penetration Test<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-f65b0a2a\">\n\n<p class=\"gb-headline gb-headline-6299817c gb-headline-text\">Vulnerability Management<br><\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-99290237\">\n\n<p class=\"gb-headline gb-headline-da1abad4 gb-headline-text\">Application Security<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-f0ec9fd1\">\n\n<p class=\"gb-headline gb-headline-6b4566ee gb-headline-text\">Threat Hunting<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-72b5ddbc\">\n\n<a class=\"gb-button gb-button-cfa11b91\" href=\"https:\/\/pegasussecurity.com.br\/contact\/\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" role=\"img\" height=\"1em\" width=\"1em\" viewbox=\"0 0 496 512\"><path fill=\"currentColor\" d=\"M248 8C111 8 0 119 0 256s111 248 248 248 248-111 248-248S385 8 248 8zm0 96c48.6 0 88 39.4 88 88s-39.4 88-88 88-88-39.4-88-88 39.4-88 88-88zm0 344c-58.7 0-111.3-26.6-146.5-68.2 18.8-35.4 55.6-59.8 98.5-59.8 2.4 0 4.8.4 7.1 1.1 13 4.2 26.6 6.9 40.9 6.9 14.3 0 28-2.7 40.9-6.9 2.3-.7 4.7-1.1 7.1-1.1 42.9 0 79.7 24.4 98.5 59.8C359.3 421.4 306.7 448 248 448z\"><\/path><\/svg><\/span><span class=\"gb-button-text\">Talk to a consultant and schedule a demonstration.<\/span><\/a>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>X-VRM: Vulnerability Management TestX-VRM: Application Security Testingand automated testing to identify IT assets and applications and assess their vulnerabilities. Our Portal will help you prioritize your remediation Our Differentiators VULNERABILITY MANAGEMENT LIFECYCLEIntegrated with our vulnerability management lifecycle. Track your vulnerabilities from a single point of view CENTER OF EXCELLENCEHighly skilled operations team at our Global &#8230; <a title=\"X-VRM\" class=\"read-more\" href=\"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-vrm\/\" aria-label=\"Read more about X-VRM\">Read more<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":5362,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-5520","page","type-page","status-publish"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>X-VRM - Pegasus Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-vrm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"X-VRM - Pegasus Security\" \/>\n<meta property=\"og:description\" content=\"X-VRM: Vulnerability Management TestX-VRM: Application Security Testingand automated testing to identify IT assets and applications and assess their vulnerabilities. Our Portal will help you prioritize your remediation Our Differentiators VULNERABILITY MANAGEMENT LIFECYCLEIntegrated with our vulnerability management lifecycle. Track your vulnerabilities from a single point of view CENTER OF EXCELLENCEHighly skilled operations team at our Global ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-vrm\/\" \/>\n<meta property=\"og:site_name\" content=\"Pegasus Security\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-19T16:14:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test.webp\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/solutions\\\/x-vrm\\\/\",\"url\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/solutions\\\/x-vrm\\\/\",\"name\":\"X-VRM - Pegasus Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/solutions\\\/x-vrm\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/solutions\\\/x-vrm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pegasussecurity.com.br\\\/wp-content\\\/uploads\\\/x-vrm-test.webp\",\"datePublished\":\"2024-08-06T20:26:39+00:00\",\"dateModified\":\"2025-02-19T16:14:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/solutions\\\/x-vrm\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/solutions\\\/x-vrm\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/solutions\\\/x-vrm\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pegasussecurity.com.br\\\/wp-content\\\/uploads\\\/x-vrm-test.webp\",\"contentUrl\":\"https:\\\/\\\/pegasussecurity.com.br\\\/wp-content\\\/uploads\\\/x-vrm-test.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/solutions\\\/x-vrm\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions\",\"item\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/solutions\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"X-VRM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/\",\"name\":\"Pegasus Security\",\"description\":\"Cybersecurity for All\",\"publisher\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/#organization\"},\"alternateName\":\"Pegasus\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/#organization\",\"name\":\"Pegasus Security\",\"alternateName\":\"Pegasus Security\",\"url\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/pegasussecurity.com.br\\\/wp-content\\\/uploads\\\/cropped-pegasus-white-logo.webp\",\"contentUrl\":\"https:\\\/\\\/pegasussecurity.com.br\\\/wp-content\\\/uploads\\\/cropped-pegasus-white-logo.webp\",\"width\":392,\"height\":328,\"caption\":\"Pegasus Security\"},\"image\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"X-VRM - Pegasus Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-vrm\/","og_locale":"en_US","og_type":"article","og_title":"X-VRM - Pegasus Security","og_description":"X-VRM: Vulnerability Management TestX-VRM: Application Security Testingand automated testing to identify IT assets and applications and assess their vulnerabilities. Our Portal will help you prioritize your remediation Our Differentiators VULNERABILITY MANAGEMENT LIFECYCLEIntegrated with our vulnerability management lifecycle. Track your vulnerabilities from a single point of view CENTER OF EXCELLENCEHighly skilled operations team at our Global ... Read more","og_url":"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-vrm\/","og_site_name":"Pegasus Security","article_modified_time":"2025-02-19T16:14:06+00:00","og_image":[{"url":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test.webp","type":"","width":"","height":""}],"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-vrm\/","url":"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-vrm\/","name":"X-VRM - Pegasus Security","isPartOf":{"@id":"https:\/\/pegasussecurity.com.br\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-vrm\/#primaryimage"},"image":{"@id":"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-vrm\/#primaryimage"},"thumbnailUrl":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test.webp","datePublished":"2024-08-06T20:26:39+00:00","dateModified":"2025-02-19T16:14:06+00:00","breadcrumb":{"@id":"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-vrm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pegasussecurity.com.br\/en\/solutions\/x-vrm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-vrm\/#primaryimage","url":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test.webp","contentUrl":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/x-vrm-test.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/pegasussecurity.com.br\/en\/solutions\/x-vrm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pegasussecurity.com.br\/en\/"},{"@type":"ListItem","position":2,"name":"Solutions","item":"https:\/\/pegasussecurity.com.br\/en\/solutions\/"},{"@type":"ListItem","position":3,"name":"X-VRM"}]},{"@type":"WebSite","@id":"https:\/\/pegasussecurity.com.br\/en\/#website","url":"https:\/\/pegasussecurity.com.br\/en\/","name":"Pegasus Security","description":"Cybersecurity for All","publisher":{"@id":"https:\/\/pegasussecurity.com.br\/en\/#organization"},"alternateName":"Pegasus","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pegasussecurity.com.br\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/pegasussecurity.com.br\/en\/#organization","name":"Pegasus Security","alternateName":"Pegasus Security","url":"https:\/\/pegasussecurity.com.br\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pegasussecurity.com.br\/en\/#\/schema\/logo\/image\/","url":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/cropped-pegasus-white-logo.webp","contentUrl":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/cropped-pegasus-white-logo.webp","width":392,"height":328,"caption":"Pegasus Security"},"image":{"@id":"https:\/\/pegasussecurity.com.br\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/pages\/5520","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/comments?post=5520"}],"version-history":[{"count":1,"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/pages\/5520\/revisions"}],"predecessor-version":[{"id":5521,"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/pages\/5520\/revisions\/5521"}],"up":[{"embeddable":true,"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/pages\/5362"}],"wp:attachment":[{"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/media?parent=5520"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}