{"id":18530,"date":"2022-01-14T11:20:01","date_gmt":"2022-01-14T11:20:01","guid":{"rendered":"https:\/\/fractal-security.com\/?page_id=18530"},"modified":"2024-10-10T23:33:26","modified_gmt":"2024-10-11T02:33:26","slug":"perguntas-frequentes","status":"publish","type":"page","link":"https:\/\/fractal-security.com\/pt\/perguntas-frequentes\/","title":{"rendered":"FAQ"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"18530\" class=\"elementor elementor-18530\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4fbb30ed elementor-section-boxed elementor-section-height-default elementor-section-height-default sc_fly_static\" data-id=\"4fbb30ed\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2349d10a sc_content_align_center sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"2349d10a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8bb0085 sc_fly_static elementor-widget elementor-widget-heading\" data-id=\"8bb0085\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">FAQS<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8254fcc bordered elementor-widget__width-initial sc_fly_static elementor-widget elementor-widget-accordion\" data-id=\"8254fcc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<h3 id=\"elementor-tab-title-1361\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1361\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Como funciona a consultoria de seguran\u00e7a e tecnologia?<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\t<div id=\"elementor-tab-content-1361\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1361\"><p>\u00c9 uma consultoria previa que estuda os aspectos envolvidos na cadeia de custodia, como participantes, trajeto e possiveis vulnerabilidades. Ela acontece antes da implementacao do sistema e \u00e9 necessaria para parametrizar o geofence.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<h3 id=\"elementor-tab-title-1362\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1362\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">O que \u00e9 gerenciamento de cadeia de cust\u00f3dia?<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\t<div id=\"elementor-tab-content-1362\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1362\"><p>Gest\u00e3o da Cadeia de Cust\u00f3dia refere-se \u00e0 supervis\u00e3o, controle e documenta\u00e7\u00e3o abrangentes da transfer\u00eancia e manuseio de ativos ou mercadorias \u00e0 medida que avan\u00e7am por v\u00e1rias etapas na cadeia de suprimentos. Esse processo de gest\u00e3o garante a seguran\u00e7a, integridade e rastreabilidade dos itens desde a origem at\u00e9 o destino, minimizando riscos de adultera\u00e7\u00e3o, perda ou m\u00e1 gest\u00e3o. Engloba pr\u00e1ticas como rastreamento em tempo real, controle de acesso e conformidade com requisitos regulat\u00f3rios, promovendo transpar\u00eancia e responsabilidade em todos os pontos de contato da cadeia log\u00edstica.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<h3 id=\"elementor-tab-title-1363\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1363\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Qual a diferen\u00e7a entre lacres ativos e passivos? <br>Entenda<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\t<div id=\"elementor-tab-content-1363\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1363\"><p>Lacre Eletr\u00f4nico Ativo e Lacre Eletr\u00f4nico Passivo diferem principalmente na forma como operam e nas suas fontes de energia:<\/p><ol><li style=\"font-weight: 400;\" aria-level=\"1\"><h5><b>Lacre Eletr\u00f4nico Ativo:<\/b><\/h5><ul><li style=\"font-weight: 400;\" aria-level=\"2\"><b>Fonte de Energia<\/b><span style=\"font-weight: 400;\">: Cont\u00e9m uma fonte de energia interna, como uma bateria, permitindo seu funcionamento independente.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><b>Funcionalidade<\/b><span style=\"font-weight: 400;\">: Capaz de monitoramento cont\u00ednuo em tempo real, transmiss\u00e3o de dados e, frequentemente, inclui recursos como rastreamento por GPS.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><b>Alcance e Conectividade<\/b><span style=\"font-weight: 400;\">: Geralmente possui um alcance de leitura maior e pode se conectar via redes celulares ou sat\u00e9lites para transmiss\u00e3o de dados em tempo real.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><b>Casos de Uso<\/b><span style=\"font-weight: 400;\">: Ideal para cargas de alto valor ou sens\u00edveis que exigem monitoramento e rastreamento constantes.<\/span><\/li><\/ul><\/li><\/ol><ol><li style=\"font-weight: 400;\" aria-level=\"1\"><h5><b>Lacre Eletr\u00f4nico Passivo:<\/b><\/h5><ul><li style=\"font-weight: 400;\" aria-level=\"2\"><b>Fonte de Energia<\/b><span style=\"font-weight: 400;\">: N\u00e3o possui uma fonte de energia interna; \u00e9 ativado por um leitor externo de RFID ou NFC.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><b>Funcionalidade<\/b><span style=\"font-weight: 400;\">: Usado principalmente para monitoramento baseado em eventos (por exemplo, registrando quando o lacre \u00e9 rompido). N\u00e3o transmite dados continuamente.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><b>Alcance e Conectividade<\/b><span style=\"font-weight: 400;\">: Alcance de leitura mais curto, pois depende de leitores RFID ou NFC pr\u00f3ximos para recuperar dados.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><b>Casos de Uso<\/b><span style=\"font-weight: 400;\">: Adequado para aplica\u00e7\u00f5es em que o monitoramento ocasional ou por pontos de verifica\u00e7\u00e3o \u00e9 suficiente, proporcionando uma solu\u00e7\u00e3o econ\u00f4mica e sem depend\u00eancia de bateria.<\/span><\/li><\/ul><\/li><\/ol><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-mouse-helper=\"hover\" data-mouse-helper-hide-helper=\"0\" data-mouse-helper-centered=\"1\" data-mouse-helper-magnet=\"0\" data-mouse-helper-color=\"\" data-mouse-helper-bg-color=\"#FF5B4A\" data-mouse-helper-bd-color=\"\" data-mouse-helper-bd-width=\"-1\" data-mouse-helper-mode=\"multiply\" data-mouse-helper-axis=\"xy\" data-mouse-helper-delay=\"0\" data-mouse-helper-text=\"\" data-mouse-helper-text-size=\"\" data-mouse-helper-text-round=\"0\" data-mouse-helper-icon=\"\" data-mouse-helper-icon-size=\"\" data-mouse-helper-icon-color=\"\" data-mouse-helper-image=\"\" data-mouse-helper-layout=\"\" data-mouse-helper-class=\"\" data-mouse-helper-callback=\"\" data-mouse-helper-hide-cursor=\"1\" class=\"elementor-section elementor-top-section elementor-element elementor-element-665c822 scheme_dark elementor-section-boxed elementor-section-height-default elementor-section-height-default sc_fly_static\" data-id=\"665c822\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3547359 sc_content_align_inherit sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"3547359\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>FAQS How does security and technology consulting work? It is a preliminary consultation that examines aspects of the custody chain, such as participants, route, and potential vulnerabilities. It takes place&hellip;<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-18530","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/fractal-security.com\/pt\/wp-json\/wp\/v2\/pages\/18530","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fractal-security.com\/pt\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/fractal-security.com\/pt\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/fractal-security.com\/pt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fractal-security.com\/pt\/wp-json\/wp\/v2\/comments?post=18530"}],"version-history":[{"count":22,"href":"https:\/\/fractal-security.com\/pt\/wp-json\/wp\/v2\/pages\/18530\/revisions"}],"predecessor-version":[{"id":22580,"href":"https:\/\/fractal-security.com\/pt\/wp-json\/wp\/v2\/pages\/18530\/revisions\/22580"}],"wp:attachment":[{"href":"https:\/\/fractal-security.com\/pt\/wp-json\/wp\/v2\/media?parent=18530"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}