{"id":26015,"date":"2023-09-14T07:02:01","date_gmt":"2023-09-14T07:02:01","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?page_id=26015"},"modified":"2026-04-17T18:07:40","modified_gmt":"2026-04-17T18:07:40","slug":"continuous-threat-exposure-management","status":"publish","type":"page","link":"https:\/\/nsfocusglobal.com\/pt-br\/continuous-threat-exposure-management\/","title":{"rendered":"Continuous Threat Exposure Management"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"26015\" class=\"elementor elementor-26015\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section data-dce-background-image-url=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/11\/qtq80-B7WuPf.jpeg\" class=\"has_ae_slider elementor-section elementor-top-section elementor-element elementor-element-61d0e83a elementor-section-height-min-height elementor-section-full_width elementor-section-height-default elementor-section-items-middle ae-bg-gallery-type-default\" data-id=\"61d0e83a\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_ae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-786e882e ae-bg-gallery-type-default\" data-id=\"786e882e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-225cb5fb elementor-widget elementor-widget-heading\" data-id=\"225cb5fb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Continuous Threat Exposure Management<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4cdeffbf elementor-widget elementor-widget-heading\" data-id=\"4cdeffbf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Stay Ahead of Evolving Cyber Threats by Continuously Monitoring and Managing Your Exposure to Potential Attacks<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5778d319 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"5778d319\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/wp-content\/uploads\/2023\/12\/CTEM-Datasheet-20231222.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-pdf\" viewBox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M181.9 256.1c-5-16-4.9-46.9-2-46.9 8.4 0 7.6 36.9 2 46.9zm-1.7 47.2c-7.7 20.2-17.3 43.3-28.4 62.7 18.3-7 39-17.2 62.9-21.9-12.7-9.6-24.9-23.4-34.5-40.8zM86.1 428.1c0 .8 13.2-5.4 34.9-40.2-6.7 6.3-29.1 24.5-34.9 40.2zM248 160h136v328c0 13.3-10.7 24-24 24H24c-13.3 0-24-10.7-24-24V24C0 10.7 10.7 0 24 0h200v136c0 13.2 10.8 24 24 24zm-8 171.8c-20-12.2-33.3-29-42.7-53.8 4.5-18.5 11.6-46.6 6.2-64.2-4.7-29.4-42.4-26.5-47.8-6.8-5 18.3-.4 44.1 8.1 77-11.6 27.6-28.7 64.6-40.8 85.8-.1 0-.1.1-.2.1-27.1 13.9-73.6 44.5-54.5 68 5.6 6.9 16 10 21.5 10 17.9 0 35.7-18 61.1-61.8 25.8-8.5 54.1-19.1 79-23.2 21.7 11.8 47.1 19.5 64 19.5 29.2 0 31.2-32 19.7-43.4-13.9-13.6-54.3-9.7-73.6-7.2zM377 105L279 7c-4.5-4.5-10.6-7-17-7h-6v128h128v-6.1c0-6.3-2.5-12.4-7-16.9zm-74.1 255.3c4.1-2.7-2.5-11.9-42.8-9 37.1 15.8 42.8 9 42.8 9z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">READ DATASHEET<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_ae_slider elementor-section elementor-top-section elementor-element elementor-element-4b2fe2f5 elementor-section-boxed elementor-section-height-default elementor-section-height-default ae-bg-gallery-type-default\" data-id=\"4b2fe2f5\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_ae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-688316fc ae-bg-gallery-type-default\" data-id=\"688316fc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-66c0d490 elementor-widget elementor-widget-spacer\" data-id=\"66c0d490\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_ae_slider elementor-section elementor-top-section elementor-element elementor-element-57bd98ca elementor-section-boxed elementor-section-height-default elementor-section-height-default ae-bg-gallery-type-default\" data-id=\"57bd98ca\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_ae_slider elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-51222f6f ae-bg-gallery-type-default\" data-id=\"51222f6f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"has_ae_slider elementor-section elementor-inner-section elementor-element elementor-element-6df447bc elementor-section-boxed elementor-section-height-default elementor-section-height-default ae-bg-gallery-type-default\" data-id=\"6df447bc\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_ae_slider elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-2943dc8e ae-bg-gallery-type-default\" data-id=\"2943dc8e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-715853d5 elementor-widget elementor-widget-heading\" data-id=\"715853d5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">CTEM<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-39e021f9 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"39e021f9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Continuous Threat Exposure Management<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-44d0a953 elementor-widget elementor-widget-text-editor\" data-id=\"44d0a953\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>CTEM is a set of processes and capabilities for identifying, assessing, and mitigating risks within an organization\u2019s digital environment. By adopting this strategy, organizations of all sizes can stay ahead of evolving cyber threats by continuously monitoring and managing their exposure to potential attacks, thus enhancing their overall security posture.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"has_ae_slider elementor-column elementor-col-66 elementor-inner-column elementor-element elementor-element-5d6f8d62 ae-bg-gallery-type-default\" data-id=\"5d6f8d62\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3bfb1a5e elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"3bfb1a5e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h5>Proactively and predictively defend against threats<\/h5><h5>Inventory all digital assets and critical assets<\/h5><h5>Prioritize risks<\/h5><h5>Improve resilience and reinforce overall security<\/h5><h5>Get insights with evidence for making the right security decisions<\/h5>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"has_ae_slider elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-735af798 ae-bg-gallery-type-default\" data-id=\"735af798\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-701d963d dce_masking-none elementor-widget elementor-widget-image\" data-id=\"701d963d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\/wp-content\/uploads\/2023\/12\/CTEM-Datasheet-20231222.pdf\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/elementor\/thumbs\/ctemdatasheetcover-e1694768230642-qskwme1z2j120poidlw13slxm65bvnq4w9ky9ktkqc.png\" title=\"Cybersecurity management document with circular diagram.\" alt=\"Cybersecurity management document with circular diagram.\" class=\"elementor-animation-grow\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_ae_slider elementor-section elementor-top-section elementor-element elementor-element-535585f0 elementor-section-boxed elementor-section-height-default elementor-section-height-default ae-bg-gallery-type-default\" data-id=\"535585f0\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_ae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4dff1abe ae-bg-gallery-type-default\" data-id=\"4dff1abe\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4209f2ab elementor-widget elementor-widget-spacer\" data-id=\"4209f2ab\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_ae_slider elementor-section elementor-top-section elementor-element elementor-element-6820201 elementor-section-boxed elementor-section-height-default elementor-section-height-default ae-bg-gallery-type-default\" data-id=\"6820201\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_ae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-81d3ed8 ae-bg-gallery-type-default\" data-id=\"81d3ed8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fc69ac6 elementor-widget elementor-widget-heading\" data-id=\"fc69ac6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Tools and Technologies Used in CTEM<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-de60d02 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"de60d02\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>CTEM requires a consolidated platform that integrates the necessary tools and technologies to streamline the entire process.<\/p><p>The following tools and technologies can be used to support the implementation and improvement of a CTEM program in the five stages:<\/p><ul><li>Scoping<\/li><li>Discovery<\/li><li>Prioritization<\/li><li>Validation<\/li><li>Mobilization<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"has_ae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-c18b533 ae-bg-gallery-type-default\" data-id=\"c18b533\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fe3bd84 dce_masking-none elementor-widget elementor-widget-image\" data-id=\"fe3bd84\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1072\" height=\"985\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/ctemsteps.png\" class=\"elementor-animation-grow attachment-full size-full wp-image-26196\" alt=\"Continuous Threat Exposure Management process diagram.\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/ctemsteps.png 1072w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/ctemsteps-300x276.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/ctemsteps-1024x941.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/ctemsteps-768x706.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/ctemsteps-600x551.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/ctemsteps-200x184.png 200w\" sizes=\"(max-width: 1072px) 100vw, 1072px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_ae_slider elementor-section elementor-top-section elementor-element elementor-element-ae3202d elementor-section-boxed elementor-section-height-default elementor-section-height-default ae-bg-gallery-type-default\" data-id=\"ae3202d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_ae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-018dcf2 ae-bg-gallery-type-default\" data-id=\"018dcf2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6bbf14f elementor-widget elementor-widget-heading\" data-id=\"6bbf14f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">DIAGNOSE<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-abc58f5 elementor-tabs-alignment-stretch elementor-tabs-view-horizontal elementor-widget elementor-widget-tabs\" data-id=\"abc58f5\" data-element_type=\"widget\" data-widget_type=\"tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-tabs\">\n\t\t\t<div class=\"elementor-tabs-wrapper\" role=\"tablist\" >\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1801\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"elementor-tab-content-1801\" aria-expanded=\"false\">NSFOCUS Offering<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1802\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1802\" aria-expanded=\"false\">CTEM Value<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<div class=\"elementor-tabs-content-wrapper\" role=\"tablist\" aria-orientation=\"vertical\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"elementor-tab-content-1801\" aria-expanded=\"false\">NSFOCUS Offering<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1801\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1801\" tabindex=\"0\" hidden=\"false\"><ul><li>CAASM &#8211; Cyber Asset Attack Surface Management<\/li><li><span style=\"text-decoration: underline;\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/04\/NSFOCUS-EASM-Datasheet0428.pdf\">EASM &#8211; External Attack Surface Management<\/a><\/span><\/li><li>EM &#8211; Exposure Management<\/li><li><span style=\"text-decoration: underline;\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/RSAS-Datasheet-230113.pdf\">RSAS &#8211; Remote Security Assessment System<\/a><\/span><\/li><li><span style=\"text-decoration: underline;\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/09\/NSFOCUS-DRPS-Datasheet_240912.pdf\">DRPS &#8211; Digital Risk Protection Service<\/a><\/span><\/li><li><span style=\"text-decoration: underline;\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/WebSafe-datasheet-20230330.pdf\">WebSafe<\/a><\/span><\/li><li>Source Code Review<\/li><li>VA &#8211; Vulnerability Assessment<\/li><li>Configuration Verification<\/li><li>VPT &#8211; Vulnerability Prioritization Technology<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1802\" aria-expanded=\"false\">CTEM Value<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1802\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1802\" tabindex=\"0\" hidden=\"hidden\"><ul><li>Identify your most valuable assets and data. By identifying the critical assets and data, organizations can prioritize their resources and focus their efforts on the areas that are most at risk.<\/li><li>Gather data from all of your systems and networks. By collecting data from a variety of sources, organizations can get a more complete view of their security posture and identify threats that may not be detected by individual security products.<\/li><li>Identify the threats that pose the greatest risk to your organization. By prioritizing threats based on their likelihood and impact, organizations can make the most of their resources and focus their efforts on the threats that pose the greatest risk<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"has_ae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3dfc330 ae-bg-gallery-type-default\" data-id=\"3dfc330\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-690da70 elementor-widget elementor-widget-heading\" data-id=\"690da70\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">ACTION<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ff5e64 elementor-tabs-alignment-stretch elementor-tabs-view-horizontal elementor-widget elementor-widget-tabs\" data-id=\"2ff5e64\" data-element_type=\"widget\" data-widget_type=\"tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-tabs\">\n\t\t\t<div class=\"elementor-tabs-wrapper\" role=\"tablist\" >\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-5021\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"elementor-tab-content-5021\" aria-expanded=\"false\">NSFOCUS Offering<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-5022\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-5022\" aria-expanded=\"false\">CTEM Value<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<div class=\"elementor-tabs-content-wrapper\" role=\"tablist\" aria-orientation=\"vertical\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"elementor-tab-content-5021\" aria-expanded=\"false\">NSFOCUS Offering<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-5021\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-5021\" tabindex=\"0\" hidden=\"false\"><ul><li>BAS &#8211; Breach and Attack Simulation<\/li><li>EM &#8211; Exposure Management<\/li><li><span style=\"text-decoration: underline;\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/04\/NSFOCUS-PTaaS-Datasheet-230428.pdf\">PTaaS &#8211; Penetration Testing as a Service<\/a><\/span><\/li><li>Red Teaming<\/li><li>IR &#8211; Incident Response<\/li><li>Consulting Service<\/li><li>Security Awareness Training<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-5022\" aria-expanded=\"false\">CTEM Value<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-5022\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-5022\" tabindex=\"0\" hidden=\"hidden\"><ul><li>Confirm that the threats you&#8217;ve identified are real and pose a risk to your organization. By validating threats, organizations can avoid wasting time and resources on threats that are not real or that do not pose a risk.<\/li><li>Take action to mitigate the threats you&#8217;ve identified. By taking action to mitigate validated threats, organizations can reduce their risk of being attacked.<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_ae_slider elementor-section elementor-top-section elementor-element elementor-element-4b98c9db elementor-section-boxed elementor-section-height-default elementor-section-height-default ae-bg-gallery-type-default\" data-id=\"4b98c9db\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_ae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3bc3fe2b ae-bg-gallery-type-default\" data-id=\"3bc3fe2b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-532fb7d0 elementor-widget elementor-widget-spacer\" data-id=\"532fb7d0\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_ae_slider elementor-section elementor-top-section elementor-element elementor-element-53ae8a53 elementor-section-full_width elementor-section-height-default elementor-section-height-default ae-bg-gallery-type-default\" data-id=\"53ae8a53\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_ae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-29ccbf0 ae-bg-gallery-type-default\" data-id=\"29ccbf0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-32236235 elementor-cta--skin-cover e-transform e-transform elementor-animated-content elementor-widget elementor-widget-call-to-action\" data-id=\"32236235\" data-element_type=\"widget\" data-settings=\"{&quot;_transform_translateX_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_skewX_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_skewX_effect_tablet&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_skewX_effect_mobile&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_skewY_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_skewY_effect_tablet&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_skewY_effect_mobile&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: url(https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/10\/qtq80-kG6G1A-1024x683.jpeg);\" role=\"img\" aria-label=\"Hands typing on a keyboard with digital code overlay.\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item elementor-animated-item--grow\">\n\t\t\t\t\t\tSECURITY MADE SMART AND SIMPLE\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item elementor-animated-item--grow\">\n\t\t\t\t\t\tSEE HOW OUR SOLUTIONS PROTECT YOUR CUSTOMERS AND YOUR INFRASTRUCTURE\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item elementor-animated-item--grow\">\n\t\t\t\t\t<a class=\"elementor-cta__button elementor-button elementor-size-\" href=\"\/contact-us\/\">\n\t\t\t\t\t\tCONTACT US\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Continuous Threat Exposure Management Stay Ahead of Evolving Cyber Threats by Continuously Monitoring and Managing Your Exposure to Potential Attacks READ DATASHEET CTEM Continuous Threat Exposure Management CTEM is a set of processes and capabilities for identifying, assessing, and mitigating risks within an organization&acirc;&euro;&trade;s digital environment. By adopting this strategy, organizations of all sizes can [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":35687,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"class_list":["post-26015","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity Risk Management | Threat Exposure Management<\/title>\n<meta name=\"description\" content=\"Protect Your business with Cybersecurity Risk Management by NSFOCUS. Enhance defenses and manage threats effectively. Learn more now.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Risk Management | Threat Exposure Management\" \/>\n<meta property=\"og:description\" content=\"Protect Your business with Cybersecurity Risk Management by NSFOCUS. Enhance defenses and manage threats effectively. Learn more now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/continuous-threat-exposure-management\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/ctemdatasheetcover-e1694768230642-qskwme1z2j120poidlw13slxm65bvnq4w9ky9ktkqc.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Cybersecurity Risk Management | Threat Exposure Management\" \/>\n<meta name=\"twitter:description\" content=\"Protect Your business with Cybersecurity Risk Management by NSFOCUS. Enhance defenses and manage threats effectively. Learn more now.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/ctemdatasheetcover-e1694768230642-qskwme1z2j120poidlw13slxm65bvnq4w9ky9ktkqc.png\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/continuous-threat-exposure-management\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/continuous-threat-exposure-management\\\/\",\"name\":\"Cybersecurity Risk Management | Threat Exposure Management\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/continuous-threat-exposure-management\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/continuous-threat-exposure-management\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/ctemdatasheetcover-e1694768230642-qskwme1z2j120poidlw13slxm65bvnq4w9ky9ktkqc.png\",\"datePublished\":\"2023-09-14T07:02:01+00:00\",\"dateModified\":\"2026-04-17T18:07:40+00:00\",\"description\":\"Protect Your business with Cybersecurity Risk Management by NSFOCUS. Enhance defenses and manage threats effectively. Learn more now.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/continuous-threat-exposure-management\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/continuous-threat-exposure-management\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/continuous-threat-exposure-management\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/ctemdatasheetcover-e1694768230642-qskwme1z2j120poidlw13slxm65bvnq4w9ky9ktkqc.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/ctemdatasheetcover-e1694768230642-qskwme1z2j120poidlw13slxm65bvnq4w9ky9ktkqc.png\",\"width\":114,\"height\":146,\"caption\":\"Cybersecurity document with a pie chart.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/continuous-threat-exposure-management\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Continuous Threat Exposure Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Risk Management | Threat Exposure Management","description":"Protect Your business with Cybersecurity Risk Management by NSFOCUS. Enhance defenses and manage threats effectively. Learn more now.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Cybersecurity Risk Management | Threat Exposure Management","og_description":"Protect Your business with Cybersecurity Risk Management by NSFOCUS. Enhance defenses and manage threats effectively. Learn more now.","og_url":"https:\/\/nsfocusglobal.com\/continuous-threat-exposure-management\/","og_site_name":"NSFOCUS","article_modified_time":"2026-04-17T18:07:40+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/ctemdatasheetcover-e1694768230642-qskwme1z2j120poidlw13slxm65bvnq4w9ky9ktkqc.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_title":"Cybersecurity Risk Management | Threat Exposure Management","twitter_description":"Protect Your business with Cybersecurity Risk Management by NSFOCUS. Enhance defenses and manage threats effectively. Learn more now.","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/ctemdatasheetcover-e1694768230642-qskwme1z2j120poidlw13slxm65bvnq4w9ky9ktkqc.png","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/continuous-threat-exposure-management\/","url":"https:\/\/nsfocusglobal.com\/continuous-threat-exposure-management\/","name":"Cybersecurity Risk Management | Threat Exposure Management","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/continuous-threat-exposure-management\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/continuous-threat-exposure-management\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/ctemdatasheetcover-e1694768230642-qskwme1z2j120poidlw13slxm65bvnq4w9ky9ktkqc.png","datePublished":"2023-09-14T07:02:01+00:00","dateModified":"2026-04-17T18:07:40+00:00","description":"Protect Your business with Cybersecurity Risk Management by NSFOCUS. Enhance defenses and manage threats effectively. Learn more now.","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/continuous-threat-exposure-management\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/continuous-threat-exposure-management\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/continuous-threat-exposure-management\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/ctemdatasheetcover-e1694768230642-qskwme1z2j120poidlw13slxm65bvnq4w9ky9ktkqc.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/ctemdatasheetcover-e1694768230642-qskwme1z2j120poidlw13slxm65bvnq4w9ky9ktkqc.png","width":114,"height":146,"caption":"Cybersecurity document with a pie chart."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/continuous-threat-exposure-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Continuous Threat Exposure Management"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/pages\/26015","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=26015"}],"version-history":[{"count":26,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/pages\/26015\/revisions"}],"predecessor-version":[{"id":33969,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/pages\/26015\/revisions\/33969"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/35687"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=26015"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}