<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" generatedBy="WIX">
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/protecao-de-dados/quais-sao-os-principais-recursos-do-tuvis</loc>
<lastmod>2025-03-26</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/protecao-de-dados/como-o-tuvis-garante-a-seguranca-e-conformidade-das-comunicacoes-empresariais-no-whatsapp</loc>
<lastmod>2025-03-26</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/gerenciamento-continuo-do-risco/quais-sao-os-principais-beneficios-de-implementar-um-programa-ctem</loc>
<lastmod>2025-03-20</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/gerenciamento-continuo-do-risco/como-a-xm-cyber-ajuda-na-priorizacao-de-investimentos-em-seguranca-e-na-demonstracao-do-retorno-sobre-o-investimento-roi</loc>
<lastmod>2025-03-20</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/gerenciamento-continuo-do-risco/como-o-ctem-se-diferencia-do-vulnerability-management-tradicional-e-de-outras-abordagens-de-seguranca</loc>
<lastmod>2025-03-20</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/pentest/quanto-custa-um-pentest</loc>
<lastmod>2025-01-10</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/insider-threat/o-que-%C3%A9-user-activity-monitoring-uam</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/insider-threat/quem-e-a-teramind</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/insider-threat/o-que-e-insider-threat</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/pentest/o-que-e-pentest-e-para-que-serve</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/pentest/quais-sao-os-resultados-de-um-pentest</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/microssegmentacao/o-que-e-a-segmentacao-de-confianca-zero</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/gestao-de-identidade-e-acesso/o-que-e-elevacao-de-privilegios</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/ciberseguranca/qual-e-o-processo-para-gerenciamento-de-vulnerabilidades</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/ciberseguranca/o-que-e-gerenciamento-de-vulnerabilidades</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/gestao-de-identidade-e-acesso/acesso-remoto-seguro-o-que-e-pra-privileged-remote-access</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/gestao-de-identidade-e-acesso/como-integrar-um-unix-ou-linux-ao-active-directory-usando-o-ad-bridge</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/protecao-de-dados/para-que-serve-a-protecao-de-e-mail</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/protecao-de-dados/como-implementar-e-mail-protection</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/protecao-de-dados/o-que-e-protecao-de-e-mail---e-mail-protection</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/protecao-de-dados/o-que-e-data-loss-prevention-dlp</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/verificacao-kyc/o-que-e-verificacao-kyc</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/verificacao-kyc/por-que-optar-pelo-onboarding-digital</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/verificacao-kyc/o-que-e-onboarding-digital</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/soc/o-que-e-um-endpoint</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/protecao-de-dados/quem-e-a-proofpoint</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/ciberseguranca/o-que-e-zero-trust</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/gestao-de-identidade-e-acesso/o-que-e-rotacao-de-senha</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/soc/o-que-e-content-disarm-and-reconstruction-cdr</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/soc/o-que-e-extended-detection-and-response-xdr</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/soc/o-que-e-threat-detection-and-response-tdr</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/soc/o-que-e-soc-endpoint-detection-and-response-edr</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/gestao-de-identidade-e-acesso/o-que-e-identity-governance-and-administration-iga</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/protecao-para-api/para-que-serve-owasp-top-10</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/protecao-para-api/o-que-e-open-web-application-security-project-owasp</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/seguranca-em-nuvem/o-que-e-cloud-workload-protection-plataform-cwpp</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/soc/o-que-e-managed-detection-and-response-mdr</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/soc/o-que-e-o-mssp</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/soc/o-que-e-soar</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/protecao-de-dados/o-que-e-a-anpd-na-lgpd</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/protecao-de-dados/o-que-e-a-lgpd</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/protecao-de-dados/o-que-e-protecao-de-dados</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/gerenciamento-continuo-do-risco/como-implementar-o-ctem</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/gestao-de-identidade-e-acesso/o-que-e-pam</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/gestao-de-identidade-e-acesso/quem-e-a-beyondtrust</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/gerenciamento-continuo-do-risco/quem-e-a-xm-cyber</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/gerenciamento-continuo-do-risco/o-ctem-e-uma-ferramenta</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/gerenciamento-continuo-do-risco/por-que-implementar-ctem</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/gerenciamento-continuo-do-risco/qual-objetivo-do-ctem</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/gerenciamento-continuo-do-risco/quais-sao-as-5-etapas-do-ctem</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/gerenciamento-continuo-do-risco/o-que-e-ctem</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/seguranca-em-nuvem/quais-sao-os-beneficios-de-usar-a-orca-security</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/seguranca-em-nuvem/o-que-e-cloud-native-application-protection-platform-cnapp</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/seguranca-em-nuvem/quem-e-a-orca-security</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/pentest/qual-modalidade-de-pentest-%C3%A9-ideal-para-mim</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/pentest/o-que-e-pentest-black-box-caixa-preta</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/pentest/o-que-e-pentest-grey-box-caixa-cinza</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/pentest/o-que-e-pentest-white-box-caixa-branca</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/pentest/quais-sao-as-modalidades-de-pentest</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/pentest/o-que-e-pentest-continuo</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/soc/o-que-e-siem</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/pentest/o-que-e-pentest</loc>
<lastmod>2025-01-09</lastmod>
</url>
<url>
<loc>https://www.netconn.com.br/perguntas-e-respostas/soc/o-que-e-soc</loc>
<lastmod>2025-01-09</lastmod>
</url>
</urlset>