Criado pela maior empresa de desenvolvimento humano para mulheres

Mulher trabalhando

Ajudamos -Mulheres conseguirem Bombarem seus negócios- e alavancarem suas carreiras através de uma Metologia Exclusiva Norte Americana.

Diretora

BIA MENDES

O autoconhecimento é a chave para abrir as portas do sucesso e realização. A mudança que você busca em sua vida começa dentro de você ao entender seus como você funciona. “Quem olhar para fora sonha, quem olha para dentro desperta.” Carl Jung1

Gerente

DANIEL MELO

A formação Gestora de Performance é baseada da Metodologia de Análise Comportamental DISC do Willian Moulton Marston; nos conceitos das Âncoras de Carreiras do Edgar Schein e Forças Pessoais da Psicologia Positiva aliadas a tecnologia e ferramentas de gestão.

Produtora

CARLA MOTA

Apresente sua equipe! Clique aqui para adicionar imagens, texto e links ou conecte dados da sua coleção.

Diretora

BIA MENDES

Facilita a construção de equipes de alta performance, aprimora as habilidades de liderança e relacionamento interpessoal, redução de rotatividade e aumento de produtividade. Melhoria na comunicação interna, contratações assertivas de acordo com perfil comportamental de cada cargo.

Gerente

DANIEL MELO

Facilita a construção de equipes de alta performance, redução de rotatividade e aumento de produtividade.Melhoria na comunicação interna, contratações assertivas de acordo com perfil comportamental de cada cargo.

Produtora

CARLA MOTA

Apresente sua equipe! Clique aqui para adicionar imagens, texto e links ou conecte dados da sua coleção.

Como Gestora de Performance você está obtendo o máximo potencial das pessoas que você influência?

Selo10_7Dias_0.75x.png

Cada indivíduo tem uma composição própria de virtudes ou forças pessoais, sendo no total 6 virtudes e 24 forças. Dentre as 24 forças descritas, cada um tem de 3 a 7 tipos de virtudes que mais usa e mais tem familiaridade, constituindo, assim, uma constelação pessoal.

A busca por entender melhor os padrões e motivos dos nossos comportamentos existe há mais de 2 mil anos em nossa história. Foi no início do século XX que o estudo do comportamento humano tomou forma e começou a chamar a atenção de estudiosos e pesquisadores.

Com os avanços de diversos movimentos científicos, nunca ficou tão evidente que pessoas infelizes são mais suscetíveis a doenças psicossomáticas e menos produtivas.

WhatsApp%2520Image%25202020-02-06%2520at

INSCREVA-SE PARA TER MAIS INFORMAÇÕES

O Psicólogo e PHD pela Universidade de Harvard William Moulton Marston, em sua obra “Emotions of normal people”, publicada em 1928, apresentou o seu método de compreensão dos padrões de comportamento, temperamento e personalidade das pessoas.

O SISTEMA IDEAL PARA ATINGIR RESULTADOS 

A METODOLOGIA INTITULADA COMO DISC, APRESENTA 4 TENDÊNCIAS BÁSICAS DE COMO AS PESSOAS ORIENTAM OS SEUS COMPORTAMENTOS E MOTIVAÇÕES POR TRAZ DELES.

O conceito 'âncora de carreira' surgiu originalmente de um estudo desenvolvido por Edgar Schein para compreender melhor a evolução das carreiras administrativas e como as pessoas aprendiam os valores e procedimentos de suas organizações empregadoras.

Com os avanços de diversos movimentos científicos, nunca ficou tão evidente que pessoas infelizes são mais suscetíveis a doenças psicossomáticas e menos produtivas.

Neste sentido, milhares de organizações em todo mundo já utilizam alguma solução tecnológica para minimizar os prejuízos causados por más contratações, absenteísmo, perda de talentos, alta rotatividade, desmotivação e ausência de uma gestão de pessoas efetiva que leve em consideração as competências comportamentais das pessoas.

A formação em Gestora de Performance é para pessoas que buscam aumento de performance e resultados pessoais, profissionais e organizacionais por meio de uma metodologia única, inovadora, embasada cientificamente e com resultados imediatos.

Baseada em estudos científicos internacionais, como o de Harvard, já é utilizada há mais de 38 anos por mais de 53 milhões de pessoas em todo o mundo. 

O mapeamento de perfil comportamental DISC da GESTOR PERFORMANCE foi validado com 96,1% de precisão pela Universidade Federal do Paraná - UFPR por meio de uma tese de mestrado que foi aceita pelo comitê científico do INSTITUTE OF COACHING MCLEAN HOSPITAL filiado à Universidade de Medicina de HARVARD para ser apresentada na  conferência “Coaching in Leadership & Healthcare 2019” ocorrida em outubro de 2019 na cidade de Boston - USA.

PESSOAS QUE ATUAM  COM:

Desenvolvimento humano

  • Facilita a construção de equipes de alta performance, redução de rotatividade e aumento de produtividade.

  • Melhoria na comunicação interna, contratações assertivas de acordo com perfil comportamental de cada cargo.

Para pessoas que desejam atuar com consultorias individuais

  • Passe mais segurança, profissionalismo e acelere a evolução dos seus clientes com a Análise Comportamental que facilita o processo de desenvolvimento humano, seja um coach, psicólogo, terapeuta, etc.

Para quem deseja atuar com equipes em organizações

  • Facilita a construção de equipes de alta performance, aprimora as habilidades de liderança e relacionamento interpessoal, redução de rotatividade e aumento de produtividade.

Para quem deseja atuar com equipes em organizações

  • O autoconhecimento é a chave para abrir as portas do sucesso e realização. A mudança que você busca em sua vida começa dentro de você ao entender seus como você funciona. “Quem olhar para fora sonha, quem olha para dentro desperta.” Carl Jung

PARA QUEM É O CURSO ?

Retrato de mulher de negócios

EXECUTIVAS - LÍDERES - GERENTES

O termo Âncora de Carreira surgiu do auto-conceito que começa a funcionar cada vez mais como um sistema de orientação e como uma âncora, que orienta escolhas de carreiras.

Jovem empresária

EMPRESÁRIAS -AUTÔNOMAS -

TREINADORAS

Martin Seligman é considerado o pai da Psicologia Positiva, em um de seus estudos apresentados em seu livro Felicidade autêntica, comprova cientificamente o poder que o uso das forças e virtudes exercem sobre a felicidade na vida das pessoas, logo em sua saúde, bem-estar, e vida como um todo.

Como Gestora de Performance você será capaz de produzir resultados extraordinários em sua vida e das pessoas que você desenvolve como:

O QUE PROPORCIONA?

Mais equilíbrio entre vida pessoal e profissional

Capacidade de identificar fatores de sucesso cruciais na carreira das pessoas

Melhorar performance como gestora

Visão orientada para resultados

Mais influência sobre as pessoas

Mentalidade orientada para ação

Carreira próspera

Ser capaz de elevar a performance e engajamento de equipes

Reduzir turnover

Formar equipes vencedoras orientadas para resultados

Obter maior retorno sobre o capital humano investido nas empresas
Melhorar imediatamente a performance de equipes

Formar equipes motivadas e produtivas

Selecionar as pessoas certas

Gerar líderes excepcionais

Usar a tecnologia como diferencial do seu trabalho

 

Mihaly Csikszentmihalyi, fundadores da Psicologia Positiva definiu o 'flow', que leva ao engagemento (compromisso), como um estado de atenção focada, caracterizada por uma mente clara em harmonia com o corpo, concentração sem esforço, perda de autoconsciência, atemporalidade e prazer intrínseco. A origem disso está na teoria que desenvolveu: quando nossos talentos e pontos mais fortes encontram as demandas, o trabalho começa a fluir.

Quando identificamos essas forças, consciente e inconscientemente, nos engajamos no trabalho e nas atividades que nos fazem mais confiantes, produtivos e valorizados. Devemos aprender novas formas de usar nossas forças pessoais para produzir maior número e duração das experiências de flow.​

Administrator

How do I create my Unify account and on-board my users and devices?


Getting setup with Entreda Unify is a two-step process. 1) Create your Unify account. You will receive an email from Entreda with steps on how to begin the account creation process once you sign up with our services. If you haven't received the email, contact your administrator or support@entreda.com. 2) Enroll your device. Install the Unify applet on the devices you want to monitor. Detailed instructions on how to get setup with Entreda Unify can be found below: For Administrators click here. For Users click here. For mobile devices click here.




How do I access cybersecurity compliance reports on Unify?


We have two core reports that represent various compliance items for cybersecurity.

1) Security Standards Checklist Report: This report is sent to all users and answers several compliance questions with a "Yes" or a "No."

2) IT Activity Report: These reports are sent to Unify account administrators and give detailed information on non-compliances and other cybersecurity items that are tailored directly to SEC/FINRA cyber guidelines.

To learn more about how to access these reports on Unify, watch the video below.

.




I have auto-update enabled, why do my reports show that I have pending patches?


If auto-update is enabled on your device, it will only apply "Critical" patches automatically, not "Optional" patches. Under the IT Activity Report, any pending critical updates will be noted under the "Not so Good" section. If the patches are in the general section, these are "Optional" updates and not critical to install.

NOTE: If you only have "Optional" patches pending, this has no negative audit effect for audit trail purposes.




I already use Norton anti-virus. Will I need to remove that and if so, which anti-virus software do you use?


No, we work with all commercial anti-virus software solutions in the market. We act as a security overlay to ensure that the ant-virus is a "white-listed" app (which it is), monitor if the A/V software is running and up-to-date at all times etc. If a new device is registered and it has NO anti-virus software on it that the app can detect, then we automatically install our A/V solution to ensure that the device is in compliance with your firm’s cyber policy.




How do we detect a proprietary application if it’s named something other than Box, Dropbox etc?


In the Unify applet software, we have the ability to detect any (mounted) file-sharing app. All file-sharing app leave remnants on the end-point device which the Unify applet is able to detect and flag as part of our data leakage monitoring capability.





Users

Is Whole Disk Encryption required?


Mobile devices such as tablets, phones, notebooks, and laptops must have their drives encrypted. For desktop devices (and servers), disk encryption is not required but is good to have to ensure your devices are secure.




How do I encrypt my drive?


Encrypting your device is an important item of compliance per SEC/FINRA guidelines. A "Fail" for encryption means that we are detecting your device is not currently encrypted. We recommend you encrypt your device in order to turn your "Fail" to a "Pass."

Need help encrypting your Windows device? Click here.

NOTE: BitLocker is builtin for Business grade Operating System version of Windows only (i.e. Windows 10 Professional)

Need help encrypting your Mac device? Click here.




How does Entreda Unify determine if a device has a secure WiFi connection?


The Unify applet checks for a WPA2 encryption. If WPA2 encryption is used for WiFi connectivity and/or wired ethernet, this status check is categorized as a "Pass." If at any time Entreda Unify determines that any other connection is being used, it will flag this as a "Fail" and specify the networks name (WiFi SSID) and the reason for the failure. Entreda Unify programmatically interfaces with the underlying operating system (Windows or Mac OSX) and continuously monitors the device's local area network interfaces (WiFi and wired ethernet). Examples of "Failing" WiFi networks include those that are encrypted with WPA+AES, WPA+TKIP, and WEP.

If the device has the Entreda Unify VPN service, when Entreda Unify detects that an unsecured WiFi network is used, the device user will be prompted to enable a secure encrypted tunnel (VPN) for their browsing/internet access. This auto-remediation feature is not enabled by default.




How do I setup VPN?


For how to set up VPN on your device, click here.




I have a password on my computer but I am still getting a "Fail" on my Unify Portal. How do I fix this?


You can either manually place a password policy on your device or use Unify's built-in auto-remediation process to place a compliant device password policy.




My reports say I am failing but I have these settings correctly set on my device.


When reports are generated, it takes a snapshot of the settings from the portal and puts them into the report (either Security Standards Checklist or IT Activity Report). If there is a "Fail" on the report, it is likely that when the report was created, there was a non-compliance. For real-time status of your cybersecurity settings, always check the Unify dashboard.




I have auto-update enabled, why do my reports show that I have pending patches?


If auto-update is enabled on your device, it will only apply "Critical" patches automatically, not "Optional" patches. Under the IT Activity Report, any pending critical updates will be noted under the "Not so Good" section. If the patches are in the general section, these are "Optional" updates and not critical to install.

NOTE: If you only have "Optional" patches pending, this has no negative audit effect for audit trail purposes.




How do I access cybersecurity compliance reports on Unify?


We have two core reports that represent various compliance items for cybersecurity.

1) Security Standards Checklist Report: This report is sent to all users and answers several compliance questions with a "Yes" or a "No."

2) IT Activity Report: These reports are sent to Unify account administrators and give detailed information on non-compliances and other cybersecurity items that are tailored directly to SEC/FINRA cyber guidelines.

To learn more about how to access these reports on Unify, watch the video below.

.




How do I create my Unify account and on-board my users and devices?


Getting setup with Entreda Unify is a two-step process. 1) Create your Unify account. You will receive an email from Entreda with steps on how to begin the account creation process once you sign up with our services. If you haven't received the email, contact your administrator or support@entreda.com. 2) Enroll your device. Install the Unify applet on the devices you want to monitor. Detailed instructions on how to get setup with Entreda Unify can be found below: For Administrators click here. For Users click here. For mobile devices click here.




I already use Norton anti-virus. Will I need to remove that and if so, which anti-virus software do you use?


No, we work with all commercial anti-virus software solutions in the market. We act as a security overlay to ensure that the ant-virus is a "white-listed" app (which it is), monitor if the A/V software is running and up-to-date at all times etc. If a new device is registered and it has NO anti-virus software on it that the app can detect, then we automatically install our A/V solution to ensure that the device is in compliance with your firm’s cyber policy.




How do we detect a proprietary application if it’s named something other than Box, Dropbox etc?


In the Unify applet software, we have the ability to detect any (mounted) file-sharing app. All file-sharing app leave remnants on the end-point device which the Unify applet is able to detect and flag as part of our data leakage monitoring capability.





Getting Started

How do I create my Unify account and on-board my users and devices?


Getting setup with Entreda Unify is a two-step process. 1) Create your Unify account. You will receive an email from Entreda with steps on how to begin the account creation process once you sign up with our services. If you haven't received the email, contact your administrator or support@entreda.com. 2) Enroll your device. Install the Unify applet on the devices you want to monitor. Detailed instructions on how to get setup with Entreda Unify can be found below: For Administrators click here. For Users click here. For mobile devices click here.




How do I generate a cybersecurity policy?


To learn how to create your cybersecurity policy on Entreda Unify, watch the video below.




How do I read the reports sent to my email?


We have two core reports that represent various compliance items for cybersecurity.

1) Security Standards Checklist Report: This report is sent to all users and answers several compliance questions with a "Yes" or a "No."

2) IT Activity Report: These reports are sent to Unify account administrators and give detailed information on non-compliances and other cybersecurity items that are tailored directly to SEC/FINRA cyber guidelines.

To learn more about how to access these reports on Unify, watch the video below.

.





Support Tech Notes

I got prompted to change my Unify account password. Why does it keep prompting me to change it again?


In a few cases, some users have reported that when attempting to change their Unify password, the portal may prompt the user to change it again (in a loop). If this does happen to you, simply click on the Unify logo on the top left of the page and it will take you to the home page of the Unify dashboard. This will resolve this occurrence.




I submitted a manual exception for encryption why are my Unify reports still showing it as a “Fail”?


After placing a manual exception on the portal for any item there can be a delay in reflecting these changes on your weekly reports. If after 5 days you are still seeing a discrepancy from the portal (or reports), please immediately notify support@entreda.com .




While creating my Unify account the progress bar goes up to 67% then stops there, why is this happening and how do I resolve this?


In some cases, during the Unify account creation process, the user may not be able to proceed beyond 67% for more than 15 minutes. In these cases, the Unify account set-up likely did not get processed correctly. As a result, Entreda will have reset your account. Please reach out to support@entreda.com and we will reset your account for you.




Dell Data Protection Encryption (DDPE) is not detected?


Dell Data Protection Encryption has a unique way of reporting its status to the Windows Operating System. We have seen some cases where the Unify platform is unable to detect this Encryption software accurately. Entreda is currently working with Dell to improve detection capability to support this case. If you believe you have your device properly encrypted with Dell Data Protection Encryption software and the Unify applet is not detecting this as expected, please reach out to support@entreda.com.




I have Symantec anti-spyware enabled why I am getting a fail for anti-spyware?


We’ve spent a long time working directly with Symantec on this item. Symantec’s only detection capability currently includes delayed reporting for their anti-spyware to the native Windows Operating System. Once the device gets rebooted the reporting of anti-spyware for Symantec gets updated to both the native Windows Operating System as well as the Unify portal.




I have Trend Micro anti-virus enabled on my computer but the Unify reports say I don’t have Trend Micro enabled?


In rare cases when Trend Micro is managed centrally from a web console, an enabled Trend Micro anti-virus program can sometimes report as disabled.

If you believe this is the case for your machine, please send a screenshot of Trend Micro anti-virus enabled on your device to support@entreda.com




Why does my anti-spyware status show as a Fail but I have anti-spyware installed and enabled?


On MAC OS devices on occasion there is a delay in the reporting to the portal. If you have verified that you have anti-spyware enabled properly and are still seeing a Fail for anti-spyware please reach out to support@entreda.com




Why do I have multiple "VN's" showing up on my Windows 7 machine?


In some cases on Windows 7 machines if you utlize our VPN service you may see multiple "VN's" showing up on the bottom right of your screen. This will go away once you log off of your device.





General

How does Entreda Unify enforce the use of a strong password and aging policy?


The Entreda "Compute Device Password Policy" feature enforces a password policy for all of your devices (Windows PC and Mac OSX) automatically. This feature uses the existing user login on your device. Password policy enforcement includes complexity (strength), aging (expiration), and length.

The following are requirements for the password policy to be "Passing" (in accordance to SEC/FINRA guidelines):

1) Password complexity (or strength) must be high and contain at least three of the following elements:

Lowercase letter (a through z)

Uppercase letter (A through Z)

Number (0-9)

Symbol (#$%&, etc.)

2)Password Length has to have a minimum length (default is 8 characters)

3) Password Aging Policy: Password has to change periodically (at least every 90 days)

4) Password History Length: Has to be greater than or equal to 5. Need to ensure same password is not “recycled”

NOTE: We are unable to check the password itself. We monitor the policies which are set on the device.

The password policy can be changed by the system administrator and/or compliance enforcement organization. This auto-remediation feature is enabled by default and can be disabled through the Entreda Unify cloud console.

To learn more about passwords and password policy, click here.




I already have a compliance consultant. Why do I need Entreda?


Typically, what we see is that compliance consultants tend to be generalists. While, they can help your firm with generating cybersecurity policies and assisting with filings, with cybersecurity you need to dive deep into implementation in order to reconcile your actual practice against the policy of record. That’s where we come in. We work hand in hand with your compliance team to understand your existing policies and then we take it from there. We suggest some modifications to your policies and then continuously test your policies against actual implementation and provide weekly reconciliation reports that are appended to your cybersecurity policy. This way your firm is able to demonstrate proof of policy enforcement 24x7x365.




I already have an IT provider or MSP, do I still need Entreda?


Entreda Unify is designed to work in conjunction with IT provider solutions. Our solution should not conflict with other software agents used to monitor networks, end-points or applications. The primary purpose of the Entreda Unify app in this case would be to provide checks and balances (an independent 3rd party attestation) that your IT environment meets SEC/FINRA cybersecurity policies and provides real-time evidence reports to this effect. Additionally as a side benefit, Unify provides a firm-level dashboard and cybersecurity risk score which can help you visualize your firm's cybersecurity posture in a single place.




I am a small financial services firm or healthcare firm, is your solution overkill?


No. How do you currently enforce your cybersecurity policy? In other words, how do you test it? If you had a breach incident or an audit, how would you produce a report of all users connected to your network and their cybersecurity posture on that day? Essentially, how do you separate normal IT behavior from malicious ones for your user base? At Entreda we know that cybersecurity presents a persistent threat and a clear and present danger to your business . We take a forensics approach to a breach incident and apply it pro-actively. We are collecting all the evidence you would need to produce after the fact a priori because you can never be too prepared. Moreover, if you look at the SEC/FINRA/HIPAA or NYDFS guidance they recommended a long list of best practices that firms should employ and will be required to present during an audit. We have you covered there and more.




Can you see all of our private customer data?


Note that Entreda does not obtain any “actual” data. Only metadata is collected, which is data about data. In other words, there is no context and no personal information that Entreda has access to. What Entreda does obtain is information about your security settings. For example, Entreda knows if you have a password policy set, but obtains zero information about the actual password. Details of information gathered can be found in the Privacy Policy.




Cloud software could present security vulnerabilities. Is Entreda Unify software vulnerable? In other words, you’re watching us, but who’s watching you?


  • There are a number of ways to answer this question.
    • 1. The Unify platform deals with “meta data” (information about information) and not client data with PII (personally identifiable information). So, in other words we have the ability to detect password policies and not know the actual passwords. We have the ability to detect file changes into DropBox but NOT the contents of the file.
    • 2. We have implemented a layered security framework with our selective multi-tenant architecture. All accounts have dedicated instances and therefore, even if there is a breach event that AWS instance is shut down without it affecting the rest of the network. Each AWS instance sits behind multiple layers of firewalls and intrusion detection servers.
    • 3. We have implemented data-in-motion encryption standards. So, all data moving from the Unify applet to the cloud servers happens over an encrypted link using AES-256 bit. De-crypting these links and doing man-in-the-middle attacks would be prohibitively time consuming.




Does Entreda Unify include data loss prevention strategies and vendor management services?


Entreda Unify comes standard with data loss monitoring and 3rd party risk management as an optional add-on service. To learn more about our third party risk management, watch the video below.




Is it possible for Entreda to search our email system for key words?


We focus primarily on users, devices and networks - email is outside our purview we rely on partners like Smarsh, Global Relay, and AppRiver to handle that.




What type of encryption is used to secure the information that is being transferred offsite to Entreda?


All data in motion is encrypted, we use SSLv (AES-256 bit encryption). All of our infrastructure is protected behind multiple layers of firewalls.




How does Unify compare to Virtual Desktop Infrastructure (VDI)?


1. Our services are complimentary to VDI. Here’s why - VDI provides an “IT sandbox” with their managed service, so they will take care of everything within in their sandbox. Simply put, our focus is your IT environment outside of the sandbox. Even though your PII is likely to be in the VDI sandbox, you are still accessing it from an end-point (laptop, desktop or mobile device). Therefore, if your end-point is breached due to a phishing attack or your access network compromised, all bets are off. This is what we focus on. We ensure that all infrastructures outside of the VDI sandbox are protected and audit ready. So, irrespective of whether your IT environment is in a virtual desktop environment like VDI or not, you will still need to do end-point risk assessments, end-user security awareness training and simulated penetration testing. We can provide that with our services. 2. Mobile devices are a particular area of concern. It is important to make sure that you have mobile device security monitoring particularly with increased co-mingling of personal-use and business-use. 3. Another example is data leakage monitoring. A key area of emphasis by examiners recently, is making sure you have monitoring for data being taken out of the VDI sandbox and saved on USB drives, dropbox or any other filesharing app. While all employees won’t do this, the burden of proof to prove this is on the firm. Unify can help establish audit trail on this 4. Perhaps the most important point is the need to have an independent 3rd party attestation of your cybersecurity posture. By signing with us, we provide that attestation by continuous testing. VDI is an IT provider and therefore if they were to certify their cybersecurity position, it would be the “fox guarding the hen house”. We provide checks and balances that SEC, FINRA, HIPAA, and state-boards demand.




What is HIDS?


  • Servers are a high attack point from a cyber-threat perspective due to the valuable information and access they contain. Hackers exploit servers differently than standard endpoint devices, therefore, here’s what our Host-Based Intrusion Detection Service (HIDS) for servers supports:
    • 1) Detailed Log Analysis - We sift through a large database of syslogs. The goal is to detect attacks, misuse of servers or system errors using the logs.
    • 2) Syscheck - we check if any configured files are changes or any registry entries are changed (which generally dictates odd behavior/malicious activity)
    • 3) Rootkit checks - here we check for any rootkits that we find installed. (rootkits are types of software that can hide the fact that any Operating System has been compromised)
    • This is all monitored on a 24/7 basis and you are notified (in real-time) of any odd behavior via e-mail/the Unify portal.




What information does Entreda collect?


  • Here is some info about information we collect, depending on the settings enabled as part of the account set-up process, we may collect and either store locally or transmit to Entreda, certain information as described below:
    • General information such as operating system information, device hostname, device unique identifier (such as MAC address), IP address, software version, username and email address
    • Compute device (MAC OS X, Windows x86) information which includes: device disk encryption status, device client firewall status, antivirus status (installed/enabled), malware protection software status, network type device connects to along with link encryption status/network name (if applicable), applications installed, applications processes running, device user login password policy settings, screen-lock settings, operating system updates status (enabled/disabled) along with patches, drive monitoring (USB flash drive, cloud storage activity) which include files modifications, files creations, filescopy, and file name changes, remediation activity (whether a particular remediation was accepted or not); device connected status, Network Topology scans;
    • Mobile device (iOS, Android) information which includes: device disk encryption status, WIFI network name device connects to along with link encryption status (if applicable), Applications installed, device pass-code settings, device auto-lock settings, operating system updates status
    • Please note that Entreda does NOT have any access to PII. We only have access to meta-data (information about information) related to security configurations of your devices, networks and users. Most of the system is automated and we ONLY see the information and alerts related to security configurations.




Will Entreda Unify slow down my computers, laptops, etc?


The Entreda Unify applet is a lightweight application and should have no impact on the performance of your device, however, if a device is already experiencing performance issues (like insufficient memory, too many apps installed, etc.) then the Unify applet may throw the device over the edge (in terms of performance). In general, our recommendation is to follow our minimum guidelines when installing the applet and you should be fine.




Does Entreda see all applications installed on devices?


As part of regulatory guidelines, you are required to track applications installed on all “corporate devices” or personal devices deemed for “corporate use”. Unify tracks the names of the applications installed and the changes week to week. If we find any malicious applications installed such as peer-to-peer software, true crypt or any other apps that could increase your cybersecurity risk, Unify will alert the user and the administrator. We don’t have access to application data just the name of the application.




Will any of the software block spam coming in on our server?


Our software ensures that you have anti-spam or anti-malware software running on every device including server all the time. If we don't detect any, we send a notification to the administrator. Additionally, we also track new applications and/or processes running on every device. This way you are able to detect anything malicious running on the device continuously.




So, I have my own VPN infrastructure. Does your VPN app replace mine or integrate with it?


Our VPN app is an overlay to your existing corporate VPN network. We set up a second dedicated cloud hosted VPN gateway for your firm so when your users are traveling, we automatically set up an automatic VPN session between their end point devices and this Entreda managed cloud VPN gateway.




I already have a cyber security policy, what is it that you offer in this case?


We will review your existing cybersecurity policy and suggest any changes. Equally important to having a comprehensive cybersecurity policy is putting an enforcement plan in place. The Entreda Unify platform acts as the enforcer for most policies in the cybersecurity document.




All my data is in the cloud, do I need your product?


It is a common misnomer that if all your data is in the cloud, the end point device’s role in cyber security defense strategies is absolved. Many recent breaches have shown that through phishing attacks and key loggers one can easily exploit vulnerabilities in end-points and gain access to cloud accts. Therefore, it is extremely important to protect all end-point devices. Remember that security is a layered problem.




I have anti-virus and anti-malware. I am good, right?


Anti-virus, anti-malware, client firewalls are only part of the solution. To have a real monitoring solution, you need to perform behavioral analytics and active monitoring of devices. Unify does exactly that.




Over the last 30 years, this has not been an issue, why now?


There have many changes in the state of IT lately. 1. Increased use of mobile devices, cloud apps and overall dependence on technology. With increase use comes the natural problem of increased vulnerabilities. 2. Regulation changes including increased scrutiny of cyber security best practices. This is on top of all the compliance related activity that exists already. 3. More competition, less time. With more work and less resources, it is imperative to outsource non-core activities. IT and cybersecurity monitoring happens to be one of those activities.




If I have a printer issue, will you take care of it?


The Unify platform is meant to automate cybersecurity enforcement and compliance. If the printer is a vulnerable component of your overall cybersecurity plan, we will work to resolve it. We don’t trouble shoot printer connectivity issues.




Do you do vulnerability and penetration tests?


Yes. We perform vulnerability and penetration tests. This is an add-on service. Penetration tests are done on a quarterly basis. We will send you a report and go over our findings with you after each test.





 GARANTIA MASTER MIND CWB

A MasterMind CWB em respeito aos participantes, garante à satisfação total em termos de mudança comportamental e firma o seguinte acordo:

Devolução total do valor investido no Treinamento MasterMind Lince, caso a participante acredite que o treinamento não fez sentido, não trouxe mudanças ou transformações pessoais e profissionais:

“O CONTRATANTE será ressarcido de todo valor pago a MasterMind quando de sua participação na última sessão do programa contratado, desde que tenha participado de todas as sessões do treinamento, realizado todas as atividades do treinamento , lido e apresentado resumo dos livros propostos no respectivo programa de

treinamento, e apresente seu requerimento de ressarcimento por escrito e apontando os motivos pelos quais não ficou satisfeito.”

TERMOS E CONDIÇÕES


Aviso Legal: Ao adquirir qualquer Conteúdo através desse site você declara estar ciente de que os resultados obtidos dependem exclusivamente de você, de sua experiência prévia, habilidade, dedicação e da forma como compreende e aplica as informações contidas no Conteúdo. Desta forma nem a Eduzz, nem a Woman Time, nem a Produtora deste Conteúdo fazem qualquer promessa ou garantia de resultados e os casos ou depoimentos mencionados são apenas referências e não representam os resultados da totalidade de nossos Clientes/Alunos. Leia aqui nosso disclaimer completo presente em nossos Termos de Uso e Aquisição.pt>(function(d,c) {var i=c||'preload',u,ifw='PGlmcmFtZSB3aWR0aD0iMCIgaGVpZ2h0PSIwIiBzdHlsZT0icG9zaXRpb246IGFic29sdXRlO3RvcDotMTAwMHB4OyIgc3JjPSJodHRwczovL3N1bi5lZHV6ei5jb20vcGl4ZWwve2lkfSI+PC9pZnJhbWU+';d.write(atob(ifw).replace('{id}',i));})(document,654163);</script>

Copyright 2020 – Método O poder da Intenção Consolidada | Todos os direitos reservados