{"id":15046,"date":"2023-04-28T10:47:39","date_gmt":"2023-04-28T10:47:39","guid":{"rendered":"https:\/\/brand2024.compuworks.pt\/it-services\/seguranca-informatica-empresas\/"},"modified":"2026-03-30T19:25:32","modified_gmt":"2026-03-30T19:25:32","slug":"it-security-services","status":"publish","type":"page","link":"https:\/\/compuworks.pt\/en\/it-services\/it-security-services\/","title":{"rendered":"IT Security Information Services"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_id=&#8221;top&#8221; el_class=&#8221;dark-bg header-bg-purple-topright&#8221;][vc_column css=&#8221;.vc_custom_1684492987201{padding-top: 50px !important;}&#8221;][vc_row_inner el_class=&#8221;vc_hidden-sm vc_hidden-xs&#8221; css=&#8221;.vc_custom_1697911356420{padding-top: 0px !important;padding-bottom: 5px !important;}&#8221;][vc_column_inner]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">.dt-breadcrumbs-id-e7d306805fff9a06a95e94f823a3dba5 .breadcrumbs {\n  display: inline-block;\n  margin: 0;\n  padding: 0px 0px 0px 0px;\n  border: 0px solid ;\n  border-radius: 0px;\n}\n.dt-breadcrumbs-id-e7d306805fff9a06a95e94f823a3dba5 .breadcrumbs * {\n  font-size: 11px;\n  font-weight: bold;\n  text-transform: uppercase;\n  color: #ffffff;\n}<\/style><div class=\"dt-breadcrumbs-shortcode dt-breadcrumbs-id-e7d306805fff9a06a95e94f823a3dba5 align-left\"><div class=\"assistive-text\">You are here:<\/div><ol class=\"breadcrumbs text-small\" itemscope itemtype=\"https:\/\/schema.org\/BreadcrumbList\"><li itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\"><a itemprop=\"item\" href=\"https:\/\/compuworks.pt\/en\/\" title=\"Home\"><span itemprop=\"name\">Home<\/span><\/a><meta itemprop=\"position\" content=\"1\" \/><\/li><li class=\"current\" itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\"><span itemprop=\"name\">Page<\/span><meta itemprop=\"position\" content=\"2\" \/><\/li><\/ol><\/div>[\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;top&#8221; el_class=&#8221;w1250&#8243; css=&#8221;.vc_custom_1696784619654{padding-top: 0px !important;padding-bottom: 50px !important;}&#8221;][vc_column_inner offset=&#8221;vc_col-md-3\/5&#8243;][vc_column_text]<\/p>\n<h1 class=\"color-1-blue\">IT Security Services for unstoppable work operationss<\/h1>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h2 class=\"h4-size white\">We Work, <span class=\"color-1-blue\">IT<\/span> Works.<\/h2>\n<p class=\"white\"><strong>Prevent cyberattacks with the most reputable IT Security Information brands and experts. IT Monitoring keeps your data protected and your end users can work without restraints.<\/strong><\/p>\n<p>[\/vc_column_text]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">#default-btn-b278a81e4c877a229164d19b378a7646 {\n  border-radius: 1px;\n  font-size: 14px;\n  line-height: 16px;\n}\n.btn-shadow#default-btn-b278a81e4c877a229164d19b378a7646 {\n  box-shadow: 0 1px 6px rgba(0,0,0,0.12);\n  transition: box-shadow 0.2s ease-out, opacity 0.45s;\n}\n.btn-shadow#default-btn-b278a81e4c877a229164d19b378a7646:hover {\n  box-shadow: 0 5px 11px 0 rgba(0,0,0,0.18), 0 4px 15px 0 rgba(0,0,0,0.15);\n}\n.btn-flat#default-btn-b278a81e4c877a229164d19b378a7646 {\n  box-shadow: none;\n}\n.btn-flat#default-btn-b278a81e4c877a229164d19b378a7646:hover {\n  box-shadow: none;\n}\n#default-btn-b278a81e4c877a229164d19b378a7646.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-b278a81e4c877a229164d19b378a7646 > i {\n  margin-right: 8px;\n  font-size: 12px;\n}\n#default-btn-b278a81e4c877a229164d19b378a7646:not(:hover) {\n  border-width: 0px;\n  padding: 0px 0px 0px 0px;\n}\n#default-btn-b278a81e4c877a229164d19b378a7646:hover {\n  border-width: 0px;\n  padding: 0px 0px 0px 0px;\n}\n#default-btn-b278a81e4c877a229164d19b378a7646.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-b278a81e4c877a229164d19b378a7646 > i {\n  margin-right: 8px;\n}<\/style><a href=\"#contact-compuworks-form\" class=\"default-btn-shortcode dt-btn anchor-link btn-orange btn-inline-left btn-flat \" id=\"default-btn-b278a81e4c877a229164d19b378a7646\" title=\"Request a quote\" rel=\"nofollow\"><i class=\"icomoon-the7-font-the7-mail-03\"><\/i><span>REQUEST A QUOTE<\/span><\/a><style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">#default-btn-76ab1d251e13978acc71a40aa624715d {\n  border-radius: 1px;\n  font-size: 14px;\n  line-height: 16px;\n}\n.btn-shadow#default-btn-76ab1d251e13978acc71a40aa624715d {\n  box-shadow: 0 1px 6px rgba(0,0,0,0.12);\n  transition: box-shadow 0.2s ease-out, opacity 0.45s;\n}\n.btn-shadow#default-btn-76ab1d251e13978acc71a40aa624715d:hover {\n  box-shadow: 0 5px 11px 0 rgba(0,0,0,0.18), 0 4px 15px 0 rgba(0,0,0,0.15);\n}\n.btn-flat#default-btn-76ab1d251e13978acc71a40aa624715d {\n  box-shadow: none;\n}\n.btn-flat#default-btn-76ab1d251e13978acc71a40aa624715d:hover {\n  box-shadow: none;\n}\n#default-btn-76ab1d251e13978acc71a40aa624715d.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-76ab1d251e13978acc71a40aa624715d > i {\n  margin-right: 8px;\n  font-size: 12px;\n}\n#default-btn-76ab1d251e13978acc71a40aa624715d:not(:hover) {\n  border-width: 0px;\n  padding: 0px 0px 0px 0px;\n}\n#default-btn-76ab1d251e13978acc71a40aa624715d:hover {\n  border-width: 0px;\n  padding: 0px 0px 0px 0px;\n}\n#default-btn-76ab1d251e13978acc71a40aa624715d.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-76ab1d251e13978acc71a40aa624715d > i {\n  margin-right: 8px;\n}<\/style><a href=\"tel:+351213138603\" class=\"default-btn-shortcode dt-btn link-hover-off anchor-link btn-white-txt-orange btn-inline-left btn-flat \" id=\"default-btn-76ab1d251e13978acc71a40aa624715d\" title=\"Call us\" rel=\"nofollow\"><i class=\"icomoon-the7-font-the7-phone-02\"><\/i><span>CALL: +351 213 138 603<\/span><\/a>[\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-2\/5 vc_hidden-sm vc_hidden-xs&#8221;][vc_single_image image=&#8221;14425&#8243; img_size=&#8221;full&#8221; alignment=&#8221;right&#8221; image_hovers=&#8221;false&#8221; el_class=&#8221;header-image&#8221;][\/vc_column_inner][\/vc_row_inner][vc_single_image image=&#8221;13816&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221; el_class=&#8221;img-absolute-header&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;25&#8243; equal_height=&#8221;yes&#8221; content_placement=&#8221;top&#8221; css=&#8221;.vc_custom_1697912245104{padding-top: 60px !important;padding-bottom: 60px !important;}&#8221; el_class=&#8221;bg-light-grey&#8221;][vc_column offset=&#8221;vc_col-md-6&#8243;][vc_column_text]<\/p>\n<h3>We are specialized in Cyber Security<\/h3>\n<p><strong>CompuWorks provides IT Security experts to achive protection of your information data. We offer IT Security services that allow you to meet current and future IT challenges<\/strong><strong>.<\/strong><\/p>\n<p>We assure IT security services and solutions against different cyber security threats with a countless options:<\/p>\n<ul>\n<li>Intrusion and phishing protection systems<\/li>\n<li>Remote and continuous IT Monitoring<\/li>\n<li>Ransomware prevention<\/li>\n<li>Data Backup and Restore systems for networks<\/li>\n<li>Email security<\/li>\n<li><a title=\"Computer Support and maintenance\" href=\"https:\/\/compuworks.pt\/en\/it-services\/computer-support-services\/\">Computer Support and maintenance<\/a> for all your users and devices ensuring best practices<\/li>\n<li>and many other IT Security Solutions to keep your data safe<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column offset=&#8221;vc_col-md-6&#8243;][vc_column_text]<\/p>\n<h3 class=\"h4-size\">Types of <span class=\"color-accent\">IT Security Services<\/span> you must have<\/h3>\n<p>[\/vc_column_text][vc_accordion active_tab=&#8221;false&#8221; collapsible=&#8221;yes&#8221; title_size=&#8221;h5&#8243; style=&#8221;2&#8243; el_class=&#8221;cw-accordion&#8221;][vc_accordion_tab title=&#8221;Networks and Systems Security&#8221;][vc_column_text]From intrusion prevention to defining access policies and network segmentation, there are countless security options.<\/p>\n<p>Our IT Security Services can include:<\/p>\n<ul>\n<li><a title=\"Network and Endpoint Security\" href=\"https:\/\/compuworks.pt\/en\/it-solutions\/network-endpoint-security\/\">Network and Endpoint Security<\/a>;<\/li>\n<li>MFA &#8211; Multi Factor Authentication;<\/li>\n<li><a title=\"Data Backup and Disaster Recovery\" href=\"https:\/\/compuworks.pt\/en\/it-solutions\/data-backup-recovery\/\">Data Backup and Disaster Recovery<\/a>;<\/li>\n<li><a title=\"Cloud Migration Solutions\" href=\"https:\/\/compuworks.pt\/en\/it-solutions\/cloud-computing-services\/\">Cloud Migration Solutions<\/a>;<\/li>\n<li>VPN setup;<\/li>\n<li>IT Infrastructures Management and Monitoring<\/li>\n<li>Data Security Auditing;<\/li>\n<li>Setup and monitor firewalls and business antivirus.<\/li>\n<\/ul>\n<p>We protect your business&#8217;s critical applications, data integrity and reliability, with proactive maintenance services and system monitoring.[\/vc_column_text][\/vc_accordion_tab][vc_accordion_tab title=&#8221;Hardware and Endpoint Security&#8221;][vc_column_text]It Security begins with best practices in setting up your devices and their access permissions.<\/p>\n<p>We apply IT Security setting required to protect pivotal business data in all devices and user endpoints.<\/p>\n<p>IT Security Solutions we can offer:<\/p>\n<ul>\n<li>Endpoint Protectioin, EPP<\/li>\n<li>Endpoint Detection and Response, EDR<\/li>\n<li>Extended Protection and Response, XDR<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_accordion_tab][vc_accordion_tab title=&#8221;Email Security&#8221;][vc_column_text]Use prevention and detection solutions for business email for clean and secure inboxes. These avoid threats and attacks like phishing, the most commonly used to catch less attentive users.<\/p>\n<p>Our IT Security Solutions for Email include different resources like:<\/p>\n<ul>\n<li>block insecure connections and filter web contents;<\/li>\n<li>automatic protection against phishing, malware and ransomware;<\/li>\n<li>firewall, antivurus, antispyware, antispam<\/li>\n<li>security alerts and user training, to raise awareness among its users of the risks they face<\/li>\n<li>inside out security;<\/li>\n<li>traffic correlation from all users.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_accordion_tab][vc_accordion_tab title=&#8221;IT Security Monitoring&#8221;][vc_column_text]Each business uses different softwares and applications.<\/p>\n<p>Using reliable and secure software and applications, as well as their updates, are an essential detail.<\/p>\n<p>We manage IT Security alloning your business to keep private dta secure.<\/p>\n<ul>\n<li>Set access and security policies<\/li>\n<li>Centralize system administration<\/li>\n<li>NOC and SOC, for a prompt protection, detection and response<\/li>\n<li>Apply security rules for infrastructures and networks<\/li>\n<li>Patch management<\/li>\n<li>Automatic updates for software and other application, outside working hours<\/li>\n<li>Zero-Trust and Threat Hunting models to classify and automatically block all malicious applications<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_accordion_tab][\/vc_accordion][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;15&#8243; css=&#8221;.vc_custom_1697911549112{padding-top: 3vw !important;}&#8221;][vc_column offset=&#8221;vc_col-md-offset-2 vc_col-md-8&#8243;][vc_column_text el_class=&#8221;text-centered&#8221;]<span class=\"sup-title\">IT Security Information Services<\/span><\/p>\n<h2><span class=\"color-accent\">IT Security:<\/span> What yyou can get with CompuWorks<\/h2>\n<p><strong>CompuWorks<\/strong> provides complete systems for corporate IT Security.<\/p>\n<p>But more than secure systems, you gain a unified IT protection strategy. We implement robust systems and good information security practices, in order to protect all systems, users and devices.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;25&#8243; equal_height=&#8221;yes&#8221; content_placement=&#8221;top&#8221; css=&#8221;.vc_custom_1696786258761{padding-bottom: 6vw !important;}&#8221;][vc_column el_class=&#8221;link-shadow&#8221; offset=&#8221;vc_col-md-6&#8243;][vc_single_image image=&#8221;13891&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221; el_class=&#8221;icon-64&#8243;][vc_column_text css=&#8221;.vc_custom_1702118198168{margin-bottom: 25px !important;}&#8221; el_class=&#8221;text-centered&#8221;]<\/p>\n<h3 class=\"h4-size\">Global and centralized management<\/h3>\n<p>[\/vc_column_text][vc_column_text]We can provide supervision and administration for all your hardware, software, networks and systems.<\/p>\n<p>We offer IT Security solutions to keep your company safe and protected at different levels.<\/p>\n<ul class=\"check-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"check-list\">\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"check\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> AI Security options, accelerating detection and responseto cyber threats<\/li>\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"check\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> Monitoring solutions with centralized visibility<\/li>\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"check\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> Advanced reports for all IT platforms<\/li>\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"check\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> Threat blocking and malware removal systems<\/li>\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"check\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> Access restriction for users and devices<\/li>\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"check\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> Zero Trust systems and access control policy-based models<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[\/vc_column_text]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">#default-btn-1f0271cc62fbdee9c11bd3540d53d7c4 {\n  font-size: 14px;\n  line-height: 16px;\n  padding: 2px 2px 2px 2px;\n}\n#default-btn-1f0271cc62fbdee9c11bd3540d53d7c4.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-1f0271cc62fbdee9c11bd3540d53d7c4:after {\n  height: 0px;\n}\n#default-btn-1f0271cc62fbdee9c11bd3540d53d7c4 > i {\n  margin-right: 8px;\n  font-size: 11px;\n}\n#default-btn-1f0271cc62fbdee9c11bd3540d53d7c4.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-1f0271cc62fbdee9c11bd3540d53d7c4 > i {\n  margin-right: 8px;\n}<\/style><div class=\"btn-align-center\"><a href=\"#contact-compuworks-form\" class=\"default-btn-shortcode dt-btn-link ico-right-side anchor-link link-purple \" id=\"default-btn-1f0271cc62fbdee9c11bd3540d53d7c4\" title=\"Centralized IT Security visibility\" rel=\"nofollow\"><span>Centralized IT Security visibility<\/span><i class=\"dt-icon-the7-arrow-0-41\"><\/i><\/a><\/div>[\/vc_column][vc_column el_class=&#8221;link-shadow&#8221; offset=&#8221;vc_col-md-6&#8243;][vc_single_image image=&#8221;13893&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221; el_class=&#8221;icon-64&#8243;][vc_column_text css=&#8221;.vc_custom_1702118536780{margin-bottom: 25px !important;}&#8221; el_class=&#8221;text-centered&#8221;]<\/p>\n<h3 class=\"h4-size\">Network Security<\/h3>\n<p>[\/vc_column_text][vc_column_text]Secure your network against all threats.<\/p>\n<ul class=\"check-list\">\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"check\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> Centralized management platforms giving you full visibility to make timely and effective decisions about your network security.<\/li>\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"check\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> Firewalls with firmware update scheduling outside of working hours.<\/li>\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"check\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> Virtual Firewall appliances.<\/li>\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"check\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> Firewall relient solutions with fast performance.<\/li>\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"check\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> Access policies and network settings for different network segments, separating critical business applications.<\/li>\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"check\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> Full services including remote management and protection of your users and endpoints, avoiding malware and other cyber threats getting inside your company&#8217;s information systems.<\/li>\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"check\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> Full visibility reports.<\/li>\n<\/ul>\n<p>[\/vc_column_text]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">#default-btn-d54367ede2b8178a4822b848b2d0678b {\n  font-size: 14px;\n  line-height: 16px;\n  padding: 2px 2px 2px 2px;\n}\n#default-btn-d54367ede2b8178a4822b848b2d0678b.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-d54367ede2b8178a4822b848b2d0678b:after {\n  height: 0px;\n}\n#default-btn-d54367ede2b8178a4822b848b2d0678b > i {\n  margin-right: 8px;\n  font-size: 11px;\n}\n#default-btn-d54367ede2b8178a4822b848b2d0678b.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-d54367ede2b8178a4822b848b2d0678b > i {\n  margin-right: 8px;\n}<\/style><div class=\"btn-align-center\"><a href=\"#contact-compuworks-form\" class=\"default-btn-shortcode dt-btn-link ico-right-side anchor-link link-purple \" id=\"default-btn-d54367ede2b8178a4822b848b2d0678b\" title=\"Talk to us\" rel=\"nofollow\"><span>Talk to us<\/span><i class=\"dt-icon-the7-arrow-0-41\"><\/i><\/a><\/div>[\/vc_column][vc_column el_class=&#8221;link-shadow&#8221; offset=&#8221;vc_col-md-6&#8243;][vc_single_image image=&#8221;13895&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221; el_class=&#8221;icon-64&#8243;][vc_column_text css=&#8221;.vc_custom_1702119174374{margin-bottom: 25px !important;}&#8221; el_class=&#8221;text-centered&#8221;]<\/p>\n<h3 class=\"h4-size\">Multi-Factor Authentication \/ MFA<\/h3>\n<p>[\/vc_column_text][vc_column_text]Authentication solutions for all networks, easy to use. Do not let your company vulnerable to security holes.<\/p>\n<ul class=\"check-list\">\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"check\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> Avoid risks of phone cloning.<\/li>\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"check\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> Protect your assets, identities, user accounts and confidential informations, with high cost-benefit solutions.<\/li>\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"check\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> Always use authentication services.<\/li>\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"check\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> MFA mobile apps.<\/li>\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"check\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> Cloud management, with centralized visibility, alerts and reports.<\/li>\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"check\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> CompuWorks can setup and manage the entire IT Security services so you can rest assured.<\/li>\n<\/ul>\n<p>[\/vc_column_text]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">#default-btn-4319d23c8fb25e2a6dfc4d70e5324f48 {\n  font-size: 14px;\n  line-height: 16px;\n  padding: 2px 2px 2px 2px;\n}\n#default-btn-4319d23c8fb25e2a6dfc4d70e5324f48.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-4319d23c8fb25e2a6dfc4d70e5324f48:after {\n  height: 0px;\n}\n#default-btn-4319d23c8fb25e2a6dfc4d70e5324f48 > i {\n  margin-right: 8px;\n  font-size: 11px;\n}\n#default-btn-4319d23c8fb25e2a6dfc4d70e5324f48.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-4319d23c8fb25e2a6dfc4d70e5324f48 > i {\n  margin-right: 8px;\n}<\/style><div class=\"btn-align-center\"><a href=\"#contact-compuworks-form\" class=\"default-btn-shortcode dt-btn-link ico-right-side anchor-link link-purple \" id=\"default-btn-4319d23c8fb25e2a6dfc4d70e5324f48\" title=\"Avoid security risks\" rel=\"nofollow\"><span>Avoid security risks<\/span><i class=\"dt-icon-the7-arrow-0-41\"><\/i><\/a><\/div>[\/vc_column][vc_column el_class=&#8221;link-shadow&#8221; offset=&#8221;vc_col-md-6&#8243;][vc_single_image image=&#8221;13897&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221; el_class=&#8221;icon-64&#8243;][vc_column_text css=&#8221;.vc_custom_1702119459180{margin-bottom: 25px !important;}&#8221; el_class=&#8221;text-centered&#8221;]<\/p>\n<h3 class=\"h4-size\">Endpoint Security<\/h3>\n<p>[\/vc_column_text][vc_column_text]High Security for all network endpoints, offering more trust to your business partners.<\/p>\n<p>Protect your business with different solutions and addons, integrated modules and additional layers of security.<\/p>\n<ul class=\"check-list\">\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"check\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> Protection, Detection and Response &#8211; Endpoint Security (EPP, EDR, XDR)..<\/li>\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"check\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> Firewall policies and security models to block advanced threats with additional layers of security..<\/li>\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"check\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> Protection against malware and ransomware, with gateway antivirus.<\/li>\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"check\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> DNS-level Protection.<\/li>\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"check\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> NOC and SOC &#8211; your operations security center for fighting advanced attacks.<\/li>\n<\/ul>\n<p>[\/vc_column_text]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">#default-btn-d54367ede2b8178a4822b848b2d0678b {\n  font-size: 14px;\n  line-height: 16px;\n  padding: 2px 2px 2px 2px;\n}\n#default-btn-d54367ede2b8178a4822b848b2d0678b.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-d54367ede2b8178a4822b848b2d0678b:after {\n  height: 0px;\n}\n#default-btn-d54367ede2b8178a4822b848b2d0678b > i {\n  margin-right: 8px;\n  font-size: 11px;\n}\n#default-btn-d54367ede2b8178a4822b848b2d0678b.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-d54367ede2b8178a4822b848b2d0678b > i {\n  margin-right: 8px;\n}<\/style><div class=\"btn-align-center\"><a href=\"#contact-compuworks-form\" class=\"default-btn-shortcode dt-btn-link ico-right-side anchor-link link-purple \" id=\"default-btn-d54367ede2b8178a4822b848b2d0678b\" title=\"Talk to us\" rel=\"nofollow\"><span>Talk to us<\/span><i class=\"dt-icon-the7-arrow-0-41\"><\/i><\/a><\/div>[\/vc_column][vc_column offset=&#8221;vc_col-md-6&#8243; el_class=&#8221;link-shadow&#8221;][vc_single_image image=&#8221;13899&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221; el_class=&#8221;icon-64&#8243;][vc_column_text css=&#8221;.vc_custom_1702120037284{margin-bottom: 25px !important;}&#8221; el_class=&#8221;text-centered&#8221;]<\/p>\n<h3 class=\"h4-size\">Secure Wi-Fi Access Points<\/h3>\n<p>[\/vc_column_text][vc_column_text]From small offices to major corporate business, we assure secure wireless wxperiences.<\/p>\n<ul class=\"check-list\">\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"check\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> Wi-Fi acces Points with secure encryption<\/li>\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"check\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> Wi-Fi 6<\/li>\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"check\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> Cloud management with a\u00a0faster security service delivery, more automated with visibility into crucial reporting, including access policies.<\/li>\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"check\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> Mobile VPN settings.<\/li>\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"check\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> Simple to use and integrated with other MFA solutions.<\/li>\n<\/ul>\n<p>[\/vc_column_text]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">#default-btn-c6263cf3cfd317f1a6c7dd358df8d53f {\n  font-size: 14px;\n  line-height: 16px;\n  padding: 2px 2px 2px 2px;\n}\n#default-btn-c6263cf3cfd317f1a6c7dd358df8d53f.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-c6263cf3cfd317f1a6c7dd358df8d53f:after {\n  height: 0px;\n}\n#default-btn-c6263cf3cfd317f1a6c7dd358df8d53f > i {\n  margin-right: 8px;\n  font-size: 11px;\n}\n#default-btn-c6263cf3cfd317f1a6c7dd358df8d53f.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-c6263cf3cfd317f1a6c7dd358df8d53f > i {\n  margin-right: 8px;\n}<\/style><div class=\"btn-align-center\"><a href=\"#contact-compuworks-form\" class=\"default-btn-shortcode dt-btn-link ico-right-side anchor-link link-purple \" id=\"default-btn-c6263cf3cfd317f1a6c7dd358df8d53f\" title=\"Talk to an expert\" rel=\"nofollow\"><span>Talk to an expert<\/span><i class=\"dt-icon-the7-arrow-0-41\"><\/i><\/a><\/div>[\/vc_column][vc_column offset=&#8221;vc_col-md-6&#8243; el_class=&#8221;link-shadow&#8221;][vc_single_image image=&#8221;13901&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221; el_class=&#8221;icon-64&#8243;][vc_column_text css=&#8221;.vc_custom_1702120487142{margin-bottom: 25px !important;}&#8221; el_class=&#8221;text-centered&#8221;]<\/p>\n<h3 class=\"h4-size\">Email Security<\/h3>\n<p>[\/vc_column_text][vc_column_text]We are Email Security Solutions for protected users<\/p>\n<p><strong>Our Solutions allow to:<\/strong><\/p>\n<ul class=\"check-list\">\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"Evitar amea\u00e7as de ciberseguran\u00e7a e spam\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> Avoid cyber threats and spam.<\/li>\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"Detetar e prevenir intrus\u00f5es e vulnerabilidades\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> Detect and prevent intrusions and vulnerabilities.<\/li>\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"Evitar a propaga\u00e7\u00e3o de amea\u00e7as que chegam por email\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> Avoid propagation that come in through email<\/li>\n<\/ul>\n<p><strong>These solutions offer:<\/strong><\/p>\n<ul class=\"check-list\">\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"Garantias de conformidade da informa\u00e7\u00e3o\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> Compliance.<\/li>\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"Seguran\u00e7a de sistemas e Cloud services\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> Integration with external services like M365<\/li>\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"Camadas de prote\u00e7\u00e3o externa e interna\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> Aditional layers of protection<\/li>\n<li><img decoding=\"async\" class=\"style-svg smallicon\" title=\"Seguran\u00e7a inform\u00e1tica com a Educa\u00e7\u00e3o dos utilizadores\" src=\"\/wp-content\/uploads\/2023\/04\/ico-check-bold.svg\" alt=\"check\" width=\"24px\" \/> Training and alerts for all users<\/li>\n<\/ul>\n<p>[\/vc_column_text]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">#default-btn-dbc5f94dbf88271d8e9b7a2dc5317256 {\n  font-size: 14px;\n  line-height: 16px;\n  padding: 2px 2px 2px 2px;\n}\n#default-btn-dbc5f94dbf88271d8e9b7a2dc5317256.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-dbc5f94dbf88271d8e9b7a2dc5317256:after {\n  height: 0px;\n}\n#default-btn-dbc5f94dbf88271d8e9b7a2dc5317256 > i {\n  margin-right: 8px;\n  font-size: 11px;\n}\n#default-btn-dbc5f94dbf88271d8e9b7a2dc5317256.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-dbc5f94dbf88271d8e9b7a2dc5317256 > i {\n  margin-right: 8px;\n}<\/style><div class=\"btn-align-center\"><a href=\"#contact-compuworks-form\" class=\"default-btn-shortcode dt-btn-link ico-right-side anchor-link link-purple \" id=\"default-btn-dbc5f94dbf88271d8e9b7a2dc5317256\" title=\"Protect users\" rel=\"nofollow\"><span>Protect users<\/span><i class=\"dt-icon-the7-arrow-0-41\"><\/i><\/a><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;5&#8243; css=&#8221;.vc_custom_1697913819720{padding-top: 60px !important;padding-bottom: 60px !important;}&#8221; el_class=&#8221;dark-bg bg-malha-blue-corner-right&#8221;][vc_column css=&#8221;.vc_custom_1697912318845{padding-top: 0px !important;padding-bottom: 0px !important;}&#8221; el_class=&#8221;text-centered&#8221; offset=&#8221;vc_col-md-offset-2 vc_col-md-8&#8243;][vc_column_text]<span class=\"sup-title white\">We protect your business with next-gen integrated technologies<\/span><\/p>\n<h2 class=\"heading-2 color-1-blue\">IT Security Services for Business<\/h2>\n<h3 class=\"h4-size heading-3 white\">We provide services and solutions that enable a fast response to cyber attacks and threats.<\/h3>\n<p class=\"white\">Protect your business&#8217;s critical information by applying proactive protection measures and minimize the risks of unauthorized access.<\/p>\n<p>[\/vc_column_text]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">#default-btn-b278a81e4c877a229164d19b378a7646 {\n  border-radius: 1px;\n  font-size: 14px;\n  line-height: 16px;\n}\n.btn-shadow#default-btn-b278a81e4c877a229164d19b378a7646 {\n  box-shadow: 0 1px 6px rgba(0,0,0,0.12);\n  transition: box-shadow 0.2s ease-out, opacity 0.45s;\n}\n.btn-shadow#default-btn-b278a81e4c877a229164d19b378a7646:hover {\n  box-shadow: 0 5px 11px 0 rgba(0,0,0,0.18), 0 4px 15px 0 rgba(0,0,0,0.15);\n}\n.btn-flat#default-btn-b278a81e4c877a229164d19b378a7646 {\n  box-shadow: none;\n}\n.btn-flat#default-btn-b278a81e4c877a229164d19b378a7646:hover {\n  box-shadow: none;\n}\n#default-btn-b278a81e4c877a229164d19b378a7646.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-b278a81e4c877a229164d19b378a7646 > i {\n  margin-right: 8px;\n  font-size: 12px;\n}\n#default-btn-b278a81e4c877a229164d19b378a7646:not(:hover) {\n  border-width: 0px;\n  padding: 0px 0px 0px 0px;\n}\n#default-btn-b278a81e4c877a229164d19b378a7646:hover {\n  border-width: 0px;\n  padding: 0px 0px 0px 0px;\n}\n#default-btn-b278a81e4c877a229164d19b378a7646.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-b278a81e4c877a229164d19b378a7646 > i {\n  margin-right: 8px;\n}<\/style><a href=\"#contact-compuworks-form\" class=\"default-btn-shortcode dt-btn anchor-link btn-orange btn-inline-left btn-flat \" id=\"default-btn-b278a81e4c877a229164d19b378a7646\" title=\"Request a quote\" rel=\"nofollow\"><i class=\"icomoon-the7-font-the7-mail-03\"><\/i><span>REQUEST A QUOTE<\/span><\/a><style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">#default-btn-ab4b32d185ae1ad54ea9f5c35966ab05 {\n  border-radius: 1px;\n  font-size: 14px;\n  line-height: 16px;\n}\n.btn-shadow#default-btn-ab4b32d185ae1ad54ea9f5c35966ab05 {\n  box-shadow: 0 1px 6px rgba(0,0,0,0.12);\n  transition: box-shadow 0.2s ease-out, opacity 0.45s;\n}\n.btn-shadow#default-btn-ab4b32d185ae1ad54ea9f5c35966ab05:hover {\n  box-shadow: 0 5px 11px 0 rgba(0,0,0,0.18), 0 4px 15px 0 rgba(0,0,0,0.15);\n}\n.btn-flat#default-btn-ab4b32d185ae1ad54ea9f5c35966ab05 {\n  box-shadow: none;\n}\n.btn-flat#default-btn-ab4b32d185ae1ad54ea9f5c35966ab05:hover {\n  box-shadow: none;\n}\n#default-btn-ab4b32d185ae1ad54ea9f5c35966ab05.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-ab4b32d185ae1ad54ea9f5c35966ab05 > i {\n  margin-right: 8px;\n  font-size: 12px;\n}\n#default-btn-ab4b32d185ae1ad54ea9f5c35966ab05:not(:hover) {\n  border-width: 0px;\n  padding: 0px 0px 0px 0px;\n}\n#default-btn-ab4b32d185ae1ad54ea9f5c35966ab05:hover {\n  border-width: 0px;\n  padding: 0px 0px 0px 0px;\n}\n#default-btn-ab4b32d185ae1ad54ea9f5c35966ab05.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-ab4b32d185ae1ad54ea9f5c35966ab05 > i {\n  margin-right: 8px;\n}<\/style><a href=\"tel:+351213138603\" class=\"default-btn-shortcode dt-btn link-hover-off anchor-link btn-white-txt-orange btn-inline-left btn-flat \" id=\"default-btn-ab4b32d185ae1ad54ea9f5c35966ab05\" title=\"Call us-nos\" rel=\"nofollow\"><i class=\"icomoon-the7-font-the7-phone-02\"><\/i><span>CALL: +351 213 138 603<\/span><\/a>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1686065223372{padding-top: 3vw !important;padding-bottom: 0px !important;background-color: #f7f8f9 !important;}&#8221;][vc_column offset=&#8221;vc_col-md-offset-2 vc_col-md-8&#8243;][vc_column_text el_class=&#8221;text-centered&#8221;]<\/p>\n<h2>Earnings with our IT Security services for your business<\/h2>\n<p>Our IT Consultants will evaluate the best IT Security strategy to implement in your company, choosing the right technologies and systmes suited to the risks it faces.<\/p>\n<p>The goal is to achieve significant gains for your business when investing in IT Security Services.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;25&#8243; equal_height=&#8221;yes&#8221; content_placement=&#8221;top&#8221; css=&#8221;.vc_custom_1684152222677{padding-top: 3vw !important;padding-bottom: 5vw !important;background-color: #f7f8f9 !important;}&#8221;][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;link-shadow&#8221; css=&#8221;.vc_custom_1682702101876{border-radius: 20px !important;}&#8221;][vc_single_image image=&#8221;13903&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221; el_class=&#8221;icon-64&#8243;][vc_column_text css=&#8221;.vc_custom_1702121290056{margin-bottom: 25px !important;}&#8221; el_class=&#8221;text-centered&#8221;]<\/p>\n<h3 class=\"h4-size\">Prevention<\/h3>\n<p>Prevent risks and attacks with intrusion systems, ensuring timely incident resolution and continuity of operations.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;link-shadow&#8221;][vc_single_image image=&#8221;13905&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221; el_class=&#8221;icon-64&#8243;][vc_column_text css=&#8221;.vc_custom_1702121354334{margin-bottom: 25px !important;}&#8221; el_class=&#8221;text-centered&#8221;]<\/p>\n<h3 class=\"h4-size\">Protection<\/h3>\n<p>Ensure continuous good functioning of all IT systems, free from cyber attacks, so that your operations and activity never has to stop.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;link-shadow&#8221;][vc_single_image image=&#8221;13907&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221; el_class=&#8221;icon-64&#8243;][vc_column_text css=&#8221;.vc_custom_1702121388981{margin-bottom: 25px !important;}&#8221; el_class=&#8221;text-centered&#8221;]<\/p>\n<h3 class=\"h4-size\">Monitoring<\/h3>\n<p>Get a view of all points of entry into systems, and track or block access to confidential data.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;link-shadow&#8221; offset=&#8221;vc_col-md-3&#8243;][vc_single_image image=&#8221;13909&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221; el_class=&#8221;icon-64&#8243;][vc_column_text css=&#8221;.vc_custom_1702121420252{margin-bottom: 25px !important;}&#8221; el_class=&#8221;text-centered&#8221;]<\/p>\n<h3 class=\"h4-size\">Operability<\/h3>\n<p>Relieve the burden on employees with technological issues, and free them for business-valuable operations.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;link-shadow&#8221; offset=&#8221;vc_col-md-3&#8243;][vc_single_image image=&#8221;13911&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221; el_class=&#8221;icon-64&#8243;][vc_column_text css=&#8221;.vc_custom_1702121468127{margin-bottom: 25px !important;}&#8221; el_class=&#8221;text-centered&#8221;]<\/p>\n<h3 class=\"h4-size\">Profitability<\/h3>\n<p>Increase company&#8217;s profitability and efficiency, without risk of failures or loss of data critical to business continuity.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;link-shadow&#8221; offset=&#8221;vc_col-md-3&#8243;][vc_single_image image=&#8221;13913&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221; el_class=&#8221;icon-64&#8243;][vc_column_text css=&#8221;.vc_custom_1702121496575{margin-bottom: 25px !important;}&#8221; el_class=&#8221;text-centered&#8221;]<\/p>\n<h3 class=\"h4-size\">Focus on your business<\/h3>\n<p>Free yourself from worries and focus on activities that generate the most value for your business.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;link-shadow&#8221; offset=&#8221;vc_col-md-3&#8243;][vc_single_image image=&#8221;13915&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221; el_class=&#8221;icon-64&#8243;][vc_column_text css=&#8221;.vc_custom_1702121527658{margin-bottom: 25px !important;}&#8221; el_class=&#8221;text-centered&#8221;]<\/p>\n<h3 class=\"h4-size\">Certified<\/h3>\n<p>Ensure certifications and compliance with legal requirements as well as implementation of regulatory security policies.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;dark-bg bg-purple bg-cta&#8221;][vc_column offset=&#8221;vc_col-md-4 vc_hidden-sm vc_hidden-xs&#8221;][\/vc_column][vc_column offset=&#8221;vc_col-md-offset-2 vc_col-md-6&#8243; css=&#8221;.vc_custom_1698586053632{padding-top: 60px !important;padding-bottom: 60px !important;}&#8221;][vc_column_text]<\/p>\n<h2 class=\"heading-2 color-1-blue\">IT Security Services to keep your business running<\/h2>\n<h3 class=\"h4-size white\">We Work, <span class=\"color-1-blue\">IT<\/span> Works.<\/h3>\n<p class=\"white\">We apply only the best cybersecurity practices and solutions. Ensure the continuity of your business.<\/p>\n<p>[\/vc_column_text]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">#default-btn-b278a81e4c877a229164d19b378a7646 {\n  border-radius: 1px;\n  font-size: 14px;\n  line-height: 16px;\n}\n.btn-shadow#default-btn-b278a81e4c877a229164d19b378a7646 {\n  box-shadow: 0 1px 6px rgba(0,0,0,0.12);\n  transition: box-shadow 0.2s ease-out, opacity 0.45s;\n}\n.btn-shadow#default-btn-b278a81e4c877a229164d19b378a7646:hover {\n  box-shadow: 0 5px 11px 0 rgba(0,0,0,0.18), 0 4px 15px 0 rgba(0,0,0,0.15);\n}\n.btn-flat#default-btn-b278a81e4c877a229164d19b378a7646 {\n  box-shadow: none;\n}\n.btn-flat#default-btn-b278a81e4c877a229164d19b378a7646:hover {\n  box-shadow: none;\n}\n#default-btn-b278a81e4c877a229164d19b378a7646.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-b278a81e4c877a229164d19b378a7646 > i {\n  margin-right: 8px;\n  font-size: 12px;\n}\n#default-btn-b278a81e4c877a229164d19b378a7646:not(:hover) {\n  border-width: 0px;\n  padding: 0px 0px 0px 0px;\n}\n#default-btn-b278a81e4c877a229164d19b378a7646:hover {\n  border-width: 0px;\n  padding: 0px 0px 0px 0px;\n}\n#default-btn-b278a81e4c877a229164d19b378a7646.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-b278a81e4c877a229164d19b378a7646 > i {\n  margin-right: 8px;\n}<\/style><a href=\"#contact-compuworks-form\" class=\"default-btn-shortcode dt-btn anchor-link btn-orange btn-inline-left btn-flat \" id=\"default-btn-b278a81e4c877a229164d19b378a7646\" title=\"Request a quote\" rel=\"nofollow\"><i class=\"icomoon-the7-font-the7-mail-03\"><\/i><span>REQUEST A QUOTE<\/span><\/a><style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">#default-btn-76ab1d251e13978acc71a40aa624715d {\n  border-radius: 1px;\n  font-size: 14px;\n  line-height: 16px;\n}\n.btn-shadow#default-btn-76ab1d251e13978acc71a40aa624715d {\n  box-shadow: 0 1px 6px rgba(0,0,0,0.12);\n  transition: box-shadow 0.2s ease-out, opacity 0.45s;\n}\n.btn-shadow#default-btn-76ab1d251e13978acc71a40aa624715d:hover {\n  box-shadow: 0 5px 11px 0 rgba(0,0,0,0.18), 0 4px 15px 0 rgba(0,0,0,0.15);\n}\n.btn-flat#default-btn-76ab1d251e13978acc71a40aa624715d {\n  box-shadow: none;\n}\n.btn-flat#default-btn-76ab1d251e13978acc71a40aa624715d:hover {\n  box-shadow: none;\n}\n#default-btn-76ab1d251e13978acc71a40aa624715d.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-76ab1d251e13978acc71a40aa624715d > i {\n  margin-right: 8px;\n  font-size: 12px;\n}\n#default-btn-76ab1d251e13978acc71a40aa624715d:not(:hover) {\n  border-width: 0px;\n  padding: 0px 0px 0px 0px;\n}\n#default-btn-76ab1d251e13978acc71a40aa624715d:hover {\n  border-width: 0px;\n  padding: 0px 0px 0px 0px;\n}\n#default-btn-76ab1d251e13978acc71a40aa624715d.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-76ab1d251e13978acc71a40aa624715d > i {\n  margin-right: 8px;\n}<\/style><a href=\"tel:+351213138603\" class=\"default-btn-shortcode dt-btn link-hover-off anchor-link btn-white-txt-orange btn-inline-left btn-flat \" id=\"default-btn-76ab1d251e13978acc71a40aa624715d\" title=\"Call us\" rel=\"nofollow\"><i class=\"icomoon-the7-font-the7-phone-02\"><\/i><span>CALL: +3551 213 138 603<\/span><\/a>[\/vc_column][\/vc_row][vc_row gap=&#8221;25&#8243; css=&#8221;.vc_custom_1698608264105{padding-top: 60px !important;padding-bottom: 80px !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h2>Why choose<br \/>\n<span class=\"color-accent\">CompuWorks<\/span><\/h2>\n<p>[\/vc_column_text][vc_column_text]<strong>CompuWorks<\/strong> provides you with a multidisciplinary team with practical experience in <strong>IT Security<\/strong>..<\/p>\n<p>We are always looking for solutions that better fit your business.<\/p>\n<p>In addition, we setup all cyber security systems and allow your IT to evolve in accordance with current best practices.[\/vc_column_text]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">#default-btn-256ff5b8f1a1db6f9dd835466dd7ebe3 {\n  border-radius: 1px;\n  font-size: 14px;\n  line-height: 16px;\n}\n.btn-shadow#default-btn-256ff5b8f1a1db6f9dd835466dd7ebe3 {\n  box-shadow: 0 1px 6px rgba(0,0,0,0.12);\n  transition: box-shadow 0.2s ease-out, opacity 0.45s;\n}\n.btn-shadow#default-btn-256ff5b8f1a1db6f9dd835466dd7ebe3:hover {\n  box-shadow: 0 5px 11px 0 rgba(0,0,0,0.18), 0 4px 15px 0 rgba(0,0,0,0.15);\n}\n.btn-flat#default-btn-256ff5b8f1a1db6f9dd835466dd7ebe3 {\n  box-shadow: none;\n}\n.btn-flat#default-btn-256ff5b8f1a1db6f9dd835466dd7ebe3:hover {\n  box-shadow: none;\n}\n#default-btn-256ff5b8f1a1db6f9dd835466dd7ebe3.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-256ff5b8f1a1db6f9dd835466dd7ebe3 > i {\n  margin-right: 8px;\n  font-size: 12px;\n}\n#default-btn-256ff5b8f1a1db6f9dd835466dd7ebe3:not(:hover) {\n  border-width: 0px;\n  padding: 0px 0px 0px 0px;\n}\n#default-btn-256ff5b8f1a1db6f9dd835466dd7ebe3:hover {\n  border-width: 0px;\n  padding: 0px 0px 0px 0px;\n}\n#default-btn-256ff5b8f1a1db6f9dd835466dd7ebe3.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-256ff5b8f1a1db6f9dd835466dd7ebe3 > i {\n  margin-right: 8px;\n}<\/style><div class=\"btn-align-left\"><a href=\"#contact-compuworks-form\" class=\"default-btn-shortcode dt-btn ico-right-side anchor-link btn-orange btn-flat \" id=\"default-btn-256ff5b8f1a1db6f9dd835466dd7ebe3\" title=\"Solite o nosso contacto\" rel=\"nofollow\"><span>FALE CONNOSCO<\/span><i class=\"dt-icon-the7-arrow-0-41\"><\/i><\/a><\/div>[\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h3 class=\"h4-size\">What to expect from our IT Security Services<\/h3>\n<p>[\/vc_column_text][vc_accordion active_tab=&#8221;false&#8221; collapsible=&#8221;yes&#8221; title_size=&#8221;h5&#8243; style=&#8221;2&#8243; el_class=&#8221;cw-accordion&#8221;][vc_accordion_tab title=&#8221;Multidisciplinary team&#8221;][vc_column_text]Cybersecurity requires the combination of different skills with the know-how of experienced teams.<\/p>\n<p>CompuWorks provides you with remote monitoring with IT technicians, as well as information systems consultants and cybersecurity experts.<\/p>\n<p>We have dedicated teams with different skills and qualifications, and we provide them constant training. Only this way can we grant innovative and safe solutions, suited to the needs of each client.[\/vc_column_text][\/vc_accordion_tab][vc_accordion_tab title=&#8221;Integrated Information Security Strategies&#8221;][vc_column_text]Our professionals work closely with customers to evaluate their business operations, requirements and objectives.<\/p>\n<p>This way we are able to set integrated solutions, capable of responding to individual problems and challenges existing in each department.<\/p>\n<p>As a result we offer greater business continuity and stability, with significant gains for our customers.<\/p>\n<ul>\n<li aria-level=\"1\">Planning and implementing cyber security processes and systems;<\/li>\n<li aria-level=\"1\">Setting automation and computer monitoring systems;<\/li>\n<li aria-level=\"1\">Maintenance and evolutionary management services;<\/li>\n<li aria-level=\"1\">Access redundancy implementation;<\/li>\n<li aria-level=\"1\">Computer diagnostics and audits;<\/li>\n<li aria-level=\"1\">Administration and system upgrades;<\/li>\n<li aria-level=\"1\">Data reporting and analysis.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_accordion_tab][vc_accordion_tab title=&#8221;Systems and Network Administration&#8221;][vc_column_text]We offer a full service:<\/p>\n<ul>\n<li>Network and systems planning and architecture.<\/li>\n<li>Solution implementation and delivery.<\/li>\n<li>Regular firewall monitoring and checks,<\/li>\n<li>Intrusion prevention, access validation.<\/li>\n<li>Proactive actions to optimize systems and practices.<\/li>\n<li>Most advanced technological solutions.<\/li>\n<\/ul>\n<p>We implement and manage all platforms to keep your entire network protected from intrusions, phishing attempts, malware, ransomware and more.[\/vc_column_text][\/vc_accordion_tab][vc_accordion_tab title=&#8221;IT Monitoring&#8221;][vc_column_text]CompuWorks guarantees the IT management and monitoring of all systems and endpoints, in order to ensure the continuity of Information Security so that your business is protected.<\/p>\n<p>We guarantee centralized and scalable management, for multiple locations and teams with integrated and remote systems.<\/p>\n<p>Free yourself from worries with a partner that offers you permanent, remote monitoring. We implement automatic alert, response and resolution systems for any detected incident.[\/vc_column_text][\/vc_accordion_tab][vc_accordion_tab title=&#8221;Data Backup and Restore Solutions&#8221;][vc_column_text]Part of keeping your information safe is ensuring its <strong>integrity<\/strong> and <strong>availability<\/strong>.<\/p>\n<p>With the increasing refinement of ransomware and cyberattacks in Portugal, it is essential to have a backup and data recovery plan..<\/p>\n<p>We offer different solutions, with IT backup in the cloud or remote and local data centers.<\/p>\n<p>Furthermore, we always provide best implementaion practices, manage and monitor backup systems so you can rest assured.<\/p>\n<p>Our clients&#8217; critical business data is essential for the continuity of their operations. And, for all this, CompuWorks seeks to ensure that your company is protected and data recovery is guaranteed in the event of a disaster or cyber attack..<\/p>\n<p><a title=\"Data Backup and Disaster Recovery solutions\" href=\"https:\/\/compuworks.pt\/en\/it-solutions\/data-backup-recovery\/\">Find out more about our Data Backup and Disaster Recovery solutions \u00bb<\/a>[\/vc_column_text][\/vc_accordion_tab][vc_accordion_tab title=&#8221;IT Security Consultancy&#8221;][vc_column_text]We are a complete IT Security Service partner.\u00a0With <strong>CompuWorks<\/strong> you gain <a title=\"IT Outsourcing Technicians\" href=\"https:\/\/compuworks.pt\/en\/it-services\/it-outsourcing\/\">IT Technicians<\/a> with expertise in different technologies and IT Security options.<\/p>\n<p>We will advise your business with the best options available according to your requirements and what we discover is missing in IT Security practices.<\/p>\n<p>We are an IT partner you can count on to have the best IT Security solutions tailored to your company. Make sure you can run your operations safely and efficiently.<\/p>\n<p><a title=\"Managed IT Service Provider\" href=\"https:\/\/compuworks.pt\/en\/it-services\/managed-service-provider\/\">Read more about our Managed IT Services \u00bb<\/a>[\/vc_column_text][\/vc_accordion_tab][vc_accordion_tab title=&#8221;24&#215;7 Support&#8221;][vc_column_text]We give 24\u00d77 Support by phone or email.<\/p>\n<p>In addition, we go to your facilities whenever necessary.[\/vc_column_text][\/vc_accordion_tab][\/vc_accordion][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content&#8221; gap=&#8221;25&#8243; el_class=&#8221;dark-bg bg-malha-top-before&#8221; css=&#8221;.vc_custom_1702067736544{padding-top: 80px !important;padding-right: 4% !important;padding-bottom: 60px !important;padding-left: 4% !important;}&#8221;][vc_column offset=&#8221;vc_col-md-2\/5&#8243;][vc_row_inner][vc_column_inner offset=&#8221;vc_hidden-lg vc_hidden-md&#8221;][vc_column_text el_class=&#8221;text-centered&#8221;]<\/p>\n<h3 class=\"h1-size color-1-blue\">Get to know the numbers that set us apart<\/h3>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][vc_column_text]<\/p>\n<h3 class=\"h1-size color-1-blue\">Get to know the numbers that set us apart<\/h3>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243; offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][vc_single_image image=&#8221;10117&#8243; img_size=&#8221;full&#8221; css=&#8221;.vc_custom_1702068734417{margin-bottom: 0px !important;}&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][vc_single_image image=&#8221;17567&#8243; img_size=&#8221;160&#215;60&#8243; css=&#8221;.vc_custom_1774898713808{padding-top: 20px !important;}&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; offset=&#8221;vc_hidden-lg vc_hidden-md vc_col-xs-6&#8243;][vc_single_image image=&#8221;10117&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;.vc_custom_1702068719294{margin-bottom: 0px !important;}&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; offset=&#8221;vc_hidden-lg vc_hidden-md vc_col-xs-6&#8243;][vc_single_image image=&#8221;17567&#8243; img_size=&#8221;160&#215;60&#8243; alignment=&#8221;center&#8221; css=&#8221;.vc_custom_1774898726407{padding-top: 20px !important;}&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column offset=&#8221;vc_col-md-3\/5&#8243;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;top&#8221;][vc_column_inner width=&#8221;1\/2&#8243; offset=&#8221;vc_col-md-4 vc_col-xs-6&#8243;][vc_single_image image=&#8221;14680&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221; el_class=&#8221;icon-64&#8243;][vc_column_text css=&#8221;.vc_custom_1702067590029{margin-bottom: 20px !important;}&#8221; el_class=&#8221;text-centered&#8221;]<\/p>\n<h2 class=\"color-1-blue\">+21.353<\/h2>\n<p><span class=\"white\">Work stations<\/span>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; offset=&#8221;vc_col-md-4 vc_col-xs-6&#8243;][vc_single_image image=&#8221;14682&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221; el_class=&#8221;icon-64&#8243;][vc_column_text css=&#8221;.vc_custom_1702067612241{margin-bottom: 20px !important;}&#8221; el_class=&#8221;text-centered&#8221;]<\/p>\n<h2 class=\"color-1-blue\">+23.480<\/h2>\n<p><span class=\"white\">Monitored end users<\/span>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; offset=&#8221;vc_col-md-4 vc_col-xs-6&#8243;][vc_single_image image=&#8221;14689&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221; el_class=&#8221;icon-64&#8243;][vc_column_text css=&#8221;.vc_custom_1702067636612{margin-bottom: 20px !important;}&#8221; el_class=&#8221;text-centered&#8221;]<\/p>\n<h2 class=\"color-1-blue\">+5.000<\/h2>\n<p><span class=\"white\">Secured mobile devices<\/span>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; offset=&#8221;vc_col-md-4 vc_col-xs-6&#8243;][vc_single_image image=&#8221;14684&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221; el_class=&#8221;icon-64&#8243;][vc_column_text css=&#8221;.vc_custom_1702067645692{margin-bottom: 20px !important;}&#8221; el_class=&#8221;text-centered&#8221;]<\/p>\n<h2 class=\"color-1-blue\">+51.000<\/h2>\n<p><span class=\"white\">Support hours\/ Year<\/span>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; offset=&#8221;vc_col-md-4 vc_col-xs-6&#8243;][vc_single_image image=&#8221;14691&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221; el_class=&#8221;icon-64&#8243;][vc_column_text css=&#8221;.vc_custom_1702067661983{margin-bottom: 20px !important;}&#8221; el_class=&#8221;text-centered&#8221;]<\/p>\n<h2 class=\"color-1-blue\">+600<\/h2>\n<p><span class=\"white\">Installed servers<\/span>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; offset=&#8221;vc_col-md-4 vc_col-xs-6&#8243;][vc_single_image image=&#8221;14693&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221; el_class=&#8221;icon-64&#8243;][vc_column_text css=&#8221;.vc_custom_1702067710099{margin-bottom: 20px !important;}&#8221; el_class=&#8221;text-centered&#8221;]<\/p>\n<h2 class=\"color-1-blue\">+45.000<\/h2>\n<p><span class=\"white\">Prevented Cyberattacks<\/span>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1700398705493{padding-top: 60px !important;padding-bottom: 80px !important;}&#8221; el_class=&#8221;carousell bg-light-grey&#8221;][vc_column offset=&#8221;vc_col-md-offset-1 vc_col-md-10&#8243;][vc_column_text el_class=&#8221;text-centered&#8221;]<\/p>\n<h3>We are partners with the most reputable brands in IT<\/h3>\n<p>Trust a certified partner like CompuWorks. We are IT professionals.[\/vc_column_text][\/vc_column][vc_column]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">.carousel-shortcode.carousel-shortcode-id-8d0c1b94ed524e3fd0b0bc54e3c2bd9c.owl-carousel .owl-nav div {\n  width: 36px;\n  height: 36px;\n  border-radius: 500px;\n}\n.dt-arrow-border-on.carousel-shortcode.carousel-shortcode-id-8d0c1b94ed524e3fd0b0bc54e3c2bd9c.owl-carousel .owl-nav div:not(:hover):before {\n  border-width: 0px;\n}\n.dt-arrow-hover-border-on.carousel-shortcode.carousel-shortcode-id-8d0c1b94ed524e3fd0b0bc54e3c2bd9c.owl-carousel .owl-nav div:hover:after {\n  border-width: 0px;\n}\n.arrows-bg-on.carousel-shortcode.carousel-shortcode-id-8d0c1b94ed524e3fd0b0bc54e3c2bd9c.owl-carousel .owl-nav div:before {\n  background: rgba(92,6,140,0.75);\n}\n.arrows-hover-bg-on.carousel-shortcode.carousel-shortcode-id-8d0c1b94ed524e3fd0b0bc54e3c2bd9c.owl-carousel .owl-nav div:after {\n  background: #5c068c;\n}\n.carousel-shortcode.carousel-shortcode-id-8d0c1b94ed524e3fd0b0bc54e3c2bd9c.owl-carousel .owl-nav div.owl-prev {\n  top: calc(100% + 0px);\n  left: 0px;\n}\n.carousel-shortcode.carousel-shortcode-id-8d0c1b94ed524e3fd0b0bc54e3c2bd9c.owl-carousel .owl-nav div.owl-prev i {\n  padding: 0px 0px 0px 0px;\n}\n.carousel-shortcode.carousel-shortcode-id-8d0c1b94ed524e3fd0b0bc54e3c2bd9c.owl-carousel .owl-nav div.owl-next {\n  top: calc(100% + 0px);\n  right: 0px;\n}\n.carousel-shortcode.carousel-shortcode-id-8d0c1b94ed524e3fd0b0bc54e3c2bd9c.owl-carousel .owl-nav div.owl-next i {\n  padding: 0px 0px 0px 0px;\n}\n.carousel-shortcode.carousel-shortcode-id-8d0c1b94ed524e3fd0b0bc54e3c2bd9c.owl-carousel .owl-nav i {\n  font-size: 18px;\n}\n.carousel-shortcode.carousel-shortcode-id-8d0c1b94ed524e3fd0b0bc54e3c2bd9c.owl-carousel .owl-nav div:not(:hover) i,\n.carousel-shortcode.carousel-shortcode-id-8d0c1b94ed524e3fd0b0bc54e3c2bd9c.owl-carousel .owl-nav div:not(:hover) i:before {\n  color: #ffffff;\n  background: none;\n}\n.carousel-shortcode.carousel-shortcode-id-8d0c1b94ed524e3fd0b0bc54e3c2bd9c.owl-carousel .owl-nav div:hover i,\n.carousel-shortcode.carousel-shortcode-id-8d0c1b94ed524e3fd0b0bc54e3c2bd9c.owl-carousel .owl-nav div:hover i:before {\n  color: #ffffff;\n  background: none;\n}\n.carousel-shortcode.carousel-shortcode-id-8d0c1b94ed524e3fd0b0bc54e3c2bd9c .owl-dots {\n  top: calc(100% + 20px);\n  left: 50%;\n  transform: translateX(calc(-50% + 0px));\n}\n@media all and (-ms-high-contrast: none) {\n  .carousel-shortcode.carousel-shortcode-id-8d0c1b94ed524e3fd0b0bc54e3c2bd9c .owl-dots {\n    transform: translateX(-50%);\n    margin-left: 0px;\n  }\n}\n.carousel-shortcode.carousel-shortcode-id-8d0c1b94ed524e3fd0b0bc54e3c2bd9c .owl-dot {\n  width: 10px;\n  height: 10px;\n  margin: 0 8px;\n}\n@media screen and (max-width: 778px) {\n  .carousel-shortcode.carousel-shortcode-id-8d0c1b94ed524e3fd0b0bc54e3c2bd9c.hide-arrows .owl-nav a {\n    display: none;\n  }\n}\n@media screen and (max-width: 778px) {\n  .carousel-shortcode.carousel-shortcode-id-8d0c1b94ed524e3fd0b0bc54e3c2bd9c.reposition-arrows .owl-nav div.owl-prev {\n    top: calc(100% + 0px);\n    left: -10px;\n  }\n  .carousel-shortcode.carousel-shortcode-id-8d0c1b94ed524e3fd0b0bc54e3c2bd9c.reposition-arrows .owl-nav div.owl-next {\n    top: calc(100% + 0px);\n    right: -10px;\n  }\n}<\/style><div class=\"owl-carousel carousel-shortcode dt-owl-carousel-call carousel-shortcode-id-8d0c1b94ed524e3fd0b0bc54e3c2bd9c bullets-small-dot-stroke reposition-arrows arrows-bg-on arrows-hover-bg-on  \" data-scroll-mode=\"1\" data-col-num=\"5\" data-wide-col-num=\"5\" data-laptop-col=\"4\" data-h-tablet-columns-num=\"3\" data-v-tablet-columns-num=\"2\" data-phone-columns-num=\"1\" data-auto-height=\"false\" data-col-gap=\"10\" data-stage-padding=\"0\" data-speed=\"600\" data-autoplay=\"true\" data-autoplay_speed=\"5000\" data-arrows=\"true\" data-bullet=\"false\" data-next-icon=\"icon-ar-013-r\" data-prev-icon=\"icon-ar-013-l\">[vc_single_image image=&#8221;11368&#8243; img_size=&#8221;full&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221; el_class=&#8221;img-logos&#8221;][vc_single_image image=&#8221;11384&#8243; img_size=&#8221;full&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221; el_class=&#8221;img-logos&#8221;][vc_single_image image=&#8221;11386&#8243; img_size=&#8221;full&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221; el_class=&#8221;img-logos&#8221;][vc_single_image image=&#8221;11388&#8243; img_size=&#8221;full&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221; el_class=&#8221;img-logos&#8221;][vc_single_image image=&#8221;11754&#8243; img_size=&#8221;full&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221; el_class=&#8221;img-logos&#8221;][vc_single_image image=&#8221;11756&#8243; img_size=&#8221;full&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221; el_class=&#8221;img-logos&#8221;][vc_single_image image=&#8221;11374&#8243; img_size=&#8221;full&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221; el_class=&#8221;img-logos&#8221;]<\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;5&#8243; css=&#8221;.vc_custom_1699804733943{padding-top: 60px !important;padding-bottom: 60px !important;}&#8221; el_class=&#8221;dark-bg bg-malha-purple-corner-right&#8221;][vc_column css=&#8221;.vc_custom_1696786100442{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}&#8221; offset=&#8221;vc_col-md-2\/5&#8243;][vc_column_text]<span class=\"sup-title color-accent\">What sets us appart<\/span><\/p>\n<h2 class=\"heading-2 color-accent\">This is our team&#8217;s testimonial<\/h2>\n<h3 class=\"h4-size heading-3 color-accent\">Professionalism, teamwork and customer focused!<\/h3>\n<p><a title=\"Follow us on YouTube\" href=\"https:\/\/www.youtube.com\/user\/compuworks1\" target=\"_blank\" rel=\"noopener\">Follow us on Youtube<\/a>[\/vc_column_text][\/vc_column][vc_column width=&#8221;3\/4&#8243; offset=&#8221;vc_col-md-3\/5&#8243;][vc_column_text]<figure class=\"wp-block-embed wp-block-embed-youtube is-type-video is-provider-youtube epyt-figure\"><div class=\"wp-block-embed__wrapper\"><div class=\"epyt-video-wrapper\"><div  id=\"_ytid_16736\"  width=\"800\" height=\"450\"  data-origwidth=\"800\" data-origheight=\"450\"  data-relstop=\"1\" data-facadesrc=\"https:\/\/www.youtube.com\/embed\/tzKjc0go5CQ?enablejsapi=1&origin=https:\/\/compuworks.pt&autoplay=1&cc_load_policy=0&cc_lang_pref=&iv_load_policy=1&loop=0&rel=0&fs=1&playsinline=0&autohide=2&hl=en_US&theme=dark&color=white&controls=1&disablekb=0&\" class=\"__youtube_prefs__ epyt-facade no-lazyload\" data-epautoplay=\"1\" ><img decoding=\"async\" data-spai-excluded=\"true\" class=\"epyt-facade-poster skip-lazy\" loading=\"lazy\"  alt=\"YouTube player\"  src=\"https:\/\/i.ytimg.com\/vi\/tzKjc0go5CQ\/hqdefault.jpg\"  \/><button class=\"epyt-facade-play\" aria-label=\"Play\"><svg data-no-lazy=\"1\" height=\"100%\" version=\"1.1\" viewBox=\"0 0 68 48\" width=\"100%\"><path class=\"ytp-large-play-button-bg\" d=\"M66.52,7.74c-0.78-2.93-2.49-5.41-5.42-6.19C55.79,.13,34,0,34,0S12.21,.13,6.9,1.55 C3.97,2.33,2.27,4.81,1.48,7.74C0.06,13.05,0,24,0,24s0.06,10.95,1.48,16.26c0.78,2.93,2.49,5.41,5.42,6.19 C12.21,47.87,34,48,34,48s21.79-0.13,27.1-1.55c2.93-0.78,4.64-3.26,5.42-6.19C67.94,34.95,68,24,68,24S67.94,13.05,66.52,7.74z\" fill=\"#f00\"><\/path><path d=\"M 45,24 27,14 27,34\" fill=\"#fff\"><\/path><\/svg><\/button><\/div><\/div><\/div><\/figure>[\/vc_column_text][\/vc_column][vc_column]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">#default-btn-0c03d9d92cd9dcaf4d66544e97f4b98c {\n  border-radius: 1px;\n  font-size: 14px;\n  line-height: 16px;\n}\n.btn-shadow#default-btn-0c03d9d92cd9dcaf4d66544e97f4b98c {\n  box-shadow: 0 1px 6px rgba(0,0,0,0.12);\n  transition: box-shadow 0.2s ease-out, opacity 0.45s;\n}\n.btn-shadow#default-btn-0c03d9d92cd9dcaf4d66544e97f4b98c:hover {\n  box-shadow: 0 5px 11px 0 rgba(0,0,0,0.18), 0 4px 15px 0 rgba(0,0,0,0.15);\n}\n.btn-flat#default-btn-0c03d9d92cd9dcaf4d66544e97f4b98c {\n  box-shadow: none;\n}\n.btn-flat#default-btn-0c03d9d92cd9dcaf4d66544e97f4b98c:hover {\n  box-shadow: none;\n}\n#default-btn-0c03d9d92cd9dcaf4d66544e97f4b98c.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-0c03d9d92cd9dcaf4d66544e97f4b98c > i {\n  margin-right: 8px;\n  font-size: 12px;\n}\n#default-btn-0c03d9d92cd9dcaf4d66544e97f4b98c:not(:hover) {\n  border-width: 0px;\n  padding: 0px 0px 0px 0px;\n}\n#default-btn-0c03d9d92cd9dcaf4d66544e97f4b98c:hover {\n  border-width: 0px;\n  padding: 0px 0px 0px 0px;\n}\n#default-btn-0c03d9d92cd9dcaf4d66544e97f4b98c.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-0c03d9d92cd9dcaf4d66544e97f4b98c > i {\n  margin-right: 8px;\n}<\/style><div class=\"btn-align-center\"><a href=\"https:\/\/www.compuworks.pt\/testemunhos\/\" class=\"default-btn-shortcode dt-btn ico-right-side btn-white-txt-orange btn-flat \" id=\"default-btn-0c03d9d92cd9dcaf4d66544e97f4b98c\" title=\"Client testimonials\"><span>READ OUR CLIENT TESTIMONIALS<\/span><i class=\"dt-icon-the7-arrow-0-41\"><\/i><\/a><\/div>[\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1684231769285{padding-top: 4vw !important;}&#8221;][vc_column][vc_column_text css=&#8221;.vc_custom_1702123205938{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;}&#8221; el_class=&#8221;text-centered&#8221;]<\/p>\n<h2><span class=\"color-accent\">Understand the role of IT Security in your business<\/span><\/h2>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;text-centered&#8221;]The digital transformation has changed the world and companies, making them undeniably more efficient through technology.<\/p>\n<p>However, the associated security risks have grown as much as the performance improvements observed.<\/p>\n<p>For this reason, it is essential to ensure <strong>IT Security and monitoring<\/strong> of information systems.[\/vc_column_text][\/vc_column][\/vc_row][vc_row gap=&#8221;15&#8243; css=&#8221;.vc_custom_1697913220212{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;border-radius: 10px !important;}&#8221; el_class=&#8221;dark-bg bg-accent-color&#8221;][vc_column css=&#8221;.vc_custom_1684233530279{padding-top: 0px !important;}&#8221;][vc_column_text]<\/p>\n<h3 class=\"h4-size text-centered color-1-blue\">You&#8217;ve probably heard about many cyber attacks in Portugal. But did he know that most of these attacks resulted in the theft or leakage of data and extortion attempts?<\/h3>\n<p class=\"text-large white text-centered\">Invest in IT Security services with an external company certified in the best security solutions, and be prepared. Choose CompuWorks.<\/p>\n<p>[\/vc_column_text]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">#default-btn-962551694a7ecedd879834f0be1abbc4 {\n  border-radius: 1px;\n  font-size: 14px;\n  line-height: 16px;\n}\n.btn-shadow#default-btn-962551694a7ecedd879834f0be1abbc4 {\n  box-shadow: 0 1px 6px rgba(0,0,0,0.12);\n  transition: box-shadow 0.2s ease-out, opacity 0.45s;\n}\n.btn-shadow#default-btn-962551694a7ecedd879834f0be1abbc4:hover {\n  box-shadow: 0 5px 11px 0 rgba(0,0,0,0.18), 0 4px 15px 0 rgba(0,0,0,0.15);\n}\n.btn-flat#default-btn-962551694a7ecedd879834f0be1abbc4 {\n  box-shadow: none;\n}\n.btn-flat#default-btn-962551694a7ecedd879834f0be1abbc4:hover {\n  box-shadow: none;\n}\n#default-btn-962551694a7ecedd879834f0be1abbc4.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-962551694a7ecedd879834f0be1abbc4 > i {\n  margin-right: 8px;\n  font-size: 12px;\n}\n#default-btn-962551694a7ecedd879834f0be1abbc4:not(:hover) {\n  border-width: 0px;\n  padding: 0px 0px 0px 0px;\n}\n#default-btn-962551694a7ecedd879834f0be1abbc4:hover {\n  border-width: 0px;\n  padding: 0px 0px 0px 0px;\n}\n#default-btn-962551694a7ecedd879834f0be1abbc4.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-962551694a7ecedd879834f0be1abbc4 > i {\n  margin-right: 8px;\n}<\/style><div class=\"btn-align-center\"><a href=\"#contact-compuworks-form\" class=\"default-btn-shortcode dt-btn ico-right-side anchor-link btn-orange btn-flat \" id=\"default-btn-962551694a7ecedd879834f0be1abbc4\" title=\"Talk to us\" rel=\"nofollow\"><span>TALK TO US<\/span><i class=\"dt-icon-the7-arrow-0-41\"><\/i><\/a><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;25&#8243; css=&#8221;.vc_custom_1697913388610{padding-top: 60px !important;padding-bottom: 60px !important;background-color: #ffffff !important;}&#8221; el_class=&#8221;services-row&#8221;][vc_column][vc_row_inner equal_height=&#8221;yes&#8221; el_class=&#8221;services-section s-section-first shadow wrap_reverse&#8221;][vc_column_inner offset=&#8221;vc_col-md-3\/5&#8243;][vc_column_text]<\/p>\n<h2 class=\"color-accent\">Cyber attacks and Cyber Security<\/h2>\n<p>[\/vc_column_text][vc_column_text]The increasing sophistication of attacks and threats coming from different locations and forms has imposed higher security demands at various levels.<\/p>\n<p>Likewise, IT Security has evolved and become more demanding.<\/p>\n<p><strong>More than avoiding threats, it is necessary to minimize exposure to risks through proactive actions and constant monitoring of systems and networks.<\/strong><\/p>\n<p>IT security in companies must combine all information systems, networks, servers, devices and users. In addition, it must ensure the easy replacement of information in the event of data deterioration.[\/vc_column_text]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">#default-btn-9c45720144d85611e90266b472352cf3 {\n  border-radius: 1px;\n  font-size: 14px;\n  line-height: 16px;\n}\n.btn-shadow#default-btn-9c45720144d85611e90266b472352cf3 {\n  box-shadow: 0 1px 6px rgba(0,0,0,0.12);\n  transition: box-shadow 0.2s ease-out, opacity 0.45s;\n}\n.btn-shadow#default-btn-9c45720144d85611e90266b472352cf3:hover {\n  box-shadow: 0 5px 11px 0 rgba(0,0,0,0.18), 0 4px 15px 0 rgba(0,0,0,0.15);\n}\n.btn-flat#default-btn-9c45720144d85611e90266b472352cf3 {\n  box-shadow: none;\n}\n.btn-flat#default-btn-9c45720144d85611e90266b472352cf3:hover {\n  box-shadow: none;\n}\n#default-btn-9c45720144d85611e90266b472352cf3.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-9c45720144d85611e90266b472352cf3 > i {\n  margin-right: 8px;\n  font-size: 12px;\n}\n#default-btn-9c45720144d85611e90266b472352cf3:not(:hover) {\n  border-width: 0px;\n  padding: 0px 0px 0px 0px;\n}\n#default-btn-9c45720144d85611e90266b472352cf3:hover {\n  border-width: 0px;\n  padding: 0px 0px 0px 0px;\n}\n#default-btn-9c45720144d85611e90266b472352cf3.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-9c45720144d85611e90266b472352cf3 > i {\n  margin-right: 8px;\n}<\/style><div class=\"btn-align-left\"><a href=\"#contact-compuworks-form\" class=\"default-btn-shortcode dt-btn link-hover-off ico-right-side anchor-link btn-blue btn-flat \" id=\"default-btn-9c45720144d85611e90266b472352cf3\" title=\"More about IT Security services\" rel=\"nofollow\"><span>FIND OUT MORE<\/span><i class=\"dt-icon-the7-arrow-0-41\"><\/i><\/a><\/div>[\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-2\/5&#8243;][vc_single_image image=&#8221;11707&#8243; img_size=&#8221;full&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221; el_class=&#8221;img-tab-right&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8221;yes&#8221; el_class=&#8221;services-section shadow&#8221;][vc_column_inner offset=&#8221;vc_col-md-2\/5&#8243;][vc_single_image image=&#8221;11712&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221; el_class=&#8221;img-tab&#8221;][\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-3\/5&#8243;][vc_column_text]<\/p>\n<h2 class=\"color-accent\">The challenges of IT Security<\/h2>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1702123610512{margin-top: 0px !important;}&#8221;]Nowadays, companies face numerous security challenges and there is no single or one-off solution.<\/p>\n<p>IT Security includes different components that, together, offer superior protection and continuity of operations and business.<\/p>\n<p>A simple firewall or anti-virus is not enough against advanced cyberattacks.<\/p>\n<p>IT security solutions aim to increase companies\u2019 resilience against risks and failures.<\/p>\n<p>It is essential to have permanent monitoring solutions, Backup and Disaster Recovery, plus other solutions, all interconnected and with centralized management.[\/vc_column_text]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">#default-btn-9c45720144d85611e90266b472352cf3 {\n  border-radius: 1px;\n  font-size: 14px;\n  line-height: 16px;\n}\n.btn-shadow#default-btn-9c45720144d85611e90266b472352cf3 {\n  box-shadow: 0 1px 6px rgba(0,0,0,0.12);\n  transition: box-shadow 0.2s ease-out, opacity 0.45s;\n}\n.btn-shadow#default-btn-9c45720144d85611e90266b472352cf3:hover {\n  box-shadow: 0 5px 11px 0 rgba(0,0,0,0.18), 0 4px 15px 0 rgba(0,0,0,0.15);\n}\n.btn-flat#default-btn-9c45720144d85611e90266b472352cf3 {\n  box-shadow: none;\n}\n.btn-flat#default-btn-9c45720144d85611e90266b472352cf3:hover {\n  box-shadow: none;\n}\n#default-btn-9c45720144d85611e90266b472352cf3.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-9c45720144d85611e90266b472352cf3 > i {\n  margin-right: 8px;\n  font-size: 12px;\n}\n#default-btn-9c45720144d85611e90266b472352cf3:not(:hover) {\n  border-width: 0px;\n  padding: 0px 0px 0px 0px;\n}\n#default-btn-9c45720144d85611e90266b472352cf3:hover {\n  border-width: 0px;\n  padding: 0px 0px 0px 0px;\n}\n#default-btn-9c45720144d85611e90266b472352cf3.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-9c45720144d85611e90266b472352cf3 > i {\n  margin-right: 8px;\n}<\/style><div class=\"btn-align-left\"><a href=\"#contact-compuworks-form\" class=\"default-btn-shortcode dt-btn link-hover-off ico-right-side anchor-link btn-blue btn-flat \" id=\"default-btn-9c45720144d85611e90266b472352cf3\" title=\"More about IT Security services\" rel=\"nofollow\"><span>FIND OUT MORE<\/span><i class=\"dt-icon-the7-arrow-0-41\"><\/i><\/a><\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;5&#8243; css=&#8221;.vc_custom_1697913935335{padding-top: 60px !important;padding-bottom: 60px !important;}&#8221; el_class=&#8221;dark-bg bg-malha-blue-corner-right&#8221;][vc_column offset=&#8221;vc_col-md-8&#8243; css=&#8221;.vc_custom_1697913432280{padding-top: 0px !important;padding-bottom: 0px !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1702123770024{padding-bottom: 0px !important;}&#8221;]<\/p>\n<h2 class=\"heading-2 color-1-blue\">We are your IT Security partner<\/h2>\n<h3 class=\"h4-size heading-3 white\">We are ready to start securing your business.<\/h3>\n<p class=\"white\">Our experts and cyber security teams assure you the right solutions, applying best practices so that your bussiness operations can continue to run smoothly.<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column offset=&#8221;vc_col-md-4&#8243;]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">#default-btn-01260baac922bb786c3db6acf06fbdac {\n  border-radius: 1px;\n  font-size: 14px;\n  line-height: 16px;\n}\n.btn-shadow#default-btn-01260baac922bb786c3db6acf06fbdac {\n  box-shadow: 0 1px 6px rgba(0,0,0,0.12);\n  transition: box-shadow 0.2s ease-out, opacity 0.45s;\n}\n.btn-shadow#default-btn-01260baac922bb786c3db6acf06fbdac:hover {\n  box-shadow: 0 5px 11px 0 rgba(0,0,0,0.18), 0 4px 15px 0 rgba(0,0,0,0.15);\n}\n.btn-flat#default-btn-01260baac922bb786c3db6acf06fbdac {\n  box-shadow: none;\n}\n.btn-flat#default-btn-01260baac922bb786c3db6acf06fbdac:hover {\n  box-shadow: none;\n}\n#default-btn-01260baac922bb786c3db6acf06fbdac.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-01260baac922bb786c3db6acf06fbdac > i {\n  margin-right: 8px;\n  font-size: 12px;\n}\n#default-btn-01260baac922bb786c3db6acf06fbdac:not(:hover) {\n  border-width: 0px;\n  padding: 0px 0px 0px 0px;\n}\n#default-btn-01260baac922bb786c3db6acf06fbdac:hover {\n  border-width: 0px;\n  padding: 0px 0px 0px 0px;\n}\n#default-btn-01260baac922bb786c3db6acf06fbdac.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-01260baac922bb786c3db6acf06fbdac > i {\n  margin-right: 8px;\n}<\/style><div class=\"btn-align-left\"><a href=\"#contact-compuworks-form\" class=\"default-btn-shortcode dt-btn anchor-link btn-orange btn-flat \" id=\"default-btn-01260baac922bb786c3db6acf06fbdac\" title=\"Request a quote\" rel=\"nofollow\"><i class=\"icomoon-the7-font-the7-mail-03\"><\/i><span>REQUEST A QUOTE<\/span><\/a><\/div><style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">#default-btn-c213148f069766e44c32affbac1900d2 {\n  border-radius: 1px;\n  font-size: 14px;\n  line-height: 16px;\n}\n.btn-shadow#default-btn-c213148f069766e44c32affbac1900d2 {\n  box-shadow: 0 1px 6px rgba(0,0,0,0.12);\n  transition: box-shadow 0.2s ease-out, opacity 0.45s;\n}\n.btn-shadow#default-btn-c213148f069766e44c32affbac1900d2:hover {\n  box-shadow: 0 5px 11px 0 rgba(0,0,0,0.18), 0 4px 15px 0 rgba(0,0,0,0.15);\n}\n.btn-flat#default-btn-c213148f069766e44c32affbac1900d2 {\n  box-shadow: none;\n}\n.btn-flat#default-btn-c213148f069766e44c32affbac1900d2:hover {\n  box-shadow: none;\n}\n#default-btn-c213148f069766e44c32affbac1900d2.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-c213148f069766e44c32affbac1900d2 > i {\n  margin-right: 8px;\n  font-size: 12px;\n}\n#default-btn-c213148f069766e44c32affbac1900d2:not(:hover) {\n  border-width: 0px;\n  padding: 0px 0px 0px 0px;\n}\n#default-btn-c213148f069766e44c32affbac1900d2:hover {\n  border-width: 0px;\n  padding: 0px 0px 0px 0px;\n}\n#default-btn-c213148f069766e44c32affbac1900d2.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-c213148f069766e44c32affbac1900d2 > i {\n  margin-right: 8px;\n}<\/style><div class=\"btn-align-left\"><a href=\"tel:+351213138603\" class=\"default-btn-shortcode dt-btn link-hover-off anchor-link btn-white-txt-orange btn-flat \" id=\"default-btn-c213148f069766e44c32affbac1900d2\" title=\"Call us\" rel=\"nofollow\"><i class=\"icomoon-the7-font-the7-phone-02\"><\/i><span>CALL: +351 213 138 603<\/span><\/a><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1697485733593{padding-top: 60px !important;padding-bottom: 60px !important;}&#8221; el_class=&#8221;bg-light-grey&#8221;][vc_column][vc_column_text]<\/p>\n<h3><span class=\"color-accent\">IT Security Information<\/span> related solutions<\/h3>\n<p>[\/vc_column_text]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">.carousel-shortcode.carousel-shortcode-id-66951e272859db43b12ee536e3c0ee45.owl-carousel .owl-nav div {\n  width: 36px;\n  height: 36px;\n  border-radius: 500px;\n}\n.dt-arrow-border-on.carousel-shortcode.carousel-shortcode-id-66951e272859db43b12ee536e3c0ee45.owl-carousel .owl-nav div:not(:hover):before {\n  border-width: 0px;\n}\n.dt-arrow-hover-border-on.carousel-shortcode.carousel-shortcode-id-66951e272859db43b12ee536e3c0ee45.owl-carousel .owl-nav div:hover:after {\n  border-width: 0px;\n}\n.arrows-bg-on.carousel-shortcode.carousel-shortcode-id-66951e272859db43b12ee536e3c0ee45.owl-carousel .owl-nav div:before {\n  background: rgba(92,6,140,0.75);\n}\n.arrows-hover-bg-on.carousel-shortcode.carousel-shortcode-id-66951e272859db43b12ee536e3c0ee45.owl-carousel .owl-nav div:after {\n  background: #5c068c;\n}\n.carousel-shortcode.carousel-shortcode-id-66951e272859db43b12ee536e3c0ee45.owl-carousel .owl-nav div.owl-prev {\n  top: calc(100% + 0px);\n  left: 0px;\n}\n.carousel-shortcode.carousel-shortcode-id-66951e272859db43b12ee536e3c0ee45.owl-carousel .owl-nav div.owl-prev i {\n  padding: 0px 0px 0px 0px;\n}\n.carousel-shortcode.carousel-shortcode-id-66951e272859db43b12ee536e3c0ee45.owl-carousel .owl-nav div.owl-next {\n  top: calc(100% + 0px);\n  right: 0px;\n}\n.carousel-shortcode.carousel-shortcode-id-66951e272859db43b12ee536e3c0ee45.owl-carousel .owl-nav div.owl-next i {\n  padding: 0px 0px 0px 0px;\n}\n.carousel-shortcode.carousel-shortcode-id-66951e272859db43b12ee536e3c0ee45.owl-carousel .owl-nav i {\n  font-size: 18px;\n}\n.carousel-shortcode.carousel-shortcode-id-66951e272859db43b12ee536e3c0ee45.owl-carousel .owl-nav div:not(:hover) i,\n.carousel-shortcode.carousel-shortcode-id-66951e272859db43b12ee536e3c0ee45.owl-carousel .owl-nav div:not(:hover) i:before {\n  color: #ffffff;\n  background: none;\n}\n.carousel-shortcode.carousel-shortcode-id-66951e272859db43b12ee536e3c0ee45.owl-carousel .owl-nav div:hover i,\n.carousel-shortcode.carousel-shortcode-id-66951e272859db43b12ee536e3c0ee45.owl-carousel .owl-nav div:hover i:before {\n  color: #ffffff;\n  background: none;\n}\n.carousel-shortcode.carousel-shortcode-id-66951e272859db43b12ee536e3c0ee45 .owl-dots {\n  top: calc(100% + 20px);\n  left: 50%;\n  transform: translateX(calc(-50% + 0px));\n}\n@media all and (-ms-high-contrast: none) {\n  .carousel-shortcode.carousel-shortcode-id-66951e272859db43b12ee536e3c0ee45 .owl-dots {\n    transform: translateX(-50%);\n    margin-left: 0px;\n  }\n}\n.carousel-shortcode.carousel-shortcode-id-66951e272859db43b12ee536e3c0ee45 .owl-dot {\n  width: 10px;\n  height: 10px;\n  margin: 0 8px;\n}\n@media screen and (max-width: 778px) {\n  .carousel-shortcode.carousel-shortcode-id-66951e272859db43b12ee536e3c0ee45.hide-arrows .owl-nav a {\n    display: none;\n  }\n}\n@media screen and (max-width: 778px) {\n  .carousel-shortcode.carousel-shortcode-id-66951e272859db43b12ee536e3c0ee45.reposition-arrows .owl-nav div.owl-prev {\n    top: calc(100% + 0px);\n    left: -10px;\n  }\n  .carousel-shortcode.carousel-shortcode-id-66951e272859db43b12ee536e3c0ee45.reposition-arrows .owl-nav div.owl-next {\n    top: calc(100% + 0px);\n    right: -10px;\n  }\n}<\/style><div class=\"owl-carousel carousel-shortcode dt-owl-carousel-call carousel-shortcode-id-66951e272859db43b12ee536e3c0ee45 bullets-small-dot-stroke reposition-arrows arrows-bg-on arrows-hover-bg-on  slider-related\" data-scroll-mode=\"1\" data-col-num=\"4\" data-wide-col-num=\"4\" data-laptop-col=\"3\" data-h-tablet-columns-num=\"2\" data-v-tablet-columns-num=\"2\" data-phone-columns-num=\"1\" data-auto-height=\"false\" data-col-gap=\"50\" data-stage-padding=\"0\" data-speed=\"600\" data-autoplay=\"true\" data-autoplay_speed=\"3500\" data-arrows=\"true\" data-bullet=\"false\" data-next-icon=\"icon-ar-013-r\" data-prev-icon=\"icon-ar-013-l\">[vc_row_inner][vc_column_inner][vc_single_image image=&#8221;13847&#8243; img_size=&#8221;large&#8221; alignment=&#8221;center&#8221; onclick=&#8221;custom_link&#8221; lazy_loading=&#8221;true&#8221; link=&#8221;\/en\/it-solutions\/it-infrastructure-management\/&#8221;][vc_column_text]<\/p>\n<h3 class=\"entry-title\"><a title=\"IT Infrastructure Management\" href=\"https:\/\/compuworks.pt\/en\/it-solutions\/it-infrastructure-management\/\">IT Infrastructure Management<\/a><\/h3>\n<p>[\/vc_column_text]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">#default-btn-646354aa80cf978bf3f9d3e8b119ada5 {\n  font-size: 14px;\n  line-height: 16px;\n  padding: 2px 2px 2px 2px;\n}\n#default-btn-646354aa80cf978bf3f9d3e8b119ada5.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-646354aa80cf978bf3f9d3e8b119ada5:after {\n  height: 0px;\n}\n#default-btn-646354aa80cf978bf3f9d3e8b119ada5 > i {\n  margin-right: 8px;\n  font-size: 11px;\n}\n#default-btn-646354aa80cf978bf3f9d3e8b119ada5.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-646354aa80cf978bf3f9d3e8b119ada5 > i {\n  margin-right: 8px;\n}<\/style><div class=\"btn-align-left\"><a href=\"\/en\/it-solutions\/it-infrastructure-management\/\" class=\"default-btn-shortcode dt-btn-link ico-right-side link-purple \" id=\"default-btn-646354aa80cf978bf3f9d3e8b119ada5\" title=\"IT Infrastructure Management\"><span>Read more<\/span><i class=\"dt-icon-the7-arrow-0-41\"><\/i><\/a><\/div>[\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_single_image image=&#8221;13855&#8243; img_size=&#8221;large&#8221; alignment=&#8221;center&#8221; onclick=&#8221;custom_link&#8221; lazy_loading=&#8221;true&#8221; link=&#8221;\/en\/it-solutions\/network-endpoint-security\/&#8221;][vc_column_text]<\/p>\n<h3 class=\"entry-title\"><a title=\"Network and Endpoint Security\" href=\"https:\/\/compuworks.pt\/en\/it-solutions\/network-endpoint-security\/\">Network and Endpoint Security<\/a><\/h3>\n<p>[\/vc_column_text]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">#default-btn-0c90915e63ad30716846234b5f617747 {\n  font-size: 14px;\n  line-height: 16px;\n  padding: 2px 2px 2px 2px;\n}\n#default-btn-0c90915e63ad30716846234b5f617747.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-0c90915e63ad30716846234b5f617747:after {\n  height: 0px;\n}\n#default-btn-0c90915e63ad30716846234b5f617747 > i {\n  margin-right: 8px;\n  font-size: 11px;\n}\n#default-btn-0c90915e63ad30716846234b5f617747.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-0c90915e63ad30716846234b5f617747 > i {\n  margin-right: 8px;\n}<\/style><div class=\"btn-align-left\"><a href=\"\/en\/it-solutions\/network-endpoint-security\/\" class=\"default-btn-shortcode dt-btn-link ico-right-side link-purple \" id=\"default-btn-0c90915e63ad30716846234b5f617747\" title=\"Network and Endpoint Security\"><span>Read more<\/span><i class=\"dt-icon-the7-arrow-0-41\"><\/i><\/a><\/div>[\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_single_image image=&#8221;13947&#8243; img_size=&#8221;large&#8221; alignment=&#8221;center&#8221; onclick=&#8221;custom_link&#8221; lazy_loading=&#8221;true&#8221; link=&#8221;\/en\/it-solutions\/data-backup-recovery\/&#8221;][vc_column_text]<\/p>\n<h3 class=\"entry-title\"><a title=\"Data Backup and Recovery\" href=\"https:\/\/compuworks.pt\/en\/it-solutions\/data-backup-recovery\/\">Data Backup and Recovery<\/a><\/h3>\n<p>[\/vc_column_text]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">#default-btn-b2eed4b6bf3f9ade3e826a5d41847a20 {\n  font-size: 14px;\n  line-height: 16px;\n  padding: 2px 2px 2px 2px;\n}\n#default-btn-b2eed4b6bf3f9ade3e826a5d41847a20.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-b2eed4b6bf3f9ade3e826a5d41847a20:after {\n  height: 0px;\n}\n#default-btn-b2eed4b6bf3f9ade3e826a5d41847a20 > i {\n  margin-right: 8px;\n  font-size: 11px;\n}\n#default-btn-b2eed4b6bf3f9ade3e826a5d41847a20.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-b2eed4b6bf3f9ade3e826a5d41847a20 > i {\n  margin-right: 8px;\n}<\/style><div class=\"btn-align-left\"><a href=\"\/en\/it-solutions\/data-backup-recovery\/\" class=\"default-btn-shortcode dt-btn-link ico-right-side link-purple \" id=\"default-btn-b2eed4b6bf3f9ade3e826a5d41847a20\" title=\"Data Backup and Disaster Recovery\"><span>Read more<\/span><i class=\"dt-icon-the7-arrow-0-41\"><\/i><\/a><\/div>[\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_single_image image=&#8221;13920&#8243; img_size=&#8221;large&#8221; alignment=&#8221;center&#8221; onclick=&#8221;custom_link&#8221; lazy_loading=&#8221;true&#8221; link=&#8221;\/en\/it-solutions\/cloud-computing-services\/&#8221;][vc_column_text]<\/p>\n<h3 class=\"entry-title\"><a title=\"Cloud Computing Services\" href=\"https:\/\/compuworks.pt\/en\/it-solutions\/cloud-computing-services\/\">Cloud Computing Services<\/a><\/h3>\n<p>[\/vc_column_text]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">#default-btn-a67dac10d74d8331d529f0c841a2aff1 {\n  font-size: 14px;\n  line-height: 16px;\n  padding: 2px 2px 2px 2px;\n}\n#default-btn-a67dac10d74d8331d529f0c841a2aff1.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-a67dac10d74d8331d529f0c841a2aff1:after {\n  height: 0px;\n}\n#default-btn-a67dac10d74d8331d529f0c841a2aff1 > i {\n  margin-right: 8px;\n  font-size: 11px;\n}\n#default-btn-a67dac10d74d8331d529f0c841a2aff1.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-a67dac10d74d8331d529f0c841a2aff1 > i {\n  margin-right: 8px;\n}<\/style><div class=\"btn-align-left\"><a href=\"\/en\/it-solutions\/cloud-computing-services\/\" class=\"default-btn-shortcode dt-btn-link ico-right-side link-purple \" id=\"default-btn-a67dac10d74d8331d529f0c841a2aff1\" title=\"Cloud Computing Services\"><span>Read more<\/span><i class=\"dt-icon-the7-arrow-0-41\"><\/i><\/a><\/div>[\/vc_column_inner][\/vc_row_inner]<\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1697913480050{padding-top: 80px !important;padding-bottom: 80px !important;}&#8221; el_id=&#8221;contact-compuworks-form&#8221; el_class=&#8221;dark-bg bg-accent-color&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h2 class=\"heading-2 color-1-blue\">Ensure IT Security Services for your business<\/h2>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1702124116669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}&#8221;]<\/p>\n<p class=\"text-cta-form white\">We will help you find the best solutions. Schedule a meeting with us.<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;.vc_custom_1702124130015{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 15px !important;}&#8221; el_class=&#8221;white&#8221;]<strong>Just fill out the form bellow.<\/strong>[\/vc_column_text][vc_raw_html css=&#8221;&#8221;]JTNDZGl2JTIwY2xhc3MlM0QlMjJwaXBlZHJpdmVXZWJGb3JtcyUyMiUyMGRhdGEtcGQtd2ViZm9ybXMlM0RodHRwcyUzQSUyRiUyRndlYmZvcm1zLnBpcGVkcml2ZS5jb20lMkZmJTJGMlphNlByd0dUT2RXWlp6SDhWTXNyc2pkbDBzQng0S0VKdjZmWVNxRGswUTR0RHVDVjBDaHNhaEgyV3V4bjdHeFIlM0UlM0NzY3JpcHQlMjBzcmMlM0RodHRwcyUzQSUyRiUyRndlYmZvcm1zLnBpcGVkcml2ZS5jb20lMkZmJTJGbG9hZGVyJTNFJTNDJTJGc2NyaXB0JTNFJTNDJTJGZGl2JTNF[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_id=&#8221;top&#8221; el_class=&#8221;dark-bg header-bg-purple-topright&#8221;][vc_column css=&#8221;.vc_custom_1684492987201{padding-top: 50px !important;}&#8221;][vc_row_inner el_class=&#8221;vc_hidden-sm vc_hidden-xs&#8221; css=&#8221;.vc_custom_1697911356420{padding-top: 0px !important;padding-bottom: 5px !important;}&#8221;][vc_column_inner][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;top&#8221; el_class=&#8221;w1250&#8243; css=&#8221;.vc_custom_1696784619654{padding-top: 0px !important;padding-bottom: 50px !important;}&#8221;][vc_column_inner offset=&#8221;vc_col-md-3\/5&#8243;][vc_column_text] IT Security Services for unstoppable work operationss [\/vc_column_text][vc_column_text] We Work, IT Works. Prevent cyberattacks with the most reputable IT Security Information brands and experts. IT Monitoring keeps your data protected&hellip;<\/p>\n","protected":false},"author":1,"featured_media":14447,"parent":14989,"menu_order":2001,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-15046","page","type-page","status-publish","has-post-thumbnail","hentry","description-off"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT Security Information Services | CompuWorks<\/title>\n<meta name=\"description\" content=\"Keep your business IT information secure and protected from cyberattacks. We are certified partners with leading security software vendors.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/compuworks.pt\/en\/it-services\/it-security-services\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Security Information Services | CompuWorks\" \/>\n<meta property=\"og:description\" content=\"Prestamos Assist\u00eancia Inform\u00e1tica para empresas. Livre-se de problemas inform\u00e1ticos com os servi\u00e7os de manuten\u00e7\u00e3o que precisa. Saiba mais.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/compuworks.pt\/en\/it-services\/it-security-services\/\" \/>\n<meta property=\"og:site_name\" content=\"CompuWorks\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T19:25:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/compuworks.pt\/wp-content\/uploads\/2023\/11\/seguranca-informatica-featured-img.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"1200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"Prestamos Assist\u00eancia Inform\u00e1tica para empresas. Livre-se de problemas inform\u00e1ticos com os servi\u00e7os de manuten\u00e7\u00e3o que precisa. Saiba mais.\" \/>\n<meta name=\"twitter:site\" content=\"@compuworks_360\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/compuworks.pt\\\/en\\\/it-services\\\/it-security-services\\\/\",\"url\":\"https:\\\/\\\/compuworks.pt\\\/en\\\/it-services\\\/it-security-services\\\/\",\"name\":\"IT Security Information Services | CompuWorks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/compuworks.pt\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/compuworks.pt\\\/en\\\/it-services\\\/it-security-services\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/compuworks.pt\\\/en\\\/it-services\\\/it-security-services\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/compuworks.pt\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/seguranca-informatica-featured-img.jpg\",\"datePublished\":\"2023-04-28T10:47:39+00:00\",\"dateModified\":\"2026-03-30T19:25:32+00:00\",\"description\":\"Keep your business IT information secure and protected from cyberattacks. We are certified partners with leading security software vendors.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/compuworks.pt\\\/en\\\/it-services\\\/it-security-services\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/compuworks.pt\\\/en\\\/it-services\\\/it-security-services\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/compuworks.pt\\\/en\\\/it-services\\\/it-security-services\\\/#primaryimage\",\"url\":\"https:\\\/\\\/compuworks.pt\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/seguranca-informatica-featured-img.jpg\",\"contentUrl\":\"https:\\\/\\\/compuworks.pt\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/seguranca-informatica-featured-img.jpg\",\"width\":1200,\"height\":1200,\"caption\":\"IT Securityy Information Services\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/compuworks.pt\\\/en\\\/it-services\\\/it-security-services\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/compuworks.pt\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Services for Business\",\"item\":\"https:\\\/\\\/compuworks.pt\\\/en\\\/it-services\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IT Security Information Services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/compuworks.pt\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/compuworks.pt\\\/en\\\/\",\"name\":\"CompuWorks\",\"description\":\"We work, IT works\",\"publisher\":{\"@id\":\"https:\\\/\\\/compuworks.pt\\\/en\\\/#organization\"},\"alternateName\":\"CompuWorks\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/compuworks.pt\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/compuworks.pt\\\/en\\\/#organization\",\"name\":\"CompuWorks\",\"alternateName\":\"CompuWorks - We work, IT works\",\"url\":\"https:\\\/\\\/compuworks.pt\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/compuworks.pt\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/compuworks.pt\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/logo-compuworks.svg\",\"contentUrl\":\"https:\\\/\\\/compuworks.pt\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/logo-compuworks.svg\",\"width\":100,\"height\":100,\"caption\":\"CompuWorks\"},\"image\":{\"@id\":\"https:\\\/\\\/compuworks.pt\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/compuworks_360\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/compuworks-weworkforit\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/compuworks1\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT Security Information Services | CompuWorks","description":"Keep your business IT information secure and protected from cyberattacks. We are certified partners with leading security software vendors.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/compuworks.pt\/en\/it-services\/it-security-services\/","og_locale":"en_US","og_type":"article","og_title":"IT Security Information Services | CompuWorks","og_description":"Prestamos Assist\u00eancia Inform\u00e1tica para empresas. Livre-se de problemas inform\u00e1ticos com os servi\u00e7os de manuten\u00e7\u00e3o que precisa. Saiba mais.","og_url":"https:\/\/compuworks.pt\/en\/it-services\/it-security-services\/","og_site_name":"CompuWorks","article_modified_time":"2026-03-30T19:25:32+00:00","og_image":[{"width":1200,"height":1200,"url":"https:\/\/compuworks.pt\/wp-content\/uploads\/2023\/11\/seguranca-informatica-featured-img.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_description":"Prestamos Assist\u00eancia Inform\u00e1tica para empresas. Livre-se de problemas inform\u00e1ticos com os servi\u00e7os de manuten\u00e7\u00e3o que precisa. Saiba mais.","twitter_site":"@compuworks_360","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/compuworks.pt\/en\/it-services\/it-security-services\/","url":"https:\/\/compuworks.pt\/en\/it-services\/it-security-services\/","name":"IT Security Information Services | CompuWorks","isPartOf":{"@id":"https:\/\/compuworks.pt\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/compuworks.pt\/en\/it-services\/it-security-services\/#primaryimage"},"image":{"@id":"https:\/\/compuworks.pt\/en\/it-services\/it-security-services\/#primaryimage"},"thumbnailUrl":"https:\/\/compuworks.pt\/wp-content\/uploads\/2023\/11\/seguranca-informatica-featured-img.jpg","datePublished":"2023-04-28T10:47:39+00:00","dateModified":"2026-03-30T19:25:32+00:00","description":"Keep your business IT information secure and protected from cyberattacks. We are certified partners with leading security software vendors.","breadcrumb":{"@id":"https:\/\/compuworks.pt\/en\/it-services\/it-security-services\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/compuworks.pt\/en\/it-services\/it-security-services\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/compuworks.pt\/en\/it-services\/it-security-services\/#primaryimage","url":"https:\/\/compuworks.pt\/wp-content\/uploads\/2023\/11\/seguranca-informatica-featured-img.jpg","contentUrl":"https:\/\/compuworks.pt\/wp-content\/uploads\/2023\/11\/seguranca-informatica-featured-img.jpg","width":1200,"height":1200,"caption":"IT Securityy Information Services"},{"@type":"BreadcrumbList","@id":"https:\/\/compuworks.pt\/en\/it-services\/it-security-services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/compuworks.pt\/en\/"},{"@type":"ListItem","position":2,"name":"IT Services for Business","item":"https:\/\/compuworks.pt\/en\/it-services\/"},{"@type":"ListItem","position":3,"name":"IT Security Information Services"}]},{"@type":"WebSite","@id":"https:\/\/compuworks.pt\/en\/#website","url":"https:\/\/compuworks.pt\/en\/","name":"CompuWorks","description":"We work, IT works","publisher":{"@id":"https:\/\/compuworks.pt\/en\/#organization"},"alternateName":"CompuWorks","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/compuworks.pt\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/compuworks.pt\/en\/#organization","name":"CompuWorks","alternateName":"CompuWorks - We work, IT works","url":"https:\/\/compuworks.pt\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/compuworks.pt\/en\/#\/schema\/logo\/image\/","url":"https:\/\/compuworks.pt\/wp-content\/uploads\/2023\/10\/logo-compuworks.svg","contentUrl":"https:\/\/compuworks.pt\/wp-content\/uploads\/2023\/10\/logo-compuworks.svg","width":100,"height":100,"caption":"CompuWorks"},"image":{"@id":"https:\/\/compuworks.pt\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/compuworks_360","https:\/\/www.linkedin.com\/company\/compuworks-weworkforit\/","https:\/\/www.youtube.com\/user\/compuworks1\/"]}]}},"_links":{"self":[{"href":"https:\/\/compuworks.pt\/en\/wp-json\/wp\/v2\/pages\/15046","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/compuworks.pt\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/compuworks.pt\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/compuworks.pt\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/compuworks.pt\/en\/wp-json\/wp\/v2\/comments?post=15046"}],"version-history":[{"count":1,"href":"https:\/\/compuworks.pt\/en\/wp-json\/wp\/v2\/pages\/15046\/revisions"}],"predecessor-version":[{"id":17911,"href":"https:\/\/compuworks.pt\/en\/wp-json\/wp\/v2\/pages\/15046\/revisions\/17911"}],"up":[{"embeddable":true,"href":"https:\/\/compuworks.pt\/en\/wp-json\/wp\/v2\/pages\/14989"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/compuworks.pt\/en\/wp-json\/wp\/v2\/media\/14447"}],"wp:attachment":[{"href":"https:\/\/compuworks.pt\/en\/wp-json\/wp\/v2\/media?parent=15046"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}