{"id":22548,"date":"2025-05-15T08:27:50","date_gmt":"2025-05-15T15:27:50","guid":{"rendered":"https:\/\/www.salesforce.com\/?p=22548"},"modified":"2025-08-27T23:14:42","modified_gmt":"2025-08-27T23:14:42","slug":"4th-state-of-it-security","status":"publish","type":"post","link":"https:\/\/www.salesforce.com\/br\/blog\/4th-state-of-it-security\/","title":{"rendered":"State of IT: Seguran\u00e7a, 4\u00aa edi\u00e7\u00e3o"},"content":{"rendered":"\n<p>A seguran\u00e7a na \u00e1rea de TI est\u00e1 em constante mudan\u00e7a, mas os avan\u00e7os r\u00e1pidos na <a href=\"https:\/\/www.salesforce.com\/artificial-intelligence\/what-is-ai\/\" target=\"_blank\" rel=\"noreferrer noopener\">intelig\u00eancia artificial (IA)<\/a> est\u00e3o abalando as estruturas do setor. Um novo desafio para organiza\u00e7\u00f5es \u00e9 que cibercriminosos usam a IA para criar ataques mais sofisticados. Mas \u00e9 tamb\u00e9m a IA que ajuda a detectar e responder a amea\u00e7as de forma mais eficiente, automatizando tarefas do dia a dia e liberando colaboradores para trabalhos mais importantes.<\/p>\n\n\n\n<p>Na quarta edi\u00e7\u00e3o do nosso novo relat\u00f3rio <a href=\"https:\/\/www.salesforce.com\/form\/platform\/4th-state-of-it-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">State of IT: Seguran\u00e7a,<\/a> que entrevistou mais de 4.000 l\u00edderes de TI em diversas partes do mundo (sendo mais de 2.000 especialistas em conformidade e seguran\u00e7a), mergulhamos nessa nova din\u00e2mica e oferecemos insights cr\u00edticos para organiza\u00e7\u00f5es que est\u00e3o procurando <a href=\"https:\/\/www.salesforce.com\/blog\/ai-digital-transformation\/\" target=\"_blank\" rel=\"noreferrer noopener\">inovar e manter a seguran\u00e7a<\/a>.<\/p>\n\n\n\n<p>O que percebemos \u00e9 que encontrar esse equil\u00edbrio n\u00e3o \u00e9 f\u00e1cil, mas \u00e9 poss\u00edvel com as ferramentas certas e integrando a seguran\u00e7a em cada etapa do processo do desenvolvimento. Continue lendo para ver algumas tend\u00eancias que descobrimos nesse relat\u00f3rio.<\/p>\n\n\n\n<div class=\"layout-five wp-block-salesforce-blog-offer\">\n\t<div class=\"wp-block-offer__wrapper\">\n\n\t\t<div class=\"wp-block-offer__content\">\n\t\t\t<h2 class=\"wp-block-offer__title\">Prepare sua estrat\u00e9gia de TI para o futuro<\/h2>\n\t\t\t\t\t\t\t<p class=\"wp-block-offer__description\">Saiba como grandes profissionais de seguran\u00e7a e compliance est\u00e3o protegendo dados na era da IA.<\/p>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"wp-block-button\">\n\t\t\t\t\t<a class=\"wp-block-button__link\" target=\"_blank\" href=\"https:\/\/www.salesforce.com\/form\/platform\/4th-state-of-it-security\/\">Baixar relat\u00f3rio<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t<div class=\"wp-block-offer__media\">\n\t\t\t\t\t<\/div>\n\t<\/div>\n\n\t\n\t\t\t<!-- Standard Illustration -->\n\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__illustration\" src=\"https:\/\/www.salesforce.com\/br\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-illustration-layout-five.png\" alt=\"\">\n\n\t\t<!-- Small Accent Illustration -->\n\t\t\t\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__accent\" src=\"https:\/\/www.salesforce.com\/br\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-accent-layout-five.png\" alt=\"\">\n\t\t\n\t\t<!-- Left Side Illustration -->\n\t\t\n\t\t<!-- Cloud Illustration -->\n\t\t\t\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__cloud\" src=\"https:\/\/www.salesforce.com\/br\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-cloud-layout-five.png\" alt=\"\">\n\t\t\n\t<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-tendencia-1-os-orcamentos-para-a-seguranca-estao-aumentando-de-novo\">Tend\u00eancia 1: os or\u00e7amentos para a seguran\u00e7a est\u00e3o aumentando (de novo)<\/h2>\n\n\n\n<p>Ao longo dos \u00faltimos cinco anos, a porcentagem do or\u00e7amento da TI destinada \u00e0 seguran\u00e7a vem aumentando <a href=\"https:\/\/www.iansresearch.com\/resources\/press-releases\/detail\/new-research-reveals-security-budgets-only-increased-2-points-in-2024--while-12--of-cisos-faced-reductions\" target=\"_blank\" rel=\"noreferrer noopener\">de 8,6% em 2020 para 13,2% em 2024<\/a>. Com base em nossa pesquisa, essa tend\u00eancia deve continuar. 65% das organiza\u00e7\u00f5es j\u00e1 antecipam um aumento nos or\u00e7amentos de seguran\u00e7a para ajudar a combater amea\u00e7as mais frequentes e sofisticadas.\u00a0<\/p>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e5a1b0b4573&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69e5a1b0b4573\" class=\"wp-block-image size-full is-resized wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1792\" height=\"1250\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/www.salesforce.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/05\/IT-Security-Report2.png?strip=all&#038;quality=95\" alt=\"Gr\u00e1fico mostrando mudan\u00e7as esperadas no or\u00e7amento de seguran\u00e7a para o pr\u00f3ximo ano.\" class=\"wp-image-22550\" style=\"width:527px;height:auto\" srcset=\"https:\/\/www.salesforce.com\/br\/blog\/wp-content\/uploads\/sites\/6\/2025\/05\/IT-Security-Report2.png 1792w, https:\/\/www.salesforce.com\/br\/blog\/wp-content\/uploads\/sites\/6\/2025\/05\/IT-Security-Report2.png?w=300&amp;h=209 300w, https:\/\/www.salesforce.com\/br\/blog\/wp-content\/uploads\/sites\/6\/2025\/05\/IT-Security-Report2.png?w=768&amp;h=536 768w, https:\/\/www.salesforce.com\/br\/blog\/wp-content\/uploads\/sites\/6\/2025\/05\/IT-Security-Report2.png?w=1024&amp;h=714 1024w, https:\/\/www.salesforce.com\/br\/blog\/wp-content\/uploads\/sites\/6\/2025\/05\/IT-Security-Report2.png?w=1536&amp;h=1071 1536w, https:\/\/www.salesforce.com\/br\/blog\/wp-content\/uploads\/sites\/6\/2025\/05\/IT-Security-Report2.png?w=150&amp;h=105 150w\" sizes=\"auto, (max-width: 1792px) 100vw, 1792px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><figcaption class=\"wp-element-caption\">Relat\u00f3rio State of IT: Seguran\u00e7a, 4\u00aa edi\u00e7\u00e3o<\/figcaption><\/figure>\n\n\n\n<p>Esse compromisso financeiro demonstra o reconhecimento crescente do potencial de danos financeiros e reputacionais de ataques de IA como envenenamento de dados, invers\u00e3o de modelos, vazamento de dados privados, entre outros. Aumentar or\u00e7amentos pode ajudar organiza\u00e7\u00f5es a investir em tecnologias de seguran\u00e7a avan\u00e7adas, atrair e reter profissionais de ciberseguran\u00e7a, al\u00e9m de implementar estrat\u00e9gias de seguran\u00e7a abrangentes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-tendencia-2-a-confianca-e-mais-importante-na-era-da-ia\">Tend\u00eancia 2: a confian\u00e7a \u00e9 mais importante na era da IA<\/h2>\n\n\n\n<p>A IA ampliou a import\u00e2ncia da confian\u00e7a nos clientes. O relat\u00f3rio revela que 64% dos clientes acreditam que as empresas lidam com seus dados de forma irrespons\u00e1vel, e 61% acreditam que a IA aumentou a necessidade de prote\u00e7\u00e3o aos dados. Essas estat\u00edsticas destacam a necessidade das organiza\u00e7\u00f5es priorizarem a governan\u00e7a de dados.\u00a0<\/p>\n\n\n\n<p>E isso n\u00e3o \u00e9 apenas uma quest\u00e3o de atender aos requisitos de conformidade. \u00c9 simplesmente crucial para os neg\u00f3cios. Quando demonstram compromisso com a seguran\u00e7a dos dados, garantindo transpar\u00eancia no uso e implementando protocolos de seguran\u00e7a restritos, as organiza\u00e7\u00f5es conseguem criar e manter a confian\u00e7a dos clientes.<\/p>\n\n\n\n<div class=\"layout-three wp-block-salesforce-blog-offer\">\n\t<div class=\"wp-block-offer__wrapper\">\n\n\t\t<div class=\"wp-block-offer__content\">\n\t\t\t<h2 class=\"wp-block-offer__title\">Desbloqueie o potencial da IA com dados seguros<\/h2>\n\t\t\t\t\t\t\t<p class=\"wp-block-offer__description\">Baixe o guia para saber como a Salesforce pode ajudar voc\u00ea a adotar as pr\u00e1ticas recomendadas de seguran\u00e7a de dados e inovar com a IA.<\/p>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"wp-block-button\">\n\t\t\t\t\t<a class=\"wp-block-button__link\" target=\"_blank\" href=\"https:\/\/www.salesforce.com\/form\/platform\/data-security-best-practices-guide\">Acesse o guia<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t<div class=\"wp-block-offer__media\">\n\t\t\t\t\t<\/div>\n\t<\/div>\n\n\t\t\t<div class=\"wp-block-offer__graphics wp-block-offer__contour\"><\/div>\n\t\n\t\t\t<!-- Standard Illustration -->\n\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__illustration\" src=\"https:\/\/www.salesforce.com\/br\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-illustration-layout-three.png\" alt=\"\">\n\n\t\t<!-- Small Accent Illustration -->\n\t\t\t\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__accent\" src=\"https:\/\/www.salesforce.com\/br\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-accent-layout-three.png\" alt=\"\">\n\t\t\n\t\t<!-- Left Side Illustration -->\n\t\t\n\t\t<!-- Cloud Illustration -->\n\t\t\n\t<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-tendencia-3-a-conformidade-esta-ficando-mais-complexa\">Tend\u00eancia 3: a conformidade est\u00e1 ficando mais complexa<\/h2>\n\n\n\n<p>Pelo relat\u00f3rio, ficou claro para n\u00f3s que a complexidade do <a href=\"https:\/\/www.salesforce.com\/form\/platform\/regulations-whitepaper\/\" target=\"_blank\" rel=\"noreferrer noopener\">cen\u00e1rio regulat\u00f3rio<\/a> est\u00e1 sobrecarregando a lideran\u00e7a do setor. Cerca de 68% dos participantes da pesquisa relatam um aumento percept\u00edvel da dificuldade de manter a conformidade. Aumento esse impulsionado pelo lan\u00e7amento r\u00e1pido e fragmentado de novas regulamenta\u00e7\u00f5es em diferentes regi\u00f5es e setores.\u00a0<\/p>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e5a1b0b5d02&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69e5a1b0b5d02\" class=\"wp-block-image size-full is-resized wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1792\" height=\"1083\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/www.salesforce.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/05\/IT-Security-Report4.png?strip=all&#038;quality=95\" alt=\"Dois gr\u00e1ficos mostrando preocupa\u00e7\u00f5es da lideran\u00e7a de TI com as regulamenta\u00e7\u00f5es.\" class=\"wp-image-22551\" style=\"width:543px;height:auto\" srcset=\"https:\/\/www.salesforce.com\/br\/blog\/wp-content\/uploads\/sites\/6\/2025\/05\/IT-Security-Report4.png 1792w, https:\/\/www.salesforce.com\/br\/blog\/wp-content\/uploads\/sites\/6\/2025\/05\/IT-Security-Report4.png?w=300&amp;h=181 300w, https:\/\/www.salesforce.com\/br\/blog\/wp-content\/uploads\/sites\/6\/2025\/05\/IT-Security-Report4.png?w=768&amp;h=464 768w, https:\/\/www.salesforce.com\/br\/blog\/wp-content\/uploads\/sites\/6\/2025\/05\/IT-Security-Report4.png?w=1024&amp;h=619 1024w, https:\/\/www.salesforce.com\/br\/blog\/wp-content\/uploads\/sites\/6\/2025\/05\/IT-Security-Report4.png?w=1536&amp;h=928 1536w, https:\/\/www.salesforce.com\/br\/blog\/wp-content\/uploads\/sites\/6\/2025\/05\/IT-Security-Report4.png?w=150&amp;h=91 150w\" sizes=\"auto, (max-width: 1792px) 100vw, 1792px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><figcaption class=\"wp-element-caption\">Relat\u00f3rio State of IT: Seguran\u00e7a, 4\u00aa edi\u00e7\u00e3o<\/figcaption><\/figure>\n\n\n\n<p>Adicionar outra camada de complexidade est\u00e1 gerando incertezas com rela\u00e7\u00e3o \u00e0s novas <a href=\"https:\/\/www.salesforce.com\/blog\/guide-to-eu-ai-act\/\" target=\"_blank\" rel=\"noreferrer noopener\">regulamenta\u00e7\u00f5es espec\u00edficas para IA<\/a>. 43% dos l\u00edderes da \u00e1rea de seguran\u00e7a admitem se sentir pouco preparados para a potencial onda de regras e diretrizes que podem governar o desenvolvimento e a implanta\u00e7\u00e3o das tecnologias de IA. Eles precisam cada vez mais de orienta\u00e7\u00f5es mais expl\u00edcitas e estrat\u00e9gias proativas para resolver quest\u00f5es de conformidade relacionadas \u00e0 IA.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-tendencia-4-a-ia-e-uma-faca-de-dois-gumes\">Tend\u00eancia 4: a IA \u00e9 uma faca de dois gumes<\/h2>\n\n\n\n<p>\u00c9 claro que a IA tem vantagens e desvantagens quando se fala de seguran\u00e7a de TI. Enquanto 80% da lideran\u00e7a reconhece <a href=\"https:\/\/www.salesforce.com\/blog\/secure-ai\/\" target=\"_blank\" rel=\"noreferrer noopener\">o potencial de transforma\u00e7\u00e3o da IA na hora de aprimorar a postura de seguran\u00e7a\u279a<\/a> por meio da detec\u00e7\u00e3o autom\u00e1tica de amea\u00e7as, respostas mais r\u00e1pidas a incidentes e an\u00e1lise de vulnerabilidade avan\u00e7ada, tamb\u00e9m est\u00e1 cientes dos novos desafios que a IA introduz em termos de conformidade e seguran\u00e7a.<\/p>\n\n\n\n<p>Entre esses desafios est\u00e3o o risco de que esses sistemas de IA sejam explorados por agentes mal-intencionados, as complexidades na hora de proteger os algoritmos de IA e treinar dados, bem como a necessidade de adaptar estruturas de conformidade existentes para abordar aspectos \u00fanicos das implanta\u00e7\u00f5es de IA.&nbsp;<\/p>\n\n\n\n<p>Para lidar com essa natureza dupla da IA, \u00e9 necess\u00e1rio estabelecer estruturas de governan\u00e7a, estrat\u00e9gias de gerenciamento de riscos proativo e uma abordagem de aprendizagem cont\u00ednua para ficar \u00e0 frente de amea\u00e7as em potencial.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-descubra-mais-insights-do-relatorio-state-of-it-seguranca\">Descubra mais insights do relat\u00f3rio State of IT: Seguran\u00e7a<\/h2>\n\n\n\n<p>Estes s\u00e3o apenas alguns dos insights que voc\u00ea encontrar\u00e1 no relat\u00f3rio <a href=\"https:\/\/www.salesforce.com\/form\/platform\/4th-state-of-it-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">State of IT: Seguran\u00e7a<\/a>. N\u00e3o importa se voc\u00ea \u00e9 l\u00edder no setor de seguran\u00e7a lidando com a governan\u00e7a de IA, resolvendo demandas de conformidade cada vez maiores ou tentando conquistar a confian\u00e7a dos clientes, nosso relat\u00f3rio traz perspectivas valiosas de profissionais de diversos setores e geografias.\u00a0<\/p>\n\n\n\n<p>Que tal se aprofundar nesses achados e aprender mais sobre a seguran\u00e7a de TI na era da IA? <a href=\"https:\/\/www.salesforce.com\/form\/platform\/4th-state-of-it-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Baixe o relat\u00f3rio\u279a<\/a> para navegar pelo cen\u00e1rio atual e futuro de seguran\u00e7a e transforme vulnerabilidades potenciais em vantagens competitivas.<\/p>\n\n\n\n<div class=\"layout-four wp-block-salesforce-blog-offer\">\n\t<div class=\"wp-block-offer__wrapper\">\n\n\t\t<div class=\"wp-block-offer__content\">\n\t\t\t<h2 class=\"wp-block-offer__title\">Prepare-se para a IA e o Agentforce<\/h2>\n\t\t\t\t\t\t\t<p class=\"wp-block-offer__description\">Mergulhe no mundo da IA com os olhos abertos: conhe\u00e7a seis etapas essenciais de seguran\u00e7a para se preparar para o Agentforce.<\/p>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"wp-block-button\">\n\t\t\t\t\t<a class=\"wp-block-button__link\" target=\"_blank\" href=\"https:\/\/www.salesforce.com\/form\/platform\/six-security-steps-to-prepare-for-agentforce\/\">Acesse o guia<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t<div class=\"wp-block-offer__media\">\n\t\t\t\t\t<\/div>\n\t<\/div>\n\n\t\n\t\t\t<!-- Standard Illustration -->\n\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__illustration\" src=\"https:\/\/www.salesforce.com\/br\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-illustration-layout-four.png\" alt=\"\">\n\n\t\t<!-- Small Accent Illustration -->\n\t\t\t\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__accent\" src=\"https:\/\/www.salesforce.com\/br\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-accent-layout-four.png\" alt=\"\">\n\t\t\n\t\t<!-- Left Side Illustration -->\n\t\t\n\t\t<!-- Cloud Illustration -->\n\t\t\t\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__cloud\" src=\"https:\/\/www.salesforce.com\/br\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-cloud-layout-four.png\" alt=\"\">\n\t\t\n\t<\/div>\n","protected":false},"excerpt":{"rendered":"<p>O relat\u00f3rio State of IT: Security traz insights de mais de 4.000 l\u00edderes de TI sobre seguran\u00e7a, revelando quatro tend\u00eancias principais e as estrat\u00e9gias para o momento.<\/p>\n","protected":false},"author":675,"featured_media":22549,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sf_justforyou_enable_alt":true,"optimizely_content_id":"68af155a4cbecdff3f656a43BR","post_meta_title":"","ai_synopsis":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"sf_topic":[],"sf_content_type":[1317,1318],"blog":[],"coauthors":[1316],"class_list":["post-22548","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","sf_content_type-blog","sf_content_type-research-and-reports"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Relat\u00f3rio State of IT: Seguran\u00e7a, 4\u00aa edi\u00e7\u00e3o<\/title>\n<meta name=\"description\" content=\"Saiba como a IA aprimora a seguran\u00e7a de TI, introduz novos desafios e como as empresas est\u00e3o se adaptando para sair na frente da concorr\u00eancia.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.salesforce.com\/br\/blog\/4th-state-of-it-security\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"State of IT: Seguran\u00e7a, 4\u00aa edi\u00e7\u00e3o\" \/>\n<meta property=\"og:description\" content=\"Saiba como a IA aprimora a seguran\u00e7a de TI, introduz novos desafios e como as empresas est\u00e3o se adaptando para sair na frente da concorr\u00eancia.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.salesforce.com\/br\/blog\/4th-state-of-it-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Salesforce\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-15T15:27:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-27T23:14:42+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.salesforce.com\/br\/blog\/wp-content\/uploads\/sites\/6\/2025\/05\/State-of-it_-Security-1.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n\t<meta name=\"twitter:label3\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data3\" content=\"\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.salesforce.com\/br\/blog\/4th-state-of-it-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/br\/blog\/4th-state-of-it-security\/\"},\"author\":{\"@id\":\"https:\/\/www.salesforce.com\/br\/blog\/#\/schema\/person\/8d70abd8e12f83dd60ca082ba5e897f0\"},\"headline\":\"State of IT: Seguran\u00e7a, 4\u00aa edi\u00e7\u00e3o\",\"datePublished\":\"2025-05-15T15:27:50+00:00\",\"dateModified\":\"2025-08-27T23:14:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/br\/blog\/4th-state-of-it-security\/\"},\"wordCount\":896,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/br\/blog\/4th-state-of-it-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/br\/blog\/wp-content\/uploads\/sites\/6\/2025\/05\/State-of-it_-Security-1.png\",\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.salesforce.com\/br\/blog\/4th-state-of-it-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.salesforce.com\/br\/blog\/4th-state-of-it-security\/\",\"url\":\"https:\/\/www.salesforce.com\/br\/blog\/4th-state-of-it-security\/\",\"name\":\"Relat\u00f3rio State of IT: Seguran\u00e7a, 4\u00aa edi\u00e7\u00e3o\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/br\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/br\/blog\/4th-state-of-it-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/br\/blog\/4th-state-of-it-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/br\/blog\/wp-content\/uploads\/sites\/6\/2025\/05\/State-of-it_-Security-1.png\",\"datePublished\":\"2025-05-15T15:27:50+00:00\",\"dateModified\":\"2025-08-27T23:14:42+00:00\",\"author\":{\"@id\":\"https:\/\/www.salesforce.com\/br\/blog\/#\/schema\/person\/8d70abd8e12f83dd60ca082ba5e897f0\"},\"description\":\"Saiba como a IA aprimora a seguran\u00e7a de TI, introduz novos desafios e como as empresas est\u00e3o se adaptando para sair na frente da concorr\u00eancia.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.salesforce.com\/br\/blog\/4th-state-of-it-security\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.salesforce.com\/br\/blog\/4th-state-of-it-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.salesforce.com\/br\/blog\/4th-state-of-it-security\/#primaryimage\",\"url\":\"https:\/\/www.salesforce.com\/br\/blog\/wp-content\/uploads\/sites\/6\/2025\/05\/State-of-it_-Security-1.png\",\"contentUrl\":\"https:\/\/www.salesforce.com\/br\/blog\/wp-content\/uploads\/sites\/6\/2025\/05\/State-of-it_-Security-1.png\",\"width\":3000,\"height\":1688,\"caption\":\"80% of security leaders recognize the transformative potential of AI in enhancing their security posture. [Image: Salesforce]\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.salesforce.com\/br\/blog\/4th-state-of-it-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.salesforce.com\/br\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"State of IT: Seguran\u00e7a, 4\u00aa edi\u00e7\u00e3o\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.salesforce.com\/br\/blog\/#website\",\"url\":\"https:\/\/www.salesforce.com\/br\/blog\/\",\"name\":\"Salesforce\",\"description\":\"Novidades sobre ia ag\u00eantica, dados e crm\",\"alternateName\":\"Salesforce Brasil\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.salesforce.com\/br\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.salesforce.com\/br\/blog\/#\/schema\/person\/8d70abd8e12f83dd60ca082ba5e897f0\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/dc321869b8a0ee3e2fd6c052767bb667efc1a42c06f2b20f591d67cac9041ebd?s=96&d=mm&r=g6040395424e4d2530c0dde101c8ae736\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/dc321869b8a0ee3e2fd6c052767bb667efc1a42c06f2b20f591d67cac9041ebd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/dc321869b8a0ee3e2fd6c052767bb667efc1a42c06f2b20f591d67cac9041ebd?s=96&d=mm&r=g\"},\"url\":\"https:\/\/www.salesforce.com\/br\/blog\/author\/mike-melonesalesforce-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Relat\u00f3rio State of IT: Seguran\u00e7a, 4\u00aa edi\u00e7\u00e3o","description":"Saiba como a IA aprimora a seguran\u00e7a de TI, introduz novos desafios e como as empresas est\u00e3o se adaptando para sair na frente da concorr\u00eancia.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.salesforce.com\/br\/blog\/4th-state-of-it-security\/","og_locale":"pt_BR","og_type":"article","og_title":"State of IT: Seguran\u00e7a, 4\u00aa edi\u00e7\u00e3o","og_description":"Saiba como a IA aprimora a seguran\u00e7a de TI, introduz novos desafios e como as empresas est\u00e3o se adaptando para sair na frente da concorr\u00eancia.","og_url":"https:\/\/www.salesforce.com\/br\/blog\/4th-state-of-it-security\/","og_site_name":"Salesforce","article_published_time":"2025-05-15T15:27:50+00:00","article_modified_time":"2025-08-27T23:14:42+00:00","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.salesforce.com\/br\/blog\/wp-content\/uploads\/sites\/6\/2025\/05\/State-of-it_-Security-1.png","twitter_misc":{"Escrito por":"","Est. tempo de leitura":"5 minutos","Written by":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.salesforce.com\/br\/blog\/4th-state-of-it-security\/#article","isPartOf":{"@id":"https:\/\/www.salesforce.com\/br\/blog\/4th-state-of-it-security\/"},"author":{"@id":"https:\/\/www.salesforce.com\/br\/blog\/#\/schema\/person\/8d70abd8e12f83dd60ca082ba5e897f0"},"headline":"State of IT: Seguran\u00e7a, 4\u00aa edi\u00e7\u00e3o","datePublished":"2025-05-15T15:27:50+00:00","dateModified":"2025-08-27T23:14:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.salesforce.com\/br\/blog\/4th-state-of-it-security\/"},"wordCount":896,"commentCount":0,"image":{"@id":"https:\/\/www.salesforce.com\/br\/blog\/4th-state-of-it-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/br\/blog\/wp-content\/uploads\/sites\/6\/2025\/05\/State-of-it_-Security-1.png","inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.salesforce.com\/br\/blog\/4th-state-of-it-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.salesforce.com\/br\/blog\/4th-state-of-it-security\/","url":"https:\/\/www.salesforce.com\/br\/blog\/4th-state-of-it-security\/","name":"Relat\u00f3rio State of IT: Seguran\u00e7a, 4\u00aa edi\u00e7\u00e3o","isPartOf":{"@id":"https:\/\/www.salesforce.com\/br\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.salesforce.com\/br\/blog\/4th-state-of-it-security\/#primaryimage"},"image":{"@id":"https:\/\/www.salesforce.com\/br\/blog\/4th-state-of-it-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/br\/blog\/wp-content\/uploads\/sites\/6\/2025\/05\/State-of-it_-Security-1.png","datePublished":"2025-05-15T15:27:50+00:00","dateModified":"2025-08-27T23:14:42+00:00","author":{"@id":"https:\/\/www.salesforce.com\/br\/blog\/#\/schema\/person\/8d70abd8e12f83dd60ca082ba5e897f0"},"description":"Saiba como a IA aprimora a seguran\u00e7a de TI, introduz novos desafios e como as empresas est\u00e3o se adaptando para sair na frente da concorr\u00eancia.","breadcrumb":{"@id":"https:\/\/www.salesforce.com\/br\/blog\/4th-state-of-it-security\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.salesforce.com\/br\/blog\/4th-state-of-it-security\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.salesforce.com\/br\/blog\/4th-state-of-it-security\/#primaryimage","url":"https:\/\/www.salesforce.com\/br\/blog\/wp-content\/uploads\/sites\/6\/2025\/05\/State-of-it_-Security-1.png","contentUrl":"https:\/\/www.salesforce.com\/br\/blog\/wp-content\/uploads\/sites\/6\/2025\/05\/State-of-it_-Security-1.png","width":3000,"height":1688,"caption":"80% of security leaders recognize the transformative potential of AI in enhancing their security posture. [Image: Salesforce]"},{"@type":"BreadcrumbList","@id":"https:\/\/www.salesforce.com\/br\/blog\/4th-state-of-it-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.salesforce.com\/br\/blog\/"},{"@type":"ListItem","position":2,"name":"State of IT: Seguran\u00e7a, 4\u00aa edi\u00e7\u00e3o"}]},{"@type":"WebSite","@id":"https:\/\/www.salesforce.com\/br\/blog\/#website","url":"https:\/\/www.salesforce.com\/br\/blog\/","name":"Salesforce","description":"Novidades sobre ia ag\u00eantica, dados e crm","alternateName":"Salesforce Brasil","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.salesforce.com\/br\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Person","@id":"https:\/\/www.salesforce.com\/br\/blog\/#\/schema\/person\/8d70abd8e12f83dd60ca082ba5e897f0","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/dc321869b8a0ee3e2fd6c052767bb667efc1a42c06f2b20f591d67cac9041ebd?s=96&d=mm&r=g6040395424e4d2530c0dde101c8ae736","url":"https:\/\/secure.gravatar.com\/avatar\/dc321869b8a0ee3e2fd6c052767bb667efc1a42c06f2b20f591d67cac9041ebd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/dc321869b8a0ee3e2fd6c052767bb667efc1a42c06f2b20f591d67cac9041ebd?s=96&d=mm&r=g"},"url":"https:\/\/www.salesforce.com\/br\/blog\/author\/mike-melonesalesforce-com\/"}]}},"jetpack_featured_media_url":"https:\/\/www.salesforce.com\/br\/blog\/wp-content\/uploads\/sites\/6\/2025\/05\/State-of-it_-Security-1.png","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Salesforce","distributor_original_site_url":"https:\/\/www.salesforce.com\/br\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.salesforce.com\/br\/blog\/wp-json\/wp\/v2\/posts\/22548","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.salesforce.com\/br\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.salesforce.com\/br\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/br\/blog\/wp-json\/wp\/v2\/users\/675"}],"replies":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/br\/blog\/wp-json\/wp\/v2\/comments?post=22548"}],"version-history":[{"count":3,"href":"https:\/\/www.salesforce.com\/br\/blog\/wp-json\/wp\/v2\/posts\/22548\/revisions"}],"predecessor-version":[{"id":22867,"href":"https:\/\/www.salesforce.com\/br\/blog\/wp-json\/wp\/v2\/posts\/22548\/revisions\/22867"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/br\/blog\/wp-json\/wp\/v2\/media\/22549"}],"wp:attachment":[{"href":"https:\/\/www.salesforce.com\/br\/blog\/wp-json\/wp\/v2\/media?parent=22548"}],"wp:term":[{"taxonomy":"sf_topic","embeddable":true,"href":"https:\/\/www.salesforce.com\/br\/blog\/wp-json\/wp\/v2\/sf_topic?post=22548"},{"taxonomy":"sf_content_type","embeddable":true,"href":"https:\/\/www.salesforce.com\/br\/blog\/wp-json\/wp\/v2\/sf_content_type?post=22548"},{"taxonomy":"blog","embeddable":true,"href":"https:\/\/www.salesforce.com\/br\/blog\/wp-json\/wp\/v2\/blog?post=22548"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.salesforce.com\/br\/blog\/wp-json\/wp\/v2\/coauthors?post=22548"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}