{"id":38496,"date":"2025-10-15T13:17:25","date_gmt":"2025-10-15T17:17:25","guid":{"rendered":"https:\/\/www.lightspeedsystems.com\/?p=38496"},"modified":"2025-10-20T14:53:25","modified_gmt":"2025-10-20T18:53:25","slug":"why-zero-trust-is-essential-for-k-12-schools-and-how-to-make-it-work","status":"publish","type":"post","link":"https:\/\/www.lightspeedsystems.com\/pt\/blog\/why-zero-trust-is-essential-for-k-12-schools-and-how-to-make-it-work\/","title":{"rendered":"Por que a Confian\u00e7a Zero \u00e9 essencial para escolas de ensino fundamental e m\u00e9dio e como faz\u00ea-la funcionar"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"38496\" class=\"elementor elementor-38496\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0a623c0 e-flex e-con-boxed e-con e-parent\" data-id=\"0a623c0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-af16c92 elementor-widget elementor-widget-text-editor\" data-id=\"af16c92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Escolas de ensino fundamental e m\u00e9dio est\u00e3o sob o cerco de amea\u00e7as cibern\u00e9ticas. Ransomware, phishing, riscos internos e dispositivos desprotegidos s\u00e3o agora realidades di\u00e1rias para distritos em todos os lugares. Ao mesmo tempo, alunos e funcion\u00e1rios precisam acessar recursos de aprendizagem de casa, do campus e da nuvem \u2014 muitas vezes em uma combina\u00e7\u00e3o de dispositivos pessoais e da escola. A abordagem tradicional de &quot;per\u00edmetro&quot; para a seguran\u00e7a cibern\u00e9tica n\u00e3o consegue acompanhar.<\/p>\n<p>Digitar\u00a0<a href=\"https:\/\/www.lightspeedsystems.com\/pt\/ebook\/ensuring-zero-trust-in-k-12-education\/\" target=\"_blank\" rel=\"noopener\">Arquitetura Zero Trust<\/a>\u00a0(ZTA): uma estrat\u00e9gia moderna e centrada na identidade que pressup\u00f5e que nenhum usu\u00e1rio ou dispositivo \u2014 dentro ou fora da rede \u2014 seja automaticamente confi\u00e1vel. Cada solicita\u00e7\u00e3o de acesso \u00e9 verificada, cada dispositivo \u00e9 monitorado e dados confidenciais s\u00e3o sempre protegidos. Zero Trust n\u00e3o \u00e9 apenas um termo da moda. Est\u00e1 rapidamente se tornando a base para um aprendizado digital seguro e escal\u00e1vel.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f8b8fa7 e-flex e-con-boxed e-con e-parent\" data-id=\"f8b8fa7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-df8c949 elementor-widget elementor-widget-heading\" data-id=\"df8c949\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">O que significa Zero Trust para o ensino fundamental e m\u00e9dio? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d133bef e-flex e-con-boxed e-con e-parent\" data-id=\"d133bef\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd1f363 elementor-widget elementor-widget-text-editor\" data-id=\"bd1f363\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O Zero Trust reconhece que os limites est\u00e3o confusos:<\/p><ul><li><strong>Acesso descentralizado:<\/strong>A aprendizagem acontece em todos os lugares, n\u00e3o apenas no campus.<\/li><li><strong>Variedade de dispositivos:<\/strong>Os distritos gerenciam laptops fornecidos pela escola, BYOD e dispositivos compartilhados.<\/li><li><strong>Mandatos regulat\u00f3rios:<\/strong>FERPA, CIPA e leis estaduais exigem salvaguardas verific\u00e1veis para dados de alunos.<\/li><\/ul><p>Orienta\u00e7\u00e3o do Instituto Nacional de Padr\u00f5es e Tecnologia (<a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/specialpublications\/NIST.SP.800-207.pdf\" target=\"_blank\" rel=\"noopener\">NIST SP 800-207<\/a>) oferece um roteiro: verifica\u00e7\u00e3o cont\u00ednua da identidade e da integridade do dispositivo, aplica\u00e7\u00e3o de pol\u00edticas no ponto de acesso e registro e an\u00e1lise robustos em todos os dispositivos e usu\u00e1rios.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6a03eb9 e-flex e-con-boxed e-con e-parent\" data-id=\"6a03eb9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3b4ce29 elementor-widget elementor-widget-heading\" data-id=\"3b4ce29\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Os seis pilares da arquitetura Zero Trust para escolas <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0f899e3 e-flex e-con-boxed e-con e-parent\" data-id=\"0f899e3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a893fd2 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"a893fd2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><strong>Identidade:<\/strong>Autentique todos os usu\u00e1rios. Integre com SSO, MFA e provedores de identidade robustos.<\/li><li><strong>Dispositivos:<\/strong>Gerencie e monitore todos os endpoints com MDM e prote\u00e7\u00e3o de endpoint.<\/li><li><strong>Rede:<\/strong>Segmente e microper\u00edmetro sua rede para reduzir a propaga\u00e7\u00e3o de amea\u00e7as.<\/li><li><strong>Aplica\u00e7\u00f5es:<\/strong>Restrinja o acesso a aplicativos aprovados com pol\u00edticas contextuais.<\/li><li><strong>Dados:<\/strong>Criptografe dados em tr\u00e2nsito e em repouso; monitore acesso e compartilhamento n\u00e3o autorizados.<\/li><li><strong>Visibilidade e an\u00e1lise:<\/strong>Colete telemetry em todos os lugares e use IA para detectar anomalias precocemente.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b8a9005 elementor-widget__width-initial elementor-widget elementor-widget-spacer\" data-id=\"b8a9005\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9d6faec elementor-invisible elementor-widget elementor-widget-image\" data-id=\"9d6faec\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInRight&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"565\" src=\"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2025\/10\/Zero-Trust_Core-Pillars-1024x723.png\" class=\"attachment-large size-large wp-image-38498\" alt=\"Six Pillars of Zero Trust\" srcset=\"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2025\/10\/Zero-Trust_Core-Pillars-1024x723.png 1024w, https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2025\/10\/Zero-Trust_Core-Pillars-300x212.png 300w, https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2025\/10\/Zero-Trust_Core-Pillars-768x543.png 768w, https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2025\/10\/Zero-Trust_Core-Pillars-1536x1085.png 1536w, https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2025\/10\/Zero-Trust_Core-Pillars-2048x1447.png 2048w, https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2025\/10\/Zero-Trust_Core-Pillars-18x12.png 18w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5377583 e-flex e-con-boxed e-con e-parent\" data-id=\"5377583\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ba8682d elementor-widget elementor-widget-heading\" data-id=\"ba8682d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">As ferramentas de seguran\u00e7a cibern\u00e9tica certas para o trabalho <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-158640e e-flex e-con-boxed e-con e-parent\" data-id=\"158640e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-146dab1 elementor-widget elementor-widget-text-editor\" data-id=\"146dab1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Uma estrat\u00e9gia de Confian\u00e7a Zero bem-sucedida para o ensino fundamental e m\u00e9dio deve incluir:<\/p>\n<ul>\n<li><strong>\u00a0Gerenciamento de acesso:<\/strong>Google Workspace for Education ou Microsoft Entra ID; MFA para todos os funcion\u00e1rios; SSO para acesso unificado \u00e0 plataforma.<\/li>\n<li><strong>Seguran\u00e7a de dispositivos e endpoints:<\/strong>Solu\u00e7\u00f5es MDM como\u00a0<a href=\"https:\/\/www.lightspeedsystems.com\/pt\/products\/lightspeed-mobile-device-management\/\" target=\"_blank\" rel=\"noopener\">Lightspeed MDM\u2122<\/a>, Jamf ou Intune; monitoramento em tempo real e gerenciamento de patches.<\/li>\n<li><strong>Filtragem e seguran\u00e7a da Web:<\/strong>Filtros da web baseados em nuvem (<a href=\"https:\/\/www.lightspeedsystems.com\/pt\/products\/lightspeed-filter\/\" target=\"_blank\" rel=\"noopener\">Filtro Lightspeed\u2122<\/a>, GoGuardian, Securly) que aplicam pol\u00edticas baseadas no usu\u00e1rio e detectam riscos comportamentais.<\/li>\n<li><strong>Controles de rede:<\/strong>Firewalls, Zero Trust Network Access (ZTNA) e segmenta\u00e7\u00e3o de VLAN para funcion\u00e1rios, alunos e dispositivos IoT.<\/li>\n<li><strong>Detec\u00e7\u00e3o e resposta a amea\u00e7as:<\/strong>Sistemas SIEM, automa\u00e7\u00e3o de resposta a incidentes e registro centralizado.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-43fa322 e-flex e-con-boxed e-con e-parent\" data-id=\"43fa322\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e2d684d elementor-widget elementor-widget-heading\" data-id=\"e2d684d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Melhores pr\u00e1ticas para acertar em Zero Trust<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ffb347b e-flex e-con-boxed e-con e-parent\" data-id=\"ffb347b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c46e3f5 elementor-widget elementor-widget-text-editor\" data-id=\"c46e3f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>Comece com a identidade:<\/strong>Centralize diret\u00f3rios, aplique MFA e proteja contas privilegiadas.<\/li><li><strong>Acesso ao mapa por fun\u00e7\u00e3o:<\/strong>Aplique acesso de privil\u00e9gio m\u00ednimo com base nas fun\u00e7\u00f5es do cargo.<\/li><li><strong>Dispositivos seguros em todos os lugares:<\/strong>Use o gerenciamento de endpoint e aplique pol\u00edticas de seguran\u00e7a em todos os dispositivos.<\/li><li><strong>Filtrar e monitorar o uso da Internet:<\/strong>Filtragem adapt\u00e1vel e monitoramento de comportamento inapropriado ou arriscado.<\/li><li><strong>Registre tudo:<\/strong>Registros centralizados para autentica\u00e7\u00e3o, uso de aplicativos e atividade na web \u2014 integre IA\/ML para detec\u00e7\u00e3o de anomalias.<\/li><li><strong>Treinamento Cont\u00ednuo:<\/strong>Treinamento regular e adequado \u00e0 fun\u00e7\u00e3o em seguran\u00e7a cibern\u00e9tica para funcion\u00e1rios e alunos.<\/li><li><strong>Teste sua resposta:<\/strong>Tenha (e teste) um plano de resposta a incidentes para estar preparado para ransomware, phishing ou viola\u00e7\u00f5es.<\/li><\/ul><p>Evite armadilhas comuns, como depender de firewalls legados, ignorar a privacidade dos dados dos alunos ou deixar de monitorar atividades fora do campus.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9353a51 e-flex e-con-boxed e-con e-parent\" data-id=\"9353a51\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fd9e6c0 elementor-widget elementor-widget-heading\" data-id=\"fd9e6c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Por que o filtro Lightspeed foi desenvolvido especificamente para Zero Trust do ensino fundamental e m\u00e9dio <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3210ae6 e-flex e-con-boxed e-con e-parent\" data-id=\"3210ae6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-63f7641 elementor-widget elementor-widget-text-editor\" data-id=\"63f7641\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Embora as solu\u00e7\u00f5es corporativas Zero Trust sejam muitas vezes muito r\u00edgidas para escolas, o Lightspeed Filter oferece seguran\u00e7a e flexibilidade personalizadas para a educa\u00e7\u00e3o:<\/p>\n<ul>\n<li><strong>Suporta todos os modelos de aprendizagem:<\/strong>BYOD, dispositivos compartilhados, convidados e muito mais, sem interromper as instru\u00e7\u00f5es.<\/li>\n<li><strong>Filtragem no dispositivo:<\/strong>Prote\u00e7\u00e3o sempre ativa, dentro e fora do campus, sem necessidade de tunelamento.<\/li>\n<li><strong>Integra\u00e7\u00f5es perfeitas:<\/strong>Funciona com seu firewall e provedor de identidade para seguran\u00e7a em camadas.<\/li>\n<li><strong>Controles espec\u00edficos para o ensino fundamental e m\u00e9dio:<\/strong>A IA e a revis\u00e3o humana distinguem entre conte\u00fado instrucional e inapropriado.<\/li>\n<li><strong>Bloqueio de amea\u00e7as em tempo real:<\/strong>Conecta-se a fontes globais de intelig\u00eancia intel para&nbsp;<a href=\"https:\/\/www.lightspeedsystems.com\/pt\/blog\/the-hidden-dangers-of-unknown-urls\/\" target=\"_blank\">bloquear novas amea\u00e7as.<\/a><\/li>\n<li><strong>Portal dos pais:<\/strong><a href=\"https:\/\/www.lightspeedsystems.com\/pt\/blog\/why-parent-transparency-matters-more-than-ever-in-k-12-edtech\/#ParentPortal\" target=\"_blank\" rel=\"noopener\">Supervis\u00e3o parental aprimorada<\/a> al\u00e9m do hor\u00e1rio escolar.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7f224db e-flex e-con-boxed e-con e-parent\" data-id=\"7f224db\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4855237 elementor-widget elementor-widget-heading\" data-id=\"4855237\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">O resultado final<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c3796cf e-flex e-con-boxed e-con e-parent\" data-id=\"c3796cf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-21c72a2 elementor-widget elementor-widget-text-editor\" data-id=\"21c72a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O Zero Trust agora \u00e9 essencial para os distritos do ensino fundamental e m\u00e9dio \u2014 n\u00e3o apenas algo &quot;bom de se ter&quot;. \u00c0 medida que o aprendizado se torna mais m\u00f3vel e as amea\u00e7as se tornam mais sofisticadas, os distritos devem implementar seguran\u00e7a com base em visibilidade, verifica\u00e7\u00e3o e controle proativo.<\/p><p>O Lightspeed Filter possibilita essa mudan\u00e7a, fornecendo uma base Zero Trust para a educa\u00e7\u00e3o. Com as ferramentas certas e um plano de implementa\u00e7\u00e3o bem pensado, seu distrito pode construir um ambiente seguro, escal\u00e1vel e protegido para todos os alunos e funcion\u00e1rios.<\/p><p><strong>Pronto para ver o Zero Trust em a\u00e7\u00e3o?<a href=\"https:\/\/www.lightspeedsystems.com\/pt\/request-a-demo\/\" target=\"_blank\" rel=\"noopener\">Solicite uma demonstra\u00e7\u00e3o do Lightspeed Filter hoje mesmo.<\/a><\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7204af3 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"7204af3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;animation&quot;:&quot;slideInUp&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a6860ef e-con-full e-flex e-con e-child\" data-id=\"a6860ef\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5acb271 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"5acb271\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Com amea\u00e7as como<font color=\"ffd177\"> ransomware e phishing<\/font> em ascens\u00e3o<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c31134d elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"c31134d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As escolas de ensino fundamental e m\u00e9dio devem adotar o Zero Trust para garantir que <strong>nenhum usu\u00e1rio ou dispositivo<\/strong> \u00e9 automaticamente confi\u00e1vel.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ddd910 elementor-widget elementor-widget-button\" data-id=\"7ddd910\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/www.lightspeedsystems.com\/pt\/ebook\/ensuring-zero-trust-in-k-12-education\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Saiba mais sobre Zero Trust<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2bedd12 e-con-full e-flex e-con e-child\" data-id=\"2bedd12\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bf7703d elementor-widget elementor-widget-image\" data-id=\"bf7703d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"2560\" height=\"1780\" src=\"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2025\/09\/Cover-Spread-Ensuring-Zero-Trust-in-K-12-White-Paper-scaled.png\" class=\"attachment-full size-full wp-image-37389\" alt=\"Ensuring Zero Trust in K-12 Education Whitepaper\" srcset=\"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2025\/09\/Cover-Spread-Ensuring-Zero-Trust-in-K-12-White-Paper-scaled.png 2560w, https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2025\/09\/Cover-Spread-Ensuring-Zero-Trust-in-K-12-White-Paper-300x209.png 300w, https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2025\/09\/Cover-Spread-Ensuring-Zero-Trust-in-K-12-White-Paper-1024x712.png 1024w, https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2025\/09\/Cover-Spread-Ensuring-Zero-Trust-in-K-12-White-Paper-768x534.png 768w, https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2025\/09\/Cover-Spread-Ensuring-Zero-Trust-in-K-12-White-Paper-1536x1068.png 1536w, https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2025\/09\/Cover-Spread-Ensuring-Zero-Trust-in-K-12-White-Paper-2048x1424.png 2048w, https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2025\/09\/Cover-Spread-Ensuring-Zero-Trust-in-K-12-White-Paper-18x12.png 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Apresentamos a Arquitetura Zero Trust (ZTA): uma estrat\u00e9gia moderna e centrada na identidade que pressup\u00f5e que nenhum usu\u00e1rio ou dispositivo \u2014 dentro ou fora da rede \u2014 deve ser automaticamente confi\u00e1vel. Cada solicita\u00e7\u00e3o de acesso \u00e9 verificada, cada dispositivo \u00e9 monitorado e os dados confidenciais est\u00e3o sempre protegidos.<\/p>","protected":false},"author":19,"featured_media":38498,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"zero trust","_yoast_wpseo_title":"What is Zero Trust for K12 Schools | Zero Trust Architecture (ZTA) | Blog","_yoast_wpseo_metadesc":"Zero Trust Architecture: a modern, identity-centric strategy that assumes no user or device should be automatically trusted.\u202f","footnotes":""},"categories":[1],"tags":[11,10],"class_list":["post-38496","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-cybersecurity","tag-lightspeed-filter"],"acf":{"authors":[777]},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is Zero Trust for K12 Schools | Zero Trust Architecture (ZTA) | Blog<\/title>\n<meta name=\"description\" content=\"Zero Trust Architecture: a modern, identity-centric strategy that assumes no user or device should be automatically trusted.\u202f\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lightspeedsystems.com\/pt\/blog\/why-zero-trust-is-essential-for-k-12-schools-and-how-to-make-it-work\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Zero Trust is Essential for K-12 Schools and How to Make It Work\" \/>\n<meta property=\"og:description\" content=\"Zero Trust Architecture: a modern, identity-centric strategy that assumes no user or device should be automatically trusted.\u202f\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lightspeedsystems.com\/pt\/blog\/why-zero-trust-is-essential-for-k-12-schools-and-how-to-make-it-work\/\" \/>\n<meta property=\"og:site_name\" content=\"Lightspeed Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/lightspeedsystems\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-15T17:17:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-20T18:53:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2025\/10\/Zero-Trust_Core-Pillars.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2235\" \/>\n\t<meta property=\"og:image:height\" content=\"1579\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"gracemellette\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lightspeedsys\" \/>\n<meta name=\"twitter:site\" content=\"@lightspeedsys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matthew Burg\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.lightspeedsystems.com\/blog\/why-zero-trust-is-essential-for-k-12-schools-and-how-to-make-it-work\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.lightspeedsystems.com\/blog\/why-zero-trust-is-essential-for-k-12-schools-and-how-to-make-it-work\/\"},\"author\":{\"name\":\"gracemellette\",\"@id\":\"https:\/\/www.lightspeedsystems.com\/zh\/#\/schema\/person\/a996dc5e11a575f0b42c0e12340978aa\"},\"headline\":\"Why Zero Trust is Essential for K-12 Schools and How to Make It Work\",\"datePublished\":\"2025-10-15T17:17:25+00:00\",\"dateModified\":\"2025-10-20T18:53:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.lightspeedsystems.com\/blog\/why-zero-trust-is-essential-for-k-12-schools-and-how-to-make-it-work\/\"},\"wordCount\":733,\"publisher\":{\"@id\":\"https:\/\/www.lightspeedsystems.com\/zh\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.lightspeedsystems.com\/blog\/why-zero-trust-is-essential-for-k-12-schools-and-how-to-make-it-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2025\/10\/Zero-Trust_Core-Pillars.png\",\"keywords\":[\"Cybersecurity\",\"Lightspeed Filter\u2122\"],\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.lightspeedsystems.com\/blog\/why-zero-trust-is-essential-for-k-12-schools-and-how-to-make-it-work\/\",\"url\":\"https:\/\/www.lightspeedsystems.com\/blog\/why-zero-trust-is-essential-for-k-12-schools-and-how-to-make-it-work\/\",\"name\":\"What is Zero Trust for K12 Schools | Zero Trust Architecture (ZTA) | Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.lightspeedsystems.com\/zh\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.lightspeedsystems.com\/blog\/why-zero-trust-is-essential-for-k-12-schools-and-how-to-make-it-work\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.lightspeedsystems.com\/blog\/why-zero-trust-is-essential-for-k-12-schools-and-how-to-make-it-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2025\/10\/Zero-Trust_Core-Pillars.png\",\"datePublished\":\"2025-10-15T17:17:25+00:00\",\"dateModified\":\"2025-10-20T18:53:25+00:00\",\"description\":\"Zero Trust Architecture: a modern, identity-centric strategy that assumes no user or device should be automatically trusted.\u202f\",\"breadcrumb\":{\"@id\":\"https:\/\/www.lightspeedsystems.com\/blog\/why-zero-trust-is-essential-for-k-12-schools-and-how-to-make-it-work\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.lightspeedsystems.com\/blog\/why-zero-trust-is-essential-for-k-12-schools-and-how-to-make-it-work\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.lightspeedsystems.com\/blog\/why-zero-trust-is-essential-for-k-12-schools-and-how-to-make-it-work\/#primaryimage\",\"url\":\"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2025\/10\/Zero-Trust_Core-Pillars.png\",\"contentUrl\":\"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2025\/10\/Zero-Trust_Core-Pillars.png\",\"width\":2235,\"height\":1579,\"caption\":\"Six Pillars of Zero Trust\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.lightspeedsystems.com\/blog\/why-zero-trust-is-essential-for-k-12-schools-and-how-to-make-it-work\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.lightspeedsystems.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Zero Trust is Essential for K-12 Schools and How to Make It Work\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.lightspeedsystems.com\/zh\/#website\",\"url\":\"https:\/\/www.lightspeedsystems.com\/zh\/\",\"name\":\"Lightspeed Systems\",\"description\":\"Helping K-12 communities provide safe, secure, and equitable education\u2014effortlessly.\",\"publisher\":{\"@id\":\"https:\/\/www.lightspeedsystems.com\/zh\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.lightspeedsystems.com\/zh\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.lightspeedsystems.com\/zh\/#organization\",\"name\":\"Lightspeed Systems\",\"url\":\"https:\/\/www.lightspeedsystems.com\/zh\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.lightspeedsystems.com\/zh\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2024\/12\/lightspeed_systems_logo.svg\",\"contentUrl\":\"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2024\/12\/lightspeed_systems_logo.svg\",\"caption\":\"Lightspeed Systems\"},\"image\":{\"@id\":\"https:\/\/www.lightspeedsystems.com\/zh\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/lightspeedsystems\/\",\"https:\/\/x.com\/lightspeedsys\",\"https:\/\/www.linkedin.com\/company\/lightspeed-systems\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.lightspeedsystems.com\/zh\/#\/schema\/person\/a996dc5e11a575f0b42c0e12340978aa\",\"name\":\"gracemellette\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.lightspeedsystems.com\/zh\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/618018ae54f6cabf8dcfeba46b0734c9b0a3e36b133a10a6130d917ad395cbd9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/618018ae54f6cabf8dcfeba46b0734c9b0a3e36b133a10a6130d917ad395cbd9?s=96&d=mm&r=g\",\"caption\":\"gracemellette\"},\"url\":\"https:\/\/www.lightspeedsystems.com\/pt\/person\/matthew-burg\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"O que \u00e9 Zero Trust para escolas de ensino fundamental e m\u00e9dio | Arquitetura Zero Trust (ZTA) | Blog","description":"Arquitetura Zero Trust: uma estrat\u00e9gia moderna e centrada na identidade que pressup\u00f5e que nenhum usu\u00e1rio ou dispositivo deve ser automaticamente confi\u00e1vel.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lightspeedsystems.com\/pt\/blog\/why-zero-trust-is-essential-for-k-12-schools-and-how-to-make-it-work\/","og_locale":"pt_BR","og_type":"article","og_title":"Why Zero Trust is Essential for K-12 Schools and How to Make It Work","og_description":"Zero Trust Architecture: a modern, identity-centric strategy that assumes no user or device should be automatically trusted.\u202f","og_url":"https:\/\/www.lightspeedsystems.com\/pt\/blog\/why-zero-trust-is-essential-for-k-12-schools-and-how-to-make-it-work\/","og_site_name":"Lightspeed Systems","article_publisher":"https:\/\/www.facebook.com\/lightspeedsystems\/","article_published_time":"2025-10-15T17:17:25+00:00","article_modified_time":"2025-10-20T18:53:25+00:00","og_image":[{"width":2235,"height":1579,"url":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2025\/10\/Zero-Trust_Core-Pillars.png","type":"image\/png"}],"author":"gracemellette","twitter_card":"summary_large_image","twitter_creator":"@lightspeedsys","twitter_site":"@lightspeedsys","twitter_misc":{"Written by":"Matthew Burg","Est. reading time":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.lightspeedsystems.com\/blog\/why-zero-trust-is-essential-for-k-12-schools-and-how-to-make-it-work\/#article","isPartOf":{"@id":"https:\/\/www.lightspeedsystems.com\/blog\/why-zero-trust-is-essential-for-k-12-schools-and-how-to-make-it-work\/"},"author":{"name":"gracemellette","@id":"https:\/\/www.lightspeedsystems.com\/zh\/#\/schema\/person\/a996dc5e11a575f0b42c0e12340978aa"},"headline":"Why Zero Trust is Essential for K-12 Schools and How to Make It Work","datePublished":"2025-10-15T17:17:25+00:00","dateModified":"2025-10-20T18:53:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.lightspeedsystems.com\/blog\/why-zero-trust-is-essential-for-k-12-schools-and-how-to-make-it-work\/"},"wordCount":733,"publisher":{"@id":"https:\/\/www.lightspeedsystems.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.lightspeedsystems.com\/blog\/why-zero-trust-is-essential-for-k-12-schools-and-how-to-make-it-work\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2025\/10\/Zero-Trust_Core-Pillars.png","keywords":["Cybersecurity","Lightspeed Filter\u2122"],"articleSection":["Uncategorized"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.lightspeedsystems.com\/blog\/why-zero-trust-is-essential-for-k-12-schools-and-how-to-make-it-work\/","url":"https:\/\/www.lightspeedsystems.com\/blog\/why-zero-trust-is-essential-for-k-12-schools-and-how-to-make-it-work\/","name":"O que \u00e9 Zero Trust para escolas de ensino fundamental e m\u00e9dio | Arquitetura Zero Trust (ZTA) | Blog","isPartOf":{"@id":"https:\/\/www.lightspeedsystems.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.lightspeedsystems.com\/blog\/why-zero-trust-is-essential-for-k-12-schools-and-how-to-make-it-work\/#primaryimage"},"image":{"@id":"https:\/\/www.lightspeedsystems.com\/blog\/why-zero-trust-is-essential-for-k-12-schools-and-how-to-make-it-work\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2025\/10\/Zero-Trust_Core-Pillars.png","datePublished":"2025-10-15T17:17:25+00:00","dateModified":"2025-10-20T18:53:25+00:00","description":"Arquitetura Zero Trust: uma estrat\u00e9gia moderna e centrada na identidade que pressup\u00f5e que nenhum usu\u00e1rio ou dispositivo deve ser automaticamente confi\u00e1vel.","breadcrumb":{"@id":"https:\/\/www.lightspeedsystems.com\/blog\/why-zero-trust-is-essential-for-k-12-schools-and-how-to-make-it-work\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lightspeedsystems.com\/blog\/why-zero-trust-is-essential-for-k-12-schools-and-how-to-make-it-work\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.lightspeedsystems.com\/blog\/why-zero-trust-is-essential-for-k-12-schools-and-how-to-make-it-work\/#primaryimage","url":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2025\/10\/Zero-Trust_Core-Pillars.png","contentUrl":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2025\/10\/Zero-Trust_Core-Pillars.png","width":2235,"height":1579,"caption":"Six Pillars of Zero Trust"},{"@type":"BreadcrumbList","@id":"https:\/\/www.lightspeedsystems.com\/blog\/why-zero-trust-is-essential-for-k-12-schools-and-how-to-make-it-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.lightspeedsystems.com\/"},{"@type":"ListItem","position":2,"name":"Why Zero Trust is Essential for K-12 Schools and How to Make It Work"}]},{"@type":"WebSite","@id":"https:\/\/www.lightspeedsystems.com\/zh\/#website","url":"https:\/\/www.lightspeedsystems.com\/zh\/","name":"Sistemas Lightspeed","description":"Ajudando comunidades do ensino fundamental e m\u00e9dio a oferecer educa\u00e7\u00e3o segura, protegida e equitativa, sem esfor\u00e7o.","publisher":{"@id":"https:\/\/www.lightspeedsystems.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lightspeedsystems.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.lightspeedsystems.com\/zh\/#organization","name":"Sistemas Lightspeed","url":"https:\/\/www.lightspeedsystems.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.lightspeedsystems.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2024\/12\/lightspeed_systems_logo.svg","contentUrl":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2024\/12\/lightspeed_systems_logo.svg","caption":"Lightspeed Systems"},"image":{"@id":"https:\/\/www.lightspeedsystems.com\/zh\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/lightspeedsystems\/","https:\/\/x.com\/lightspeedsys","https:\/\/www.linkedin.com\/company\/lightspeed-systems\/"]},{"@type":"Person","@id":"https:\/\/www.lightspeedsystems.com\/zh\/#\/schema\/person\/a996dc5e11a575f0b42c0e12340978aa","name":"Gracemellette","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.lightspeedsystems.com\/zh\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/618018ae54f6cabf8dcfeba46b0734c9b0a3e36b133a10a6130d917ad395cbd9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/618018ae54f6cabf8dcfeba46b0734c9b0a3e36b133a10a6130d917ad395cbd9?s=96&d=mm&r=g","caption":"gracemellette"},"url":"https:\/\/www.lightspeedsystems.com\/pt\/person\/matthew-burg\/"}]}},"_links":{"self":[{"href":"https:\/\/www.lightspeedsystems.com\/pt\/wp-json\/wp\/v2\/posts\/38496","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lightspeedsystems.com\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lightspeedsystems.com\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lightspeedsystems.com\/pt\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lightspeedsystems.com\/pt\/wp-json\/wp\/v2\/comments?post=38496"}],"version-history":[{"count":0,"href":"https:\/\/www.lightspeedsystems.com\/pt\/wp-json\/wp\/v2\/posts\/38496\/revisions"}],"acf:post":[{"embeddable":true,"href":"https:\/\/www.lightspeedsystems.com\/pt\/wp-json\/wp\/v2\/person\/777"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lightspeedsystems.com\/pt\/wp-json\/wp\/v2\/media\/38498"}],"wp:attachment":[{"href":"https:\/\/www.lightspeedsystems.com\/pt\/wp-json\/wp\/v2\/media?parent=38496"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lightspeedsystems.com\/pt\/wp-json\/wp\/v2\/categories?post=38496"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lightspeedsystems.com\/pt\/wp-json\/wp\/v2\/tags?post=38496"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}