{"id":13526,"date":"2023-06-21T07:33:06","date_gmt":"2023-06-21T04:33:06","guid":{"rendered":"https:\/\/emiralmedia.ro\/site\/safetech_new\/solutions\/pam-privileged-access-management\/cyberark-pam\/"},"modified":"2024-09-18T10:34:05","modified_gmt":"2024-09-18T07:34:05","slug":"cyberark-pam","status":"publish","type":"page","link":"https:\/\/safetech.ro\/en\/solutions\/privilege-and-identity-assurance\/cyberark-pam\/","title":{"rendered":"CyberArk PAM"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"13526\" class=\"elementor elementor-13526 elementor-6658\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-400602a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"400602a\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-15708f8\" data-id=\"15708f8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-201b78e elementor-widget elementor-widget-ld_breadcrumb\" data-id=\"201b78e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_breadcrumb.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"lqd-breadcrumb-wrapper\"><nav role=\"navigation\" aria-label=\"Breadcrumbs\" class=\"breadcrumbs\"><ol class=\"breadcrumb reset-ul inline-nav inline-ul comma-sep-li\"><li class=\"breadcrumb-item active\"><a href=\"https:\/\/safetech.ro\/en\/\" rel=\"home\"><span>Home<\/span><\/a><\/li><\/ol><\/nav><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-9104914 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"9104914\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e7ae82a\" data-id=\"e7ae82a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a9f4d5b elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"a9f4d5b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e1ea364006e\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h1 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h1\"  > CyberArk Privileged Access Manager<\/h1>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c528a11 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"c528a11\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e1ea3640e56\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h4 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h4\"  > The PAM solution to reduce risk and maximize productivity<\/h4>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa8a072 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"fa8a072\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e1ea3641a48\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > CyberArk Privileged Access Manager is a complete solution that enables organizations to secure, manage, control and monitor all activities associated with privileged identities.<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7dabd88 elementor-widget elementor-widget-spacer\" data-id=\"7dabd88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-baa54a7\" data-id=\"baa54a7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c1c8108 elementor-widget__width-auto elementor-widget elementor-widget-ld_fancy_image\" data-id=\"c1c8108\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_fancy_image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"lqd-imggrp-single d-block pos-rel \">\n\t\t\t<div class=\"lqd-imggrp-img-container d-inline-flex pos-rel align-items-center justify-content-center \">\n\t\t\t\t\t\t\t\t<figure class=\"w-100 pos-rel\">\n\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"400\" height=\"150\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/08\/logo-cyberark.png\" class=\"attachment-full size-full wp-image-16358\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/08\/logo-cyberark.png 400w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/08\/logo-cyberark-300x113.png 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f9cd4da elementor-hidden-tablet elementor-hidden-mobile_extra elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f9cd4da\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8eb2b7c\" data-id=\"8eb2b7c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7445b60 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7445b60\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-ff7ee20\" data-id=\"ff7ee20\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-35c74f7 meniu-iot elementor-widget elementor-widget-ld_custom_menu\" data-id=\"35c74f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;sticky&quot;:&quot;yes&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile_extra&quot;,&quot;mobile&quot;],&quot;sticky_offset&quot;:0,&quot;sticky_effects_offset&quot;:0,&quot;sticky_anchor_link_offset&quot;:0}\" data-widget_type=\"ld_custom_menu.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div\t\t\t\tclass=\"lqd-fancy-menu lqd-custom-menu pos-abs menu-items-has-fill center lqd-menu-td-none lqd-sticky-menu lqd-sticky-menu-floating\"\n\t\t\t\t\t\t\t\t\tdata-inview=\"true\"\n\t\t\t\t\tdata-inview-options='{ \"toggleBehavior\": \"toggleInView\" }'\n\t\t\t\t\t\t\t>\n\t\t\t\n\t\t\t\t\t\t\t<ul class=\"reset-ul inline-ul\" id=\"lqd-custom-menu-35c74f7\"  data-localscroll=\"true\" data-localscroll-options=\"{&quot;itemsSelector&quot;:&quot;&gt; li &gt; a&quot;,&quot;trackWindowScroll&quot;:true,&quot;includeParentAsOffset&quot;:true,&quot;offsetElements&quot;:&quot;[data-sticky-header] .lqd-head-sec-wrap:not(.lqd-hide-onstuck), #wpadminbar, body.elementor-page .main-header[data-sticky-header] &gt; .elementor &gt; .elementor-section-wrap &gt; .elementor-section:not(.lqd-hide-onstuck):not(.lqd-stickybar-wrap), body.elementor-page .main-header[data-sticky-header] &gt; .elementor &gt; .elementor-section:not(.lqd-hide-onstuck):not(.lqd-stickybar-wrap), body.elementor-page .main-header[data-sticky-header] &gt; .elementor &gt; .e-con:not(.lqd-hide-onstuck):not(.lqd-stickybar-wrap)&quot;}\">\n\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#prezentare\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty left-icon icon-next-to-label\"><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOverview\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#functionalitati\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty left-icon icon-next-to-label\"><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tMain functionalities\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#beneficii\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty left-icon icon-next-to-label\"><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tBenefits\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#servicii\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty left-icon icon-next-to-label\"><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSafetech services\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#contact\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty left-icon icon-next-to-label\"><i aria-hidden=\"true\" class=\"fas fa-pen\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tContact us\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b76e14f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b76e14f\" data-element_type=\"section\" data-e-type=\"section\" id=\"prezentare\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-a6a2b9d\" data-id=\"a6a2b9d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div data-parallax=\"true\" data-parallax-options=\"{&quot;ease&quot;:[&quot;linear&quot;],&quot;start&quot;:&quot;top bottom&quot;,&quot;end&quot;:&quot;bottom+=0px top&quot;}\" data-parallax-from=\"{&quot;y&quot;:&quot;135px&quot;,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;}\" data-parallax-to=\"{&quot;y&quot;:&quot;-85px&quot;,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;}\" class=\"elementor-element elementor-element-ac6cff7 elementor-widget__width-initial elementor-hidden-mobile elementor-hidden-mobile_extra elementor-hidden-tablet elementor-widget elementor-widget-ld_fancy_image\" data-id=\"ac6cff7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_fancy_image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"lqd-imggrp-single d-block pos-rel \" data-shadow-style=\"3\" data-inview=\"true\" data-animate-shadow=\"true\">\n\t\t\t<div class=\"lqd-imggrp-img-container d-inline-flex pos-rel align-items-center justify-content-center \">\n\t\t\t\t\t\t\t\t<figure class=\"w-100 pos-rel\">\n\t\t\t\t\t<img decoding=\"async\" width=\"1200\" height=\"800\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/07\/shutterstock_2303586803.webp\" class=\"attachment-full size-full wp-image-9796\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/07\/shutterstock_2303586803.webp 1200w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/07\/shutterstock_2303586803-300x200.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/07\/shutterstock_2303586803-1024x683.webp 1024w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/07\/shutterstock_2303586803-720x480.webp 720w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-parallax=\"true\" data-parallax-options=\"{&quot;ease&quot;:[&quot;linear&quot;],&quot;start&quot;:&quot;top bottom&quot;,&quot;end&quot;:&quot;bottom+=0px top&quot;}\" data-parallax-from=\"{&quot;y&quot;:&quot;55px&quot;,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;}\" data-parallax-to=\"{&quot;y&quot;:&quot;-65px&quot;,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;}\" class=\"elementor-element elementor-element-b6e31d7 elementor-widget__width-initial elementor-absolute elementor-hidden-mobile elementor-widget elementor-widget-ld_fancy_image\" data-id=\"b6e31d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"ld_fancy_image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"lqd-imggrp-single d-block pos-rel \" data-shadow-style=\"3\" data-inview=\"true\" data-animate-shadow=\"true\">\n\t\t\t<div class=\"lqd-imggrp-img-container d-inline-flex pos-rel align-items-center justify-content-center \">\n\t\t\t\t\t\t\t\t<figure class=\"w-100 pos-rel\">\n\t\t\t\t\t<img decoding=\"async\" width=\"1200\" height=\"675\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/07\/shutterstock_1682600908.jpg\" class=\"attachment-full size-full wp-image-8215\" alt=\"ics detect\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/07\/shutterstock_1682600908.jpg 1200w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/07\/shutterstock_1682600908-300x169.jpg 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/07\/shutterstock_1682600908-1024x576.jpg 1024w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-52d7d29\" data-id=\"52d7d29\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4a155d5 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"4a155d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e1ea364c460\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > Solution overview<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-55a8da9 elementor-widget elementor-widget-text-editor\" data-id=\"55a8da9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tCyberArk PAM provides the following functionality:<br><br>\n<ul>\n \t<li><b> Privileged Credential Management:<\/b> identify and secure privileged credentials used by human and non-human identities.\n<\/li>\n \t<li><b> Isolation and monitoring of access sessions:<\/b> maintain compliance by logging key events and byy secure and isolated remote sessions and record all activities during sessions.\n<\/li>\n \t<li><b> Threat detection and response:<\/b> automatically identify and secure unmanaged privileged accounts and credentials, detect and remediate issues.\n<\/li>\n \t<li><b> Management of nomadic devices:<\/b> by periodically changing credentials.\n<\/li>\n \t<li><b> Secure remote access: <\/b> enable secure access by remote employees and external providers to Privileged Access Manager, regardless of location, without VPN, without agent, without password.\n<\/li>\n \t<li><b> Multi-Factor Authentication (MFA) and Single sign-on (SSO):<\/b> validate privileged users with context-sensitive multi-factor authentication and secure access to resources with SSO.\n<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-e7aa160 e-flex e-con-boxed e-con e-parent\" data-id=\"e7aa160\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cf3a541 elementor-widget elementor-widget-image\" data-id=\"cf3a541\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"980\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/12\/CyberArk_Identity_Security_Platform_UI27-1.webp\" class=\"attachment-full size-full wp-image-20807\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/12\/CyberArk_Identity_Security_Platform_UI27-1.webp 1920w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/12\/CyberArk_Identity_Security_Platform_UI27-1-300x153.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/12\/CyberArk_Identity_Security_Platform_UI27-1-1024x523.webp 1024w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/12\/CyberArk_Identity_Security_Platform_UI27-1-1536x784.webp 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0c04230 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0c04230\" data-element_type=\"section\" data-e-type=\"section\" id=\"functionalitati\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div data-custom-animations=\"true\" data-ca-options=\"{&quot;addChildTimelines&quot;:false,&quot;trigger&quot;:&quot;firstChild&quot;,&quot;animationTarget&quot;:&quot;:scope &gt; .elementor-widget-wrap &gt; .elementor-element &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-section &gt; .elementor-container &gt; .elementor-column &gt; .elementor-widget-wrap &gt; .elementor-element:not(.lqd-el-has-inner-anim) &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-lines .lqd-lines .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-words .lqd-words .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-chars .lqd-chars .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-ld_custom_menu .lqd-fancy-menu &gt; ul &gt; li&quot;,&quot;startDelay&quot;:300,&quot;ease&quot;:[&quot;power4.out&quot;],&quot;initValues&quot;:{&quot;y&quot;:&quot;40px&quot;,&quot;opacity&quot;:0,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;},&quot;animations&quot;:{&quot;y&quot;:&quot;0px&quot;,&quot;opacity&quot;:1,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;}}\" class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-f7a8fe4\" data-id=\"f7a8fe4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a04cdcb elementor-widget__width-inherit elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"a04cdcb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e1ea3650fc1\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > Main functionalities<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-310bbac elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"310bbac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e1ea3651b64\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > CyberArk Privileged Access Manager provides the following functionalities:<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-11dda30 elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"11dda30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_11dda30\" class=\"iconbox d-flex flex-grow-1 pos-rel z-index-2 iconbox-side iconbox-icon-shaped iconbox-circle iconbox-icon-linked\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  pos-rel\"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"fas fa-chevron-circle-right\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Managing privileged credentials <\/h3>\t\t\t\t<p>Centralized management allows administrators to set uniform policies for password complexity, rotation frequency, and resource access. Automated password rotation helps strengthen security while eliminating manual processes for IT teams.<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab92eb1 elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"ab92eb1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_ab92eb1\" class=\"iconbox d-flex flex-grow-1 pos-rel z-index-2 iconbox-side iconbox-icon-shaped iconbox-circle iconbox-icon-linked\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  pos-rel\"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"fas fa-chevron-circle-right\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Session isolation and monitoring <\/h3>\t\t\t\t<p>End users never connect directly to the targeted systems, reducing the risk of malware infection. Session recordings are securely stored centrally to facilitate security, auditing and compliance.<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ce461a elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"6ce461a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_6ce461a\" class=\"iconbox d-flex flex-grow-1 pos-rel z-index-2 iconbox-side iconbox-icon-shaped iconbox-circle iconbox-icon-linked\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  pos-rel\"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"fas fa-chevron-circle-right\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Threat detection and response <\/h3>\t\t\t\t<p>The solution enables detection of anomalous behaviors and indicators of compromise and includes policy-based remediation capabilities.<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2377f5c elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"2377f5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_2377f5c\" class=\"iconbox d-flex flex-grow-1 pos-rel z-index-2 iconbox-side iconbox-icon-shaped iconbox-circle iconbox-icon-linked\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  pos-rel\"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"fas fa-chevron-circle-right\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Management of nomadic devices <\/h3>\t\t\t\t<p>The solution allows security policies to be enforced and credentials to be rotated for end devices that are not always connected to the organization's network.<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-792e4c6 elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"792e4c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_792e4c6\" class=\"iconbox d-flex flex-grow-1 pos-rel z-index-2 iconbox-side iconbox-icon-shaped iconbox-circle iconbox-icon-linked\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  pos-rel\"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"fas fa-chevron-circle-right\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Remote access <\/h3>\t\t\t\t<p>The integrated Vendor Privileged Access Manager solution enables vendor relationship management through multi-factor biometric authentication, enables the provision of credentials to third parties and the ability to record, monitor and remediate their activities.<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a52c1bf elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"a52c1bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_a52c1bf\" class=\"iconbox d-flex flex-grow-1 pos-rel z-index-2 iconbox-side iconbox-icon-shaped iconbox-circle iconbox-icon-linked\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  pos-rel\"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"fas fa-chevron-circle-right\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Adaptive Multi-Factor Authentication (MFA) and Single sign-on (SSO). <\/h3>\t\t\t\t<p>The integrated Workforce Identity solution enables secure, one-click access to all the resources employees need, including validating identities with AI, extending MFA to end devices, using the AI analytics engine to monitor the context of access requests, and generate useful information.<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-596390d\" data-id=\"596390d\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-01e0ad9 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"01e0ad9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e1ea365d3ed\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > Architecture and Implementation<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-33538ed elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"33538ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e1ea365e002\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > The CyberArk PAM solution architecture consists of two major elements, which communicate using CyberArk's secure protocol:<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff09ad9 elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"ff09ad9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_ff09ad9\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t\t\t\t\t<p><b>The storage engine<\/b> (Storage Engine) stores and secures the stored data and ensures authenticated and controlled access,<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-51302f3 elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"51302f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_51302f3\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t\t\t\t\t<p><b>The interface<\/b> (Windows interfaces, web, and SDKs) communicates with the storage engine while providing access to users and applications.<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff56879 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"ff56879\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e1ea3666b86\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > CyberArk Privileged Access Manager can be deployed as:<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-593a47e elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"593a47e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_593a47e\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Software as a Service (SaaS) <\/h3>\t\t\t\t<p>PAM-as-a-Service according to SOC 2 Type 2 standards, a Service Level Agreement (SLA) of 99.95% and advanced operational support. It ensures automatic updates and a low TCO.<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf24378 elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"bf24378\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_bf24378\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Private hosting <\/h3>\t\t\t\t<p>Enables you to protect, monitor and control privileged access with on-site deployment in your data center, private or public cloud to meet regulatory compliance or organizational needs.<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-d1cd249 e-flex e-con-boxed e-con e-parent\" data-id=\"d1cd249\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-028088c elementor-widget elementor-widget-image\" data-id=\"028088c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1432\" height=\"694\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/12\/Cyberark-PAM-303143-1.webp\" class=\"attachment-full size-full wp-image-20809\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/12\/Cyberark-PAM-303143-1.webp 1432w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/12\/Cyberark-PAM-303143-1-300x145.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/12\/Cyberark-PAM-303143-1-1024x496.webp 1024w\" sizes=\"(max-width: 1432px) 100vw, 1432px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-74323bc e-flex e-con-boxed e-con e-parent\" data-id=\"74323bc\" data-element_type=\"container\" data-e-type=\"container\" id=\"beneficii\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div data-custom-animations=\"true\" data-ca-options=\"{&quot;addChildTimelines&quot;:false,&quot;trigger&quot;:&quot;firstChild&quot;,&quot;animationTarget&quot;:&quot;:scope  &gt; .elementor-element:not(.lqd-exclude-parent-ca) &gt; .elementor-widget-container, :scope  &gt; .elementor-widget-hub_fancy_heading .lqd-split-lines .lqd-lines .split-inner, :scope  &gt; .elementor-widget-hub_fancy_heading .lqd-split-words .lqd-words .split-inner, :scope  &gt; .elementor-widget-hub_fancy_heading .lqd-split-chars .lqd-chars .split-inner, :scope  &gt; .elementor-widget-hub_fancy_heading .lqd-adv-txt-fig, :scope  &gt; .elementor-widget-ld_custom_menu .lqd-fancy-menu &gt; ul &gt; li&quot;,&quot;duration&quot;:750,&quot;delay&quot;:55,&quot;ease&quot;:&quot;expo.out&quot;,&quot;initValues&quot;:{&quot;y&quot;:&quot;100px&quot;,&quot;opacity&quot;:0,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;},&quot;animations&quot;:{&quot;y&quot;:&quot;0px&quot;,&quot;opacity&quot;:1,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;}}\" class=\"elementor-element elementor-element-f6866c3 e-con-full e-flex e-con e-child\" data-id=\"f6866c3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-30c3836 elementor-widget__width-inherit elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"30c3836\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e1ea366e95d\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > What the CyberArk solution brings<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6706f85 elementor-widget__width-inherit elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"6706f85\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e1ea366f550\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > CyberArk Privileged Access Manager allows you to:<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ef56143 elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"ef56143\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_ef56143\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><?xml version=\"1.0\" encoding=\"UTF-8\"?> <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10\" height=\"10\" viewBox=\"0 0 10 10\"><circle cx=\"5\" cy=\"5\" r=\"5\"><\/circle><\/svg> <\/div><\/div>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Keep unauthorized users at bay with ease <\/h3>\t\t\t\t<p><\/p>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e98220c elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"e98220c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_e98220c\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><?xml version=\"1.0\" encoding=\"UTF-8\"?> <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10\" height=\"10\" viewBox=\"0 0 10 10\"><circle cx=\"5\" cy=\"5\" r=\"5\"><\/circle><\/svg> <\/div><\/div>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Detect and stop threats in real time <\/h3>\t\t\t\t<p><\/p>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-69d894d elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"69d894d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_69d894d\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><?xml version=\"1.0\" encoding=\"UTF-8\"?> <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10\" height=\"10\" viewBox=\"0 0 10 10\"><circle cx=\"5\" cy=\"5\" r=\"5\"><\/circle><\/svg> <\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Easily deploy PAM as-a-Service <\/h3>\t\t\t\t<p>or implement the solution in your own IT environment<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f5807d elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"6f5807d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_6f5807d\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><?xml version=\"1.0\" encoding=\"UTF-8\"?> <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10\" height=\"10\" viewBox=\"0 0 10 10\"><circle cx=\"5\" cy=\"5\" r=\"5\"><\/circle><\/svg> <\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Allow secure login <\/h3>\t\t\t\t<p>of users with no VPN access<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-650ad6c elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"650ad6c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_650ad6c\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><?xml version=\"1.0\" encoding=\"UTF-8\"?> <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10\" height=\"10\" viewBox=\"0 0 10 10\"><circle cx=\"5\" cy=\"5\" r=\"5\"><\/circle><\/svg> <\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Protect privileged identities <\/h3>\t\t\t\t<p>human and non-human, against attacks<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e197f1d elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"e197f1d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_e197f1d\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><?xml version=\"1.0\" encoding=\"UTF-8\"?> <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10\" height=\"10\" viewBox=\"0 0 10 10\"><circle cx=\"5\" cy=\"5\" r=\"5\"><\/circle><\/svg> <\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Meet audit and compliance requirements <\/h3>\t\t\t\t<p>by enforcing internal policies, managing access and maintaining full centralized auditing.<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ffdb982 e-flex e-con-boxed e-con e-parent\" data-id=\"ffdb982\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-55f2b3d elementor-widget elementor-widget-image\" data-id=\"55f2b3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1429\" height=\"726\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/12\/Cyberark-PAM-What-s-New_6-1.webp\" class=\"attachment-full size-full wp-image-20811\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/12\/Cyberark-PAM-What-s-New_6-1.webp 1429w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/12\/Cyberark-PAM-What-s-New_6-1-300x152.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/12\/Cyberark-PAM-What-s-New_6-1-1024x520.webp 1024w\" sizes=\"(max-width: 1429px) 100vw, 1429px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-742e818 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"742e818\" data-element_type=\"section\" data-e-type=\"section\" id=\"servicii\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f57cf9a\" data-id=\"f57cf9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-a5b0ca4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a5b0ca4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-1935529\" data-id=\"1935529\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eae830a elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"eae830a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e1ea36bcf09\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > Services provided by Safetech Innovations<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ef75983 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"ef75983\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e1ea36bdaf0\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > Safetech Innovations places a strong emphasis on privileged account management and provides full services for the installation, configuration and efficient use of CyberArk Privileged Access Manager or other PAM solutions. <br>\nCyberArk Privileged Access Manager can be deployed independently or integrated into complex security architectures. Our IT security systems integration services include:<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5618f4a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5618f4a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-cfefbce\" data-id=\"cfefbce\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5339419 elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"5339419\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_5339419\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><img decoding=\"async\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/02\/icon-security-protection-white.png\" class=\"lqd-image-icon\" alt=\"Requirements analysis and system design\" \/><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Requirements analysis and system design <\/h3>\t\t\t\t<p>Analysis of project objectives, requirements and constraints, identification of risks, design of integrated architecture, development of a detailed project plan for the integration of various components and subsystems<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0415533\" data-id=\"0415533\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0d547ab elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"0d547ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_0d547ab\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><img decoding=\"async\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/02\/icon-security-protection-white.png\" class=\"lqd-image-icon\" alt=\"Implementation\" \/><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Implementation <\/h3>\t\t\t\t<p>Delivering and installing products, configuring, testing, implementing and optimizing the integrated system, verifying that all components work together as planned, training system administrators on how to use the solution<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3f70c86 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3f70c86\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-93aee54\" data-id=\"93aee54\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-38f8952 elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"38f8952\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_38f8952\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><img decoding=\"async\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/02\/icon-security-protection-white.png\" class=\"lqd-image-icon\" alt=\"Technical support and service\" \/><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Technical support and service <\/h3>\t\t\t\t<p>Providing technical support and service to ensure the continuous operation of the system optimally, meeting the needs of the organization<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b58d87 elementor-widget elementor-widget-shortcode\" data-id=\"9b58d87\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"section\" data-elementor-id=\"21361\" class=\"elementor elementor-21361 elementor-21357 elementor-21357\" data-elementor-post-type=\"elementor_library\">\n\t\t\t<div class=\"elementor-element elementor-element-0e36043 e-flex e-con-boxed e-con e-parent\" data-id=\"0e36043\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dae2eaa elementor-widget elementor-widget-text-editor\" data-id=\"dae2eaa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>With 14 years of activity, over 600 completed projects and a team of over 30 experts, Safetech Innovations is one of the most experienced cyber security companies in Romania. Choosing Safetech\u2019s systems integration services ensures you reduce the risks of implementation, customization, scalability and flexibility, post-implementation support.<\/p><p>We completely manage the cyber security of clients, from the analysis of existing or potential threats\/vulnerabilities and the assessment of risks and business impact, to the implementation of the necessary solutions in order to achieve an optimal level of security.<\/p><p>In the long term, we ensure continuous monitoring of events and response to cyber security incidents.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dce6c18 articole-pagina  elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dce6c18\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-07fea3a\" data-id=\"07fea3a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-fc6de24 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fc6de24\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-963d6cd\" data-id=\"963d6cd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f0984d3 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"f0984d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e1ea36d4b5d\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > Similar articles<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fab0f5f elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-card-shadow-yes elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"fab0f5f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;cards_columns&quot;:&quot;3&quot;,&quot;cards_columns_tablet&quot;:&quot;2&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile_extra&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-29994 post type-post status-publish format-standard has-post-thumbnail hentry category-technology-news tag-compliance tag-efficiency-improvement tag-nis-en tag-proofpoint-en tag-risk-management tag-systems-integration\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/safetech.ro\/en\/intelligent-human-risk-management-with-proofpoint-solutions\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"1536\" height=\"1024\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Proofpoint.webp\" class=\"attachment-full size-full wp-image-29986\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Proofpoint.webp 1536w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Proofpoint-300x200.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Proofpoint-1024x683.webp 1024w\" sizes=\"(max-width: 1536px) 100vw, 1536px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/safetech.ro\/en\/intelligent-human-risk-management-with-proofpoint-solutions\/\" >\n\t\t\t\tIntelligent Human Risk Management with Proofpoint Solutions\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tMarch 24, 2026\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-29956 post type-post status-publish format-standard has-post-thumbnail hentry category-company-news category-technology-news tag-compliance tag-efficiency-improvement tag-proofpoint-en tag-systems-integration\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/safetech.ro\/en\/safetech-proofpoint-webinar-rethinking-cybersecurity-from-the-perspective-of-human-risk\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"900\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Picture1-1.webp\" class=\"attachment-full size-full wp-image-29940\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Picture1-1.webp 1600w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Picture1-1-300x169.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Picture1-1-1024x576.webp 1024w\" sizes=\"(max-width: 1600px) 100vw, 1600px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/safetech.ro\/en\/safetech-proofpoint-webinar-rethinking-cybersecurity-from-the-perspective-of-human-risk\/\" >\n\t\t\t\tSafetech Proofpoint Webinar: From Inbox to Incident \u2014 Rethinking Cybersecurity from the Perspective of Human Risk\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tMarch 12, 2026\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-29617 post type-post status-publish format-standard has-post-thumbnail hentry category-technology-news tag-automation tag-cert-en tag-cynet-en tag-efficiency-improvement tag-monitoring-and-response tag-systems-integration\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/safetech.ro\/en\/cynet-component-of-safetech-soc-validated-mitre-attck\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"1593\" height=\"1116\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/Automation-skew.webp\" class=\"attachment-full size-full wp-image-29613\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/Automation-skew.webp 1593w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/Automation-skew-300x210.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/Automation-skew-1024x717.webp 1024w\" sizes=\"(max-width: 1593px) 100vw, 1593px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/safetech.ro\/en\/cynet-component-of-safetech-soc-validated-mitre-attck\/\" >\n\t\t\t\tCynet platform, an important component of the Safetech SOC, is validated consecutively in the MITRE ATT&amp;CK tests\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tJanuary 14, 2026\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-28459 post type-post status-publish format-standard has-post-thumbnail hentry category-technology-news tag-compliance tag-dlp-en tag-dora-en tag-grc-en tag-risk-management tag-systems-integration\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/safetech.ro\/en\/data-loss-prevention-the-essential-data-protection-in-modern-organizations\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"957\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2025\/07\/Proofpoint-1.webp\" class=\"attachment-full size-full wp-image-28271\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2025\/07\/Proofpoint-1.webp 1920w, https:\/\/safetech.ro\/wp-content\/uploads\/2025\/07\/Proofpoint-1-300x150.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2025\/07\/Proofpoint-1-1024x510.webp 1024w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/safetech.ro\/en\/data-loss-prevention-the-essential-data-protection-in-modern-organizations\/\" >\n\t\t\t\tData Loss Prevention &#8211; the essential data protection in modern organizations\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tAugust 19, 2025\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-28408 post type-post status-publish format-standard has-post-thumbnail hentry category-technology-news tag-compliance tag-monitoring-and-response tag-proofpoint-en tag-risk-management tag-systems-integration\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/safetech.ro\/en\/email-security-attacks-best-practices-and-state-of-the-art-solutions\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1280\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2025\/07\/shutterstock_2200095955.webp\" class=\"attachment-full size-full wp-image-28401\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2025\/07\/shutterstock_2200095955.webp 1920w, https:\/\/safetech.ro\/wp-content\/uploads\/2025\/07\/shutterstock_2200095955-300x200.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2025\/07\/shutterstock_2200095955-1024x683.webp 1024w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/safetech.ro\/en\/email-security-attacks-best-practices-and-state-of-the-art-solutions\/\" >\n\t\t\t\tEmail security &#8211; types of attacks, best practices and state-of-the-art solutions\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tJuly 17, 2025\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-28187 post type-post status-publish format-standard has-post-thumbnail hentry category-company-news tag-automation tag-cert-en tag-edr-en tag-efficiency-improvement tag-monitoring-and-response tag-ndr-en tag-outsourcing tag-siem-en tag-stellar-cyber-en tag-systems-integration tag-xdr-en\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/safetech.ro\/en\/webinar-safetech-the-modern-soc-smart-centralization-and-local-autonomy-with-open-xdr\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/Webinar-SOC-modern-cu-Open-XDR.webp\" class=\"attachment-full size-full wp-image-28172\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/Webinar-SOC-modern-cu-Open-XDR.webp 1920w, https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/Webinar-SOC-modern-cu-Open-XDR-300x169.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/Webinar-SOC-modern-cu-Open-XDR-1024x576.webp 1024w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/safetech.ro\/en\/webinar-safetech-the-modern-soc-smart-centralization-and-local-autonomy-with-open-xdr\/\" >\n\t\t\t\tWebinar Safetech Innovations: The Modern SOC \u2013 Smart Centralization and Local Autonomy with Open XDR\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tJune 12, 2025\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ac79cc elementor-align-center elementor-widget elementor-widget-ld_button\" data-id=\"5ac79cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<a\n\t\t\t\thref=\"https:\/\/safetech.ro\/en\/blog\/\"class=\"elementor-button btn btn-solid btn-hover-txt-switch btn-hover-txt-switch-y btn-xsm btn-icon-right btn-icon-circle btn-icon-custom-size btn-icon-shaped btn-icon-solid btn-has-label\"\t\t\t>\n\t\t\t\t\t\t\t\t\t<span data-text=\"SEE ALL ARTICLES\" class=\"btn-txt\" data-transition-delay=\"true\" data-delay-options=\"{&quot;elements&quot;: &quot;.lqd-chars&quot;, &quot;delayType&quot;: &quot;animation&quot;, &quot;startDelay&quot;: 0, &quot;delayBetween&quot;: 32.5}\" data-split-text=\"true\" data-split-options=\"{&quot;type&quot;: &quot;chars, words&quot;}\">\n\t\t\t\t\t\tSEE ALL ARTICLES\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"btn-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"lqd-icn-ess icon-ion-ios-arrow-forward\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-05dab0f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"05dab0f\" data-element_type=\"section\" data-e-type=\"section\" id=\"contact\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5704b9d\" data-id=\"5704b9d\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-a1b4b9e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a1b4b9e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-b7ed2e8\" data-id=\"b7ed2e8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5fad2c9 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"5fad2c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e1ea36e28c3\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h2 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h2\"  > Contact us<\/h2>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b77bf2 elementor-widget elementor-widget-ld_cf722\" data-id=\"7b77bf2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_cf722.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t<div class=\"lqd-contact-form lqd-contact-form-inputs-underlined      lqd-contact-form-button-circle  \">\n\t\t\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f11788-o1\" lang=\"ro-RO\" dir=\"ltr\" data-wpcf7-id=\"11788\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/pages\/13526#wpcf7-f11788-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Formular de contact\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"11788\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"ro_RO\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f11788-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/fieldset>\n<div class=\"row\">\n\t<div class=\"col-md-6\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"text-438\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Full name\" value=\"\" type=\"text\" name=\"text-438\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"col-md-6\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"email-873\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"E-mail\" value=\"\" type=\"email\" name=\"email-873\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"col-md-6\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"text-448\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Subject\" value=\"\" type=\"text\" name=\"text-448\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"col-md-6\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"tel-969\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Phone\" value=\"\" type=\"tel\" name=\"tel-969\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"col-md-12\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"textarea-601\"><textarea cols=\"10\" rows=\"4\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Message\" name=\"textarea-601\"><\/textarea><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"col-md-12\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"acceptance-120\"><span class=\"wpcf7-form-control wpcf7-acceptance\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"acceptance-120\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\">I have read the &nbsp; <a href=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/08\/INFORMARE-GENERALA-PRIVIND-PRELUCRAREA-DCP-EN.pdf\" target=\"_blank\">  notification regarding the processing of personal data<\/a>.<\/span><\/label><\/span><\/span><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div style=\"text-align: center; margin-top: 25px;\" class=\"col-md-12\">\n\t\t<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Send\" \/>\n\t\t<\/p>\n\t<\/div>\n<\/div><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Home CyberArk Privileged Access Manager The PAM solution to reduce risk and maximize productivity CyberArk Privileged Access Manager is a complete solution that enables organizations<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":23325,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-13526","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages\/13526","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/comments?post=13526"}],"version-history":[{"count":16,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages\/13526\/revisions"}],"predecessor-version":[{"id":24885,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages\/13526\/revisions\/24885"}],"up":[{"embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages\/23325"}],"wp:attachment":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/media?parent=13526"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}