{"id":13883,"date":"2023-06-16T06:52:37","date_gmt":"2023-06-16T03:52:37","guid":{"rendered":"https:\/\/emiralmedia.ro\/site\/safetech_new\/services\/"},"modified":"2025-03-21T17:25:09","modified_gmt":"2025-03-21T15:25:09","slug":"services","status":"publish","type":"page","link":"https:\/\/safetech.ro\/en\/services\/","title":{"rendered":"Services"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"13883\" class=\"elementor elementor-13883 elementor-6244\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-736959f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"736959f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b83371b\" data-id=\"b83371b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4516c51 elementor-widget elementor-widget-ld_breadcrumb\" data-id=\"4516c51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_breadcrumb.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"lqd-breadcrumb-wrapper\"><nav role=\"navigation\" aria-label=\"Breadcrumbs\" class=\"breadcrumbs\"><ol class=\"breadcrumb reset-ul inline-nav inline-ul comma-sep-li\"><li class=\"breadcrumb-item active\"><a href=\"https:\/\/safetech.ro\/en\/\" rel=\"home\"><span>Home<\/span><\/a><\/li><\/ol><\/nav><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f624a81 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"f624a81\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d3f260c\" data-id=\"d3f260c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-00a7e24 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"00a7e24\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69eaa386a48a8\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h1 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h1\"  > Cyber security services<\/h1>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e1c2dd4 elementor-widget elementor-widget-spacer\" data-id=\"e1c2dd4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-33f8832 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"33f8832\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69eaa386a6264\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > We combine expertise and experience with artificial intelligence to provide our clients with the necessary means to achieve and maintain the desired level of security.<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-538cb7e elementor-hidden-tablet elementor-hidden-mobile\" data-id=\"538cb7e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-76e2c46 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"76e2c46\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-fe19142\" data-id=\"fe19142\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8cd4380 elementor-widget__width-initial elementor-hidden-mobile elementor-widget elementor-widget-ld_fancy_image\" data-id=\"8cd4380\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_fancy_image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"lqd-imggrp-single d-block pos-rel \" data-shadow-style=\"3\" data-inview=\"true\" data-animate-shadow=\"true\">\n\t\t\t<div class=\"lqd-imggrp-img-container d-inline-flex pos-rel align-items-center justify-content-center \">\n\t\t\t\t\t\t\t\t<figure class=\"w-100 pos-rel\">\n\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1920\" height=\"1280\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/07\/shutterstock_2050897058-1.jpg\" class=\"attachment-full size-full wp-image-7579\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/07\/shutterstock_2050897058-1.jpg 1920w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/07\/shutterstock_2050897058-1-300x200.jpg 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/07\/shutterstock_2050897058-1-1024x683.jpg 1024w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/07\/shutterstock_2050897058-1-1536x1024.jpg 1536w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/07\/shutterstock_2050897058-1-720x480.jpg 720w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-cc93bd7\" data-id=\"cc93bd7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3331a51 elementor-widget elementor-widget-text-editor\" data-id=\"3331a51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Since 2011, Safetech Innovations has been providing cyber security services tailored to the needs of client organizations. Safetech Innovations has partnership relations with a number of companies with a decisive role in the field of cyber security, such as Check Point, Darktrace, Microsoft, Splunk, HID, Cynet.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b092078 elementor-widget elementor-widget-shortcode\" data-id=\"b092078\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"section\" data-elementor-id=\"21255\" class=\"elementor elementor-21255 elementor-21252 elementor-21252\" data-elementor-post-type=\"elementor_library\">\n\t\t\t<div class=\"elementor-element elementor-element-fe2ceda e-flex e-con-boxed e-con e-parent\" data-id=\"fe2ceda\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7539141 elementor-widget elementor-widget-text-editor\" data-id=\"7539141\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Currently counting over 70 employees, the company has dedicated teams for research and development of cybersecurity software products, implementation and support of security solutions, and Computer Emergency Response Team (CERT).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3c677a elementor-widget elementor-widget-text-editor\" data-id=\"a3c677a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Safetech&#8217;s Security Operations Center has been serving clients since 2015 and provides them with a mature and efficient detection, response and remediation capability designed to handle cyber threats with 24\/7\/365 coverage. STI CERT analysts hold multiple personal certifications, obtained through (ISC)\u00b2, ISACA and EC-Council.<\/p><p>Numerous Romanian organizations have chosen Safetech&#8217;s services to improve their level of cyber security. The company has customers from the following industries: financial-banking, energy, oil and gas, utilities, health, insurance, industrial production, high tech, retail, distribution, public sector, consulting, gaming. Seven of the ten largest banks in Romania have chosen us as their cyber security service provider.<\/p><p>Safetech has also been involved in more than 100 critical infrastructure security projects in the United States, Canada, Mexico, Brazil, the European Union, UK, Switzerland, Morocco, Singapore, the Philippines, India, China and New Zealand.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-32701ef elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"32701ef\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5f78ed9\" data-id=\"5f78ed9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b9fbdd9 elementor-section-content-bottom elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b9fbdd9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-bb62633\" data-id=\"bb62633\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2c29325 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"2c29325\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69eaa386bb0fe\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h2 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h2\"  > Cyber security services<\/h2>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-eac128b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"eac128b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-24c339a\" data-id=\"24c339a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f367efb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f367efb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1b5788e servicii\" data-id=\"1b5788e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-17dac7f elementor-align-center elementor-widget elementor-widget-ld_icon_box\" data-id=\"17dac7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_17dac7f\" class=\"iconbox d-flex flex-grow-1 pos-rel flex-column iconbox-default\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Consulting and training services <\/h3>\t\t\t\t<p>Our services provide you with technical, organizational and coordination experience and ensure the awareness of your staff about the best practices in cyber security. The services may include assessing potential risks, developing policies, procedures and controls to ensure compliance with a set of standards, building and managing internal security teams, conducting operational security risk assessments, obtaining threat intelligence and advice and support in case of crisis. Our security management consulting services have a direct impact on securing confidential data, mitigating risks and ensuring your organization's compliance with current regulations.<br><br><br><\/p>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/safetech.ro\/en\/services\/security-consulting-and-training\/\" class=\"elementor-button btn ws-nowrap btn-solid btn-icon-shaped btn-has-label\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"btn-txt\"  data-text=\"Read more\" >Read more<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-79698ce servicii\" data-id=\"79698ce\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-74f5883 elementor-align-center elementor-widget elementor-widget-ld_icon_box\" data-id=\"74f5883\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_74f5883\" class=\"iconbox d-flex flex-grow-1 pos-rel flex-column iconbox-default\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Security assessment, testing and auditing <\/h3>\t\t\t\t<p>The testing services assess the effectiveness of an organization's cybersecurity measures and identify vulnerabilities that could be exploited. Also, testing is necessary for compliance with norms and standards such as PCI DSS, ISO 27002, NIS, norms of the BNR, ASF. Our services include vulnerability assessment, penetration testing for data networks, cloud environments, mobile applications, software code security assessment and social engineering. Our Red Teaming exercise tests the resilience of the attack surface, the effectiveness of threat detection techniques, the effectiveness of response processes and the awareness of the organization's personnel. Our audit services ensure the identification of risks, the evaluation of the effectiveness of security measures and compliance with legislation and certain standards.<br><\/p>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/safetech.ro\/en\/services\/security-testing\/\" class=\"elementor-button btn ws-nowrap btn-solid btn-icon-shaped btn-has-label\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"btn-txt\"  data-text=\"Read more\" >Read more<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-de2074f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"de2074f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-11627d7 servicii\" data-id=\"11627d7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0da57e8 elementor-align-center elementor-widget elementor-widget-ld_icon_box\" data-id=\"0da57e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_0da57e8\" class=\"iconbox d-flex flex-grow-1 pos-rel flex-column iconbox-default\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Professional systems integration services <\/h3>\t\t\t\t<p>Our systems integration services aim to create a set of software applications and hardware components capable of functioning as a single, coherent solution to meet a specific set of business objectives. Services include requirements and constraints analysis, system design, implementation, configuration, testing, solution administrator training, service and technical support. Collaborating with Safetech for the integration of cyber security systems offers you the following benefits: expertise and experience, reduced risk, customization, scalability and flexibility, post-implementation support.<br><br><br><br><\/p>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/safetech.ro\/en\/services\/integration-of-cyber-security-systems\/\" class=\"elementor-button btn ws-nowrap btn-solid btn-icon-shaped btn-has-label\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"btn-txt\"  data-text=\"Read more\" >Read more<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-30baec5 servicii\" data-id=\"30baec5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9914694 elementor-align-center elementor-widget elementor-widget-ld_icon_box\" data-id=\"9914694\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_9914694\" class=\"iconbox d-flex flex-grow-1 pos-rel flex-column iconbox-default\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Outsourcing of security operations <\/h3>\t\t\t\t<p>Safetech CERT (STI CERT\u00ae), the first private Computer Emergency Response Team in Romania, is accredited by Trusted Introducer, the accreditation and certification service established by the European community of CERT organizations (www.trusted-introducer.org). STI CERT provides full services for monitoring, detection, analysis, remediation and reporting of cyber security incidents, and for vulnerability management. By using our services, you benefit from cyber risk management, early stage detection of the attempts of attacks, before causing significant damage, rapid response to incidents, 24\/7 continuous protection, compliance with security regulations and cost efficiency.<br><br><\/p>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/safetech.ro\/en\/services\/cybersecurity-operations-outsourcing\/\" class=\"elementor-button btn ws-nowrap btn-solid btn-icon-shaped btn-has-label\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"btn-txt\"  data-text=\"Read more\" >Read more<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-9d2800a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9d2800a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2d67f05 servicii\" data-id=\"2d67f05\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bfa9361 elementor-align-center elementor-widget elementor-widget-ld_icon_box\" data-id=\"bfa9361\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_bfa9361\" class=\"iconbox d-flex flex-grow-1 pos-rel flex-column iconbox-default\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Advanced analysis for critical security incidents <\/h3>\t\t\t\t<p><b>ARE YOU THE TARGET OF AN ONGOING CYBER ATTACK?<\/b><br>\nIf you have found or suspect that a cyber attack is taking place on your IT systems, we invite you to contact us to analyze the situation, identify the characteristics of the attack and propose corrective actions. Safetech will perform advanced technical investigations for critical incidents, focusing on expert analysis and recommendations for rapid remediation of the beneficiary's security posture. Depending on requirements and needs, the service may contain advanced analysis of logs, network traffic, computer memory, forensic analysis of storage devices, suspicious file analysis, coordination and reporting of security investigations.<br><br><br><\/p>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/safetech.ro\/en\/services\/advanced-analysis-critical-cyber-security-incidents\/\" class=\"elementor-button btn ws-nowrap btn-solid btn-icon-shaped btn-has-label\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"btn-txt\"  data-text=\"Read more\" >Read more<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ef6944f servicii\" data-id=\"ef6944f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div data-custom-animations=\"true\" data-ca-options=\"{&quot;addChildTimelines&quot;:false,&quot;trigger&quot;:&quot;firstChild&quot;,&quot;animationTarget&quot;:&quot;:scope .e-con-inner &gt; .elementor-element:not(.lqd-exclude-parent-ca) &gt; .elementor-widget-container, :scope .e-con-inner &gt; .elementor-widget-hub_fancy_heading .lqd-split-lines .lqd-lines .split-inner, :scope .e-con-inner &gt; .elementor-widget-hub_fancy_heading .lqd-split-words .lqd-words .split-inner, :scope .e-con-inner &gt; .elementor-widget-hub_fancy_heading .lqd-split-chars .lqd-chars .split-inner, :scope .e-con-inner &gt; .elementor-widget-hub_fancy_heading .lqd-adv-txt-fig, :scope .e-con-inner &gt; .elementor-widget-ld_custom_menu .lqd-fancy-menu &gt; ul &gt; li, :scope .e-con:not([data-parallax]) .elementor-element &gt; .elementor-widget-container, :scope .e-con:not([data-parallax]) .elementor-widget-hub_fancy_heading .lqd-split-lines .lqd-lines .split-inner, :scope .e-con:not([data-parallax]) .elementor-widget-hub_fancy_heading .lqd-split-words .lqd-words .split-inner, :scope .e-con:not([data-parallax]) .elementor-widget-hub_fancy_heading .lqd-split-chars .lqd-chars .split-inner, :scope .e-con:not([data-parallax]) .elementor-widget-ld_custom_menu .lqd-fancy-menu &gt; ul &gt; li&quot;,&quot;duration&quot;:750,&quot;delay&quot;:60,&quot;ease&quot;:&quot;expo.out&quot;,&quot;initValues&quot;:{&quot;y&quot;:&quot;150px&quot;,&quot;scaleX&quot;:0.59999999999999997779553950749686919152736663818359375,&quot;scaleY&quot;:0.59999999999999997779553950749686919152736663818359375,&quot;opacity&quot;:0,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;},&quot;animations&quot;:{&quot;y&quot;:&quot;0px&quot;,&quot;scaleX&quot;:1,&quot;scaleY&quot;:1,&quot;opacity&quot;:1,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;}}\" class=\"elementor-element elementor-element-10de0593 e-flex e-con-boxed e-con e-parent\" data-id=\"10de0593\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2d377cb2 elementor-widget elementor-widget-hub_fancy_heading lqd-el-has-inner-anim\" data-id=\"2d377cb2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;enable_split&quot;:&quot;true&quot;,&quot;split_type&quot;:&quot;lines&quot;}\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69eaa386ce406\" class=\"ld-fancy-heading pos-rel mask-text\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left lqd-split-lines h3\"  data-split-text=\"true\" data-split-options='{\"type\":\"lines\"}'> Safetech Guides and Publications<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-33b3ac7c elementor-widget__width-inherit elementor-widget elementor-widget-spacer\" data-id=\"33b3ac7c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5c4380 elementor-widget__width-inherit elementor-widget elementor-widget-ld_blog\" data-id=\"e5c4380\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_blog.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"lqd-lp-grid e5c4380 blog-id-240927616 \"><div class=\"lqd-lp-row row pos-rel d-flex flex-wrap\" ><div class=\"lqd-lp-column d-flex flex-column col-md-4 col-sm-6 safetech-guides-and-publications\"><article id=\"post-26813\" class=\"lqd-lp pos-rel lqd-lp lqd-lp-style-6 lqd-lp-style-6-alt lqd-lp-hover-img-zoom lqd-lp-hover-img-zoom-out lqd-lp-animate-onhover border-radius-4 overflow-hidden text-start post-26813 post type-post status-publish format-standard has-post-thumbnail hentry category-safetech-guides-and-publications tag-cert-en tag-compliance tag-consulting tag-efficiency-improvement tag-grc-en tag-monitoring-and-response tag-nis-en tag-outsourcing tag-risk-management\">\n<div class=\"lqd-lp-img overflow-hidden\">\n\n\t<figure><img decoding=\"async\" width=\"640\" height=\"364\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/06\/thumb-ghid-640x364.jpg\" class=\"w-100 wp-post-image\" alt=\"\" \/><\/figure>\n\t<div class=\"lqd-lp-meta text-uppercase font-weight-bold pos-rel z-index-3\">\n\t\t\t<\/div>\n\n<\/div>\n\n<header class=\"lqd-lp-header pt-4 ps-3 pe-3 px-3\">\n\n\t<div class=\"lqd-lp-meta lqd-lp-meta-dot-between d-flex flex-wrap align-items-center\">\n\n\t\t<div class=\"lqd-lp-author pos-rel z-index-3\">\n\t\t\t<div class=\"lqd-lp-author-info\">\n\t\t\t\t<h3 class=\"mt-0 mb-0\"><a href=\"https:\/\/safetech.ro\/en\/author\/gabriel-musat\/\">Gabriel Mu\u0219at<\/a><\/h3>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t<time class=\"lqd-lp-date\" datetime=\"2025-01-30T15:07:43+02:00\">January 30, 2025<\/time>\n\t<\/div>\n\n\t<h2 class=\"entry-title lqd-lp-title mt-2 mb-0 h5\"><a  href=\"https:\/\/safetech.ro\/en\/safetech-guide-to-soc-outsourcing\/\" rel=\"bookmark\">Safetech guide to SOC outsourcing<\/a><\/h2>\n<\/header>\n\n\n<a  href=\"https:\/\/safetech.ro\/en\/safetech-guide-to-soc-outsourcing\/\" class=\"lqd-lp-overlay-link lqd-overlay lqd-cc-label-trigger z-index-2\" tab-index=\"-1\"><\/a><\/article><\/div><div class=\"lqd-lp-column d-flex flex-column col-md-4 col-sm-6 safetech-guides-and-publications\"><article id=\"post-16940\" class=\"lqd-lp pos-rel lqd-lp lqd-lp-style-6 lqd-lp-style-6-alt lqd-lp-hover-img-zoom lqd-lp-hover-img-zoom-out lqd-lp-animate-onhover border-radius-4 overflow-hidden text-start post-16940 post type-post status-publish format-standard has-post-thumbnail hentry category-safetech-guides-and-publications tag-cert-en tag-compliance tag-consulting tag-efficiency-improvement tag-grc-en tag-monitoring-and-response tag-nis-en tag-outsourcing tag-risk-management tag-security-testing\">\n<div class=\"lqd-lp-img overflow-hidden\">\n\n\t<figure><img decoding=\"async\" width=\"640\" height=\"364\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/06\/thumb-ghid-640x364.jpg\" class=\"w-100 wp-post-image\" alt=\"\" \/><\/figure>\n\t<div class=\"lqd-lp-meta text-uppercase font-weight-bold pos-rel z-index-3\">\n\t\t\t<\/div>\n\n<\/div>\n\n<header class=\"lqd-lp-header pt-4 ps-3 pe-3 px-3\">\n\n\t<div class=\"lqd-lp-meta lqd-lp-meta-dot-between d-flex flex-wrap align-items-center\">\n\n\t\t<div class=\"lqd-lp-author pos-rel z-index-3\">\n\t\t\t<div class=\"lqd-lp-author-info\">\n\t\t\t\t<h3 class=\"mt-0 mb-0\"><a href=\"https:\/\/safetech.ro\/en\/author\/adi_emiral\/\">Securizare Emiral<\/a><\/h3>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t<time class=\"lqd-lp-date\" datetime=\"2022-06-15T12:49:40+03:00\">June 15, 2022<\/time>\n\t<\/div>\n\n\t<h2 class=\"entry-title lqd-lp-title mt-2 mb-0 h5\"><a  href=\"https:\/\/safetech.ro\/en\/guide-safetech-nis-conformity\/\" rel=\"bookmark\">Guide Safetech NIS Conformity<\/a><\/h2>\n<\/header>\n\n\n<a  href=\"https:\/\/safetech.ro\/en\/guide-safetech-nis-conformity\/\" class=\"lqd-lp-overlay-link lqd-overlay lqd-cc-label-trigger z-index-2\" tab-index=\"-1\"><\/a><\/article><\/div><div class=\"lqd-lp-column d-flex flex-column col-md-4 col-sm-6 safetech-guides-and-publications\"><article id=\"post-16942\" class=\"lqd-lp pos-rel lqd-lp lqd-lp-style-6 lqd-lp-style-6-alt lqd-lp-hover-img-zoom lqd-lp-hover-img-zoom-out lqd-lp-animate-onhover border-radius-4 overflow-hidden text-start post-16942 post type-post status-publish format-standard has-post-thumbnail hentry category-safetech-guides-and-publications tag-efficiency-improvement tag-honeypot-en tag-ics-en tag-monitoring-and-response tag-security-testing\">\n<div class=\"lqd-lp-img overflow-hidden\">\n\n\t<figure><img decoding=\"async\" width=\"640\" height=\"364\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/06\/thumb-ghid-640x364.jpg\" class=\"w-100 wp-post-image\" alt=\"\" \/><\/figure>\n\t<div class=\"lqd-lp-meta text-uppercase font-weight-bold pos-rel z-index-3\">\n\t\t\t<\/div>\n\n<\/div>\n\n<header class=\"lqd-lp-header pt-4 ps-3 pe-3 px-3\">\n\n\t<div class=\"lqd-lp-meta lqd-lp-meta-dot-between d-flex flex-wrap align-items-center\">\n\n\t\t<div class=\"lqd-lp-author pos-rel z-index-3\">\n\t\t\t<div class=\"lqd-lp-author-info\">\n\t\t\t\t<h3 class=\"mt-0 mb-0\"><a href=\"https:\/\/safetech.ro\/en\/author\/adi_emiral\/\">Securizare Emiral<\/a><\/h3>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t<time class=\"lqd-lp-date\" datetime=\"2022-06-15T12:11:49+03:00\">June 15, 2022<\/time>\n\t<\/div>\n\n\t<h2 class=\"entry-title lqd-lp-title mt-2 mb-0 h5\"><a  href=\"https:\/\/safetech.ro\/en\/guide-safetech-ics-honeypot\/\" rel=\"bookmark\">Guide Safetech ICS Honeypot<\/a><\/h2>\n<\/header>\n\n\n<a  href=\"https:\/\/safetech.ro\/en\/guide-safetech-ics-honeypot\/\" class=\"lqd-lp-overlay-link lqd-overlay lqd-cc-label-trigger z-index-2\" tab-index=\"-1\"><\/a><\/article><\/div><\/div><!--\/ .row --><\/div><!--\/ .lqd-lp-grid -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b0c1905 articole-pagina elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b0c1905\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-36a97e4\" data-id=\"36a97e4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-0b3a3f1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0b3a3f1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-6e3f30a\" data-id=\"6e3f30a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e68baf0 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"e68baf0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69eaa386db7f5\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h2 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h2\"  > Technology News<\/h2>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-616523d minu elementor-widget elementor-widget-ld_blog\" data-id=\"616523d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_blog.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"lqd-lp-grid 616523d blog-id-102126141 \"><div class=\"lqd-lp-row row pos-rel d-flex flex-wrap\" ><div class=\"lqd-lp-column d-flex flex-column col-md-4 col-sm-6 technology-news\"><article id=\"post-29994\" class=\"lqd-lp pos-rel lqd-lp-style-4 d-flex flex-wrap align-items-center text-start post-29994 post type-post status-publish format-standard has-post-thumbnail hentry category-technology-news tag-compliance tag-efficiency-improvement tag-nis-en tag-proofpoint-en tag-risk-management tag-systems-integration\">\n<div class=\"lqd-lp-img w-25\"><figure class=\"pos-rel overflow-hidden border-radius-6\"><img decoding=\"async\" width=\"320\" height=\"320\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Proofpoint-320x320.webp\" class=\"w-100 wp-post-image\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Proofpoint-320x320.webp 320w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Proofpoint-150x150.webp 150w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Proofpoint-60x60.webp 60w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/><\/figure><\/div>\n<header class=\"lqd-lp-header ps-3 pl-3\">\n\n\t<div class=\"lqd-lp-meta lqd-lp-meta-dot-between d-flex flex-wrap align-items-center font-weight-bold text-uppercase ltr-sp-1\">\n\n\t\t\n\t\t<time class=\"lqd-lp-date\" datetime=\"2026-03-24T11:16:25+02:00\">March 24, 2026<\/time>\n\t<\/div>\n\n\t<h2 class=\"entry-title lqd-lp-title mt-2 mb-0 h5\"><a  href=\"https:\/\/safetech.ro\/en\/intelligent-human-risk-management-with-proofpoint-solutions\/\" rel=\"bookmark\">Intelligent Human Risk Management with Proofpoint Solutions<\/a><\/h2>\n<\/header>\n\n<a  href=\"https:\/\/safetech.ro\/en\/intelligent-human-risk-management-with-proofpoint-solutions\/\" class=\"lqd-lp-overlay-link lqd-overlay lqd-cc-label-trigger z-index-2\" tab-index=\"-1\"><\/a>\n<\/article><\/div><div class=\"lqd-lp-column d-flex flex-column col-md-4 col-sm-6 company-news technology-news\"><article id=\"post-29956\" class=\"lqd-lp pos-rel lqd-lp-style-4 d-flex flex-wrap align-items-center text-start post-29956 post type-post status-publish format-standard has-post-thumbnail hentry category-company-news category-technology-news tag-compliance tag-efficiency-improvement tag-proofpoint-en tag-systems-integration\">\n<div class=\"lqd-lp-img w-25\"><figure class=\"pos-rel overflow-hidden border-radius-6\"><img loading=\"lazy\" decoding=\"async\" width=\"320\" height=\"320\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Picture1-1-320x320.webp\" class=\"w-100 wp-post-image\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Picture1-1-320x320.webp 320w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Picture1-1-150x150.webp 150w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Picture1-1-60x60.webp 60w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/><\/figure><\/div>\n<header class=\"lqd-lp-header ps-3 pl-3\">\n\n\t<div class=\"lqd-lp-meta lqd-lp-meta-dot-between d-flex flex-wrap align-items-center font-weight-bold text-uppercase ltr-sp-1\">\n\n\t\t\n\t\t<time class=\"lqd-lp-date\" datetime=\"2026-03-12T10:48:53+02:00\">March 12, 2026<\/time>\n\t<\/div>\n\n\t<h2 class=\"entry-title lqd-lp-title mt-2 mb-0 h5\"><a  href=\"https:\/\/safetech.ro\/en\/safetech-proofpoint-webinar-rethinking-cybersecurity-from-the-perspective-of-human-risk\/\" rel=\"bookmark\">Safetech Proofpoint Webinar: From Inbox to Incident \u2014 Rethinking Cybersecurity from the Perspective of Human Risk<\/a><\/h2>\n<\/header>\n\n<a  href=\"https:\/\/safetech.ro\/en\/safetech-proofpoint-webinar-rethinking-cybersecurity-from-the-perspective-of-human-risk\/\" class=\"lqd-lp-overlay-link lqd-overlay lqd-cc-label-trigger z-index-2\" tab-index=\"-1\"><\/a>\n<\/article><\/div><div class=\"lqd-lp-column d-flex flex-column col-md-4 col-sm-6 technology-news\"><article id=\"post-29856\" class=\"lqd-lp pos-rel lqd-lp-style-4 d-flex flex-wrap align-items-center text-start post-29856 post type-post status-publish format-standard has-post-thumbnail hentry category-technology-news tag-compliance tag-efficiency-improvement tag-nis-en tag-risk-management\">\n<div class=\"lqd-lp-img w-25\"><figure class=\"pos-rel overflow-hidden border-radius-6\"><img loading=\"lazy\" decoding=\"async\" width=\"320\" height=\"320\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/GRC-320x320.webp\" class=\"w-100 wp-post-image\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/GRC-320x320.webp 320w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/GRC-150x150.webp 150w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/GRC-60x60.webp 60w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/><\/figure><\/div>\n<header class=\"lqd-lp-header ps-3 pl-3\">\n\n\t<div class=\"lqd-lp-meta lqd-lp-meta-dot-between d-flex flex-wrap align-items-center font-weight-bold text-uppercase ltr-sp-1\">\n\n\t\t\n\t\t<time class=\"lqd-lp-date\" datetime=\"2026-02-19T16:20:57+02:00\">February 19, 2026<\/time>\n\t<\/div>\n\n\t<h2 class=\"entry-title lqd-lp-title mt-2 mb-0 h5\"><a  href=\"https:\/\/safetech.ro\/en\/the-grc-framework-transforms-nis2-requirements-into-resilience-and-sustainable-cybersecurity\/\" rel=\"bookmark\">The GRC framework transforms NIS2 requirements into resilience and sustainable cybersecurity<\/a><\/h2>\n<\/header>\n\n<a  href=\"https:\/\/safetech.ro\/en\/the-grc-framework-transforms-nis2-requirements-into-resilience-and-sustainable-cybersecurity\/\" class=\"lqd-lp-overlay-link lqd-overlay lqd-cc-label-trigger z-index-2\" tab-index=\"-1\"><\/a>\n<\/article><\/div><div class=\"lqd-lp-column d-flex flex-column col-md-4 col-sm-6 technology-news\"><article id=\"post-29617\" class=\"lqd-lp pos-rel lqd-lp-style-4 d-flex flex-wrap align-items-center text-start post-29617 post type-post status-publish format-standard has-post-thumbnail hentry category-technology-news tag-automation tag-cert-en tag-cynet-en tag-efficiency-improvement tag-monitoring-and-response tag-systems-integration\">\n<div class=\"lqd-lp-img w-25\"><figure class=\"pos-rel overflow-hidden border-radius-6\"><img loading=\"lazy\" decoding=\"async\" width=\"320\" height=\"320\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/Automation-skew-320x320.webp\" class=\"w-100 wp-post-image\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/Automation-skew-320x320.webp 320w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/Automation-skew-150x150.webp 150w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/Automation-skew-60x60.webp 60w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/><\/figure><\/div>\n<header class=\"lqd-lp-header ps-3 pl-3\">\n\n\t<div class=\"lqd-lp-meta lqd-lp-meta-dot-between d-flex flex-wrap align-items-center font-weight-bold text-uppercase ltr-sp-1\">\n\n\t\t\n\t\t<time class=\"lqd-lp-date\" datetime=\"2026-01-14T15:18:33+02:00\">January 14, 2026<\/time>\n\t<\/div>\n\n\t<h2 class=\"entry-title lqd-lp-title mt-2 mb-0 h5\"><a  href=\"https:\/\/safetech.ro\/en\/cynet-component-of-safetech-soc-validated-mitre-attck\/\" rel=\"bookmark\">Cynet platform, an important component of the Safetech SOC, is validated consecutively in the MITRE ATT&amp;CK tests<\/a><\/h2>\n<\/header>\n\n<a  href=\"https:\/\/safetech.ro\/en\/cynet-component-of-safetech-soc-validated-mitre-attck\/\" class=\"lqd-lp-overlay-link lqd-overlay lqd-cc-label-trigger z-index-2\" tab-index=\"-1\"><\/a>\n<\/article><\/div><div class=\"lqd-lp-column d-flex flex-column col-md-4 col-sm-6 technology-news\"><article id=\"post-29446\" class=\"lqd-lp pos-rel lqd-lp-style-4 d-flex flex-wrap align-items-center text-start post-29446 post type-post status-publish format-standard has-post-thumbnail hentry category-technology-news tag-cert-en tag-monitoring-and-response tag-risk-management tag-safetech-results\">\n<div class=\"lqd-lp-img w-25\"><figure class=\"pos-rel overflow-hidden border-radius-6\"><img loading=\"lazy\" decoding=\"async\" width=\"320\" height=\"320\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2024\/02\/detectie-incidente-320x320.webp\" class=\"w-100 wp-post-image\" alt=\"detec\u021bie \u015fi r\u0103spuns la amenin\u021b\u0103ri cibernetice, cyber threat detection and response\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2024\/02\/detectie-incidente-320x320.webp 320w, https:\/\/safetech.ro\/wp-content\/uploads\/2024\/02\/detectie-incidente-150x150.webp 150w, https:\/\/safetech.ro\/wp-content\/uploads\/2024\/02\/detectie-incidente-60x60.webp 60w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/><\/figure><\/div>\n<header class=\"lqd-lp-header ps-3 pl-3\">\n\n\t<div class=\"lqd-lp-meta lqd-lp-meta-dot-between d-flex flex-wrap align-items-center font-weight-bold text-uppercase ltr-sp-1\">\n\n\t\t\n\t\t<time class=\"lqd-lp-date\" datetime=\"2025-12-17T14:28:19+02:00\">December 17, 2025<\/time>\n\t<\/div>\n\n\t<h2 class=\"entry-title lqd-lp-title mt-2 mb-0 h5\"><a  href=\"https:\/\/safetech.ro\/en\/analysis-following-safetech-innovations-management-of-critical-security-incidents\/\" rel=\"bookmark\">Analysis and recommendations following Safetech Innovations&#8217; management of critical cyber security incidents<\/a><\/h2>\n<\/header>\n\n<a  href=\"https:\/\/safetech.ro\/en\/analysis-following-safetech-innovations-management-of-critical-security-incidents\/\" class=\"lqd-lp-overlay-link lqd-overlay lqd-cc-label-trigger z-index-2\" tab-index=\"-1\"><\/a>\n<\/article><\/div><div class=\"lqd-lp-column d-flex flex-column col-md-4 col-sm-6 company-news technology-news\"><article id=\"post-29434\" class=\"lqd-lp pos-rel lqd-lp-style-4 d-flex flex-wrap align-items-center text-start post-29434 post type-post status-publish format-standard has-post-thumbnail hentry category-company-news category-technology-news tag-cert-en tag-monitoring-and-response tag-risk-management tag-safetech-results\">\n<div class=\"lqd-lp-img w-25\"><figure class=\"pos-rel overflow-hidden border-radius-6\"><img loading=\"lazy\" decoding=\"async\" width=\"320\" height=\"320\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2024\/11\/security-operatoins-center-soc-320x320.webp\" class=\"w-100 wp-post-image\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2024\/11\/security-operatoins-center-soc-320x320.webp 320w, https:\/\/safetech.ro\/wp-content\/uploads\/2024\/11\/security-operatoins-center-soc-150x150.webp 150w, https:\/\/safetech.ro\/wp-content\/uploads\/2024\/11\/security-operatoins-center-soc-60x60.webp 60w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/><\/figure><\/div>\n<header class=\"lqd-lp-header ps-3 pl-3\">\n\n\t<div class=\"lqd-lp-meta lqd-lp-meta-dot-between d-flex flex-wrap align-items-center font-weight-bold text-uppercase ltr-sp-1\">\n\n\t\t\n\t\t<time class=\"lqd-lp-date\" datetime=\"2025-12-16T10:37:27+02:00\">December 16, 2025<\/time>\n\t<\/div>\n\n\t<h2 class=\"entry-title lqd-lp-title mt-2 mb-0 h5\"><a  href=\"https:\/\/safetech.ro\/en\/safetech-innovations-in-top-250-mssp-2025\/\" rel=\"bookmark\">Safetech Innovations, for the second time in a row in the Top 250 MSSPs globally<\/a><\/h2>\n<\/header>\n\n<a  href=\"https:\/\/safetech.ro\/en\/safetech-innovations-in-top-250-mssp-2025\/\" class=\"lqd-lp-overlay-link lqd-overlay lqd-cc-label-trigger z-index-2\" tab-index=\"-1\"><\/a>\n<\/article><\/div><\/div><!--\/ .row --><\/div><!--\/ .lqd-lp-grid -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ef88f9 elementor-align-center elementor-widget elementor-widget-ld_button\" data-id=\"4ef88f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<a\n\t\t\t\thref=\"https:\/\/safetech.ro\/blog\/\"class=\"elementor-button btn btn-solid btn-hover-txt-switch btn-hover-txt-switch-y btn-xsm btn-icon-right btn-icon-circle btn-icon-custom-size btn-icon-shaped btn-icon-solid btn-has-label\"\t\t\t>\n\t\t\t\t\t\t\t\t\t<span data-text=\"SEE ALL ARTICLES\" class=\"btn-txt\" data-transition-delay=\"true\" data-delay-options=\"{&quot;elements&quot;: &quot;.lqd-chars&quot;, &quot;delayType&quot;: &quot;animation&quot;, &quot;startDelay&quot;: 0, &quot;delayBetween&quot;: 32.5}\" data-split-text=\"true\" data-split-options=\"{&quot;type&quot;: &quot;chars, words&quot;}\">\n\t\t\t\t\t\tSEE ALL ARTICLES\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"btn-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"lqd-icn-ess icon-ion-ios-arrow-forward\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Home Cyber security services We combine expertise and experience with artificial intelligence to provide our clients with the necessary means to achieve and maintain the desired level of security. Since 2011, Safetech Innovations has been providing cyber security services tailored to the needs of client organizations. Safetech Innovations has partnership relations with a number of [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-13883","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages\/13883","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/comments?post=13883"}],"version-history":[{"count":43,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages\/13883\/revisions"}],"predecessor-version":[{"id":27348,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages\/13883\/revisions\/27348"}],"wp:attachment":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/media?parent=13883"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}