{"id":23145,"date":"2024-06-10T17:36:39","date_gmt":"2024-06-10T14:36:39","guid":{"rendered":"https:\/\/safetech.ro\/radiflow-ot-cybersecurity-solutions\/"},"modified":"2024-06-19T12:51:43","modified_gmt":"2024-06-19T09:51:43","slug":"radiflow-ot-cybersecurity-solutions","status":"publish","type":"page","link":"https:\/\/safetech.ro\/en\/solutions\/ot-and-ics-cybersecurity\/radiflow-ot-cybersecurity-solutions\/","title":{"rendered":"Radiflow OT Cybersecurity Solutions"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"23145\" class=\"elementor elementor-23145 elementor-23131\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b324e89 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b324e89\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8ac510e\" data-id=\"8ac510e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-654c8cb elementor-widget elementor-widget-ld_breadcrumb\" data-id=\"654c8cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_breadcrumb.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"lqd-breadcrumb-wrapper\"><nav role=\"navigation\" aria-label=\"Breadcrumbs\" class=\"breadcrumbs\"><ol class=\"breadcrumb reset-ul inline-nav inline-ul comma-sep-li\"><li class=\"breadcrumb-item active\"><a href=\"https:\/\/safetech.ro\/en\/\" rel=\"home\"><span>Home<\/span><\/a><\/li><\/ol><\/nav><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1ff139e elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1ff139e\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c8b2956\" data-id=\"c8b2956\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6aa9df7 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"6aa9df7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-6a04a124206d5\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h1 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h1\"  > Radiflow OT Cybersecurity<\/h1>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-485367d elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"485367d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-6a04a124214fc\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h4 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h4\"  > The complete OT Security platform<\/h4>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e76b118 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"e76b118\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-6a04a124221be\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > Radiflow's solutions form a complete Operational Technology (OT) Security platform that provides information security officers with full visibility into the network serving Industrial Control Systems (ICS). Radiflow uses non-intrusive methods to protect, monitor and assess risks in OT networks, with the aim of ensuring the continued activity of the organization.<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e2db9c elementor-widget elementor-widget-spacer\" data-id=\"4e2db9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4f8a15c\" data-id=\"4f8a15c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4c662c9 elementor-widget__width-auto elementor-widget elementor-widget-ld_fancy_image\" data-id=\"4c662c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_fancy_image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"lqd-imggrp-single d-block pos-rel \">\n\t\t\t<div class=\"lqd-imggrp-img-container d-inline-flex pos-rel align-items-center justify-content-center \">\n\t\t\t\t\t\t\t\t<figure class=\"w-100 pos-rel\">\n\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"785\" height=\"227\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2024\/06\/radiflow-3601.webp\" class=\"attachment-full size-full wp-image-23134\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2024\/06\/radiflow-3601.webp 785w, https:\/\/safetech.ro\/wp-content\/uploads\/2024\/06\/radiflow-3601-300x87.webp 300w\" sizes=\"(max-width: 785px) 100vw, 785px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f5c0b3f elementor-hidden-tablet elementor-hidden-mobile_extra elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f5c0b3f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-27e9cd2\" data-id=\"27e9cd2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-086de1b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"086de1b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-fe9ef9a\" data-id=\"fe9ef9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-97c65cc meniu-iot elementor-hidden-mobile_extra elementor-hidden-mobile elementor-widget elementor-widget-ld_custom_menu\" data-id=\"97c65cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;sticky&quot;:&quot;yes&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile_extra&quot;,&quot;mobile&quot;],&quot;sticky_offset&quot;:0,&quot;sticky_effects_offset&quot;:0,&quot;sticky_anchor_link_offset&quot;:0}\" data-widget_type=\"ld_custom_menu.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div\t\t\t\tclass=\"lqd-fancy-menu lqd-custom-menu pos-abs menu-items-has-fill center lqd-menu-td-none lqd-sticky-menu lqd-sticky-menu-floating\"\n\t\t\t\t\t\t\t\t\tdata-inview=\"true\"\n\t\t\t\t\tdata-inview-options='{ \"toggleBehavior\": \"toggleInView\" }'\n\t\t\t\t\t\t\t>\n\t\t\t\n\t\t\t\t\t\t\t<ul class=\"reset-ul inline-ul\" id=\"lqd-custom-menu-97c65cc\"  data-localscroll=\"true\" data-localscroll-options=\"{&quot;itemsSelector&quot;:&quot;&gt; li &gt; a&quot;,&quot;trackWindowScroll&quot;:true,&quot;includeParentAsOffset&quot;:true,&quot;offsetElements&quot;:&quot;[data-sticky-header] .lqd-head-sec-wrap:not(.lqd-hide-onstuck), #wpadminbar, body.elementor-page .main-header[data-sticky-header] &gt; .elementor &gt; .elementor-section-wrap &gt; .elementor-section:not(.lqd-hide-onstuck):not(.lqd-stickybar-wrap), body.elementor-page .main-header[data-sticky-header] &gt; .elementor &gt; .elementor-section:not(.lqd-hide-onstuck):not(.lqd-stickybar-wrap), body.elementor-page .main-header[data-sticky-header] &gt; .elementor &gt; .e-con:not(.lqd-hide-onstuck):not(.lqd-stickybar-wrap)&quot;}\">\n\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#prezentare\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty left-icon icon-next-to-label\"><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOverview\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#functionalitati\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty left-icon icon-next-to-label\"><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tMain functionalities\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#beneficii\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty left-icon icon-next-to-label\"><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tBenefits\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#servicii\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty left-icon icon-next-to-label\"><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSafetech services\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#contact\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty left-icon icon-next-to-label\"><i aria-hidden=\"true\" class=\"fas fa-pen\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tContact us\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9b88bc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9b88bc\" data-element_type=\"section\" data-e-type=\"section\" id=\"prezentare\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-62ffa02\" data-id=\"62ffa02\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div data-parallax=\"true\" data-parallax-options=\"{&quot;ease&quot;:[&quot;linear&quot;],&quot;start&quot;:&quot;top bottom&quot;,&quot;end&quot;:&quot;bottom+=0px top&quot;}\" data-parallax-from=\"{&quot;y&quot;:&quot;135px&quot;,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;}\" data-parallax-to=\"{&quot;y&quot;:&quot;-85px&quot;,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;}\" class=\"elementor-element elementor-element-2a4c8dc elementor-widget__width-initial elementor-hidden-mobile elementor-absolute elementor-widget elementor-widget-ld_fancy_image\" data-id=\"2a4c8dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"ld_fancy_image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"lqd-imggrp-single d-block pos-rel \" data-shadow-style=\"3\" data-inview=\"true\" data-animate-shadow=\"true\">\n\t\t\t<div class=\"lqd-imggrp-img-container d-inline-flex pos-rel align-items-center justify-content-center \">\n\t\t\t\t\t\t\t\t<figure class=\"w-100 pos-rel\">\n\t\t\t\t\t<img decoding=\"async\" width=\"1298\" height=\"1885\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2024\/06\/Radiflow-Active-Scanner-2.webp\" class=\"attachment-full size-full wp-image-23136\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2024\/06\/Radiflow-Active-Scanner-2.webp 1298w, https:\/\/safetech.ro\/wp-content\/uploads\/2024\/06\/Radiflow-Active-Scanner-2-207x300.webp 207w, https:\/\/safetech.ro\/wp-content\/uploads\/2024\/06\/Radiflow-Active-Scanner-2-705x1024.webp 705w, https:\/\/safetech.ro\/wp-content\/uploads\/2024\/06\/Radiflow-Active-Scanner-2-1058x1536.webp 1058w\" sizes=\"(max-width: 1298px) 100vw, 1298px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-cab2c75\" data-id=\"cab2c75\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2a60d15 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"2a60d15\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-6a04a1242aaff\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > Solution overview<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dc01487 elementor-widget elementor-widget-text-editor\" data-id=\"dc01487\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Radiflow solutions can be deployed at the beneficiary&#8217;s locations or remotely, at the location of a Managed Security Services Provider (MSSP), and are fully compatible with the IEC 62443 standard. The platform consists of the following components: <\/p>\n<ul>\n<li><strong>iSID Threat Detection:<\/strong> Suite of Threat Detection &amp; Monitoring solutions for OT visibility and anomaly detection. Provides cybersecurity personnel with network visibility, threat detection, alerts, and the ability to configure communication rules for devices and protocols.<\/li>\n<li><strong>Active Scanner:<\/strong> Active Asset Discovery and Data Enrichment for ICS networks. With active and secure OT scanning, Active Scanner enables full discovery of industrial assets in networks that do not have port mirroring or passive monitoring, both standalone and hybrid (with iSID). Developed for OT networks, it minimizes the chances of service interruption.<\/li>\n<li><strong>iSAP Smart Collector:<\/strong> Smart Controller. Cost-effective solution for retrieving, filtering, compressing and sending data traffic from distributed industrial units to iSID for analysis and filtering. Only one iSAP device is required for each remote location.<\/li>\n<li><strong>The iSID Threat Detection, Active Scanner and iSAP Smart Collector solutions<\/strong> work together, unitedly, to detect and remediate vulnerabilities.<\/li>\n<li><strong>iCEN Central Management:<\/strong> centralized monitoring for iSID. Designed for large enterprises and MSSPs (Managed Security Service Providers), iCEN provides unified visibility into the risk levels of locations, OT assets, alerts and maintenance actions, all through an easy-to-use web interface.<\/li>\n<li><strong>CIARA Risk Management<\/strong>: Industrial Risk Assessment &amp; Management platform. Radiflow CIARA automatically discovers and learns key risk indicators and accurately assesses overall and site-level security risk and posture. The solution allows the OT security budget to be directed to maximize the efficiency of security controls, based on cybersecurity regulations, standards and recommendations, such as ISA\/IEC 62443, NIS2 and NIST CSF.<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-169553d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"169553d\" data-element_type=\"section\" data-e-type=\"section\" id=\"functionalitati\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div data-custom-animations=\"true\" data-ca-options=\"{&quot;addChildTimelines&quot;:false,&quot;trigger&quot;:&quot;firstChild&quot;,&quot;animationTarget&quot;:&quot;:scope &gt; .elementor-widget-wrap &gt; .elementor-element &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-section &gt; .elementor-container &gt; .elementor-column &gt; .elementor-widget-wrap &gt; .elementor-element:not(.lqd-el-has-inner-anim) &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-lines .lqd-lines .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-words .lqd-words .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-chars .lqd-chars .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-ld_custom_menu .lqd-fancy-menu &gt; ul &gt; li&quot;,&quot;startDelay&quot;:300,&quot;ease&quot;:[&quot;power4.out&quot;],&quot;initValues&quot;:{&quot;y&quot;:&quot;40px&quot;,&quot;opacity&quot;:0,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;},&quot;animations&quot;:{&quot;y&quot;:&quot;0px&quot;,&quot;opacity&quot;:1,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;}}\" class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e4426fa\" data-id=\"e4426fa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-92f9c2c elementor-widget__width-inherit elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"92f9c2c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-6a04a1242d056\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > Main functionalities<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7cac481 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"7cac481\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-6a04a1242db7f\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > Radiflow's solutions work based on the following mechanisms:<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e78556 elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"5e78556\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_5e78556\" class=\"iconbox d-flex flex-grow-1 pos-rel z-index-2 iconbox-side iconbox-icon-shaped iconbox-circle iconbox-icon-linked\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  pos-rel\"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"fas fa-chevron-circle-right\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Machine learning and non-intrusive analytics <\/h3>\t\t\t\t<p>Automatic generation of the basic topology and behavior model, including all devices, ports and connections, analysis based on Deep Packet Inspection of a copy of the traffic in the operational network. <\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0924725 elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"0924725\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_0924725\" class=\"iconbox d-flex flex-grow-1 pos-rel z-index-2 iconbox-side iconbox-icon-shaped iconbox-circle iconbox-icon-linked\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  pos-rel\"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"fas fa-chevron-circle-right\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >PLC monitoring and attack vector analysis <\/h3>\t\t\t\t<p>Continuous supervision of configuration changes in PLCs (Programmable logic controllers) and other network devices. <\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ebff2f elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"2ebff2f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_2ebff2f\" class=\"iconbox d-flex flex-grow-1 pos-rel z-index-2 iconbox-side iconbox-icon-shaped iconbox-circle iconbox-icon-linked\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  pos-rel\"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"fas fa-chevron-circle-right\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Centralized view of all locations <\/h3>\t\t\t\t<p>Active Scanner provides a holistic picture of your network from multiple locations. Network-wide scan results are available in common formats (PCAP, CSV, JSON) and can be delivered to other applications within your organization.<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a8b1c1 elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"1a8b1c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_1a8b1c1\" class=\"iconbox d-flex flex-grow-1 pos-rel z-index-2 iconbox-side iconbox-icon-shaped iconbox-circle iconbox-icon-linked\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  pos-rel\"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"fas fa-chevron-circle-right\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Aggregation and tunneling <\/h3>\t\t\t\t<p>iSAP Smart Collector enables encrypted aggregation and tunneling of monitored network traffic to the iSID Threat Detection System for analysis. <\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eab1759 elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"eab1759\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_eab1759\" class=\"iconbox d-flex flex-grow-1 pos-rel z-index-2 iconbox-side iconbox-icon-shaped iconbox-circle iconbox-icon-linked\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  pos-rel\"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"fas fa-chevron-circle-right\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Data compression and filtering <\/h3>\t\t\t\t<p>Compress industrial protocols to a ratio of up to 1:10, as well as filter irrelevant traffic data via the iSAP Smart Controller. <\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba71859 elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"ba71859\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_ba71859\" class=\"iconbox d-flex flex-grow-1 pos-rel z-index-2 iconbox-side iconbox-icon-shaped iconbox-circle iconbox-icon-linked\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  pos-rel\"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"fas fa-chevron-circle-right\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Unified monitoring and visualization <\/h3>\t\t\t\t<p>iCEN Central Management enables centralized monitoring and management for multiple iSID instances.<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-37b5c6f elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"37b5c6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_37b5c6f\" class=\"iconbox d-flex flex-grow-1 pos-rel z-index-2 iconbox-side iconbox-icon-shaped iconbox-circle iconbox-icon-linked\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  pos-rel\"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"fas fa-chevron-circle-right\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Automated Risk Assessment <\/h3>\t\t\t\t<p>CIARA Risk Management reduces evaluation and audit time, as well as the necessary resources. It automatically centralises relevant network and transaction data and assesses risks accurately, quickly and discreetly. Policymakers, auditors and consultants can carry out complete and reliable risk assessments, as frequently as necessary. <\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-985d682 elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"985d682\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_985d682\" class=\"iconbox d-flex flex-grow-1 pos-rel z-index-2 iconbox-side iconbox-icon-shaped iconbox-circle iconbox-icon-linked\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  pos-rel\"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"fas fa-chevron-circle-right\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Threat Intelligence <\/h3>\t\t\t\t<p>Threat intelligence-based breach &amp; attack simulations using CIARA's breach &amp; attack simulation engine (OT-BAS). The OT-BAS algorithm calculates the probability of attacks and the effectiveness of appropriate risk mitigation measures and takes into account the impact of attacks on business processes.<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-7429a9b\" data-id=\"7429a9b\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5841d16 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"5841d16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-6a04a1243fc9c\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > Key Features of the Radiflow Platform<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce38ddc elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"ce38ddc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_ce38ddc\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t\t\t\t\t<p>Radiflow's entire approach to the continuous protection of industrial control systems is business-centric and provides a framework for planning network protection activities and expenses based on customized operational needs, long-term budgetary constraints, regulations to be adhered to, and compliance objectives. <\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78be88d elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"78be88d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_78be88d\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t\t\t\t\t<p>CIARA Risk Management is the first ROI-centric risk assessment and management platform for industrial organizations.<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-127b610 elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"127b610\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_127b610\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t\t\t\t\t<p>In addition to threat detection, Radiflow inventories device properties and vulnerabilities, provides insights into the relevant threat landscape, and shows the current level of risk exposure. Radiflow's solutions enable you to reduce risk and optimize your organization's resources, based on your deep understanding of OT\/ICS security.<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-8e2bf6e e-flex e-con-boxed e-con e-parent\" data-id=\"8e2bf6e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-694ec6e elementor-widget elementor-widget-image\" data-id=\"694ec6e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1136\" height=\"563\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2024\/06\/radiflow-Simulation-results-dashboard.webp\" class=\"attachment-full size-full wp-image-23139\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2024\/06\/radiflow-Simulation-results-dashboard.webp 1136w, https:\/\/safetech.ro\/wp-content\/uploads\/2024\/06\/radiflow-Simulation-results-dashboard-300x149.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2024\/06\/radiflow-Simulation-results-dashboard-1024x507.webp 1024w\" sizes=\"(max-width: 1136px) 100vw, 1136px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6641575 e-flex e-con-boxed e-con e-parent\" data-id=\"6641575\" data-element_type=\"container\" data-e-type=\"container\" id=\"beneficii\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div data-custom-animations=\"true\" data-ca-options=\"{&quot;addChildTimelines&quot;:false,&quot;trigger&quot;:&quot;firstChild&quot;,&quot;animationTarget&quot;:&quot;:scope  &gt; .elementor-element:not(.lqd-exclude-parent-ca) &gt; .elementor-widget-container, :scope  &gt; .elementor-widget-hub_fancy_heading .lqd-split-lines .lqd-lines .split-inner, :scope  &gt; .elementor-widget-hub_fancy_heading .lqd-split-words .lqd-words .split-inner, :scope  &gt; .elementor-widget-hub_fancy_heading .lqd-split-chars .lqd-chars .split-inner, :scope  &gt; .elementor-widget-hub_fancy_heading .lqd-adv-txt-fig, :scope  &gt; .elementor-widget-ld_custom_menu .lqd-fancy-menu &gt; ul &gt; li&quot;,&quot;duration&quot;:750,&quot;delay&quot;:55,&quot;ease&quot;:&quot;expo.out&quot;,&quot;initValues&quot;:{&quot;y&quot;:&quot;100px&quot;,&quot;opacity&quot;:0,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;},&quot;animations&quot;:{&quot;y&quot;:&quot;0px&quot;,&quot;opacity&quot;:1,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;}}\" class=\"elementor-element elementor-element-c123c60 e-con-full e-flex e-con e-child\" data-id=\"c123c60\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3dcd893 elementor-widget__width-inherit elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"3dcd893\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-6a04a12448cea\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > Main benefits of the solution<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-318e5d9 elementor-widget__width-inherit elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"318e5d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-6a04a124498cc\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > The Radiflow platform brings the following benefits:<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49bf1e8 elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"49bf1e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_49bf1e8\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><?xml version=\"1.0\" encoding=\"UTF-8\"?> <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10\" height=\"10\" viewBox=\"0 0 10 10\"><circle cx=\"5\" cy=\"5\" r=\"5\"><\/circle><\/svg> <\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >iSID Map View <\/h3>\t\t\t\t<p>The map view allows the graphical representation of all network devices, in several display modes (Purdue, Flow, Analyst and Custom). Maps can be zoomed in and items can be moved to any location on the screen. The Attack Vector analysis tool can detect vulnerabilities for interactions between different business processes.<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0932bae elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"0932bae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_0932bae\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><?xml version=\"1.0\" encoding=\"UTF-8\"?> <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10\" height=\"10\" viewBox=\"0 0 10 10\"><circle cx=\"5\" cy=\"5\" r=\"5\"><\/circle><\/svg> <\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Targeted scans <\/h3>\t\t\t\t<p>Active Scanner offers focused, ad-hoc or scheduled scans to obtain asset information for: protocols (Modbus, CIP, Profinet, SNMP, IT ICMP, NMAP, DNP3, WMI), vendors (Schneider Electric Modicon, Allen Bradley, Siemens) and operating systems (Windows OS). <\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae0111d elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"ae0111d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_ae0111d\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><?xml version=\"1.0\" encoding=\"UTF-8\"?> <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10\" height=\"10\" viewBox=\"0 0 10 10\"><circle cx=\"5\" cy=\"5\" r=\"5\"><\/circle><\/svg> <\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Cost reduction <\/h3>\t\t\t\t<p>Only one Radiflow device (iSAP) is needed for each remote location. They securely connect to a centrally located iSID Threat Detection server, where network and device activity across the company is analyzed.<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-54c4e9e elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"54c4e9e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_54c4e9e\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><?xml version=\"1.0\" encoding=\"UTF-8\"?> <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10\" height=\"10\" viewBox=\"0 0 10 10\"><circle cx=\"5\" cy=\"5\" r=\"5\"><\/circle><\/svg> <\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Reduce traffic for monitoring <\/h3>\t\t\t\t<p>iSAP Smart Collector uses Radiflow's patented data compression algorithm, allowing ratios of up to 1:10 to be achieved. Subsequently, the iSID server can decompress the data packets without loss of information. The degree of compression applied can be set depending on the type of data. <\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2fd90fa elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"2fd90fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_2fd90fa\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><?xml version=\"1.0\" encoding=\"UTF-8\"?> <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10\" height=\"10\" viewBox=\"0 0 10 10\"><circle cx=\"5\" cy=\"5\" r=\"5\"><\/circle><\/svg> <\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Centralized view of cyber risk information <\/h3>\t\t\t\t<p>iCEN displays aggregated data from all iSID instances in an organization, including: total assets of each type, total alerts by severity, and top network protocols. Additionally, iCEN provides risk scores for each site for easy prioritization of mitigation activities.<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba92938 elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"ba92938\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_ba92938\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><?xml version=\"1.0\" encoding=\"UTF-8\"?> <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10\" height=\"10\" viewBox=\"0 0 10 10\"><circle cx=\"5\" cy=\"5\" r=\"5\"><\/circle><\/svg> <\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Centralized configuration <\/h3>\t\t\t\t<p>iCEN enables centralized, one-click distribution of up-to-date cyberattack recognition signatures to multiple iSID instances.<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e737eee elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"e737eee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_e737eee\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><?xml version=\"1.0\" encoding=\"UTF-8\"?> <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10\" height=\"10\" viewBox=\"0 0 10 10\"><circle cx=\"5\" cy=\"5\" r=\"5\"><\/circle><\/svg> <\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Management process according to IEC 62443 <\/h3>\t\t\t\t<p>CIARA helps customers who are new to OT cybersecurity achieve compliance with ISA\/IEC 62443 standards and optimize their cybersecurity spend.<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1496042 e-flex e-con-boxed e-con e-parent\" data-id=\"1496042\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-183917d elementor-widget elementor-widget-image\" data-id=\"183917d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"503\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2024\/06\/radiflow-Active-scanner-dashboard.webp\" class=\"attachment-full size-full wp-image-23141\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2024\/06\/radiflow-Active-scanner-dashboard.webp 1024w, https:\/\/safetech.ro\/wp-content\/uploads\/2024\/06\/radiflow-Active-scanner-dashboard-300x147.webp 300w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d3883be elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d3883be\" data-element_type=\"section\" data-e-type=\"section\" id=\"servicii\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7699b53\" data-id=\"7699b53\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-56f33fe elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"56f33fe\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-77e686a\" data-id=\"77e686a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a25bb10 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"a25bb10\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-6a04a12522447\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > Services provided by Safetech Innovations<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-de82781 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"de82781\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-6a04a12523a0c\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > Safetech Innovations offers complete services for the efficient installation and use of Radiflow solutions, both independently and integrated into complex security architectures, along with other complementary solutions.<br> Our services include:<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e71dd73 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e71dd73\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c6f879f\" data-id=\"c6f879f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d548d9e elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"d548d9e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_d548d9e\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><img decoding=\"async\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/02\/icon-security-protection-white.png\" class=\"lqd-image-icon\" alt=\"Requirements analysis and system design\" \/><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Requirements analysis and system design <\/h3>\t\t\t\t<p>Analysis of project objectives, requirements and constraints, identification of risks, design of integrated architecture, development of a detailed project plan for the integration of various components and subsystems<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c73361a\" data-id=\"c73361a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ff9f61d elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"ff9f61d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_ff9f61d\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><img decoding=\"async\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/02\/icon-security-protection-white.png\" class=\"lqd-image-icon\" alt=\"Implementation\" \/><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Implementation <\/h3>\t\t\t\t<p>Delivering and installing products, configuring, testing, implementing and optimizing the integrated system, verifying that all components work together as planned, training system administrators on how to use the solution<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2e75ae2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2e75ae2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-f164f24\" data-id=\"f164f24\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a54abcf elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"a54abcf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_a54abcf\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><img decoding=\"async\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/02\/icon-security-protection-white.png\" class=\"lqd-image-icon\" alt=\"Technical support and service\" \/><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Technical support and service <\/h3>\t\t\t\t<p>Providing technical support and service to ensure the continuous operation of the system optimally, meeting the needs of the organization<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-95530b8 elementor-widget elementor-widget-shortcode\" data-id=\"95530b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"section\" data-elementor-id=\"21229\" class=\"elementor elementor-21229 elementor-21226 elementor-21226\" data-elementor-post-type=\"elementor_library\">\n\t\t\t<div class=\"elementor-element elementor-element-e1e2a0a e-flex e-con-boxed e-con e-parent\" data-id=\"e1e2a0a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-54a4b57 elementor-widget elementor-widget-text-editor\" data-id=\"54a4b57\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Safetech Innovations is one of the most experienced cyber security companies in Romania. We have 14 years of activity and over 600 completed projects in this field for clients from multiple economic sectors.<\/p><p>Currently, Safetech Innovations employs over 70 employees, of which 40 are members of the technical team.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ccf039f elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"ccf039f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-6a04a1253ab28\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > We completely manage the cyber security of clients, from the analysis of existing or potential threats\/vulnerabilities and the assessment of risks and business impact, to the implementation of the necessary solutions in order to achieve an optimal level of security. In the long term, we ensure continuous monitoring of events and response to cyber security incidents.<br>\nChoosing Safetech's system integrator services ensures you reduce the risks of implementation, customization, scalability and flexibility, post-implementation support.<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-556a07d articole-pagina  elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"556a07d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-49469c1\" data-id=\"49469c1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-73688ad elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"73688ad\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-51b884d\" data-id=\"51b884d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6ffa829 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"6ffa829\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-6a04a1253d90e\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > Similar articles<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-27db463 elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-card-shadow-yes elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"27db463\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;cards_columns&quot;:&quot;3&quot;,&quot;cards_columns_tablet&quot;:&quot;2&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile_extra&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-30292 post type-post status-publish format-standard has-post-thumbnail hentry category-company-news category-technology-news tag-compliance tag-efficiency-improvement tag-proofpoint-en tag-systems-integration\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/safetech.ro\/en\/webinar-next-gen-security-operations-with-stellar-cyber-and-safetech\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"1672\" height=\"941\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/04\/webinar-Stellar-Cyber-1.webp\" class=\"attachment-full size-full wp-image-30291\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/04\/webinar-Stellar-Cyber-1.webp 1672w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/04\/webinar-Stellar-Cyber-1-300x169.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/04\/webinar-Stellar-Cyber-1-1024x576.webp 1024w\" sizes=\"(max-width: 1672px) 100vw, 1672px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/safetech.ro\/en\/webinar-next-gen-security-operations-with-stellar-cyber-and-safetech\/\" >\n\t\t\t\tWebinar: Next Gen Security Operations with Stellar Cyber and Safetech Innovations\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tApril 29, 2026\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-30276 post type-post status-publish format-standard has-post-thumbnail hentry category-technology-news tag-compliance tag-efficiency-improvement tag-nis-en tag-proofpoint-en tag-risk-management tag-systems-integration\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/safetech.ro\/en\/strengthening-ot-security-and-alignment-to-nis2-with-radiflow360-and-safetech\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"768\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/04\/Radiflow360-1.webp\" class=\"attachment-full size-full wp-image-30268\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/04\/Radiflow360-1.webp 1280w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/04\/Radiflow360-1-300x180.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/04\/Radiflow360-1-1024x614.webp 1024w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/safetech.ro\/en\/strengthening-ot-security-and-alignment-to-nis2-with-radiflow360-and-safetech\/\" >\n\t\t\t\tStrengthening OT Security and alignment to NIS2 with advanced Radiflow360 solutions and Safetech expertise\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tApril 26, 2026\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-29994 post type-post status-publish format-standard has-post-thumbnail hentry category-technology-news tag-compliance tag-efficiency-improvement tag-nis-en tag-proofpoint-en tag-risk-management tag-systems-integration\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/safetech.ro\/en\/intelligent-human-risk-management-with-proofpoint-solutions\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"1536\" height=\"1024\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Proofpoint.webp\" class=\"attachment-full size-full wp-image-29986\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Proofpoint.webp 1536w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Proofpoint-300x200.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Proofpoint-1024x683.webp 1024w\" sizes=\"(max-width: 1536px) 100vw, 1536px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/safetech.ro\/en\/intelligent-human-risk-management-with-proofpoint-solutions\/\" >\n\t\t\t\tIntelligent Human Risk Management with Proofpoint Solutions\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tMarch 24, 2026\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-29956 post type-post status-publish format-standard has-post-thumbnail hentry category-company-news category-technology-news tag-compliance tag-efficiency-improvement tag-proofpoint-en tag-systems-integration\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/safetech.ro\/en\/safetech-proofpoint-webinar-rethinking-cybersecurity-from-the-perspective-of-human-risk\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"900\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Picture1-1.webp\" class=\"attachment-full size-full wp-image-29940\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Picture1-1.webp 1600w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Picture1-1-300x169.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Picture1-1-1024x576.webp 1024w\" sizes=\"(max-width: 1600px) 100vw, 1600px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/safetech.ro\/en\/safetech-proofpoint-webinar-rethinking-cybersecurity-from-the-perspective-of-human-risk\/\" >\n\t\t\t\tSafetech Proofpoint Webinar: From Inbox to Incident \u2014 Rethinking Cybersecurity from the Perspective of Human Risk\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tMarch 12, 2026\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-29856 post type-post status-publish format-standard has-post-thumbnail hentry category-technology-news tag-compliance tag-efficiency-improvement tag-nis-en tag-risk-management\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/safetech.ro\/en\/the-grc-framework-transforms-nis2-requirements-into-resilience-and-sustainable-cybersecurity\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"675\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/GRC.webp\" class=\"attachment-full size-full wp-image-29681\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/GRC.webp 1200w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/GRC-300x169.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/GRC-1024x576.webp 1024w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/safetech.ro\/en\/the-grc-framework-transforms-nis2-requirements-into-resilience-and-sustainable-cybersecurity\/\" >\n\t\t\t\tThe GRC framework transforms NIS2 requirements into resilience and sustainable cybersecurity\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tFebruary 19, 2026\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-29782 post type-post status-publish format-standard has-post-thumbnail hentry category-company-news tag-compliance tag-risk-management tag-safetech-results tag-security-testing\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/safetech.ro\/en\/safetech-innovations-achieves-crest-accreditation-for-penetration-testing\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1280\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/02\/2372476939_1.jpg\" class=\"attachment-full size-full wp-image-29774\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/02\/2372476939_1.jpg 1920w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/02\/2372476939_1-300x200.jpg 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/02\/2372476939_1-1024x683.jpg 1024w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/safetech.ro\/en\/safetech-innovations-achieves-crest-accreditation-for-penetration-testing\/\" >\n\t\t\t\tSafetech Innovations achieves CREST accreditation for its Penetration Testing services\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tFebruary 11, 2026\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a9766c elementor-align-center elementor-widget elementor-widget-ld_button\" data-id=\"2a9766c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<a\n\t\t\t\thref=\"https:\/\/safetech.ro\/blog\/\"class=\"elementor-button btn btn-solid btn-hover-txt-switch btn-hover-txt-switch-y btn-xsm btn-icon-right btn-icon-circle btn-icon-custom-size btn-icon-shaped btn-icon-solid btn-has-label\"\t\t\t>\n\t\t\t\t\t\t\t\t\t<span data-text=\"SEE ALL ARTICLES\" class=\"btn-txt\" data-transition-delay=\"true\" data-delay-options=\"{&quot;elements&quot;: &quot;.lqd-chars&quot;, &quot;delayType&quot;: &quot;animation&quot;, &quot;startDelay&quot;: 0, &quot;delayBetween&quot;: 32.5}\" data-split-text=\"true\" data-split-options=\"{&quot;type&quot;: &quot;chars, words&quot;}\">\n\t\t\t\t\t\tSEE ALL ARTICLES\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"btn-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"lqd-icn-ess icon-ion-ios-arrow-forward\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2c01e2a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2c01e2a\" data-element_type=\"section\" data-e-type=\"section\" id=\"contact\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-93c1788\" data-id=\"93c1788\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-215cb33 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"215cb33\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-d8cf3cd\" data-id=\"d8cf3cd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0deb09e elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"0deb09e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-6a04a12549fa3\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h2 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h2\"  > Contact us<\/h2>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-57b0410 elementor-widget elementor-widget-ld_cf722\" data-id=\"57b0410\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_cf722.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t<div class=\"lqd-contact-form lqd-contact-form-inputs-underlined      lqd-contact-form-button-circle  \">\n\t\t\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f11788-o1\" lang=\"ro-RO\" dir=\"ltr\" data-wpcf7-id=\"11788\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/pages\/23145#wpcf7-f11788-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Formular de contact\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"11788\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"ro_RO\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f11788-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/fieldset>\n<div class=\"row\">\n\t<div class=\"col-md-6\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"text-438\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Full name\" value=\"\" type=\"text\" name=\"text-438\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"col-md-6\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"email-873\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"E-mail\" value=\"\" type=\"email\" name=\"email-873\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"col-md-6\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"text-448\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Subject\" value=\"\" type=\"text\" name=\"text-448\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"col-md-6\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"tel-969\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Phone\" value=\"\" type=\"tel\" name=\"tel-969\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"col-md-12\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"textarea-601\"><textarea cols=\"10\" rows=\"4\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Message\" name=\"textarea-601\"><\/textarea><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"col-md-12\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"acceptance-120\"><span class=\"wpcf7-form-control wpcf7-acceptance\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"acceptance-120\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\">I have read the &nbsp; <a href=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/08\/INFORMARE-GENERALA-PRIVIND-PRELUCRAREA-DCP-EN.pdf\" target=\"_blank\">  notification regarding the processing of personal data<\/a>.<\/span><\/label><\/span><\/span><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div style=\"text-align: center; margin-top: 25px;\" class=\"col-md-12\">\n\t\t<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Send\" \/>\n\t\t<\/p>\n\t<\/div>\n<\/div><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Home Radiflow OT Cybersecurity The complete OT Security platform Radiflow&#8217;s solutions form a complete Operational Technology (OT) Security platform that provides information security officers with<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":23287,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-23145","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages\/23145","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/comments?post=23145"}],"version-history":[{"count":13,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages\/23145\/revisions"}],"predecessor-version":[{"id":23951,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages\/23145\/revisions\/23951"}],"up":[{"embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages\/23287"}],"wp:attachment":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/media?parent=23145"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}