{"id":23377,"date":"2024-06-12T17:35:01","date_gmt":"2024-06-12T14:35:01","guid":{"rendered":"https:\/\/safetech.ro\/security-incident-detection-and-response\/"},"modified":"2025-03-18T09:57:21","modified_gmt":"2025-03-18T07:57:21","slug":"security-incident-detection-and-response","status":"publish","type":"page","link":"https:\/\/safetech.ro\/en\/solutions\/security-incident-detection-and-response\/","title":{"rendered":"Security incident detection and response"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"23377\" class=\"elementor elementor-23377 elementor-23368\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5612e98 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5612e98\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-99acebf\" data-id=\"99acebf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a02eb4d elementor-widget elementor-widget-ld_breadcrumb\" data-id=\"a02eb4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_breadcrumb.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"lqd-breadcrumb-wrapper\"><nav role=\"navigation\" aria-label=\"Breadcrumbs\" class=\"breadcrumbs\"><ol class=\"breadcrumb reset-ul inline-nav inline-ul comma-sep-li\"><li class=\"breadcrumb-item active\"><a href=\"https:\/\/safetech.ro\/en\/\" rel=\"home\"><span>Home<\/span><\/a><\/li><\/ol><\/nav><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-75bf1e9 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"75bf1e9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2d140bf\" data-id=\"2d140bf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9082239 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"9082239\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e758c89a02b\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h1 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h1\"  > Security incident detection and response<\/h1>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e9ed00a elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"e9ed00a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e758c89abdb\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > Detection involves the continuous monitoring of network traffic, endpoints, and other digital assets to identify suspicious activities, unauthorized access attempts, or indicators of compromise. Rapid detection allows organizations to respond proactively to potential threats, minimizing the impact of security incidents.<br>\nResponse, on the other hand, involves the coordinated actions taken to contain and remediate security breaches once they are detected. A swift and well-coordinated response helps in minimizing the damage caused by cyber attacks and restoring the integrity of affected systems and data.<br>\nEndpoint Detection and Response (EDR), Network Detection and Response (NDR), Extended Detection and Response (XDR), and Mobile Threat Defense (MTD) are specialized technologies and approaches aimed at enhancing detection and response capabilities in specific areas of cybersecurity.<br>\nDetection and response enables organizations to effectively identify, contain and mitigate security threats and breaches.\n<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-43e73e7 elementor-widget elementor-widget-spacer\" data-id=\"43e73e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5f64e9e elementor-hidden-tablet elementor-hidden-mobile\" data-id=\"5f64e9e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b254ce8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b254ce8\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0390a03\" data-id=\"0390a03\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5ef6cbd elementor-section-content-bottom elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5ef6cbd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-c3c8853\" data-id=\"c3c8853\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-89f57e2 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"89f57e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e758c89e668\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h2 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h2\"  > Endpoint Detection and Response solutions<\/h2>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-bf8dc5e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bf8dc5e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-fbe4c99 servicii\" data-id=\"fbe4c99\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-20d9889 elementor-align-center elementor-widget elementor-widget-ld_icon_box\" data-id=\"20d9889\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_20d9889\" class=\"iconbox d-flex flex-grow-1 pos-rel flex-column iconbox-default\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Cynet EDR <\/h3>\t\t\t\t<p>Cynet 360 is an EDR platform with extended capabilities that detects cyber threats, integrates investigation and response actions into automated flows, and includes advanced monitoring, alerting and remediation options through Managed Detection and Response (MDR) services available 24\/ 7.<br><br><br><\/p>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/safetech.ro\/en\/solutions\/security-incident-detection-and-response\/cynet-edr\/\" class=\"elementor-button btn ws-nowrap btn-solid btn-icon-shaped btn-has-label\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"btn-txt\"  data-text=\"Read more\" >Read more<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-d01e819 servicii\" data-id=\"d01e819\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e10e57a elementor-align-center elementor-widget elementor-widget-ld_icon_box\" data-id=\"e10e57a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_e10e57a\" class=\"iconbox d-flex flex-grow-1 pos-rel flex-column iconbox-default\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >CrowdStrike EDR <\/h3>\t\t\t\t<p>A component of the Falcon platform, CrowdStrike's EDR solution provides continuous monitoring of endpoint activity and automatically detects and treats threats, providing organizations with a proactive defense against advanced cyber threats. The solution is backed by Managed Detection and Response services provided by CrowdStrike's team of experts.<\/p>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/safetech.ro\/en\/solutions\/security-incident-detection-and-response\/crowdstrike-edr\/\" class=\"elementor-button btn ws-nowrap btn-solid btn-icon-shaped btn-has-label\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"btn-txt\"  data-text=\"Read more\" >Read more<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-a4c9cfe servicii\" data-id=\"a4c9cfe\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-058deff elementor-align-center elementor-widget elementor-widget-ld_icon_box\" data-id=\"058deff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_058deff\" class=\"iconbox d-flex flex-grow-1 pos-rel flex-column iconbox-default\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Bitdefender GravityZone EDR Cloud <\/h3>\t\t\t\t<p>EDR solution that integrates award-winning Bitdefender technologies, such as Machine Learning systems, cloud scanning and sandbox analyzer, to detect suspicious or malicious activities unidentifiable with the help of traditional prevention mechanisms at the level of terminal devices and simplify the tasks of IT teams.<br><br><\/p>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/safetech.ro\/en\/solutions\/security-incident-detection-and-response\/bitdefender-gravityzone-edr-cloud\/\" class=\"elementor-button btn ws-nowrap btn-solid btn-icon-shaped btn-has-label\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"btn-txt\"  data-text=\"Read more\" >Read more<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4747380 elementor-section-content-bottom elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4747380\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-536811a\" data-id=\"536811a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-31df1e4 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"31df1e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e758c8a7634\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h2 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h2\"  > Network Detection and Response solutions<\/h2>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-c1e2614 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c1e2614\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-0ea5a1f servicii\" data-id=\"0ea5a1f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bcfa538 elementor-align-center elementor-widget elementor-widget-ld_icon_box\" data-id=\"bcfa538\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_bcfa538\" class=\"iconbox d-flex flex-grow-1 pos-rel flex-column iconbox-default\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Darktrace NDR <\/h3>\t\t\t\t<p>Solution that uses artificial intelligence (AI) to autonomously understand normal network behavior and identify deviations that could indicate a potential security threat. Darktrace NDR has the ability to respond proportionally and in real time to the most sophisticated cyber threats, including zero-day attacks.<\/p>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/safetech.ro\/en\/solutions\/security-incident-detection-and-response\/darktrace-ndr\/\" class=\"elementor-button btn ws-nowrap btn-solid btn-icon-shaped btn-has-label\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"btn-txt\"  data-text=\"Read more\" >Read more<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8d5e76d elementor-section-content-bottom elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8d5e76d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-5d21574\" data-id=\"5d21574\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-19a9fb9 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"19a9fb9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e758c8ac526\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h2 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h2\"  > eXtended Detection and Response solutions<\/h2>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-76fc095 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"76fc095\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-7094ff9 servicii\" data-id=\"7094ff9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-69fb3e3 elementor-align-center elementor-widget elementor-widget-ld_icon_box\" data-id=\"69fb3e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_69fb3e3\" class=\"iconbox d-flex flex-grow-1 pos-rel flex-column iconbox-default\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Stellar Cyber Open XDR <\/h3>\t\t\t\t<p>Stellar Cyber \u200b\u200bOpen XDR enables security teams to achieve coherent and consistent results across cloud, on-premise and IT\/OT environments, all from a single Extended Detection and Response (XDR) platform. Open XDR addresses the inefficiencies and complexity associated with cybersecurity alert investigations and responses through an easy-to-use all-in-one platform.<br><br><\/p>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/safetech.ro\/en\/solutions\/security-incident-detection-and-response\/stellar-cyber-open-xdr\/\" class=\"elementor-button btn ws-nowrap btn-solid btn-icon-shaped btn-has-label\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"btn-txt\"  data-text=\"Read more\" >Read more<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-8af54bd servicii\" data-id=\"8af54bd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1a0534b elementor-align-center elementor-widget elementor-widget-ld_icon_box\" data-id=\"1a0534b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_1a0534b\" class=\"iconbox d-flex flex-grow-1 pos-rel flex-column iconbox-default\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Cynet 360 AutoXDR <\/h3>\t\t\t\t<p>Cynet 360 AutoXDR is the first stand-alone cyber threat protection platform that integrates endpoint attack prevention and detection, cloud services, networks, and automated investigation and remediation capabilities. The platform provides security departments with a single point of visibility and multiple options for analyzing, investigating and handling incidents.<br><br><\/p>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/safetech.ro\/en\/solutions\/security-incident-detection-and-response\/cynet-xdr\/\" class=\"elementor-button btn ws-nowrap btn-solid btn-icon-shaped btn-has-label\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"btn-txt\"  data-text=\"Read more\" >Read more<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-81a91fd servicii\" data-id=\"81a91fd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0b4d3b2 elementor-align-center elementor-widget elementor-widget-ld_icon_box\" data-id=\"0b4d3b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_0b4d3b2\" class=\"iconbox d-flex flex-grow-1 pos-rel flex-column iconbox-default\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Microsoft 365 Defender <\/h3>\t\t\t\t<p>Microsoft 365 Defender is an eXtended Detection and Response (XDR) suite that automatically collects, correlates, and analyzes signals, threats, and alerts from across the entire Microsoft 365 environment, including end devices, cloud applications, and identities. The suite leverages Artificial Intelligence (AI) to automatically stop sophisticated attacks and restore affected assets to a safe state.<\/p>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/safetech.ro\/en\/solutions\/security-incident-detection-and-response\/microsoft-365-defender\/\" class=\"elementor-button btn ws-nowrap btn-solid btn-icon-shaped btn-has-label\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"btn-txt\"  data-text=\"Read more\" >Read more<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ad14696 elementor-section-content-bottom elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ad14696\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-cbe5d1a\" data-id=\"cbe5d1a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a7c1538 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"a7c1538\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e758c8baf4f\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h2 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h2\"  > Mobile Threat Defense solutions<\/h2>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7e86995 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7e86995\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6629071 servicii\" data-id=\"6629071\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-79c5016 elementor-align-center elementor-widget elementor-widget-ld_icon_box\" data-id=\"79c5016\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_79c5016\" class=\"iconbox d-flex flex-grow-1 pos-rel flex-column iconbox-default\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Zimperium MTD <\/h3>\t\t\t\t<p>Zimperium MTD is an application that provides advanced mobile security against all major attack vectors. Zimperium MTD protects mobile devices even when they are not connected to a network, reducing risk by scanning for potentially harmful apps and jailbreaking processes on devices before providing access to resources.<\/p>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/safetech.ro\/en\/solutions\/security-incident-detection-and-response\/zimperium-mtd\/\" class=\"elementor-button btn ws-nowrap btn-solid btn-icon-shaped btn-has-label\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"btn-txt\"  data-text=\"Read more\" >Read more<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-73f7184 servicii\" data-id=\"73f7184\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9f6114f elementor-align-center elementor-widget elementor-widget-ld_icon_box\" data-id=\"9f6114f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_9f6114f\" class=\"iconbox d-flex flex-grow-1 pos-rel flex-column iconbox-default\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Safetech MMI <\/h3>\t\t\t\t<p>MMI is a software solution developed by Safetech Innovations that detects malware-specific behaviors on the mobile device, performs behavioral analysis of the device's internet traffic, forensics and reverse engineering of the applications installed on the device.<br><br><\/p>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/safetech.ro\/en\/produse\/mmi\/\" class=\"elementor-button btn ws-nowrap btn-solid btn-icon-shaped btn-has-label\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"btn-txt\"  data-text=\"Read more\" >Read more<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Home Security incident detection and response Detection involves the continuous monitoring of network traffic, endpoints, and other digital assets to identify suspicious activities, unauthorized access attempts, or indicators of compromise. Rapid detection allows organizations to respond proactively to potential threats, minimizing the impact of security incidents. Response, on the other hand, involves the coordinated actions [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":23446,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-23377","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages\/23377","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/comments?post=23377"}],"version-history":[{"count":13,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages\/23377\/revisions"}],"predecessor-version":[{"id":27202,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages\/23377\/revisions\/27202"}],"up":[{"embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages\/23446"}],"wp:attachment":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/media?parent=23377"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}