{"id":23446,"date":"2024-06-13T11:47:07","date_gmt":"2024-06-13T08:47:07","guid":{"rendered":"https:\/\/safetech.ro\/cyber-security-solutions-2\/"},"modified":"2025-03-18T10:04:53","modified_gmt":"2025-03-18T08:04:53","slug":"solutions","status":"publish","type":"page","link":"https:\/\/safetech.ro\/en\/solutions\/","title":{"rendered":"Cyber security solutions"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"23446\" class=\"elementor elementor-23446 elementor-23433\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-48dc957 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"48dc957\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-061cbc9\" data-id=\"061cbc9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-265328d elementor-widget elementor-widget-ld_breadcrumb\" data-id=\"265328d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_breadcrumb.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"lqd-breadcrumb-wrapper\"><nav role=\"navigation\" aria-label=\"Breadcrumbs\" class=\"breadcrumbs\"><ol class=\"breadcrumb reset-ul inline-nav inline-ul comma-sep-li\"><li class=\"breadcrumb-item active\"><a href=\"https:\/\/safetech.ro\/en\/\" rel=\"home\"><span>Home<\/span><\/a><\/li><\/ol><\/nav><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8269df4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"8269df4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2f1e091\" data-id=\"2f1e091\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c43a8ed elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"c43a8ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e925c9856e2\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h1 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h1\"  > Cyber security solutions<\/h1>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-867c18d elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"867c18d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e925c98616c\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > We combine our expertise and experience with artificial intelligence to provide our clients with the necessary means to achieve and maintain the desired level of security.<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-51b5d22 elementor-widget elementor-widget-spacer\" data-id=\"51b5d22\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-061157a elementor-hidden-tablet elementor-hidden-mobile\" data-id=\"061157a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fecb199 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fecb199\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-8726ca9\" data-id=\"8726ca9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2054a2b elementor-widget__width-initial elementor-widget elementor-widget-ld_fancy_image\" data-id=\"2054a2b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_fancy_image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"lqd-imggrp-single d-block pos-rel \" data-shadow-style=\"3\" data-inview=\"true\" data-animate-shadow=\"true\">\n\t\t\t<div class=\"lqd-imggrp-img-container d-inline-flex pos-rel align-items-center justify-content-center \">\n\t\t\t\t\t\t\t\t<figure class=\"w-100 pos-rel\">\n\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1920\" height=\"1280\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/07\/shutterstock_2050897058-1.jpg\" class=\"attachment-full size-full wp-image-7579\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/07\/shutterstock_2050897058-1.jpg 1920w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/07\/shutterstock_2050897058-1-300x200.jpg 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/07\/shutterstock_2050897058-1-1024x683.jpg 1024w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/07\/shutterstock_2050897058-1-1536x1024.jpg 1536w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/07\/shutterstock_2050897058-1-720x480.jpg 720w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-8833305\" data-id=\"8833305\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0398595 elementor-widget elementor-widget-text-editor\" data-id=\"0398595\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Since 2011, Safetech Innovations has been providing cybersecurity solutions tailored to each organization\u2019s needs, along with related systems integration, technical support and training services. <br>Safetech Innovations has partnership relations with a number of companies with a decisive role in the field of cyber security, such as CheckPoint, DarkTrace, Microsoft, Splunk, HID, Cynet.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c466049 elementor-widget elementor-widget-shortcode\" data-id=\"c466049\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"section\" data-elementor-id=\"21255\" class=\"elementor elementor-21255 elementor-21252 elementor-21252\" data-elementor-post-type=\"elementor_library\">\n\t\t\t<div class=\"elementor-element elementor-element-fe2ceda e-flex e-con-boxed e-con e-parent\" data-id=\"fe2ceda\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7539141 elementor-widget elementor-widget-text-editor\" data-id=\"7539141\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Currently counting over 70 employees, the company has dedicated teams for research and development of cybersecurity software products, implementation and support of security solutions, and Computer Emergency Response Team (CERT).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b57048e elementor-widget elementor-widget-text-editor\" data-id=\"b57048e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Safetech\u2019s Security Operations Center has been serving clients since 2015 and provides them with a mature and efficient detection, response and remediation capability designed to handle cyber threats with 24\/7\/365 coverage. Safetech CERT (STI CERT\u00ae) is accredited by Trusted Introducer, the accreditation and certification service established by the European community of Computer Emergency Response Team organizations (www.trusted-introducer.org). STI CERT analysts hold multiple personal certifications, obtained through (ISC)\u00b2, ISACA and EC-Council.<\/p>\n<p>Numerous Romanian organizations have chosen to use Safetech\u2019 services for improving their level of cyber security. The company has customers from the following industries: financial-banking, energy, oil and gas, utilities, health, insurance, industrial production, high tech, retail, distribution, public sector, consulting, gaming. Seven of the ten largest banks in Romania have chosen us as their cyber security service provider.<\/p>\n<p>Safetech has also been involved in more than 100 critical infrastructure security projects in the United States, Canada, Mexico, Brazil, the European Union, UK, Switzerland, Morocco, Singapore, the Philippines, India, China and New Zealand.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-25126b9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"25126b9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0b6b96e\" data-id=\"0b6b96e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-34335e3 elementor-section-content-bottom elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"34335e3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-acdd412\" data-id=\"acdd412\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cc508aa elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"cc508aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e925c99d6fd\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h2 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h2\"  > Cyber security solutions<\/h2>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-84c287a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"84c287a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c0d439b\" data-id=\"c0d439b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2a4c84d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2a4c84d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-50f8637 servicii\" data-id=\"50f8637\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2b035ca elementor-align-center elementor-widget elementor-widget-ld_icon_box\" data-id=\"2b035ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_2b035ca\" class=\"iconbox d-flex flex-grow-1 pos-rel flex-column iconbox-default\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Network, email, cloud, and API security  <\/h3>\t\t\t\t<p>Network security involves protecting the data that flows through the organization's network. Firewalls, intrusion detection systems and secure network protocols are essential in preventing unauthorized access and ensure the detection and blocking of cyber attacks in real time.<br>\nEmail security is equally important and implementing strong security measures such as spam filters, email encryption and multi-factor authentication help prevent unauthorized access to email accounts and mitigate associated risks with malicious emails.<br>\nOrganizations are increasingly migrating their data and applications to cloud environments. Ensuring cloud security involves protecting data stored in the cloud, security measures such as data encryption, secure access management, ensuring compliance with security standards and regulations, regular security audits.<br>\nAPI security is critical due to the increasing reliance on APIs to connect services and applications. Authentication, authorization, and input validation help protect APIs from attacks.<\/p>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/safetech.ro\/en\/solutions\/network-email-cloud-and-api-security\/\" class=\"elementor-button btn ws-nowrap btn-solid btn-icon-shaped btn-has-label\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"btn-txt\"  data-text=\"Read more\" >Read more<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-30a70c9 servicii\" data-id=\"30a70c9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-24ac4e7 elementor-align-center elementor-widget elementor-widget-ld_icon_box\" data-id=\"24ac4e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_24ac4e7\" class=\"iconbox d-flex flex-grow-1 pos-rel flex-column iconbox-default\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Security incident detection and response <\/h3>\t\t\t\t<p>Detection involves the continuous monitoring of network traffic, endpoints, and other digital assets to identify suspicious activities, unauthorized access attempts, or indicators of compromise.<br> Rapid detection allows organizations to respond proactively to potential threats, minimizing the impact of security incidents. <br>\nResponse, on the other hand, involves the coordinated actions taken to contain and remediate security breaches once they are detected. A swift and well-coordinated response helps in minimizing the damage caused by cyber attacks and restoring the integrity of affected systems and data.<br>\nEndpoint Detection and Response (EDR), Network Detection and Response (NDR), Extended Detection and Response (XDR), and Mobile Threat Defense (MTD) are specialized technologies and approaches aimed at enhancing detection and response capabilities in specific areas of cybersecurity.<br>\nDetection and response enables organizations to effectively identify, contain and mitigate security threats and breaches.<br><br><\/p>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/safetech.ro\/en\/solutions\/security-incident-detection-and-response\/\" class=\"elementor-button btn ws-nowrap btn-solid btn-icon-shaped btn-has-label\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"btn-txt\"  data-text=\"Read more\" >Read more<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-94d9650 servicii\" data-id=\"94d9650\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6f21f9b elementor-align-center elementor-widget elementor-widget-ld_icon_box\" data-id=\"6f21f9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_6f21f9b\" class=\"iconbox d-flex flex-grow-1 pos-rel flex-column iconbox-default\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Cybersecurity event and incident management <\/h3>\t\t\t\t<p>Event management involves the proactive monitoring and analysis of security events to identify potential threats or anomalous activities. By correlating data from various sources, event management systems can prioritize and escalate security incidents. This proactive approach enables organizations to detect incidents in their early stages, enabling rapid reaction. <br>\nIncident management, on the other hand, focuses on systematically responding to confirmed security incidents, following predefined processes and protocols to contain and remediate the incident effectively.<br> Automation plays a critical role in cyber security by simplifying and speeding up various security processes. Automated security tools and platforms can continuously monitor the organization's digital infrastructure, rapidly identify security events, and trigger predefined responses or remediation actions based on predefined rules and policies. This improves the efficiency and effectiveness of security operations by reducing human error and response times.<\/p>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/safetech.ro\/en\/solutions\/cybersecurity-event-and-incident-management\/\" class=\"elementor-button btn ws-nowrap btn-solid btn-icon-shaped btn-has-label\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"btn-txt\"  data-text=\"Read more\" >Read more<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b13c213 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b13c213\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5fc4a29\" data-id=\"5fc4a29\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-00763fd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"00763fd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-d358891 servicii\" data-id=\"d358891\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52b0670 elementor-align-center elementor-widget elementor-widget-ld_icon_box\" data-id=\"52b0670\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_52b0670\" class=\"iconbox d-flex flex-grow-1 pos-rel flex-column iconbox-default\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Threat and breach intelligence <\/h3>\t\t\t\t<p>Threat intelligence involves the collection, analysis, and dissemination of information about potential and actual threats to an organization\u2019s digital environment. This intelligence can include details about emerging malware, attack vectors, threat actors, and their tactics, techniques, and procedures (TTPs). Threat intelligence helps prioritize security efforts, focusing resources on the most imminent and impactful threats and improving the overall resilience of an organization's cybersecurity posture.<br>\nBreach intelligence focuses on detecting, analyzing, and understanding security breaches when they occur. It involves identifying the indicators of compromise (IoCs), assessing the extent of the damage, and understanding how the breach happened. Breach intelligence provides critical insights into the weaknesses exploited by attackers, enabling organizations to implement immediate remedial actions to contain and mitigate the breach. Moreover, the lessons learned from breach intelligence inform future security strategies, helping to prevent similar incidents.<\/p>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/safetech.ro\/en\/solutions\/threat-and-breach-intelligence\/\" class=\"elementor-button btn ws-nowrap btn-solid btn-icon-shaped btn-has-label\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"btn-txt\"  data-text=\"Read more\" >Read more<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-3e92df7 servicii\" data-id=\"3e92df7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3f4f84a elementor-align-center elementor-widget elementor-widget-ld_icon_box\" data-id=\"3f4f84a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_3f4f84a\" class=\"iconbox d-flex flex-grow-1 pos-rel flex-column iconbox-default\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Privilege and identity assurance <\/h3>\t\t\t\t<p>Privilege and identity assurance are critical components of cybersecurity, playing a vital role in protecting an organization's sensitive information and ensuring operational integrity.<br> \nIdentity assurance focuses on verifying that users are who they claim to be, ensuring that only authorized individuals can access systems and data. This is achieved through multi-factor authentication (MFA), biometrics, and other advanced identity verification techniques. Strong identity assurance prevents unauthorized access by making it significantly harder for attackers to impersonate legitimate users. It also enhances accountability, as actions within the system can be reliably traced back to authenticated individuals. <br>\nPrivilege assurance involves managing and monitoring the access levels of users within an organization, ensuring that individuals have the minimum necessary access rights required to perform their job functions. By implementing stringent privilege management, organizations can reduce the risk of unauthorized access, limit the spread of malware, and prevent data breaches. <\/p>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/safetech.ro\/en\/solutions\/privilege-and-identity-assurance\/\" class=\"elementor-button btn ws-nowrap btn-solid btn-icon-shaped btn-has-label\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"btn-txt\"  data-text=\"Read more\" >Read more<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-5d829eb servicii\" data-id=\"5d829eb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6e90ec1 elementor-align-center elementor-widget elementor-widget-ld_icon_box\" data-id=\"6e90ec1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_6e90ec1\" class=\"iconbox d-flex flex-grow-1 pos-rel flex-column iconbox-default\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Asset management and asset security <\/h3>\t\t\t\t<p>Asset management involves the systematic process of identifying, classifying, and maintaining an inventory of all physical and digital assets within an organization. This comprehensive visibility enables organizations to understand what assets they own, their current status, and their value to the organization. So organizations can optimize resource allocation, prevent unauthorized access and ensure compliance with regulatory requirements. <br>\nAsset security focuses on protecting these assets from threats and vulnerabilities. This involves implementing security measures such as encryption, access controls, and regular updates to safeguard both physical and digital assets from unauthorized access, theft, and damage. Effective asset security ensures that sensitive information remains confidential, integrity is maintained, and availability is preserved, even in the face of potential cyber attacks. <br>\nAsset management and asset security are foundational elements of a robust cybersecurity strategy, ensuring that all organizational assets are accounted for, tracked, and adequately protected. <\/p>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/safetech.ro\/en\/solutions\/asset-management-and-asset-security\/\" class=\"elementor-button btn ws-nowrap btn-solid btn-icon-shaped btn-has-label\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"btn-txt\"  data-text=\"Read more\" >Read more<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b3a5813 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b3a5813\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-41c8696\" data-id=\"41c8696\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-364a698 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"364a698\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-a7122fa servicii\" data-id=\"a7122fa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9226cc0 elementor-align-center elementor-widget elementor-widget-ld_icon_box\" data-id=\"9226cc0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_9226cc0\" class=\"iconbox d-flex flex-grow-1 pos-rel flex-column iconbox-default\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Attack Surface Management and Vulnerability Management <\/h3>\t\t\t\t<p>Attack Surface Management involves the continuous monitoring and management of all potential entry points that an attacker could exploit into an organization's digital environment. These include not only the obvious, such as servers and networks, but also harder-to-detect components, such as third-party services, APIs, and even employee endpoints. <br>\nVulnerability Management specifically focuses on identifying, classifying, prioritizing and remediating security weaknesses in an organization's systems. VM is an ongoing process that involves regular scanning, assessment, and patching of vulnerabilities to ensure that systems remain secure against known threats. An effective VM requires a thorough risk assessment to prioritize the most critical vulnerabilities, and timely remedial actions.<br> \nASM and VM proactive approach reduces the risk of attacks, minimizes damage and ensures the resilience of the organization' IT infrastructure.<\/p>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/safetech.ro\/en\/solutions\/attack-surface-management-vulnerability-management\/\" class=\"elementor-button btn ws-nowrap btn-solid btn-icon-shaped btn-has-label\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"btn-txt\"  data-text=\"Read more\" >Read more<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-4b6df0f servicii\" data-id=\"4b6df0f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f062365 elementor-align-center elementor-align-center elementor-widget elementor-widget-ld_icon_box\" data-id=\"f062365\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_f062365\" class=\"iconbox d-flex flex-grow-1 pos-rel flex-column iconbox-default\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >OT and ICS cybersecurity<br><br> <\/h3>\t\t\t\t<p>Operational Technology (OT) and Industrial Control Systems (ICS) cybersecurity is of paramount importance due to the critical nature of the infrastructures they manage, necessary for the functioning of essential services such as electricity, water supply, transportation, and manufacturing. A cyber attack on these systems can have catastrophic consequences, leading to widespread service disruptions, physical damage, and even threats to public safety. Ensuring robust cybersecurity measures for OT\/ICS is vital to protect these critical infrastructures from malicious actors.<br>\nMoreover, OT\/ICS cybersecurity is crucial because these systems often operate with legacy technologies that were not originally designed with modern cybersecurity threats in mind. It is essential to adopt a comprehensive approach to OT\/ICS cybersecurity, which includes regular assessments, tailored security protocols, and continuous monitoring.<br><br><\/p>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/safetech.ro\/en\/solutions\/ot-and-ics-cybersecurity\/\" class=\"elementor-button btn ws-nowrap btn-solid btn-icon-shaped btn-has-label\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"btn-txt\"  data-text=\"Read more\" >Read more<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-0f71376 servicii\" data-id=\"0f71376\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f939be0 elementor-align-center elementor-widget elementor-widget-ld_icon_box\" data-id=\"f939be0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_f939be0\" class=\"iconbox d-flex flex-grow-1 pos-rel flex-column iconbox-default\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Cybersecurity awareness solutions  <\/h3>\t\t\t\t<p>Cybersecurity awareness is crucial in today's digital age due to the increasing frequency and sophistication of cyber threats. As businesses, governments, and individuals rely more heavily on digital platforms for communication, transactions, and data storage, the risk of cyber attacks grows correspondingly.<br> Awareness helps in identifying potential threats, understanding the tactics employed by cybercriminals, and implementing preventive measures. <br>For organizations, a well-informed staff is a vital line of defense against cyber attacks. Employees who are knowledgeable about cybersecurity can recognize phishing attempts, use strong passwords, and follow best practices, significantly reducing the likelihood of breaches that could lead to data loss, financial damage, and reputational harm.<br><br><br><br><\/p>\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/safetech.ro\/en\/solutions\/cybersecurity-awareness-solutions\/\" class=\"elementor-button btn ws-nowrap btn-solid btn-icon-shaped btn-has-label\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"btn-txt\"  data-text=\"Read more\" >Read more<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div data-custom-animations=\"true\" data-ca-options=\"{&quot;addChildTimelines&quot;:false,&quot;trigger&quot;:&quot;firstChild&quot;,&quot;animationTarget&quot;:&quot;:scope .e-con-inner &gt; .elementor-element:not(.lqd-exclude-parent-ca) &gt; .elementor-widget-container, :scope .e-con-inner &gt; .elementor-widget-hub_fancy_heading .lqd-split-lines .lqd-lines .split-inner, :scope .e-con-inner &gt; .elementor-widget-hub_fancy_heading .lqd-split-words .lqd-words .split-inner, :scope .e-con-inner &gt; .elementor-widget-hub_fancy_heading .lqd-split-chars .lqd-chars .split-inner, :scope .e-con-inner &gt; .elementor-widget-hub_fancy_heading .lqd-adv-txt-fig, :scope .e-con-inner &gt; .elementor-widget-ld_custom_menu .lqd-fancy-menu &gt; ul &gt; li, :scope .e-con:not([data-parallax]) .elementor-element &gt; .elementor-widget-container, :scope .e-con:not([data-parallax]) .elementor-widget-hub_fancy_heading .lqd-split-lines .lqd-lines .split-inner, :scope .e-con:not([data-parallax]) .elementor-widget-hub_fancy_heading .lqd-split-words .lqd-words .split-inner, :scope .e-con:not([data-parallax]) .elementor-widget-hub_fancy_heading .lqd-split-chars .lqd-chars .split-inner, :scope .e-con:not([data-parallax]) .elementor-widget-ld_custom_menu .lqd-fancy-menu &gt; ul &gt; li&quot;,&quot;duration&quot;:750,&quot;delay&quot;:60,&quot;ease&quot;:&quot;expo.out&quot;,&quot;initValues&quot;:{&quot;y&quot;:&quot;150px&quot;,&quot;scaleX&quot;:0.59999999999999997779553950749686919152736663818359375,&quot;scaleY&quot;:0.59999999999999997779553950749686919152736663818359375,&quot;opacity&quot;:0,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;},&quot;animations&quot;:{&quot;y&quot;:&quot;0px&quot;,&quot;scaleX&quot;:1,&quot;scaleY&quot;:1,&quot;opacity&quot;:1,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;}}\" class=\"elementor-element elementor-element-dbe2437 e-flex e-con-boxed e-con e-parent\" data-id=\"dbe2437\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fb9c2b7 elementor-widget elementor-widget-hub_fancy_heading lqd-el-has-inner-anim\" data-id=\"fb9c2b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;enable_split&quot;:&quot;true&quot;,&quot;split_type&quot;:&quot;lines&quot;}\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e925c9b6959\" class=\"ld-fancy-heading pos-rel mask-text\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left lqd-split-lines h3\"  data-split-text=\"true\" data-split-options='{\"type\":\"lines\"}'> Safetech Guides and Publications<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0571f84 elementor-widget__width-inherit elementor-widget elementor-widget-spacer\" data-id=\"0571f84\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-598fbf4 elementor-widget__width-inherit elementor-widget elementor-widget-ld_blog\" data-id=\"598fbf4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_blog.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"lqd-lp-grid 598fbf4 blog-id-93912052 \"><div class=\"lqd-lp-row row pos-rel d-flex flex-wrap\" ><div class=\"lqd-lp-column d-flex flex-column col-md-12 safetech-guides-and-publications\"><article id=\"post-26813\" class=\"lqd-lp pos-rel lqd-lp lqd-lp-style-6 lqd-lp-style-6-alt lqd-lp-hover-img-zoom lqd-lp-hover-img-zoom-out lqd-lp-animate-onhover border-radius-4 overflow-hidden text-start post-26813 post type-post status-publish format-standard has-post-thumbnail hentry category-safetech-guides-and-publications tag-cert-en tag-compliance tag-consulting tag-efficiency-improvement tag-grc-en tag-monitoring-and-response tag-nis-en tag-outsourcing tag-risk-management\">\n<div class=\"lqd-lp-img overflow-hidden\">\n\n\t<figure><img decoding=\"async\" width=\"640\" height=\"364\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/06\/thumb-ghid-640x364.jpg\" class=\"w-100 wp-post-image\" alt=\"\" \/><\/figure>\n\t<div class=\"lqd-lp-meta text-uppercase font-weight-bold pos-rel z-index-3\">\n\t\t\t<\/div>\n\n<\/div>\n\n<header class=\"lqd-lp-header pt-4 ps-3 pe-3 px-3\">\n\n\t<div class=\"lqd-lp-meta lqd-lp-meta-dot-between d-flex flex-wrap align-items-center\">\n\n\t\t<div class=\"lqd-lp-author pos-rel z-index-3\">\n\t\t\t<div class=\"lqd-lp-author-info\">\n\t\t\t\t<h3 class=\"mt-0 mb-0\"><a href=\"https:\/\/safetech.ro\/en\/author\/gabriel-musat\/\">Gabriel Mu\u0219at<\/a><\/h3>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t<time class=\"lqd-lp-date\" datetime=\"2025-01-30T15:07:43+02:00\">January 30, 2025<\/time>\n\t<\/div>\n\n\t<h2 class=\"entry-title lqd-lp-title mt-2 mb-0 h5\"><a  href=\"https:\/\/safetech.ro\/en\/safetech-guide-to-soc-outsourcing\/\" rel=\"bookmark\">Safetech guide to SOC outsourcing<\/a><\/h2>\n<\/header>\n\n\n<a  href=\"https:\/\/safetech.ro\/en\/safetech-guide-to-soc-outsourcing\/\" class=\"lqd-lp-overlay-link lqd-overlay lqd-cc-label-trigger z-index-2\" tab-index=\"-1\"><\/a><\/article><\/div><div class=\"lqd-lp-column d-flex flex-column col-md-12 safetech-guides-and-publications\"><article id=\"post-16940\" class=\"lqd-lp pos-rel lqd-lp lqd-lp-style-6 lqd-lp-style-6-alt lqd-lp-hover-img-zoom lqd-lp-hover-img-zoom-out lqd-lp-animate-onhover border-radius-4 overflow-hidden text-start post-16940 post type-post status-publish format-standard has-post-thumbnail hentry category-safetech-guides-and-publications tag-cert-en tag-compliance tag-consulting tag-efficiency-improvement tag-grc-en tag-monitoring-and-response tag-nis-en tag-outsourcing tag-risk-management tag-security-testing\">\n<div class=\"lqd-lp-img overflow-hidden\">\n\n\t<figure><img decoding=\"async\" width=\"640\" height=\"364\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/06\/thumb-ghid-640x364.jpg\" class=\"w-100 wp-post-image\" alt=\"\" \/><\/figure>\n\t<div class=\"lqd-lp-meta text-uppercase font-weight-bold pos-rel z-index-3\">\n\t\t\t<\/div>\n\n<\/div>\n\n<header class=\"lqd-lp-header pt-4 ps-3 pe-3 px-3\">\n\n\t<div class=\"lqd-lp-meta lqd-lp-meta-dot-between d-flex flex-wrap align-items-center\">\n\n\t\t<div class=\"lqd-lp-author pos-rel z-index-3\">\n\t\t\t<div class=\"lqd-lp-author-info\">\n\t\t\t\t<h3 class=\"mt-0 mb-0\"><a href=\"https:\/\/safetech.ro\/en\/author\/adi_emiral\/\">Securizare Emiral<\/a><\/h3>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t<time class=\"lqd-lp-date\" datetime=\"2022-06-15T12:49:40+03:00\">June 15, 2022<\/time>\n\t<\/div>\n\n\t<h2 class=\"entry-title lqd-lp-title mt-2 mb-0 h5\"><a  href=\"https:\/\/safetech.ro\/en\/guide-safetech-nis-conformity\/\" rel=\"bookmark\">Guide Safetech NIS Conformity<\/a><\/h2>\n<\/header>\n\n\n<a  href=\"https:\/\/safetech.ro\/en\/guide-safetech-nis-conformity\/\" class=\"lqd-lp-overlay-link lqd-overlay lqd-cc-label-trigger z-index-2\" tab-index=\"-1\"><\/a><\/article><\/div><div class=\"lqd-lp-column d-flex flex-column col-md-12 safetech-guides-and-publications\"><article id=\"post-16942\" class=\"lqd-lp pos-rel lqd-lp lqd-lp-style-6 lqd-lp-style-6-alt lqd-lp-hover-img-zoom lqd-lp-hover-img-zoom-out lqd-lp-animate-onhover border-radius-4 overflow-hidden text-start post-16942 post type-post status-publish format-standard has-post-thumbnail hentry category-safetech-guides-and-publications tag-efficiency-improvement tag-honeypot-en tag-ics-en tag-monitoring-and-response tag-security-testing\">\n<div class=\"lqd-lp-img overflow-hidden\">\n\n\t<figure><img decoding=\"async\" width=\"640\" height=\"364\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/06\/thumb-ghid-640x364.jpg\" class=\"w-100 wp-post-image\" alt=\"\" \/><\/figure>\n\t<div class=\"lqd-lp-meta text-uppercase font-weight-bold pos-rel z-index-3\">\n\t\t\t<\/div>\n\n<\/div>\n\n<header class=\"lqd-lp-header pt-4 ps-3 pe-3 px-3\">\n\n\t<div class=\"lqd-lp-meta lqd-lp-meta-dot-between d-flex flex-wrap align-items-center\">\n\n\t\t<div class=\"lqd-lp-author pos-rel z-index-3\">\n\t\t\t<div class=\"lqd-lp-author-info\">\n\t\t\t\t<h3 class=\"mt-0 mb-0\"><a href=\"https:\/\/safetech.ro\/en\/author\/adi_emiral\/\">Securizare Emiral<\/a><\/h3>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t<time class=\"lqd-lp-date\" datetime=\"2022-06-15T12:11:49+03:00\">June 15, 2022<\/time>\n\t<\/div>\n\n\t<h2 class=\"entry-title lqd-lp-title mt-2 mb-0 h5\"><a  href=\"https:\/\/safetech.ro\/en\/guide-safetech-ics-honeypot\/\" rel=\"bookmark\">Guide Safetech ICS Honeypot<\/a><\/h2>\n<\/header>\n\n\n<a  href=\"https:\/\/safetech.ro\/en\/guide-safetech-ics-honeypot\/\" class=\"lqd-lp-overlay-link lqd-overlay lqd-cc-label-trigger z-index-2\" tab-index=\"-1\"><\/a><\/article><\/div><\/div><!--\/ .row --><\/div><!--\/ .lqd-lp-grid -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9dd36d9 articole-pagina elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9dd36d9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e9ae1af\" data-id=\"e9ae1af\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-25ba90a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"25ba90a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-879f5e9\" data-id=\"879f5e9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b9f15a3 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"b9f15a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e925c9c121d\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > Technology News<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-84ff297 minu elementor-widget elementor-widget-ld_blog\" data-id=\"84ff297\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_blog.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"lqd-lp-grid 84ff297 blog-id-139457175 \"><div class=\"lqd-lp-row row pos-rel d-flex flex-wrap\" ><div class=\"lqd-lp-column d-flex flex-column col-md-4 col-sm-6 technology-news\"><article id=\"post-29994\" class=\"lqd-lp pos-rel lqd-lp-style-4 d-flex flex-wrap align-items-center text-start post-29994 post type-post status-publish format-standard has-post-thumbnail hentry category-technology-news tag-compliance tag-efficiency-improvement tag-nis-en tag-proofpoint-en tag-risk-management tag-systems-integration\">\n<div class=\"lqd-lp-img w-25\"><figure class=\"pos-rel overflow-hidden border-radius-6\"><img decoding=\"async\" width=\"320\" height=\"320\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Proofpoint-320x320.webp\" class=\"w-100 wp-post-image\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Proofpoint-320x320.webp 320w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Proofpoint-150x150.webp 150w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Proofpoint-60x60.webp 60w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/><\/figure><\/div>\n<header class=\"lqd-lp-header ps-3 pl-3\">\n\n\t<div class=\"lqd-lp-meta lqd-lp-meta-dot-between d-flex flex-wrap align-items-center font-weight-bold text-uppercase ltr-sp-1\">\n\n\t\t\n\t\t<time class=\"lqd-lp-date\" datetime=\"2026-03-24T11:16:25+02:00\">March 24, 2026<\/time>\n\t<\/div>\n\n\t<h2 class=\"entry-title lqd-lp-title mt-2 mb-0 h5\"><a  href=\"https:\/\/safetech.ro\/en\/intelligent-human-risk-management-with-proofpoint-solutions\/\" rel=\"bookmark\">Intelligent Human Risk Management with Proofpoint Solutions<\/a><\/h2>\n<\/header>\n\n<a  href=\"https:\/\/safetech.ro\/en\/intelligent-human-risk-management-with-proofpoint-solutions\/\" class=\"lqd-lp-overlay-link lqd-overlay lqd-cc-label-trigger z-index-2\" tab-index=\"-1\"><\/a>\n<\/article><\/div><div class=\"lqd-lp-column d-flex flex-column col-md-4 col-sm-6 company-news technology-news\"><article id=\"post-29956\" class=\"lqd-lp pos-rel lqd-lp-style-4 d-flex flex-wrap align-items-center text-start post-29956 post type-post status-publish format-standard has-post-thumbnail hentry category-company-news category-technology-news tag-compliance tag-efficiency-improvement tag-proofpoint-en tag-systems-integration\">\n<div class=\"lqd-lp-img w-25\"><figure class=\"pos-rel overflow-hidden border-radius-6\"><img loading=\"lazy\" decoding=\"async\" width=\"320\" height=\"320\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Picture1-1-320x320.webp\" class=\"w-100 wp-post-image\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Picture1-1-320x320.webp 320w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Picture1-1-150x150.webp 150w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Picture1-1-60x60.webp 60w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/><\/figure><\/div>\n<header class=\"lqd-lp-header ps-3 pl-3\">\n\n\t<div class=\"lqd-lp-meta lqd-lp-meta-dot-between d-flex flex-wrap align-items-center font-weight-bold text-uppercase ltr-sp-1\">\n\n\t\t\n\t\t<time class=\"lqd-lp-date\" datetime=\"2026-03-12T10:48:53+02:00\">March 12, 2026<\/time>\n\t<\/div>\n\n\t<h2 class=\"entry-title lqd-lp-title mt-2 mb-0 h5\"><a  href=\"https:\/\/safetech.ro\/en\/safetech-proofpoint-webinar-rethinking-cybersecurity-from-the-perspective-of-human-risk\/\" rel=\"bookmark\">Safetech Proofpoint Webinar: From Inbox to Incident \u2014 Rethinking Cybersecurity from the Perspective of Human Risk<\/a><\/h2>\n<\/header>\n\n<a  href=\"https:\/\/safetech.ro\/en\/safetech-proofpoint-webinar-rethinking-cybersecurity-from-the-perspective-of-human-risk\/\" class=\"lqd-lp-overlay-link lqd-overlay lqd-cc-label-trigger z-index-2\" tab-index=\"-1\"><\/a>\n<\/article><\/div><div class=\"lqd-lp-column d-flex flex-column col-md-4 col-sm-6 technology-news\"><article id=\"post-29856\" class=\"lqd-lp pos-rel lqd-lp-style-4 d-flex flex-wrap align-items-center text-start post-29856 post type-post status-publish format-standard has-post-thumbnail hentry category-technology-news tag-compliance tag-efficiency-improvement tag-nis-en tag-risk-management\">\n<div class=\"lqd-lp-img w-25\"><figure class=\"pos-rel overflow-hidden border-radius-6\"><img loading=\"lazy\" decoding=\"async\" width=\"320\" height=\"320\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/GRC-320x320.webp\" class=\"w-100 wp-post-image\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/GRC-320x320.webp 320w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/GRC-150x150.webp 150w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/GRC-60x60.webp 60w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/><\/figure><\/div>\n<header class=\"lqd-lp-header ps-3 pl-3\">\n\n\t<div class=\"lqd-lp-meta lqd-lp-meta-dot-between d-flex flex-wrap align-items-center font-weight-bold text-uppercase ltr-sp-1\">\n\n\t\t\n\t\t<time class=\"lqd-lp-date\" datetime=\"2026-02-19T16:20:57+02:00\">February 19, 2026<\/time>\n\t<\/div>\n\n\t<h2 class=\"entry-title lqd-lp-title mt-2 mb-0 h5\"><a  href=\"https:\/\/safetech.ro\/en\/the-grc-framework-transforms-nis2-requirements-into-resilience-and-sustainable-cybersecurity\/\" rel=\"bookmark\">The GRC framework transforms NIS2 requirements into resilience and sustainable cybersecurity<\/a><\/h2>\n<\/header>\n\n<a  href=\"https:\/\/safetech.ro\/en\/the-grc-framework-transforms-nis2-requirements-into-resilience-and-sustainable-cybersecurity\/\" class=\"lqd-lp-overlay-link lqd-overlay lqd-cc-label-trigger z-index-2\" tab-index=\"-1\"><\/a>\n<\/article><\/div><div class=\"lqd-lp-column d-flex flex-column col-md-4 col-sm-6 technology-news\"><article id=\"post-29617\" class=\"lqd-lp pos-rel lqd-lp-style-4 d-flex flex-wrap align-items-center text-start post-29617 post type-post status-publish format-standard has-post-thumbnail hentry category-technology-news tag-automation tag-cert-en tag-cynet-en tag-efficiency-improvement tag-monitoring-and-response tag-systems-integration\">\n<div class=\"lqd-lp-img w-25\"><figure class=\"pos-rel overflow-hidden border-radius-6\"><img loading=\"lazy\" decoding=\"async\" width=\"320\" height=\"320\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/Automation-skew-320x320.webp\" class=\"w-100 wp-post-image\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/Automation-skew-320x320.webp 320w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/Automation-skew-150x150.webp 150w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/Automation-skew-60x60.webp 60w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/><\/figure><\/div>\n<header class=\"lqd-lp-header ps-3 pl-3\">\n\n\t<div class=\"lqd-lp-meta lqd-lp-meta-dot-between d-flex flex-wrap align-items-center font-weight-bold text-uppercase ltr-sp-1\">\n\n\t\t\n\t\t<time class=\"lqd-lp-date\" datetime=\"2026-01-14T15:18:33+02:00\">January 14, 2026<\/time>\n\t<\/div>\n\n\t<h2 class=\"entry-title lqd-lp-title mt-2 mb-0 h5\"><a  href=\"https:\/\/safetech.ro\/en\/cynet-component-of-safetech-soc-validated-mitre-attck\/\" rel=\"bookmark\">Cynet platform, an important component of the Safetech SOC, is validated consecutively in the MITRE ATT&amp;CK tests<\/a><\/h2>\n<\/header>\n\n<a  href=\"https:\/\/safetech.ro\/en\/cynet-component-of-safetech-soc-validated-mitre-attck\/\" class=\"lqd-lp-overlay-link lqd-overlay lqd-cc-label-trigger z-index-2\" tab-index=\"-1\"><\/a>\n<\/article><\/div><div class=\"lqd-lp-column d-flex flex-column col-md-4 col-sm-6 technology-news\"><article id=\"post-29446\" class=\"lqd-lp pos-rel lqd-lp-style-4 d-flex flex-wrap align-items-center text-start post-29446 post type-post status-publish format-standard has-post-thumbnail hentry category-technology-news tag-cert-en tag-monitoring-and-response tag-risk-management tag-safetech-results\">\n<div class=\"lqd-lp-img w-25\"><figure class=\"pos-rel overflow-hidden border-radius-6\"><img loading=\"lazy\" decoding=\"async\" width=\"320\" height=\"320\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2024\/02\/detectie-incidente-320x320.webp\" class=\"w-100 wp-post-image\" alt=\"detec\u021bie \u015fi r\u0103spuns la amenin\u021b\u0103ri cibernetice, cyber threat detection and response\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2024\/02\/detectie-incidente-320x320.webp 320w, https:\/\/safetech.ro\/wp-content\/uploads\/2024\/02\/detectie-incidente-150x150.webp 150w, https:\/\/safetech.ro\/wp-content\/uploads\/2024\/02\/detectie-incidente-60x60.webp 60w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/><\/figure><\/div>\n<header class=\"lqd-lp-header ps-3 pl-3\">\n\n\t<div class=\"lqd-lp-meta lqd-lp-meta-dot-between d-flex flex-wrap align-items-center font-weight-bold text-uppercase ltr-sp-1\">\n\n\t\t\n\t\t<time class=\"lqd-lp-date\" datetime=\"2025-12-17T14:28:19+02:00\">December 17, 2025<\/time>\n\t<\/div>\n\n\t<h2 class=\"entry-title lqd-lp-title mt-2 mb-0 h5\"><a  href=\"https:\/\/safetech.ro\/en\/analysis-following-safetech-innovations-management-of-critical-security-incidents\/\" rel=\"bookmark\">Analysis and recommendations following Safetech Innovations&#8217; management of critical cyber security incidents<\/a><\/h2>\n<\/header>\n\n<a  href=\"https:\/\/safetech.ro\/en\/analysis-following-safetech-innovations-management-of-critical-security-incidents\/\" class=\"lqd-lp-overlay-link lqd-overlay lqd-cc-label-trigger z-index-2\" tab-index=\"-1\"><\/a>\n<\/article><\/div><div class=\"lqd-lp-column d-flex flex-column col-md-4 col-sm-6 company-news technology-news\"><article id=\"post-29434\" class=\"lqd-lp pos-rel lqd-lp-style-4 d-flex flex-wrap align-items-center text-start post-29434 post type-post status-publish format-standard has-post-thumbnail hentry category-company-news category-technology-news tag-cert-en tag-monitoring-and-response tag-risk-management tag-safetech-results\">\n<div class=\"lqd-lp-img w-25\"><figure class=\"pos-rel overflow-hidden border-radius-6\"><img loading=\"lazy\" decoding=\"async\" width=\"320\" height=\"320\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2024\/11\/security-operatoins-center-soc-320x320.webp\" class=\"w-100 wp-post-image\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2024\/11\/security-operatoins-center-soc-320x320.webp 320w, https:\/\/safetech.ro\/wp-content\/uploads\/2024\/11\/security-operatoins-center-soc-150x150.webp 150w, https:\/\/safetech.ro\/wp-content\/uploads\/2024\/11\/security-operatoins-center-soc-60x60.webp 60w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/><\/figure><\/div>\n<header class=\"lqd-lp-header ps-3 pl-3\">\n\n\t<div class=\"lqd-lp-meta lqd-lp-meta-dot-between d-flex flex-wrap align-items-center font-weight-bold text-uppercase ltr-sp-1\">\n\n\t\t\n\t\t<time class=\"lqd-lp-date\" datetime=\"2025-12-16T10:37:27+02:00\">December 16, 2025<\/time>\n\t<\/div>\n\n\t<h2 class=\"entry-title lqd-lp-title mt-2 mb-0 h5\"><a  href=\"https:\/\/safetech.ro\/en\/safetech-innovations-in-top-250-mssp-2025\/\" rel=\"bookmark\">Safetech Innovations, for the second time in a row in the Top 250 MSSPs globally<\/a><\/h2>\n<\/header>\n\n<a  href=\"https:\/\/safetech.ro\/en\/safetech-innovations-in-top-250-mssp-2025\/\" class=\"lqd-lp-overlay-link lqd-overlay lqd-cc-label-trigger z-index-2\" tab-index=\"-1\"><\/a>\n<\/article><\/div><\/div><!--\/ .row --><\/div><!--\/ .lqd-lp-grid -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-363dc61 elementor-align-center elementor-widget elementor-widget-ld_button\" data-id=\"363dc61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<a\n\t\t\t\thref=\"https:\/\/safetech.ro\/blog\/\"class=\"elementor-button btn btn-solid btn-hover-txt-switch btn-hover-txt-switch-y btn-xsm btn-icon-right btn-icon-circle btn-icon-custom-size btn-icon-shaped btn-icon-solid btn-has-label\"\t\t\t>\n\t\t\t\t\t\t\t\t\t<span data-text=\"SEE ALL ARTICLES\" class=\"btn-txt\" data-transition-delay=\"true\" data-delay-options=\"{&quot;elements&quot;: &quot;.lqd-chars&quot;, &quot;delayType&quot;: &quot;animation&quot;, &quot;startDelay&quot;: 0, &quot;delayBetween&quot;: 32.5}\" data-split-text=\"true\" data-split-options=\"{&quot;type&quot;: &quot;chars, words&quot;}\">\n\t\t\t\t\t\tSEE ALL ARTICLES\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"btn-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"lqd-icn-ess icon-ion-ios-arrow-forward\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Home Cyber security solutions We combine our expertise and experience with artificial intelligence to provide our clients with the necessary means to achieve and maintain the desired level of security. Since 2011, Safetech Innovations has been providing cybersecurity solutions tailored to each organization\u2019s needs, along with related systems integration, technical support and training services. Safetech [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-23446","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages\/23446","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/comments?post=23446"}],"version-history":[{"count":45,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages\/23446\/revisions"}],"predecessor-version":[{"id":27209,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages\/23446\/revisions\/27209"}],"wp:attachment":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/media?parent=23446"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}