{"id":25152,"date":"2024-09-30T10:46:04","date_gmt":"2024-09-30T07:46:04","guid":{"rendered":"https:\/\/safetech.ro\/soc-outsourcing-services\/"},"modified":"2025-02-26T15:28:12","modified_gmt":"2025-02-26T13:28:12","slug":"soc-outsourcing-services","status":"publish","type":"page","link":"https:\/\/safetech.ro\/en\/services\/cybersecurity-operations-outsourcing\/soc-outsourcing-services\/","title":{"rendered":"SOC outsourcing services"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"25152\" class=\"elementor elementor-25152 elementor-25129\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-321754c elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"321754c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2b903db\" data-id=\"2b903db\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9710e51 elementor-widget elementor-widget-ld_breadcrumb\" data-id=\"9710e51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_breadcrumb.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"lqd-breadcrumb-wrapper\"><nav role=\"navigation\" aria-label=\"Breadcrumbs\" class=\"breadcrumbs\"><ol class=\"breadcrumb reset-ul inline-nav inline-ul comma-sep-li\"><li class=\"breadcrumb-item active\"><a href=\"https:\/\/safetech.ro\/en\/\" rel=\"home\"><span>Home<\/span><\/a><\/li><\/ol><\/nav><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-639bb7b elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"639bb7b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d12cd04\" data-id=\"d12cd04\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e704bf elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"4e704bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e9be1174573\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h1 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h1\"  > SOC outsourcing services<\/h1>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2abdd36 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"2abdd36\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e9be11754e6\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > Comprehensive outsourcing services for the activities and infrastructure of a security operations center (SOC), including regular proactive actions, continuous monitoring and real-time response to cybersecurity incidents , with 24\/7\/365 coverage<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e85c1d1 elementor-widget elementor-widget-spacer\" data-id=\"e85c1d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-caac521 elementor-hidden-tablet elementor-hidden-mobile\" data-id=\"caac521\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-229e1b9 elementor-hidden-tablet elementor-hidden-mobile elementor-hidden-mobile_extra elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"229e1b9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9d53053\" data-id=\"9d53053\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-030fd97 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"030fd97\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-523a3b9\" data-id=\"523a3b9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4a9c263 elementor-hidden-mobile_extra elementor-hidden-mobile elementor-widget elementor-widget-ld_custom_menu\" data-id=\"4a9c263\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;sticky&quot;:&quot;yes&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile_extra&quot;,&quot;mobile&quot;],&quot;sticky_offset&quot;:0,&quot;sticky_effects_offset&quot;:0,&quot;sticky_anchor_link_offset&quot;:0}\" data-widget_type=\"ld_custom_menu.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div\t\t\t\tclass=\"lqd-fancy-menu lqd-custom-menu pos-abs menu-items-has-fill center lqd-menu-td-none lqd-sticky-menu lqd-sticky-menu-floating lqd-custom-menu-mobile-collapsible\"\n\t\t\t\t\t\t\t\t\tdata-inview=\"true\"\n\t\t\t\t\tdata-inview-options='{ \"toggleBehavior\": \"toggleInView\" }'\n\t\t\t\t\t\t\t>\n\t\t\t\t\t\t<span class=\"lqd-custom-menu-dropdown-btn d-flex align-items-center\" data-target=\"#lqd-custom-menu-4a9c263\" data-bs-target=\"#lqd-custom-menu-4a9c263\" data-toggle=\"collapse\" data-bs-toggle=\"collapse\" data-ld-toggle=\"true\" data-toggle-options='{ \"closeOnOutsideClick\": {\"ifNotIn\": \"#lqd-site-content\"} }'>\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<span class=\"toggle-label\">\n\t\t\t\t\t\t\t\t\t\t\t\t\tNavigheaz\u0103 la\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\n\t\t\t\t<span class=\"expander-icon ms-auto d-inline-flex\">\n\t\t\t\t\t<i class=\"lqd-icn-ess icon-ion-ios-arrow-down\"><\/i>\n\t\t\t\t<\/span>\n\t\t\t<\/span>\n\t\t\t\n\t\t\t\t\t\t\t<ul class=\"reset-ul inline-ul\" id=\"lqd-custom-menu-4a9c263\"  data-localscroll=\"true\" data-localscroll-options=\"{&quot;itemsSelector&quot;:&quot;&gt; li &gt; a&quot;,&quot;trackWindowScroll&quot;:true,&quot;includeParentAsOffset&quot;:true,&quot;offsetElements&quot;:&quot;[data-sticky-header] .lqd-head-sec-wrap:not(.lqd-hide-onstuck), #wpadminbar, body.elementor-page .main-header[data-sticky-header] &gt; .elementor &gt; .elementor-section-wrap &gt; .elementor-section:not(.lqd-hide-onstuck):not(.lqd-stickybar-wrap), body.elementor-page .main-header[data-sticky-header] &gt; .elementor &gt; .elementor-section:not(.lqd-hide-onstuck):not(.lqd-stickybar-wrap), body.elementor-page .main-header[data-sticky-header] &gt; .elementor &gt; .e-con:not(.lqd-hide-onstuck):not(.lqd-stickybar-wrap)&quot;}\">\n\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#utilitate\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty left-icon icon-next-to-label\"><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOverview\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#beneficii\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty left-icon icon-next-to-label\"><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tBenefits\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#descriere\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty left-icon icon-next-to-label\"><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tDescription\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#recomandari\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty left-icon icon-next-to-label\"><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tRecommendations\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#contact\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty left-icon icon-next-to-label\"><i aria-hidden=\"true\" class=\"fas fa-pen\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tContact us\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-25f012e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"25f012e\" data-element_type=\"section\" data-e-type=\"section\" id=\"utilitate\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-acf0752\" data-id=\"acf0752\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div data-parallax=\"true\" data-parallax-options=\"{&quot;ease&quot;:[&quot;linear&quot;],&quot;start&quot;:&quot;top bottom&quot;,&quot;end&quot;:&quot;bottom+=0px top&quot;}\" data-parallax-from=\"{&quot;y&quot;:&quot;135px&quot;,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;}\" data-parallax-to=\"{&quot;y&quot;:&quot;-85px&quot;,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;}\" class=\"elementor-element elementor-element-c4b4109 elementor-widget__width-initial elementor-hidden-mobile elementor-absolute elementor-hidden-mobile_extra elementor-hidden-tablet elementor-widget elementor-widget-ld_fancy_image\" data-id=\"c4b4109\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"ld_fancy_image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"lqd-imggrp-single d-block pos-rel \" data-shadow-style=\"3\" data-inview=\"true\" data-animate-shadow=\"true\">\n\t\t\t<div class=\"lqd-imggrp-img-container d-inline-flex pos-rel align-items-center justify-content-center \">\n\t\t\t\t\t\t\t\t<figure class=\"w-100 pos-rel\">\n\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/08\/shutterstock_1073337977.jpg\" class=\"attachment-full size-full wp-image-11963\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/08\/shutterstock_1073337977.jpg 1920w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/08\/shutterstock_1073337977-300x169.jpg 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/08\/shutterstock_1073337977-1024x576.jpg 1024w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/08\/shutterstock_1073337977-1536x864.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-333104d\" data-id=\"333104d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a787e02 elementor-widget elementor-widget-text-editor\" data-id=\"a787e02\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tSafetech&#8217;s SOC outsourcing services are provided by Safetech&#8217;s Computer Emergency Response Team (STI CERT\u00ae) and include: <ul>\n \t<li>Onboarding services,<\/li>\n \t<li>Proactive asset discovery services,<\/li>\n \t<li>Vulnerability assessment and security testing,<\/li>\n \t<li>Event monitoring,<\/li>\n \t<li>Incident detection,<\/li>\n \t<li>Threat investigation and response on a 24\/7\/365 basis.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-48c8380 beneficii elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"48c8380\" data-element_type=\"section\" data-e-type=\"section\" id=\"beneficii\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6ee94b4\" data-id=\"6ee94b4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4d9afcd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4d9afcd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-e6a2cf8\" data-id=\"e6a2cf8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-90b9f47 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"90b9f47\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e9be1185ea5\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > What problems do SOC outsourcing services address and what benefits do they bring? <\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-612e702 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"612e702\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e9be1186b29\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > The services presented in this document allow companies to outsource security operations center functions to an external provider. They offer the same capabilities as an in-house SOC (Security Operations Center), but without the costs of technical infrastructure and in-house specialized personnel. Below we present the main problems addressed by SOC outsourcing services, along with the benefits brought by these services:  <\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1c8af06 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1c8af06\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a10a10e\" data-id=\"a10a10e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-51fcb5d elementor-widget elementor-widget-text-editor\" data-id=\"51fcb5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>1. Cost reduction<\/b><\/p>\n<p>Outsourcing the SOC allows the organization to avoid the high costs associated with creating and operating an in-house SOC, including personnel, infrastructure, software, and maintenance costs. The organization can benefit from advanced SOC services without making large upfront investments, paying for subscription-based or on-demand services instead. <\/p>\n<p><b>2. Access to specialized expertise<\/b> <\/p>\n<p>Outsourced SOC service providers employ highly skilled cybersecurity experts who are up-to-date on the latest threats, attack techniques, and protective measures. Beneficiaries can access the expertise of these specialists without having to recruit and retain\/motivate all the necessary staff, which can be difficult and expensive. <\/p>\n<p><b>3. 24\/7\/365 monitoring<\/b> <\/p>\n<p>An outsourced SOC provides continuous monitoring of networks and systems, 24\/7, to quickly detect and respond to threats. The organization benefits from constant protection, reducing incident response time and minimizing the potential impact of attacks. <\/p>\n<p><b>4. Scalability<\/b> <\/p>\n<p>An outsourced SOC center is sized to serve numerous customers simultaneously, while also having a reserve for peaks of activity, thus supporting, compared to an internal SOC, faster and easier the rapid adjustments of the level of service of one of its customers, according to its changing needs. The beneficiary can scale security services up or down without making significant investments in additional resources. <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-65ef2b2\" data-id=\"65ef2b2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b7d64d elementor-widget elementor-widget-text-editor\" data-id=\"5b7d64d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>5. Access to advanced technologies<\/b> <\/p>\n<p>Outsourced SOC service providers invest in cutting-edge technologies for threat detection and response, such as XDR (eXtended Detection and Response), SIEM (Security Information and Event Management), EDR (Endpoint Detection and Response), and other security solutions. The organization benefits from these technologies without having to purchase, deploy, and maintain these complex and expensive solutions. <\/p>\n<p><b>6. Reduced incident response time<\/b> <\/p>\n<p>An outsourced SOC can quickly detect and respond to threats, reducing the time it takes to remediate security incidents. Minimizing response time reduces the potential impact of attacks and limits operational and financial losses. <\/p>\n<p><b>7. Regulatory compliance<\/b> <\/p>\n<p>Outsourced SOC service providers are often well-equipped and prepared to help organizations meet their compliance requirements with cybersecurity regulations such as GDPR, NIS2, or PCI DSS. Ensuring compliance helps the organization avoid penalties and maintain a good reputation. <\/p>\n<p><b>8. Focus on the core business of the organization<\/b> <\/p>\n<p>Outsourcing the SOC allows the organization to focus on its core activities, leaving cybersecurity management in the hands of a specialized provider. The organization can channel its resources and attention towards its strategic objectives, knowing that its security is managed by professionals. <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71ee071 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71ee071\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-dae7bc7\" data-id=\"dae7bc7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7a4261a elementor-section-content-bottom elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7a4261a\" data-element_type=\"section\" data-e-type=\"section\" id=\"descriere\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-d74c6ee\" data-id=\"d74c6ee\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4c5f87c elementor-widget__width-inherit elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"4c5f87c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e9be118da89\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > How the outsourcing services provided by Safetech work<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d6fd9b elementor-widget elementor-widget-text-editor\" data-id=\"7d6fd9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The services provided by the CERT ITS centre are based on the information provided by a number of cybersecurity technology platforms, integrated with the client&#8217;s network and IT systems. The versatility of the Safetech team allows to use its own platforms, or those made available by the customer, or even a mixed model.<\/p><p>However, based on 10 years of experience in providing SOC outsourcing services, Safetech recommends using a minimal technology architecture that respects the principles of simplicity and defense-in-depth:<\/p><ul><li>Endpoint Detection and Response (EDR) to protect the most exposed entry points into customers&#8217; network<\/li><li>Multi-technology platform based on eXtended Detection and Response (XDR) technology, which integrates EDR tools but also other sources of alerts and logs, providing a single SOC level monitoring panel.<\/li><\/ul><p>For other services, such as vulnerability assessment, security risk analysis and management of security indicators, and monitoring of internet-exposed assets, which may also be of interest in the context of SOC services, additional specialised tools are needed.<\/p><p>Also, a hybrid environment that, apart from IT, includes OT\/ICS components, may require additional specialized tools specific to the latter.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-927cc9b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"927cc9b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-88d1065\" data-id=\"88d1065\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e51d6df elementor-section-content-bottom elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e51d6df\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-8b48ac6\" data-id=\"8b48ac6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9effdf7 elementor-widget__width-inherit elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"9effdf7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e9be1192e0e\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > Safetech SOC Outsourcing Service Bundles<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12a71a0 elementor-widget elementor-widget-text-editor\" data-id=\"12a71a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>To meet the requirements of organizations of any size, Safetech provides three bundles of SOC outsourcing services. Safetech also offers the possibility to customize these bundles according to the current needs and resources of each client. The tables below show the contents of the Safetech bundles.  <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd9db5a elementor-widget__width-inherit elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"dd9db5a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e9be1194717\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > Technology platforms included in Safetech's SOC outsourcing bundles<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4716789 elementor-widget elementor-widget-text-editor\" data-id=\"4716789\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<table width=\"625\">\n<tbody>\n<tr>\n<td width=\"232\"><span style=\"font-size: 21px;\"><strong>Annual subscription bundle<\/strong><\/span><\/td><td width=\"126\"><span style=\"font-size: 21px;\"><strong>Essential<\/strong><\/span><\/td><td width=\"132\"><span style=\"font-size: 21px;\"><strong>Advanced<\/strong><\/span><\/td><td width=\"134\"><span style=\"font-size: 21px;\"><strong>Elevate<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"232\"><span style=\"color: #3366ff;\"><strong>Endpoint Detection  Response<\/strong><\/span><\/td>\n<td width=\"126\"><strong>&nbsp;<\/strong><\/td>\n<td width=\"132\"><strong>&nbsp;<\/strong><\/td>\n<td width=\"134\"><strong>&nbsp;<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"232\">\u2022&nbsp;Endpoint Protection (EPP)<\/td><td width=\"126\"><strong>\u221a<\/strong><\/td><td width=\"132\"><strong>\u221a<\/strong><\/td><td width=\"134\"><strong>\u221a<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"232\">\u2022&nbsp;Endpoint Detection and Response (EDR)<\/td><td width=\"126\"><strong>\u221a<\/strong><\/td><td width=\"132\"><strong>\u221a<\/strong><\/td><td width=\"134\"><strong>\u221a<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"232\">\u2022&nbsp;Sandbox<\/td><td width=\"126\">&#8211;<\/td><td width=\"132\"><strong>\u221a<\/strong><\/td><td width=\"134\"><strong>\u221a<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"232\">\u2022&nbsp;Deception<\/td><td width=\"126\">&#8211;<\/td><td width=\"132\">&#8211;<\/td><td width=\"134\"><strong>\u221a<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"232\">\u2022&nbsp;Mobile Threat Detection (MTD)<\/td><td width=\"126\">+<\/td><td width=\"132\">+<\/td><td width=\"134\">+<\/td>\n<\/tr>\n<tr>\n<td width=\"232\"><span style=\"color: #3366ff;\"><strong>eXtended Detection  Response<\/strong><\/span><\/td>\n<td width=\"126\"><strong>&nbsp;<\/strong><\/td>\n<td width=\"132\"><strong>&nbsp;<\/strong><\/td>\n<td width=\"134\"><strong>&nbsp;<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"232\">\u2022&nbsp;EDR integration based on out-of-the box connectors (customer existing EDR)<\/td><td width=\"126\"><strong>\u221a<\/strong><\/td><td width=\"132\"><strong>\u221a<\/strong><\/td><td width=\"134\"><strong>\u221a<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"232\">\u2022&nbsp;Next Generation Security Information and Event Management (NextGen SIEM)<\/td><td width=\"126\"><strong>\u221a<\/strong><\/td><td width=\"132\"><strong>\u221a<\/strong><\/td><td width=\"134\"><strong>\u221a<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"232\">\u2022&nbsp;Intrusion Detection System (IDS)<\/td><td width=\"126\"><strong>\u221a<\/strong><\/td><td width=\"132\"><strong>\u221a<\/strong><\/td><td width=\"134\"><strong>\u221a<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"232\">\u2022&nbsp;Case Management<\/td><td width=\"126\"><strong>\u221a<\/strong><\/td><td width=\"132\"><strong>\u221a<\/strong><\/td><td width=\"134\"><strong>\u221a<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"232\">\u2022&nbsp;Network Detection and Response (NDR)<\/td><td width=\"126\">&#8211;<\/td><td width=\"132\"><strong>\u221a<\/strong><\/td><td width=\"134\"><strong>\u221a<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"232\">\u2022&nbsp;User and Entity Behavior Analytics (UEBA)<\/td><td width=\"126\">&#8211;<\/td><td width=\"132\"><strong>\u221a<\/strong><\/td><td width=\"134\"><strong>\u221a<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"232\">\u2022&nbsp;Automated Response<\/td><td width=\"126\">&#8211;<\/td><td width=\"132\">&#8211;<\/td><td width=\"134\"><strong>\u221a<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"232\"><strong><span style=\"color: #3366ff;\">Vulnerability Management<\/span> <\/strong><\/td>\n<td width=\"126\"><strong>&nbsp;<\/strong><\/td>\n<td width=\"132\"><strong>&nbsp;<\/strong><\/td>\n<td width=\"134\"><strong>&nbsp;<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"232\">\u2022&nbsp;Web\/Network Vulnerability assessment (VA)<\/td><td width=\"126\">&#8211;<\/td><td width=\"132\"><strong>\u221a<\/strong><\/td><td width=\"134\"><strong>\u221a<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"232\"><span style=\"color: #3366ff;\"><strong>Risk Management<\/strong><\/span><\/td>\n<td width=\"126\"><strong>&nbsp;<\/strong><\/td>\n<td width=\"132\"><strong>&nbsp;<\/strong><\/td>\n<td width=\"134\"><strong>&nbsp;<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"232\">\u2022&nbsp;Asset inventory and business processes maping<\/td><td width=\"126\">&#8211;<\/td><td width=\"132\"><strong>\u221a<\/strong><\/td><td width=\"134\"><strong>\u221a<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"232\">\u2022&nbsp;Security risk analysis and&nbsp;Management of Security Indicators<\/td><td width=\"126\">&#8211;<\/td><td width=\"132\">&#8211;<\/td><td width=\"134\"><strong>\u221a<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"232\"><span style=\"color: #3366ff;\"><strong>Operational Technology Security <\/strong><\/span><\/td>\n<td width=\"126\"><strong>&nbsp;<\/strong><\/td>\n<td width=\"132\"><strong>&nbsp;<\/strong><\/td>\n<td width=\"134\"><strong>&nbsp;<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"232\">\u2022&nbsp;OT Threat Detection<\/td><td width=\"126\">+<\/td><td width=\"132\">+<\/td><td width=\"134\">+<\/td>\n<\/tr>\n<tr>\n<td width=\"232\">\u2022&nbsp;OT Risk Management<\/td><td width=\"126\">+<\/td><td width=\"132\">+<\/td><td width=\"134\">+<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-75bd4dc elementor-widget__width-inherit elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"75bd4dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e9be1197413\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > Services included in Safetech's SOC outsourcing bundles<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f455ab1 elementor-widget elementor-widget-text-editor\" data-id=\"f455ab1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<table width=\"628\"><tbody><tr><td width=\"236\"><span style=\"font-size: 21px;\"><strong>Annual subscription bundles<\/strong><\/span><\/td><td width=\"123\"><strong><span style=\"font-size: 21px;\">Essential<\/span> <\/strong><\/td><td width=\"132\"><strong><span style=\"font-size: 21px;\">Advanced<\/span> <\/strong><\/td><td width=\"137\"><span style=\"font-size: 21px;\"><strong>Elevate <\/strong><\/span><\/td><\/tr><tr><td width=\"236\"><span style=\"color: #3366ff;\"><b>Startup Services<\/b><\/span><\/td><td width=\"123\">\u00a0<\/td><td width=\"132\">\u00a0<\/td><td width=\"137\">\u00a0<\/td><\/tr><tr><td width=\"236\">Onboarding services<\/td><td width=\"123\">\u221a<\/td><td width=\"132\">\u221a<\/td><td width=\"137\">\u221a<\/td><\/tr><tr><td width=\"236\">Integration Services<\/td><td width=\"123\">\u221a<\/td><td width=\"132\">\u221a<\/td><td width=\"137\">\u221a<\/td><\/tr><tr><td width=\"236\"><span style=\"color: #3366ff;\"><b>Planning and Prevention<\/b><\/span><\/td><td width=\"123\">\u00a0<\/td><td width=\"132\">\u00a0<\/td><td width=\"137\">\u00a0<\/td><\/tr><tr><td width=\"236\">Asset Discovery<\/td><td width=\"123\">\u221a<\/td><td width=\"132\">\u221a<\/td><td width=\"137\">\u221a<\/td><\/tr><tr><td width=\"236\">Monthly external vulnerability assessment<\/td><td width=\"123\">&#8211;<\/td><td width=\"132\">\u221a<\/td><td width=\"137\">\u221a<\/td><\/tr><tr><td width=\"236\">Monthly Internal Vulnerability Assessment<\/td><td width=\"123\">&#8211;<\/td><td width=\"132\">&#8211;<\/td><td width=\"137\">\u221a<\/td><\/tr><tr><td width=\"236\">Security Testing (*)<\/td><td width=\"123\">+<\/td><td width=\"132\">+<\/td><td width=\"137\">up to 2 activities per year<\/td><\/tr><tr><td width=\"236\"><span style=\"color: #3366ff;\"><b>Monitoring, detection and investigation<\/b><\/span><\/td><td width=\"123\">\u00a0<\/td><td width=\"132\">\u00a0<\/td><td width=\"137\">\u00a0<\/td><\/tr><tr><td width=\"236\">24\/7 continuous monitoring<\/td><td width=\"123\">\u221a<\/td><td width=\"132\">\u221a<\/td><td width=\"137\">\u221a<\/td><\/tr><tr><td width=\"236\">Threat detection and investigation<\/td><td width=\"123\">\u221a<\/td><td width=\"132\">\u221a<\/td><td width=\"137\">\u221a<\/td><\/tr><tr><td width=\"236\">Root Cause Analysis<\/td><td width=\"123\">&#8211;<\/td><td width=\"132\">\u221a<\/td><td width=\"137\">\u221a<\/td><\/tr><tr><td width=\"236\">Advanced Threat Hunting<\/td><td width=\"123\">&#8211;<\/td><td width=\"132\">&#8211;<\/td><td width=\"137\">up to 2 activities per year<\/td><\/tr><tr><td width=\"236\">Monitoring of external internet assets<\/td><td width=\"123\">+<\/td><td width=\"132\">+<\/td><td width=\"137\">\u221a<\/td><\/tr><tr><td width=\"236\"><span style=\"color: #3366ff;\"><b>Response<\/b><\/span><\/td><td width=\"123\">\u00a0<\/td><td width=\"132\">\u00a0<\/td><td width=\"137\">\u00a0<\/td><\/tr><tr><td width=\"236\">Recommended remediation actions<\/td><td width=\"123\">\u221a<\/td><td width=\"132\">\u221a<\/td><td width=\"137\">\u221a<\/td><\/tr><tr><td width=\"236\">Contain\/Shutdown Host (**)<\/td><td width=\"123\">&#8211;<\/td><td width=\"132\">\u221a<\/td><td width=\"137\">\u221a<\/td><\/tr><tr><td width=\"236\">Coordination of remediation actions for major and critical incidents<\/td><td width=\"123\">&#8211;<\/td><td width=\"132\">up to 24h\/year<\/td><td width=\"137\">up to 40h\/year<\/td><\/tr><tr><td width=\"236\">Custom Playbooks<\/td><td width=\"123\">&#8211;<\/td><td width=\"132\">up to 5<\/td><td width=\"137\">up to 10<\/td><\/tr><tr><td width=\"236\"><span style=\"color: #3366ff;\"><b>Governance of services<\/b><\/span><\/td><td width=\"123\">\u00a0<\/td><td width=\"132\">\u00a0<\/td><td width=\"137\">\u00a0<\/td><\/tr><tr><td width=\"236\">Monthly reports<\/td><td width=\"123\">\u221a<\/td><td width=\"132\">\u221a<\/td><td width=\"137\">\u221a<\/td><\/tr><tr><td width=\"236\">Quarterly Evaluation\/Lessons Learned<\/td><td width=\"123\">&#8211;<\/td><td width=\"132\">\u221a<\/td><td width=\"137\">\u221a<\/td><\/tr><tr><td width=\"236\">Support for audit\/regulatory compliance<\/td><td width=\"123\">+<\/td><td width=\"132\">+<\/td><td width=\"137\">up to 2 interventions per year<\/td><\/tr><tr><td width=\"236\"><span style=\"color: #3366ff;\"><b>Additional services (add-on)<\/b><\/span><\/td><td width=\"123\">\u00a0<\/td><td width=\"132\">\u00a0<\/td><td width=\"137\">\u00a0<\/td><\/tr><tr><td width=\"236\">Governance, Risk and Compliance (GRC) Activities (***)<\/td><td width=\"123\">+<\/td><td width=\"132\">+<\/td><td width=\"137\">+<\/td><\/tr><\/tbody><\/table>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d440de elementor-widget elementor-widget-text-editor\" data-id=\"4d440de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Legend:<\/p><p>\u221a included<\/p><p>&#8211; not included<\/p><p>+ optional<\/p><p>Notes:<\/p><p>(*) Security Testing: Penetration Test, Code Review, Social Engineering, Red Teaming<\/p><p>(**) If these actions are possible from the platforms managed by Safetech and based on the procedures agreed with the customer<\/p><p>(***) Governance, risk and compliance activities: development\/review\/update of standards\/policies\/procedures, risk analysis, business impact analysis, business continuity and disaster recovery plans, compliance audit.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-5524112 e-flex e-con-boxed e-con e-parent\" data-id=\"5524112\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div data-custom-animations=\"true\" data-ca-options=\"{&quot;addChildTimelines&quot;:false,&quot;trigger&quot;:&quot;firstChild&quot;,&quot;animationTarget&quot;:&quot;:scope  &gt; .elementor-element:not(.lqd-exclude-parent-ca) &gt; .elementor-widget-container, :scope  &gt; .elementor-widget-hub_fancy_heading .lqd-split-lines .lqd-lines .split-inner, :scope  &gt; .elementor-widget-hub_fancy_heading .lqd-split-words .lqd-words .split-inner, :scope  &gt; .elementor-widget-hub_fancy_heading .lqd-split-chars .lqd-chars .split-inner, :scope  &gt; .elementor-widget-hub_fancy_heading .lqd-adv-txt-fig, :scope  &gt; .elementor-widget-ld_custom_menu .lqd-fancy-menu &gt; ul &gt; li&quot;,&quot;duration&quot;:750,&quot;delay&quot;:55,&quot;ease&quot;:&quot;expo.out&quot;,&quot;initValues&quot;:{&quot;y&quot;:&quot;100px&quot;,&quot;opacity&quot;:0,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;},&quot;animations&quot;:{&quot;y&quot;:&quot;0px&quot;,&quot;opacity&quot;:1,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;}}\" class=\"elementor-element elementor-element-2294886 e-con-full e-flex e-con e-child\" data-id=\"2294886\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ea2d333 elementor-widget__width-inherit elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"ea2d333\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e9be119ddb3\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > Frequently asked questions about Safetech's SOC outsourcing services<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0b2cb0e elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"0b2cb0e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_0b2cb0e\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"lqd-icn-ess icon-num-1\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >How does an outsourced SOC respond to security threats? <\/h3>\t\t\t\t<p>An outsourced SOC provider continuously monitors the network for suspicious activity. When a threat is detected, the team in this SOC performs the triage, analyzes the severity, and takes appropriate measures, such as isolating the affected systems or neutralizing the attack. <\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13c4a71 elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"13c4a71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_13c4a71\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"lqd-icn-ess icon-num-2\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >What types of threats are monitored by the SOC? <\/h3>\t\t\t\t<p>The SOC monitors a wide range of threats, including: malware and ransomware attacks, phishing and spear-phishing attacks, unauthorized access attempts (international and external), anomalies in network traffic, vulnerabilities at the application and server level, etc.<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8c3d0b2 elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"8c3d0b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_8c3d0b2\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"lqd-icn-ess icon-num-3\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >What are the responsibilities of the outsourced SOC service provider, and respectively of the customer, with regard to incident response? <\/h3>\t\t\t\t<p>In general, responsibility for incidents is shared. The SOC provider is responsible for monitoring and reporting incidents, as well as providing remediation recommendations. The customer is responsible for implementing the recommended measures and for the overall security of its IT infrastructure.  <\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-106d571 elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"106d571\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_106d571\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"lqd-icn-ess icon-num-4\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >What are the typical costs associated with an outsourced SOC? <\/h3>\t\t\t\t<p>The costs vary depending on: the size of the organization (number of digital assets identifiable by IP address or MAC (Media Access Control)), the range of services requested, the working hours in which the services operate (8\/5 or 24\/7), the level of customization required and the duration of the contract. Outsourced SOCs often offer subscription or pay-as-you-go models, making them more scalable and efficient than in-house SOCs. <\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-602b194 elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"602b194\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_602b194\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"lqd-icn-ess icon-num-5\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >How does an outsourced SOC ensure compliance with industry regulations? <\/h3>\t\t\t\t<p>Outsourced SOC service providers help organizations meet various compliance standards, such as GDPR, PCI DSS, ISO 27001, and the NIS directive, by continuously monitoring security policies and generating compliance reports.<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e5739c elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"5e5739c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_5e5739c\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"lqd-icn-ess icon-num-6\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >How long does it take to fully implement an outsourced SOC? <\/h3>\t\t\t\t<p>The implementation time depends on the complexity of the infrastructure and the availability of the customer's resources. In general, the process of starting SOC (onboarding and onboarding) services can take anywhere from a few weeks to a few months. The process includes agreeing on the sources that will provide data, establishing the SOC architecture, defining and applying the communication\/collaboration procedures between the provider's team and the client's team, configuring the technological platforms that will be used by the STI CERT team and integrating them with the agreed data sources.  <\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78825ef elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"78825ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_78825ef\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"lqd-icn-ess icon-num-7\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >How is the confidentiality of customer data ensured? <\/h3>\t\t\t\t<p>Outsourced SOC providers follow strict privacy and data security policies, usually compliant with regulations such as GDPR. All data is encrypted and managed according to cybersecurity best practices. <\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0914295 elementor-section-content-middle elementor-reverse-mobile elementor-reverse-tablet elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0914295\" data-element_type=\"section\" data-e-type=\"section\" id=\"recomandari\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ae576c5\" data-id=\"ae576c5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-899c925 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"899c925\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e9be11af237\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > Why choose Safetech's SOC outsourcing services?<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0346c07 elementor-widget elementor-widget-text-editor\" data-id=\"0346c07\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The STI CERT Centre has the following particular characteristics:<\/p><ul><li>Is a CERT accredited by Trusted Introducer,<\/li><li>Specialists within it have multiple personal certifications (ISC)\u00b2, ISACA, EC-Council, CREST etc,<\/li><li>Provides complete cyber incident monitoring, prevention, reporting services based on its own and\/or customers&#8217; platforms,<\/li><li>The center&#8217;s services are covered by an insurance policy that includes specific clauses for cyber event risks,<\/li><li>The center operates with staff in 3 shifts, to ensure continuous coverage 24 hours a day,<\/li><li>The services are provided based on documented internal processes, applied by the teams of continuous monitoring, vulnerability management and advanced investigations within the center and are tracked through quality and performance indicators,<\/li><li>The center applies an internal process of continuous improvement of the services provided,<\/li><li>According to current statistics, STI CERT:<ul><li>Receives, on average, 100 billion events\/month,<\/li><li>Analyzes 25,000 security alerts\/month,<\/li><li>Handles 180 security incidents\/month,<\/li><\/ul><\/li><li>STI CERT serves clients in the financial-banking, utilities, health, technology, retail, distribution, consulting, gaming industries,<\/li><li>The SOC outsourcing provided by the CERT TSI is a low-cost alternative. Not all organizations can afford to operate their own Security Operations Center (SOC). Safetech&#8217;s SOC outsourcing services are a sustainable, easy-to-apply and economically efficient alternative for small and medium-sized companies, with limited internal resources in the field of cybersecurity, as well as for large organizations, which can thus complement or expand their own skills to achieve the desired objectives. In addition, it allows companies to capitalize on the investments already made in the security infrastructure, by integrating existing solutions.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-d24b6ac\" data-id=\"d24b6ac\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-daabc39 elementor-widget__width-auto elementor-absolute elementor-widget-mobile__width-initial elementor-widget elementor-widget-image\" data-id=\"daabc39\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"544\" height=\"546\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/02\/simbol.png\" class=\"attachment-full size-full wp-image-2480\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/02\/simbol.png 544w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/02\/simbol-300x300.png 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/02\/simbol-150x150.png 150w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/02\/simbol-320x320.png 320w\" sizes=\"(max-width: 544px) 100vw, 544px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c48b2d9 elementor-widget__width-initial elementor-widget elementor-widget-ld_fancy_image\" data-id=\"c48b2d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_fancy_image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"lqd-imggrp-single d-block pos-rel \">\n\t\t\t<div class=\"lqd-imggrp-img-container d-inline-flex pos-rel align-items-center justify-content-center \">\n\t\t\t\t\t\t\t\t<figure class=\"w-100 pos-rel\">\n\t\t\t\t\t<img decoding=\"async\" width=\"1200\" height=\"675\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2024\/01\/shutterstock_1682600908.webp\" class=\"attachment-full size-full wp-image-21404\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2024\/01\/shutterstock_1682600908.webp 1200w, https:\/\/safetech.ro\/wp-content\/uploads\/2024\/01\/shutterstock_1682600908-300x169.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2024\/01\/shutterstock_1682600908-1024x576.webp 1024w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-01a9018 articole-pagina  elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"01a9018\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3dffb87\" data-id=\"3dffb87\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-313f521 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"313f521\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-898d530\" data-id=\"898d530\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-38f5e70 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"38f5e70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e9be11b61fa\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h2 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h2\"  > Similar articles<\/h2>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20b67b2 elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-card-shadow-yes elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"20b67b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;cards_columns&quot;:&quot;3&quot;,&quot;cards_columns_tablet&quot;:&quot;2&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile_extra&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-29994 post type-post status-publish format-standard has-post-thumbnail hentry category-technology-news tag-compliance tag-efficiency-improvement tag-nis-en tag-proofpoint-en tag-risk-management tag-systems-integration\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/safetech.ro\/en\/intelligent-human-risk-management-with-proofpoint-solutions\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"1536\" height=\"1024\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Proofpoint.webp\" class=\"attachment-full size-full wp-image-29986\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Proofpoint.webp 1536w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Proofpoint-300x200.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Proofpoint-1024x683.webp 1024w\" sizes=\"(max-width: 1536px) 100vw, 1536px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/safetech.ro\/en\/intelligent-human-risk-management-with-proofpoint-solutions\/\" >\n\t\t\t\tIntelligent Human Risk Management with Proofpoint Solutions\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tMarch 24, 2026\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-29956 post type-post status-publish format-standard has-post-thumbnail hentry category-company-news category-technology-news tag-compliance tag-efficiency-improvement tag-proofpoint-en tag-systems-integration\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/safetech.ro\/en\/safetech-proofpoint-webinar-rethinking-cybersecurity-from-the-perspective-of-human-risk\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"900\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Picture1-1.webp\" class=\"attachment-full size-full wp-image-29940\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Picture1-1.webp 1600w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Picture1-1-300x169.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Picture1-1-1024x576.webp 1024w\" sizes=\"(max-width: 1600px) 100vw, 1600px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/safetech.ro\/en\/safetech-proofpoint-webinar-rethinking-cybersecurity-from-the-perspective-of-human-risk\/\" >\n\t\t\t\tSafetech Proofpoint Webinar: From Inbox to Incident \u2014 Rethinking Cybersecurity from the Perspective of Human Risk\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tMarch 12, 2026\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-29856 post type-post status-publish format-standard has-post-thumbnail hentry category-technology-news tag-compliance tag-efficiency-improvement tag-nis-en tag-risk-management\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/safetech.ro\/en\/the-grc-framework-transforms-nis2-requirements-into-resilience-and-sustainable-cybersecurity\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"675\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/GRC.webp\" class=\"attachment-full size-full wp-image-29681\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/GRC.webp 1200w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/GRC-300x169.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/GRC-1024x576.webp 1024w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/safetech.ro\/en\/the-grc-framework-transforms-nis2-requirements-into-resilience-and-sustainable-cybersecurity\/\" >\n\t\t\t\tThe GRC framework transforms NIS2 requirements into resilience and sustainable cybersecurity\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tFebruary 19, 2026\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-29782 post type-post status-publish format-standard has-post-thumbnail hentry category-company-news tag-compliance tag-risk-management tag-safetech-results tag-security-testing\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/safetech.ro\/en\/safetech-innovations-achieves-crest-accreditation-for-penetration-testing\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1280\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/02\/2372476939_1.jpg\" class=\"attachment-full size-full wp-image-29774\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/02\/2372476939_1.jpg 1920w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/02\/2372476939_1-300x200.jpg 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/02\/2372476939_1-1024x683.jpg 1024w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/safetech.ro\/en\/safetech-innovations-achieves-crest-accreditation-for-penetration-testing\/\" >\n\t\t\t\tSafetech Innovations achieves CREST accreditation for its Penetration Testing services\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tFebruary 11, 2026\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-29678 post type-post status-publish format-standard has-post-thumbnail hentry category-case-studies tag-compliance tag-consulting tag-grc-en tag-nis-en tag-outsourcing tag-risk-management\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/safetech.ro\/en\/case-study-grc-safetech-profi\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"675\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/GRC.webp\" class=\"attachment-full size-full wp-image-29681\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/GRC.webp 1200w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/GRC-300x169.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/GRC-1024x576.webp 1024w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/safetech.ro\/en\/case-study-grc-safetech-profi\/\" >\n\t\t\t\tCase Study &#8211; Safetech GRC services for Profi\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tJanuary 21, 2026\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-29692 post type-post status-publish format-standard has-post-thumbnail hentry category-case-studies tag-cert-en tag-monitoring-and-response\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/safetech.ro\/en\/case-study-safetech-ransomware-critical-incident-response\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"1258\" height=\"840\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/Untitled.webp\" class=\"attachment-full size-full wp-image-29687\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/Untitled.webp 1258w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/Untitled-300x200.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/Untitled-1024x684.webp 1024w\" sizes=\"(max-width: 1258px) 100vw, 1258px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/safetech.ro\/en\/case-study-safetech-ransomware-critical-incident-response\/\" >\n\t\t\t\tCase Study &#8211; STI CERT Response to a Ransomware Critical Incident\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tJanuary 21, 2026\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-09ddb02 elementor-align-center elementor-widget elementor-widget-ld_button\" data-id=\"09ddb02\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<a\n\t\t\t\thref=\"https:\/\/safetech.ro\/blog\/\"class=\"elementor-button btn btn-solid btn-hover-txt-switch btn-hover-txt-switch-y btn-xsm btn-icon-right btn-icon-circle btn-icon-custom-size btn-icon-shaped btn-icon-solid btn-has-label\"\t\t\t>\n\t\t\t\t\t\t\t\t\t<span data-text=\"SEE ALL ARTICLES\" class=\"btn-txt\" data-transition-delay=\"true\" data-delay-options=\"{&quot;elements&quot;: &quot;.lqd-chars&quot;, &quot;delayType&quot;: &quot;animation&quot;, &quot;startDelay&quot;: 0, &quot;delayBetween&quot;: 32.5}\" data-split-text=\"true\" data-split-options=\"{&quot;type&quot;: &quot;chars, words&quot;}\">\n\t\t\t\t\t\tSEE ALL ARTICLES\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"btn-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"lqd-icn-ess icon-ion-ios-arrow-forward\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fb6d2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fb6d2\" data-element_type=\"section\" data-e-type=\"section\" id=\"contact\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9502df9\" data-id=\"9502df9\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-057fd34 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"057fd34\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-2800337\" data-id=\"2800337\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-83afd55 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"83afd55\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e9be11cdc26\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h2 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h2\"  > Contact us<\/h2>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a47eba elementor-widget elementor-widget-ld_cf722\" data-id=\"7a47eba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_cf722.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t<div class=\"lqd-contact-form lqd-contact-form-inputs-underlined      lqd-contact-form-button-circle  \">\n\t\t\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f11788-o1\" lang=\"ro-RO\" dir=\"ltr\" data-wpcf7-id=\"11788\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/pages\/25152#wpcf7-f11788-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Formular de contact\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"11788\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"ro_RO\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f11788-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/fieldset>\n<div class=\"row\">\n\t<div class=\"col-md-6\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"text-438\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Full name\" value=\"\" type=\"text\" name=\"text-438\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"col-md-6\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"email-873\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"E-mail\" value=\"\" type=\"email\" name=\"email-873\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"col-md-6\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"text-448\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Subject\" value=\"\" type=\"text\" name=\"text-448\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"col-md-6\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"tel-969\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Phone\" value=\"\" type=\"tel\" name=\"tel-969\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"col-md-12\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"textarea-601\"><textarea cols=\"10\" rows=\"4\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Message\" name=\"textarea-601\"><\/textarea><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"col-md-12\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"acceptance-120\"><span class=\"wpcf7-form-control wpcf7-acceptance\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"acceptance-120\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\">I have read the &nbsp; <a href=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/08\/INFORMARE-GENERALA-PRIVIND-PRELUCRAREA-DCP-EN.pdf\" target=\"_blank\">  notification regarding the processing of personal data<\/a>.<\/span><\/label><\/span><\/span><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div style=\"text-align: center; margin-top: 25px;\" class=\"col-md-12\">\n\t\t<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Send\" \/>\n\t\t<\/p>\n\t<\/div>\n<\/div><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Home SOC outsourcing services Comprehensive outsourcing services for the activities and infrastructure of a security operations center (SOC), including regular proactive actions, continuous monitoring and<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":27319,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-25152","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages\/25152","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/comments?post=25152"}],"version-history":[{"count":46,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages\/25152\/revisions"}],"predecessor-version":[{"id":27018,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages\/25152\/revisions\/27018"}],"up":[{"embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages\/27319"}],"wp:attachment":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/media?parent=25152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}