{"id":27264,"date":"2025-03-21T11:50:17","date_gmt":"2025-03-21T09:50:17","guid":{"rendered":"https:\/\/safetech.ro\/?page_id=27264"},"modified":"2025-03-25T12:14:23","modified_gmt":"2025-03-25T10:14:23","slug":"vulnerability-management-services","status":"publish","type":"page","link":"https:\/\/safetech.ro\/en\/services\/cybersecurity-operations-outsourcing\/vulnerability-management-services\/","title":{"rendered":"Vulnerability Management Services"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"27264\" class=\"elementor elementor-27264 elementor-27256\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-321754c elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"321754c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2b903db\" data-id=\"2b903db\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9710e51 elementor-widget elementor-widget-ld_breadcrumb\" data-id=\"9710e51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_breadcrumb.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"lqd-breadcrumb-wrapper\"><nav role=\"navigation\" aria-label=\"Breadcrumbs\" class=\"breadcrumbs\"><ol class=\"breadcrumb reset-ul inline-nav inline-ul comma-sep-li\"><li class=\"breadcrumb-item active\"><a href=\"https:\/\/safetech.ro\/en\/\" rel=\"home\"><span>Home<\/span><\/a><\/li><\/ol><\/nav><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-639bb7b elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"639bb7b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d12cd04\" data-id=\"d12cd04\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e704bf elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"4e704bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e76f5d66bd1\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h1 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h1\"  > Safetech Vulnerability Management<\/h1>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2abdd36 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"2abdd36\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e76f5d67b32\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > Professional services for identifying, classifying, and proactively remediating vulnerabilities in the IT infrastructure<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e85c1d1 elementor-widget elementor-widget-spacer\" data-id=\"e85c1d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-caac521 elementor-hidden-tablet elementor-hidden-mobile\" data-id=\"caac521\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-229e1b9 elementor-hidden-tablet elementor-hidden-mobile elementor-hidden-mobile_extra elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"229e1b9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9d53053\" data-id=\"9d53053\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-030fd97 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"030fd97\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-523a3b9\" data-id=\"523a3b9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-25f012e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"25f012e\" data-element_type=\"section\" data-e-type=\"section\" id=\"utilitate\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-acf0752\" data-id=\"acf0752\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-47865a1 elementor-widget elementor-widget-image\" data-id=\"47865a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"297\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2025\/03\/vulnerability-management-1-1-300x297.png\" class=\"attachment-medium size-medium wp-image-27298\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2025\/03\/vulnerability-management-1-1-300x297.png 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2025\/03\/vulnerability-management-1-1-150x150.png 150w, https:\/\/safetech.ro\/wp-content\/uploads\/2025\/03\/vulnerability-management-1-1.png 505w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a9c263 elementor-hidden-mobile_extra elementor-hidden-mobile elementor-widget elementor-widget-ld_custom_menu\" data-id=\"4a9c263\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;sticky&quot;:&quot;yes&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile_extra&quot;,&quot;mobile&quot;],&quot;sticky_offset&quot;:0,&quot;sticky_effects_offset&quot;:0,&quot;sticky_anchor_link_offset&quot;:0}\" data-widget_type=\"ld_custom_menu.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div\t\t\t\tclass=\"lqd-fancy-menu lqd-custom-menu pos-abs menu-items-has-fill center lqd-menu-td-none lqd-sticky-menu lqd-sticky-menu-floating lqd-custom-menu-mobile-collapsible\"\n\t\t\t\t\t\t\t\t\tdata-inview=\"true\"\n\t\t\t\t\tdata-inview-options='{ \"toggleBehavior\": \"toggleInView\" }'\n\t\t\t\t\t\t\t>\n\t\t\t\t\t\t<span class=\"lqd-custom-menu-dropdown-btn d-flex align-items-center\" data-target=\"#lqd-custom-menu-4a9c263\" data-bs-target=\"#lqd-custom-menu-4a9c263\" data-toggle=\"collapse\" data-bs-toggle=\"collapse\" data-ld-toggle=\"true\" data-toggle-options='{ \"closeOnOutsideClick\": {\"ifNotIn\": \"#lqd-site-content\"} }'>\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<span class=\"toggle-label\">\n\t\t\t\t\t\t\t\t\t\t\t\t\tNavigheaz\u0103 la\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\n\t\t\t\t<span class=\"expander-icon ms-auto d-inline-flex\">\n\t\t\t\t\t<i class=\"lqd-icn-ess icon-ion-ios-arrow-down\"><\/i>\n\t\t\t\t<\/span>\n\t\t\t<\/span>\n\t\t\t\n\t\t\t\t\t\t\t<ul class=\"reset-ul inline-ul\" id=\"lqd-custom-menu-4a9c263\"  data-localscroll=\"true\" data-localscroll-options=\"{&quot;itemsSelector&quot;:&quot;&gt; li &gt; a&quot;,&quot;trackWindowScroll&quot;:true,&quot;includeParentAsOffset&quot;:true,&quot;offsetElements&quot;:&quot;[data-sticky-header] .lqd-head-sec-wrap:not(.lqd-hide-onstuck), #wpadminbar, body.elementor-page .main-header[data-sticky-header] &gt; .elementor &gt; .elementor-section-wrap &gt; .elementor-section:not(.lqd-hide-onstuck):not(.lqd-stickybar-wrap), body.elementor-page .main-header[data-sticky-header] &gt; .elementor &gt; .elementor-section:not(.lqd-hide-onstuck):not(.lqd-stickybar-wrap), body.elementor-page .main-header[data-sticky-header] &gt; .elementor &gt; .e-con:not(.lqd-hide-onstuck):not(.lqd-stickybar-wrap)&quot;}\">\n\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#utilitate\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty left-icon icon-next-to-label\"><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOverview\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#beneficii\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty left-icon icon-next-to-label\"><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tDescription\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#descriere\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty left-icon icon-next-to-label\"><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tDeliverables\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#recomandari\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty left-icon icon-next-to-label\"><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tDifferentiators\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#contact\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty left-icon icon-next-to-label\"><i aria-hidden=\"true\" class=\"fas fa-pen\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tContact us\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-333104d\" data-id=\"333104d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a787e02 elementor-widget elementor-widget-text-editor\" data-id=\"a787e02\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Safetech Innovations&#8217; Vulnerability Management services include identifying, assessing, and prioritizing vulnerabilities, enabling organizations to effectively manage and remediate them quickly, thus helping to reduce security risks.<\/p>\n<p>The services are delivered by a team with over 14 years of experience and are based on a well-defined methodology aligned with the best international practices.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-48c8380 beneficii elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"48c8380\" data-element_type=\"section\" data-e-type=\"section\" id=\"beneficii\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6ee94b4\" data-id=\"6ee94b4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4d9afcd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4d9afcd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-e6a2cf8\" data-id=\"e6a2cf8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-90b9f47 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"90b9f47\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e76f5d731da\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > Description of the services<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-612e702 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"612e702\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e76f5d73dd2\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > Safetech Vulnerability Management services include the following steps:<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1c8af06 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1c8af06\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a10a10e\" data-id=\"a10a10e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-51fcb5d elementor-widget elementor-widget-text-editor\" data-id=\"51fcb5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>1. Analysis<\/b><\/p>\n<p>Involves defining the scope of the vulnerability management process;<\/p>\n<p><b>2. Vulnerability scanning<\/b><\/p>\n<p>Vulnerability scanners automatically scan a system for known security vulnerabilities, providing a report of all identified vulnerabilities, sorted by criticality. One of the advanced vulnerability scanners used by Safetech Innovations is Nessus Professional; <\/p>\n<p><b>3. Identification, classification and assessment of vulnerabilities<\/b><\/p>\n<p>The identification of vulnerabilities is carried out. The calculation of the risk level of vulnerabilities is based on the international Common Vulnerability Scoring System (CVSS); <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-65ef2b2\" data-id=\"65ef2b2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b7d64d elementor-widget elementor-widget-text-editor\" data-id=\"5b7d64d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>4. Optimization and prioritization actions in remediation<\/b><\/p>\n<p>Eliminate insignificant\/false positive vulnerabilities and focus the activity on the vulnerabilities with the highest impact. Threats are prioritised according to the degree of exploitation and the consequences on the infrastructure; <\/p>\n<p><b>5. Rescanning<\/b><\/p>\n<p>Once the remediation actions have been completed, Safetech Innovations performs a rescan to verify their effectiveness.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71ee071 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71ee071\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-dae7bc7\" data-id=\"dae7bc7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7a4261a elementor-section-content-bottom elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7a4261a\" data-element_type=\"section\" data-e-type=\"section\" id=\"descriere\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-d74c6ee\" data-id=\"d74c6ee\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4c5f87c elementor-widget__width-inherit elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"4c5f87c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e76f5d799bb\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > What do you get with the Safetech Vulnerability Management service?<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d6fd9b elementor-widget elementor-widget-text-editor\" data-id=\"7d6fd9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The final product delivered by the Safetech team is a comprehensive security report, detailing the identified vulnerabilities, associated risks and remediation recommendations to improve the security of the IT infrastructure. This report includes: <\/p>\n<ul>\n<li>Details of the network and systems being evaluated (active equipment and services, type, version, status of application updates, where available, and operating system),<\/li>\n<li>Presentation of the vulnerabilities discovered (by system and according to the associated risk),<\/li>\n<li>Detailed presentation of the discovered vulnerabilities, with the ways to fix them (description of the vulnerability, cataloguing according to their severity\/risk, technical description, analysis of severity and probability, countermeasures recommended for remediation),<\/li>\n<li>Technical recommendations for fixing vulnerabilities,<\/li>\n<li>Evolution of the security level (security score),<\/li>\n<li>Analysis of the evolution of vulnerabilities,<\/li>\n<li>New vulnerabilities appeared,<\/li>\n<li>Vulnerabilities fixed and how they were fixed.<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-5524112 e-flex e-con-boxed e-con e-parent\" data-id=\"5524112\" data-element_type=\"container\" data-e-type=\"container\" id=\"recomandari\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div data-custom-animations=\"true\" data-ca-options=\"{&quot;addChildTimelines&quot;:false,&quot;trigger&quot;:&quot;firstChild&quot;,&quot;animationTarget&quot;:&quot;:scope  &gt; .elementor-element:not(.lqd-exclude-parent-ca) &gt; .elementor-widget-container, :scope  &gt; .elementor-widget-hub_fancy_heading .lqd-split-lines .lqd-lines .split-inner, :scope  &gt; .elementor-widget-hub_fancy_heading .lqd-split-words .lqd-words .split-inner, :scope  &gt; .elementor-widget-hub_fancy_heading .lqd-split-chars .lqd-chars .split-inner, :scope  &gt; .elementor-widget-hub_fancy_heading .lqd-adv-txt-fig, :scope  &gt; .elementor-widget-ld_custom_menu .lqd-fancy-menu &gt; ul &gt; li&quot;,&quot;duration&quot;:750,&quot;delay&quot;:55,&quot;ease&quot;:&quot;expo.out&quot;,&quot;initValues&quot;:{&quot;y&quot;:&quot;100px&quot;,&quot;opacity&quot;:0,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;},&quot;animations&quot;:{&quot;y&quot;:&quot;0px&quot;,&quot;opacity&quot;:1,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;}}\" class=\"elementor-element elementor-element-2294886 e-con-full e-flex e-con e-child\" data-id=\"2294886\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ea2d333 elementor-widget__width-inherit elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"ea2d333\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e76f5d7d006\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > Key differentiators. What recommends us?<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0b2cb0e elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"0b2cb0e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_0b2cb0e\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"lqd-icn-ess icon-num-1\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >In-house developed scoring system <\/h3>\t\t\t\t<p>Safetech Innovations provides organizations with its own risk calculation methodology \u2013 a unique scoring system, developed internally. It allows the assessment of vulnerabilities not only individually, but also at the level of equipment, subnetworks, services and the entire infrastructure. This way, we clearly present the real risks, and customers can make informed decisions and prioritize remediation.  <\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13c4a71 elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"13c4a71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_13c4a71\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"lqd-icn-ess icon-num-2\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Dynamic analysis of security scores <\/h3>\t\t\t\t<p>The final report provided by the Safetech Innovations team also includes the evolution and trends of the vulnerabilities. As a result, we don't limit ourselves to static scans and reports, we also offer dynamic analysis of security scores, showing trends over time, and clearly explaining why fluctuations occur. Thus, beneficiaries understand exactly where and why they need to intervene.  <\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8c3d0b2 elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"8c3d0b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_8c3d0b2\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"lqd-icn-ess icon-num-3\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Prioritization of vulnerabilities <\/h3>\t\t\t\t<p>Organizations' vulnerabilities are intelligently prioritized using an advanced classification system, based on important criteria (CVSS score, VPS score, existence of known exploits, degree of exploit usability, potential impact on the organization, etc.) This way, businesses can focus their efforts where it matters most.<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-106d571 elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"106d571\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_106d571\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"lqd-icn-ess icon-num-4\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Practical recommendations <\/h3>\t\t\t\t<p>Safetech Innovations provides practical, clear recommendations and assistance in interpreting reports. In this way, customers can easily navigate through the hundreds or thousands of detected vulnerabilities to quickly resolve the issues with the greatest impact on the organization's security. <\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-602b194 elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"602b194\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_602b194\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"lqd-icn-ess icon-num-5\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Complete visibility into risks <\/h3>\t\t\t\t<p>Through the Vulnerability Management service, Safetech scans and manages vulnerabilities in both the internal and external networks, providing a complete picture of the risks.<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0914295 elementor-section-content-middle elementor-reverse-mobile elementor-reverse-tablet elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0914295\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ae576c5\" data-id=\"ae576c5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-899c925 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"899c925\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e76f5d87f09\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > Safetech experience in vulnerability management <br><br><\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0346c07 elementor-widget elementor-widget-text-editor\" data-id=\"0346c07\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The collaboration with Safetech Innovations also offers access to a team of over 70 cybersecurity specialists and award-winning solutions from over 15 leading global manufacturers.<\/p>\n<p>Our security operations center, STI CERT, provides 24\/7\/365 coverage, operated by certified analysts (ISC)\u00b2, ISACA and EC-Council.<\/p>\n<p>With over 14 years of experience in the field, Safetech is a trusted partner for organizations in critical sectors such as financial-banking, energy, oil and gas, utilities, health, insurance, manufacturing, technology, retail, distribution and the public sector.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-d24b6ac\" data-id=\"d24b6ac\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-daabc39 elementor-widget__width-auto elementor-absolute elementor-widget-mobile__width-initial elementor-widget elementor-widget-image\" data-id=\"daabc39\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"544\" height=\"546\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/02\/simbol.png\" class=\"attachment-full size-full wp-image-2480\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/02\/simbol.png 544w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/02\/simbol-300x300.png 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/02\/simbol-150x150.png 150w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/02\/simbol-320x320.png 320w\" sizes=\"(max-width: 544px) 100vw, 544px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c48b2d9 elementor-widget__width-initial elementor-widget elementor-widget-ld_fancy_image\" data-id=\"c48b2d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_fancy_image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"lqd-imggrp-single d-block pos-rel \">\n\t\t\t<div class=\"lqd-imggrp-img-container d-inline-flex pos-rel align-items-center justify-content-center \">\n\t\t\t\t\t\t\t\t<figure class=\"w-100 pos-rel\">\n\t\t\t\t\t<img decoding=\"async\" width=\"1200\" height=\"675\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2024\/01\/shutterstock_1682600908.webp\" class=\"attachment-full size-full wp-image-21404\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2024\/01\/shutterstock_1682600908.webp 1200w, https:\/\/safetech.ro\/wp-content\/uploads\/2024\/01\/shutterstock_1682600908-300x169.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2024\/01\/shutterstock_1682600908-1024x576.webp 1024w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-01a9018 articole-pagina  elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"01a9018\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3dffb87\" data-id=\"3dffb87\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-313f521 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"313f521\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-898d530\" data-id=\"898d530\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-38f5e70 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"38f5e70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e76f5d8fc0d\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h2 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h2\"  > Similar articles<\/h2>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20b67b2 elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-card-shadow-yes elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"20b67b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;cards_columns&quot;:&quot;3&quot;,&quot;cards_columns_tablet&quot;:&quot;2&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile_extra&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-29994 post type-post status-publish format-standard has-post-thumbnail hentry category-technology-news tag-compliance tag-efficiency-improvement tag-nis-en tag-proofpoint-en tag-risk-management tag-systems-integration\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/safetech.ro\/en\/intelligent-human-risk-management-with-proofpoint-solutions\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"1536\" height=\"1024\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Proofpoint.webp\" class=\"attachment-full size-full wp-image-29986\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Proofpoint.webp 1536w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Proofpoint-300x200.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Proofpoint-1024x683.webp 1024w\" sizes=\"(max-width: 1536px) 100vw, 1536px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/safetech.ro\/en\/intelligent-human-risk-management-with-proofpoint-solutions\/\" >\n\t\t\t\tIntelligent Human Risk Management with Proofpoint Solutions\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tMarch 24, 2026\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-29956 post type-post status-publish format-standard has-post-thumbnail hentry category-company-news category-technology-news tag-compliance tag-efficiency-improvement tag-proofpoint-en tag-systems-integration\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/safetech.ro\/en\/safetech-proofpoint-webinar-rethinking-cybersecurity-from-the-perspective-of-human-risk\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"900\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Picture1-1.webp\" class=\"attachment-full size-full wp-image-29940\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Picture1-1.webp 1600w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Picture1-1-300x169.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Picture1-1-1024x576.webp 1024w\" sizes=\"(max-width: 1600px) 100vw, 1600px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/safetech.ro\/en\/safetech-proofpoint-webinar-rethinking-cybersecurity-from-the-perspective-of-human-risk\/\" >\n\t\t\t\tSafetech Proofpoint Webinar: From Inbox to Incident \u2014 Rethinking Cybersecurity from the Perspective of Human Risk\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tMarch 12, 2026\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-29856 post type-post status-publish format-standard has-post-thumbnail hentry category-technology-news tag-compliance tag-efficiency-improvement tag-nis-en tag-risk-management\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/safetech.ro\/en\/the-grc-framework-transforms-nis2-requirements-into-resilience-and-sustainable-cybersecurity\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"675\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/GRC.webp\" class=\"attachment-full size-full wp-image-29681\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/GRC.webp 1200w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/GRC-300x169.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/GRC-1024x576.webp 1024w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/safetech.ro\/en\/the-grc-framework-transforms-nis2-requirements-into-resilience-and-sustainable-cybersecurity\/\" >\n\t\t\t\tThe GRC framework transforms NIS2 requirements into resilience and sustainable cybersecurity\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tFebruary 19, 2026\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-29782 post type-post status-publish format-standard has-post-thumbnail hentry category-company-news tag-compliance tag-risk-management tag-safetech-results tag-security-testing\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/safetech.ro\/en\/safetech-innovations-achieves-crest-accreditation-for-penetration-testing\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1280\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/02\/2372476939_1.jpg\" class=\"attachment-full size-full wp-image-29774\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/02\/2372476939_1.jpg 1920w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/02\/2372476939_1-300x200.jpg 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/02\/2372476939_1-1024x683.jpg 1024w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/safetech.ro\/en\/safetech-innovations-achieves-crest-accreditation-for-penetration-testing\/\" >\n\t\t\t\tSafetech Innovations achieves CREST accreditation for its Penetration Testing services\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tFebruary 11, 2026\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-29678 post type-post status-publish format-standard has-post-thumbnail hentry category-case-studies tag-compliance tag-consulting tag-grc-en tag-nis-en tag-outsourcing tag-risk-management\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/safetech.ro\/en\/case-study-grc-safetech-profi\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"675\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/GRC.webp\" class=\"attachment-full size-full wp-image-29681\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/GRC.webp 1200w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/GRC-300x169.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/GRC-1024x576.webp 1024w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/safetech.ro\/en\/case-study-grc-safetech-profi\/\" >\n\t\t\t\tCase Study &#8211; Safetech GRC services for Profi\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tJanuary 21, 2026\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-29692 post type-post status-publish format-standard has-post-thumbnail hentry category-case-studies tag-cert-en tag-monitoring-and-response\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/safetech.ro\/en\/case-study-safetech-ransomware-critical-incident-response\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"1258\" height=\"840\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/Untitled.webp\" class=\"attachment-full size-full wp-image-29687\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/Untitled.webp 1258w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/Untitled-300x200.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/Untitled-1024x684.webp 1024w\" sizes=\"(max-width: 1258px) 100vw, 1258px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/safetech.ro\/en\/case-study-safetech-ransomware-critical-incident-response\/\" >\n\t\t\t\tCase Study &#8211; STI CERT Response to a Ransomware Critical Incident\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tJanuary 21, 2026\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-09ddb02 elementor-align-center elementor-widget elementor-widget-ld_button\" data-id=\"09ddb02\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<a\n\t\t\t\thref=\"https:\/\/safetech.ro\/blog\/\"class=\"elementor-button btn btn-solid btn-hover-txt-switch btn-hover-txt-switch-y btn-xsm btn-icon-right btn-icon-circle btn-icon-custom-size btn-icon-shaped btn-icon-solid btn-has-label\"\t\t\t>\n\t\t\t\t\t\t\t\t\t<span data-text=\"SEE ALL ARTICLES\" class=\"btn-txt\" data-transition-delay=\"true\" data-delay-options=\"{&quot;elements&quot;: &quot;.lqd-chars&quot;, &quot;delayType&quot;: &quot;animation&quot;, &quot;startDelay&quot;: 0, &quot;delayBetween&quot;: 32.5}\" data-split-text=\"true\" data-split-options=\"{&quot;type&quot;: &quot;chars, words&quot;}\">\n\t\t\t\t\t\tSEE ALL ARTICLES\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"btn-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"lqd-icn-ess icon-ion-ios-arrow-forward\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fb6d2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fb6d2\" data-element_type=\"section\" data-e-type=\"section\" id=\"contact\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9502df9\" data-id=\"9502df9\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-057fd34 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"057fd34\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-2800337\" data-id=\"2800337\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-83afd55 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"83afd55\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69e76f5d9f3c8\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h2 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h2\"  > Contact us<\/h2>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a47eba elementor-widget elementor-widget-ld_cf722\" data-id=\"7a47eba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_cf722.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t<div class=\"lqd-contact-form lqd-contact-form-inputs-underlined      lqd-contact-form-button-circle  \">\n\t\t\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f11788-o1\" lang=\"ro-RO\" dir=\"ltr\" data-wpcf7-id=\"11788\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/pages\/27264#wpcf7-f11788-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Formular de contact\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"11788\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"ro_RO\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f11788-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/fieldset>\n<div class=\"row\">\n\t<div class=\"col-md-6\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"text-438\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Full name\" value=\"\" type=\"text\" name=\"text-438\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"col-md-6\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"email-873\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"E-mail\" value=\"\" type=\"email\" name=\"email-873\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"col-md-6\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"text-448\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Subject\" value=\"\" type=\"text\" name=\"text-448\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"col-md-6\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"tel-969\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Phone\" value=\"\" type=\"tel\" name=\"tel-969\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"col-md-12\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"textarea-601\"><textarea cols=\"10\" rows=\"4\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Message\" name=\"textarea-601\"><\/textarea><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"col-md-12\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"acceptance-120\"><span class=\"wpcf7-form-control wpcf7-acceptance\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"acceptance-120\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\">I have read the &nbsp; <a href=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/08\/INFORMARE-GENERALA-PRIVIND-PRELUCRAREA-DCP-EN.pdf\" target=\"_blank\">  notification regarding the processing of personal data<\/a>.<\/span><\/label><\/span><\/span><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div style=\"text-align: center; margin-top: 25px;\" class=\"col-md-12\">\n\t\t<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Send\" \/>\n\t\t<\/p>\n\t<\/div>\n<\/div><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Home Safetech Vulnerability Management Professional services for identifying, classifying, and proactively remediating vulnerabilities in the IT infrastructure Navigheaz\u0103 la Overview Description Deliverables Differentiators Contact us<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":27319,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-27264","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages\/27264","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/comments?post=27264"}],"version-history":[{"count":22,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages\/27264\/revisions"}],"predecessor-version":[{"id":27558,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages\/27264\/revisions\/27558"}],"up":[{"embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages\/27319"}],"wp:attachment":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/media?parent=27264"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}