{"id":27414,"date":"2025-03-24T13:23:44","date_gmt":"2025-03-24T11:23:44","guid":{"rendered":"https:\/\/safetech.ro\/solutions\/threat-and-breach-intelligence\/kela-external-threat-exposure-reduction\/"},"modified":"2025-03-25T12:09:33","modified_gmt":"2025-03-25T10:09:33","slug":"kela-external-threat-exposure-reduction","status":"publish","type":"page","link":"https:\/\/safetech.ro\/en\/solutions\/threat-and-breach-intelligence\/kela-external-threat-exposure-reduction\/","title":{"rendered":"KELA External Threat Exposure Reduction"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"27414\" class=\"elementor elementor-27414 elementor-27395\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3b562c1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3b562c1\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ddd61ce\" data-id=\"ddd61ce\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d232966 elementor-widget elementor-widget-ld_breadcrumb\" data-id=\"d232966\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_breadcrumb.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"lqd-breadcrumb-wrapper\"><nav role=\"navigation\" aria-label=\"Breadcrumbs\" class=\"breadcrumbs\"><ol class=\"breadcrumb reset-ul inline-nav inline-ul comma-sep-li\"><li class=\"breadcrumb-item active\"><a href=\"https:\/\/safetech.ro\/en\/\" rel=\"home\"><span>Home<\/span><\/a><\/li><\/ol><\/nav><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-97411d3 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"97411d3\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3a3b3ef\" data-id=\"3a3b3ef\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d27c8af elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"d27c8af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f64112e044e\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h1 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h1\"  > KELA External Threat Exposure Reduction<\/h1>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec45bc0 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"ec45bc0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f64112e0d20\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h4 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h4\"  > Cyber Threat Intelligence solution for proactive, continuous protection<\/h4>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e92d69a elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"e92d69a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f64112e141b\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > The KELA Cyber Threat Intelligence platform enables organizations to proactively identify and eliminate cyber threats, data leaks, and vulnerabilities. The solution automatically collects data, analyzes, and monitors emerging threats. Based on a huge volume of historical data held by KELA, the solution enables a complete cyber threat intelligence (CTI) approach to preventing cyberattacks, supported by advanced analytics and real-time alerts.   <\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a3b4c7 elementor-widget elementor-widget-spacer\" data-id=\"3a3b4c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0e01abb\" data-id=\"0e01abb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3e3ad88 elementor-widget__width-auto elementor-widget elementor-widget-ld_fancy_image\" data-id=\"3e3ad88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_fancy_image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"lqd-imggrp-single d-block pos-rel \">\n\t\t\t<div class=\"lqd-imggrp-img-container d-inline-flex pos-rel align-items-center justify-content-center \">\n\t\t\t\t\t\t\t\t<figure class=\"w-100 pos-rel\">\n\t\t\t\t\t<img decoding=\"async\" width=\"335\" height=\"85\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2025\/03\/KELA-Logo_black-and-red-1.png\" class=\"attachment-full size-full wp-image-27398\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2025\/03\/KELA-Logo_black-and-red-1.png 335w, https:\/\/safetech.ro\/wp-content\/uploads\/2025\/03\/KELA-Logo_black-and-red-1-300x76.png 300w\" sizes=\"(max-width: 335px) 100vw, 335px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1c3dbac elementor-hidden-tablet elementor-hidden-mobile_extra elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1c3dbac\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5a54286\" data-id=\"5a54286\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-304e1ce elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"304e1ce\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-fa2ce92\" data-id=\"fa2ce92\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a6b678d meniu-iot elementor-hidden-mobile_extra elementor-hidden-mobile elementor-widget elementor-widget-ld_custom_menu\" data-id=\"a6b678d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;sticky&quot;:&quot;yes&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile_extra&quot;,&quot;mobile&quot;],&quot;sticky_offset&quot;:0,&quot;sticky_effects_offset&quot;:0,&quot;sticky_anchor_link_offset&quot;:0}\" data-widget_type=\"ld_custom_menu.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div\t\t\t\tclass=\"lqd-fancy-menu lqd-custom-menu pos-abs menu-items-has-fill center lqd-menu-td-none lqd-sticky-menu lqd-sticky-menu-floating\"\n\t\t\t\t\t\t\t\t\tdata-inview=\"true\"\n\t\t\t\t\tdata-inview-options='{ \"toggleBehavior\": \"toggleInView\" }'\n\t\t\t\t\t\t\t>\n\t\t\t\n\t\t\t\t\t\t\t<ul class=\"reset-ul inline-ul\" id=\"lqd-custom-menu-a6b678d\"  data-localscroll=\"true\" data-localscroll-options=\"{&quot;itemsSelector&quot;:&quot;&gt; li &gt; a&quot;,&quot;trackWindowScroll&quot;:true,&quot;includeParentAsOffset&quot;:true,&quot;offsetElements&quot;:&quot;[data-sticky-header] .lqd-head-sec-wrap:not(.lqd-hide-onstuck), #wpadminbar, body.elementor-page .main-header[data-sticky-header] &gt; .elementor &gt; .elementor-section-wrap &gt; .elementor-section:not(.lqd-hide-onstuck):not(.lqd-stickybar-wrap), body.elementor-page .main-header[data-sticky-header] &gt; .elementor &gt; .elementor-section:not(.lqd-hide-onstuck):not(.lqd-stickybar-wrap), body.elementor-page .main-header[data-sticky-header] &gt; .elementor &gt; .e-con:not(.lqd-hide-onstuck):not(.lqd-stickybar-wrap)&quot;}\">\n\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#prezentare\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty left-icon icon-next-to-label\"><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOverview\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#functionalitati\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty left-icon icon-next-to-label\"><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tAvailable modules\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#beneficii\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty left-icon icon-next-to-label\"><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tBenefits\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#servicii\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty left-icon icon-next-to-label\"><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSafetech Services\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#contact\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty left-icon icon-next-to-label\"><i aria-hidden=\"true\" class=\"fas fa-pen\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tContact us\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ed51995 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ed51995\" data-element_type=\"section\" data-e-type=\"section\" id=\"prezentare\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-43da2e9\" data-id=\"43da2e9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div data-parallax=\"true\" data-parallax-options=\"{&quot;ease&quot;:[&quot;linear&quot;],&quot;start&quot;:&quot;top bottom&quot;,&quot;end&quot;:&quot;bottom+=0px top&quot;}\" data-parallax-from=\"{&quot;y&quot;:&quot;135px&quot;,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;}\" data-parallax-to=\"{&quot;y&quot;:&quot;-85px&quot;,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;}\" class=\"elementor-element elementor-element-2d4cb10 elementor-widget__width-initial elementor-hidden-mobile elementor-widget elementor-widget-ld_fancy_image\" data-id=\"2d4cb10\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_fancy_image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"lqd-imggrp-single d-block pos-rel \" data-shadow-style=\"3\" data-inview=\"true\" data-animate-shadow=\"true\">\n\t\t\t<div class=\"lqd-imggrp-img-container d-inline-flex pos-rel align-items-center justify-content-center \">\n\t\t\t\t\t\t\t\t<figure class=\"w-100 pos-rel\">\n\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1200\" height=\"675\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/07\/shutterstock_1798109140-1.jpg\" class=\"attachment-full size-full wp-image-8217\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/07\/shutterstock_1798109140-1.jpg 1200w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/07\/shutterstock_1798109140-1-300x169.jpg 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/07\/shutterstock_1798109140-1-1024x576.jpg 1024w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-parallax=\"true\" data-parallax-options=\"{&quot;ease&quot;:[&quot;linear&quot;],&quot;start&quot;:&quot;top bottom&quot;,&quot;end&quot;:&quot;bottom+=0px top&quot;}\" data-parallax-from=\"{&quot;y&quot;:&quot;55px&quot;,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;}\" data-parallax-to=\"{&quot;y&quot;:&quot;-65px&quot;,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;}\" class=\"elementor-element elementor-element-9c62ffe elementor-widget__width-initial elementor-absolute elementor-hidden-mobile elementor-hidden-mobile_extra elementor-hidden-tablet elementor-widget elementor-widget-ld_fancy_image\" data-id=\"9c62ffe\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"ld_fancy_image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"lqd-imggrp-single d-block pos-rel \" data-shadow-style=\"3\" data-inview=\"true\" data-animate-shadow=\"true\">\n\t\t\t<div class=\"lqd-imggrp-img-container d-inline-flex pos-rel align-items-center justify-content-center \">\n\t\t\t\t\t\t\t\t<figure class=\"w-100 pos-rel\">\n\t\t\t\t\t<img decoding=\"async\" width=\"1200\" height=\"886\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/08\/shutterstock_1102775957.jpg\" class=\"attachment-full size-full wp-image-13953\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/08\/shutterstock_1102775957.jpg 1200w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/08\/shutterstock_1102775957-300x222.jpg 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2023\/08\/shutterstock_1102775957-1024x756.jpg 1024w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-7f535b9\" data-id=\"7f535b9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1cae5bf elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"1cae5bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f64112ed0fa\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > Solution overview<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b8201fb elementor-widget elementor-widget-text-editor\" data-id=\"b8201fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The KELA Cyber Threat Intelligence platform offers extensive attack surface and asset management capabilities. It provides alerts on targeted threats to the organization, analyzing the attackers&#8217; perspectives on the organization&#8217;s external infrastructure to identify exploitable vulnerabilities. SOC teams benefit from automatic proactive detection and automatic surveillance of potentially compromised IPs and domains involved in cybercrime activities. The solution also provides protection against compromised accounts.   <\/p>\n<p>By centralizing attacker information from multiple web sources, the KELA Cyber Threat Intelligence platform facilitates detailed investigations, providing security analysts with essential tools for threat hunting and deepening cyber investigations. The solution provides contextualized security intelligence, highlighting the connections between threats and attackers and providing decision-makers with a clear picture of the ever-changing cybercrime ecosystem. The intuitive interface and concise summaries allow for quick and efficient risk analysis, supporting organizations in adopting proactive security measures.  <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-743a834 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"743a834\" data-element_type=\"section\" data-e-type=\"section\" id=\"functionalitati\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div data-custom-animations=\"true\" data-ca-options=\"{&quot;addChildTimelines&quot;:false,&quot;trigger&quot;:&quot;firstChild&quot;,&quot;animationTarget&quot;:&quot;:scope &gt; .elementor-widget-wrap &gt; .elementor-element &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-section &gt; .elementor-container &gt; .elementor-column &gt; .elementor-widget-wrap &gt; .elementor-element:not(.lqd-el-has-inner-anim) &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-lines .lqd-lines .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-words .lqd-words .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-chars .lqd-chars .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-ld_custom_menu .lqd-fancy-menu &gt; ul &gt; li&quot;,&quot;startDelay&quot;:300,&quot;ease&quot;:[&quot;power4.out&quot;],&quot;initValues&quot;:{&quot;y&quot;:&quot;40px&quot;,&quot;opacity&quot;:0,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;},&quot;animations&quot;:{&quot;y&quot;:&quot;0px&quot;,&quot;opacity&quot;:1,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;}}\" class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3dfd044\" data-id=\"3dfd044\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e24c875 elementor-widget__width-inherit elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"e24c875\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f64112eeb09\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > Available modules<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e48d10 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"5e48d10\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f64112ef18b\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > KELA Cyber Threat Intelligence allows you to choose exactly the functionalities you need, based on the following modules:<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-00d35b7 elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"00d35b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_00d35b7\" class=\"iconbox d-flex flex-grow-1 pos-rel z-index-2 iconbox-side iconbox-icon-shaped iconbox-circle iconbox-icon-linked\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  pos-rel\"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"fas fa-chevron-circle-right\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Identity Guard <\/h3>\t\t\t\t<p>The module provides extensive monitoring of sources (illegal Dark Web marketplaces, cybercrime forums, instant messaging, and bot marketplaces), and complete, real-time Asset Discovery capabilities (domains, IPs and SaaS resources of organizations). By using the module, you receive real-time alerts about compromised assets and credentials, with automatic prioritization of critical alerts for remediation.  <\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3f4ed7 elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"e3f4ed7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_e3f4ed7\" class=\"iconbox d-flex flex-grow-1 pos-rel z-index-2 iconbox-side iconbox-icon-shaped iconbox-circle iconbox-icon-linked\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  pos-rel\"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"fas fa-chevron-circle-right\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Monitor <\/h3>\t\t\t\t<p>The module alerts about threats directed against the organization, maintaining a proactive network defense. By using it, you automatically track and receive immediate notifications about threats to company assets. Thus, you can customize your organization's external threat landscape and receive specific remediation recommendations.  <\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57ba2b6 elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"57ba2b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_57ba2b6\" class=\"iconbox d-flex flex-grow-1 pos-rel z-index-2 iconbox-side iconbox-icon-shaped iconbox-circle iconbox-icon-linked\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  pos-rel\"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"fas fa-chevron-circle-right\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Investigate <\/h3>\t\t\t\t<p>Investigate and analyze threats, targets, themes, and groups, anonymously and in real-time. The investigate module helps analysts successfully perform threat hunting by providing contextualized information about attackers' tactics, techniques, and procedures (TTPs), their profiles and identities, hacking discussions, etc. Access information from a variety of sources, directly from the KELA Security Data Lake. Search raw data in over 100 languages and automatically translate the results.   <\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7cdd359 elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"7cdd359\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_7cdd359\" class=\"iconbox d-flex flex-grow-1 pos-rel z-index-2 iconbox-side iconbox-icon-shaped iconbox-circle iconbox-icon-linked\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  pos-rel\"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"fas fa-chevron-circle-right\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Threat Actors <\/h3>\t\t\t\t<p>Get detailed information about threat actors: their motivations, areas of activity, location. nicknames, contact details, and more. Simplify investigations using the Advanced Search algorithm and conduct detailed research through advanced filtering to identify actors that pose potential threats to the organization. Benefit from KELA Cyber Intelligence Center's recommendations on emerging and high-priority threat actors.   <\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd91451 elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"bd91451\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_bd91451\" class=\"iconbox d-flex flex-grow-1 pos-rel z-index-2 iconbox-side iconbox-icon-shaped iconbox-circle iconbox-icon-linked\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  pos-rel\"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"fas fa-chevron-circle-right\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Threat Landscape <\/h3>\t\t\t\t<p>The module provides high-level insights into the dynamic cybercrime ecosystem, including dashboards for the most important trends, daily benchmarks, and information feeds curated by KELA's cyber intelligence experts. The module includes information on ransomware events, network access rights offered for sale, leaked databases, and emerging threats across sectors. Benefit from effective strategic information to make informed decisions.  <\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50b06d3 elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"50b06d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_50b06d3\" class=\"iconbox d-flex flex-grow-1 pos-rel z-index-2 iconbox-side iconbox-icon-shaped iconbox-circle iconbox-icon-linked\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  pos-rel\"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"fas fa-chevron-circle-right\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Technical Intelligence <\/h3>\t\t\t\t<p>The module continuously collects and analyzes data from the underground cybercrime environment, detecting potentially compromised assets based on the context and credibility of the source. This information is normalized and shared through the KELA API in a structured, machine-readable format. Use the module to proactively monitor or block access to these assets, effectively managing potential risks.  <\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b5bfca8 elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"b5bfca8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_b5bfca8\" class=\"iconbox d-flex flex-grow-1 pos-rel z-index-2 iconbox-side iconbox-icon-shaped iconbox-circle iconbox-icon-linked\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  pos-rel\"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><i aria-hidden=\"true\" class=\"fas fa-chevron-circle-right\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Third-Party Risk Management (TPRM) <\/h3>\t\t\t\t<p>The module provides advanced security solutions for monitoring, assessing, and managing risks associated with third-party suppliers in the supply chain. It allows for rapid integration of suppliers by identifying and cataloging the digital assets associated with them. The module collects and analyzes Threat Intelligence Exposure, Attack Surface Management and Technical Intelligence data. Using a proprietary algorithm, it calculates risk scores for each provider, giving you a complete picture of their relationships with them.   <\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-37497ab e-flex e-con-boxed e-con e-parent\" data-id=\"37497ab\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-162bcbc elementor-widget elementor-widget-image\" data-id=\"162bcbc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"495\" height=\"422\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2025\/03\/Group-1171275703.png\" class=\"attachment-full size-full wp-image-27401\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2025\/03\/Group-1171275703.png 495w, https:\/\/safetech.ro\/wp-content\/uploads\/2025\/03\/Group-1171275703-300x256.png 300w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c2ef0b8 beneficii elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c2ef0b8\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8645bd2\" data-id=\"8645bd2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-54b9742 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"54b9742\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-33683bc\" data-id=\"33683bc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9f8981f elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"9f8981f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f6411307c27\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > Use Cases<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a7d632 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"3a7d632\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f6411308333\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > Organizations around the world use the KELA Cyber Threat Intelligence platform for the following activities:<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f542a4a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f542a4a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a839a4c\" data-id=\"a839a4c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-46bcf43 elementor-widget elementor-widget-text-editor\" data-id=\"46bcf43\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>1. Threat Intelligence: <\/b><\/p>\n<p>Anticipating potential threats by monitoring the behavior and activities of dangerous cyber entities relevant to the organization&#8217;s industry or sector. KELA&#8217;s &#8220;Threat Actors&#8221; module provides detailed investigations into cybercriminals, analyzing web signatures, online identities, and other complex details. <\/p>\n<p><b>2. Third-party Intelligence:<\/b><\/p>\n<p>Identifying risks in the supply chain and attack surface. The module obtains relevant information, monitors and prioritizes high-risk suppliers and allows for rapid action: recommendations for remedial measures or interruption of collaboration, depending on the situation. <\/p>\n<p><b>3. Vulnerability Intelligence:<\/b><\/p>\n<p>Vulnerability intelligence collection, breach analysis, threat monitoring, and impact prioritization. The module allows the identification of emerging vulnerabilities, the automation of monitoring, the detection of weaknesses in the network and the prevention of unauthorized access. <\/p>\n<p><b>4. Cybercrime Attack Surface Visibility:<\/b><\/p>\n<p>Discovering the attack surface of the organization from the perspective of the attackers. The module analyzes how adversaries perceive your company, in order to fully understand the risks and prioritize security measures effectively. <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-389f4da\" data-id=\"389f4da\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-09cfbee elementor-widget elementor-widget-text-editor\" data-id=\"09cfbee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>5. Identity theft protection:<\/b><\/p>\n<p>Customizing proactive credential theft protection. The module identifies compromised accounts, including those from SaaS platforms, performs a classification based on severity, and allows for quick integration with webhooks for immediate reactions. <\/p>\n<p><b>6. Fraud detection:<\/b><\/p>\n<p>Combating digital fraud involving online payments, chargebacks, bank cards, loyalty programs, and more. The module helps to proactively defend against fraudulent schemes, before they affect the organization. <\/p>\n<p><b>7. Brand protection:<\/b><\/p>\n<p>Uncovering essential information about your brand throughout the cybercrime underground. The module allows you to get a complete picture and facilitates quick action. <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-9c81c66 e-flex e-con-boxed e-con e-parent\" data-id=\"9c81c66\" data-element_type=\"container\" data-e-type=\"container\" id=\"beneficii\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div data-custom-animations=\"true\" data-ca-options=\"{&quot;addChildTimelines&quot;:false,&quot;trigger&quot;:&quot;firstChild&quot;,&quot;animationTarget&quot;:&quot;:scope  &gt; .elementor-element:not(.lqd-exclude-parent-ca) &gt; .elementor-widget-container, :scope  &gt; .elementor-widget-hub_fancy_heading .lqd-split-lines .lqd-lines .split-inner, :scope  &gt; .elementor-widget-hub_fancy_heading .lqd-split-words .lqd-words .split-inner, :scope  &gt; .elementor-widget-hub_fancy_heading .lqd-split-chars .lqd-chars .split-inner, :scope  &gt; .elementor-widget-hub_fancy_heading .lqd-adv-txt-fig, :scope  &gt; .elementor-widget-ld_custom_menu .lqd-fancy-menu &gt; ul &gt; li&quot;,&quot;duration&quot;:750,&quot;delay&quot;:55,&quot;ease&quot;:&quot;expo.out&quot;,&quot;initValues&quot;:{&quot;y&quot;:&quot;100px&quot;,&quot;opacity&quot;:0,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;},&quot;animations&quot;:{&quot;y&quot;:&quot;0px&quot;,&quot;opacity&quot;:1,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;}}\" class=\"elementor-element elementor-element-18cbf15 e-con-full e-flex e-con e-child\" data-id=\"18cbf15\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ac68fc5 elementor-widget__width-inherit elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"ac68fc5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f641130ddd9\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > Main benefits of the solution<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-160ef74 elementor-widget__width-inherit elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"160ef74\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f641130e4b0\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > KELA Cyber Threat Intelligence offers the following benefits:<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1244295 elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"1244295\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_1244295\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><?xml version=\"1.0\" encoding=\"UTF-8\"?> <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10\" height=\"10\" viewBox=\"0 0 10 10\"><circle cx=\"5\" cy=\"5\" r=\"5\"><\/circle><\/svg> <\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Centralized data visualization <\/h3>\t\t\t\t<p>Access all available information in a unified hub, gaining a clear view of the entire external attack surface.<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b3b9cb6 elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"b3b9cb6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_b3b9cb6\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><?xml version=\"1.0\" encoding=\"UTF-8\"?> <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10\" height=\"10\" viewBox=\"0 0 10 10\"><circle cx=\"5\" cy=\"5\" r=\"5\"><\/circle><\/svg> <\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Stopping the #1 cause of cyberattacks <\/h3>\t\t\t\t<p>Intercept compromised employee and customer identities with access to KELA's ever-expanding data lake, which comprises billions of compromised credentials, updated in real time.<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c709d8c elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"c709d8c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_c709d8c\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><?xml version=\"1.0\" encoding=\"UTF-8\"?> <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10\" height=\"10\" viewBox=\"0 0 10 10\"><circle cx=\"5\" cy=\"5\" r=\"5\"><\/circle><\/svg> <\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Proactive risk management <\/h3>\t\t\t\t<p>Anticipate threats and prioritize responses using KELA's predictive risk scoring. Automatically identify critical vulnerabilities and gain actionable insights to improve remediation efforts. <\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-759a671 elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"759a671\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_759a671\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><?xml version=\"1.0\" encoding=\"UTF-8\"?> <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10\" height=\"10\" viewBox=\"0 0 10 10\"><circle cx=\"5\" cy=\"5\" r=\"5\"><\/circle><\/svg> <\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Effortless integration and automation <\/h3>\t\t\t\t<p>Streamline security operations by easily and intuitively integrating with your organization's tools and processes that support automating account resets, changing passwords, and enforcing multi-factor authentication (MFA) for existing security personnel.<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9029ca8 elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"9029ca8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_9029ca8\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><?xml version=\"1.0\" encoding=\"UTF-8\"?> <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10\" height=\"10\" viewBox=\"0 0 10 10\"><circle cx=\"5\" cy=\"5\" r=\"5\"><\/circle><\/svg> <\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Immediate return on investment <\/h3>\t\t\t\t<p>Deploy quickly with self-service asset configuration, receive prioritized alerts for remediation in minutes, for a quick Return on Investment (ROI).<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-221d057 elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"221d057\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_221d057\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><?xml version=\"1.0\" encoding=\"UTF-8\"?> <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10\" height=\"10\" viewBox=\"0 0 10 10\"><circle cx=\"5\" cy=\"5\" r=\"5\"><\/circle><\/svg> <\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Total anonymity and secure search <\/h3>\t\t\t\t<p>The Investigate module works as an anonymous proxy that allows you to search and access various sources in the cybercrime underground in real-time without violating security or compliance policies and without attracting unwanted attention.<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-db325d5 elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"db325d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_db325d5\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><?xml version=\"1.0\" encoding=\"UTF-8\"?> <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10\" height=\"10\" viewBox=\"0 0 10 10\"><circle cx=\"5\" cy=\"5\" r=\"5\"><\/circle><\/svg> <\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Multi-user communication <\/h3>\t\t\t\t<p>Status filtering and a messaging dashboard make it easier for multi-user organizations to communicate.<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-73c770d elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"73c770d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_73c770d\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><?xml version=\"1.0\" encoding=\"UTF-8\"?> <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10\" height=\"10\" viewBox=\"0 0 10 10\"><circle cx=\"5\" cy=\"5\" r=\"5\"><\/circle><\/svg> <\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Real-time updates <\/h3>\t\t\t\t<p>Protect your organization by receiving real-time updates on compromised IPs and domains mentioned in cybercrime activities. Stay one step ahead of potential attacks by taking proactive action. <\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7934e1a elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"7934e1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_7934e1a\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side iconbox-icon-shaped iconbox-circle\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex pos-rel z-index-1 border-radius-circle\"><?xml version=\"1.0\" encoding=\"UTF-8\"?> <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10\" height=\"10\" viewBox=\"0 0 10 10\"><circle cx=\"5\" cy=\"5\" r=\"5\"><\/circle><\/svg> <\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >AI Profiler <\/h3>\t\t\t\t<p>Use the advanced capabilities of KELA AI to generate advanced summaries of threat actors, with a single click.<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a0a82e1 e-flex e-con-boxed e-con e-parent\" data-id=\"a0a82e1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0963fb1 elementor-widget elementor-widget-image\" data-id=\"0963fb1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"693\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2025\/03\/tour.webp\" class=\"attachment-full size-full wp-image-27403\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2025\/03\/tour.webp 1600w, https:\/\/safetech.ro\/wp-content\/uploads\/2025\/03\/tour-300x130.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2025\/03\/tour-1024x444.webp 1024w\" sizes=\"(max-width: 1600px) 100vw, 1600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cc4db6e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cc4db6e\" data-element_type=\"section\" data-e-type=\"section\" id=\"servicii\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d58946a\" data-id=\"d58946a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3e93264 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3e93264\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-1e1d15e\" data-id=\"1e1d15e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2522220 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"2522220\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f641137b1c6\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > Services provided by Safetech Innovations<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-67bd72b elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"67bd72b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f641137b8b0\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > Safetech Innovations ensures the efficient configuration and use of the modules in the KELA Cyber Threat Intelligence platform, both independently and within a complex security architecture, along with complementary solutions. <br><br> Our services include requirements analysis and platform configuration, either in salf-managed mode by the client, or in MSSP mode, through Safetech STI CERT services.<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5ea9561 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5ea9561\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-d620905\" data-id=\"d620905\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-115f023 elementor-widget elementor-widget-shortcode\" data-id=\"115f023\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"section\" data-elementor-id=\"21229\" class=\"elementor elementor-21229 elementor-21226 elementor-21226\" data-elementor-post-type=\"elementor_library\">\n\t\t\t<div class=\"elementor-element elementor-element-e1e2a0a e-flex e-con-boxed e-con e-parent\" data-id=\"e1e2a0a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-54a4b57 elementor-widget elementor-widget-text-editor\" data-id=\"54a4b57\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Safetech Innovations is one of the most experienced cyber security companies in Romania. We have 14 years of activity and over 600 completed projects in this field for clients from multiple economic sectors.<\/p><p>Currently, Safetech Innovations employs over 70 employees, of which 40 are members of the technical team.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ee952f1 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"ee952f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f6411380cdc\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > By using Safetech's implementation and support services, you reduce deployment risks, and benefit from customization, scalability, and flexibility, as well as ongoing post-deployment support.<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d5d60dc articole-pagina  elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d5d60dc\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a818adc\" data-id=\"a818adc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-825a71f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"825a71f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-eaad2f8\" data-id=\"eaad2f8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b34d49b elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"b34d49b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f641138279d\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > Similar articles<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f9ee2a elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-card-shadow-yes elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"2f9ee2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;cards_columns&quot;:&quot;3&quot;,&quot;cards_columns_tablet&quot;:&quot;2&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile_extra&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-30292 post type-post status-publish format-standard has-post-thumbnail hentry category-company-news category-technology-news tag-compliance tag-efficiency-improvement tag-proofpoint-en tag-systems-integration\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/safetech.ro\/en\/webinar-next-gen-security-operations-with-stellar-cyber-and-safetech\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"1672\" height=\"941\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/04\/webinar-Stellar-Cyber-1.webp\" class=\"attachment-full size-full wp-image-30291\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/04\/webinar-Stellar-Cyber-1.webp 1672w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/04\/webinar-Stellar-Cyber-1-300x169.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/04\/webinar-Stellar-Cyber-1-1024x576.webp 1024w\" sizes=\"(max-width: 1672px) 100vw, 1672px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/safetech.ro\/en\/webinar-next-gen-security-operations-with-stellar-cyber-and-safetech\/\" >\n\t\t\t\tWebinar: Next Gen Security Operations with Stellar Cyber and Safetech Innovations\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tApril 29, 2026\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-30276 post type-post status-publish format-standard has-post-thumbnail hentry category-technology-news tag-compliance tag-efficiency-improvement tag-nis-en tag-proofpoint-en tag-risk-management tag-systems-integration\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/safetech.ro\/en\/strengthening-ot-security-and-alignment-to-nis2-with-radiflow360-and-safetech\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"768\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/04\/Radiflow360-1.webp\" class=\"attachment-full size-full wp-image-30268\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/04\/Radiflow360-1.webp 1280w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/04\/Radiflow360-1-300x180.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/04\/Radiflow360-1-1024x614.webp 1024w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/safetech.ro\/en\/strengthening-ot-security-and-alignment-to-nis2-with-radiflow360-and-safetech\/\" >\n\t\t\t\tStrengthening OT Security and alignment to NIS2 with advanced Radiflow360 solutions and Safetech expertise\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tApril 26, 2026\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-29994 post type-post status-publish format-standard has-post-thumbnail hentry category-technology-news tag-compliance tag-efficiency-improvement tag-nis-en tag-proofpoint-en tag-risk-management tag-systems-integration\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/safetech.ro\/en\/intelligent-human-risk-management-with-proofpoint-solutions\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"1536\" height=\"1024\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Proofpoint.webp\" class=\"attachment-full size-full wp-image-29986\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Proofpoint.webp 1536w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Proofpoint-300x200.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Proofpoint-1024x683.webp 1024w\" sizes=\"(max-width: 1536px) 100vw, 1536px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/safetech.ro\/en\/intelligent-human-risk-management-with-proofpoint-solutions\/\" >\n\t\t\t\tIntelligent Human Risk Management with Proofpoint Solutions\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tMarch 24, 2026\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-29956 post type-post status-publish format-standard has-post-thumbnail hentry category-company-news category-technology-news tag-compliance tag-efficiency-improvement tag-proofpoint-en tag-systems-integration\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/safetech.ro\/en\/safetech-proofpoint-webinar-rethinking-cybersecurity-from-the-perspective-of-human-risk\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"900\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Picture1-1.webp\" class=\"attachment-full size-full wp-image-29940\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Picture1-1.webp 1600w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Picture1-1-300x169.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/03\/Picture1-1-1024x576.webp 1024w\" sizes=\"(max-width: 1600px) 100vw, 1600px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/safetech.ro\/en\/safetech-proofpoint-webinar-rethinking-cybersecurity-from-the-perspective-of-human-risk\/\" >\n\t\t\t\tSafetech Proofpoint Webinar: From Inbox to Incident \u2014 Rethinking Cybersecurity from the Perspective of Human Risk\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tMarch 12, 2026\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-29856 post type-post status-publish format-standard has-post-thumbnail hentry category-technology-news tag-compliance tag-efficiency-improvement tag-nis-en tag-risk-management\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/safetech.ro\/en\/the-grc-framework-transforms-nis2-requirements-into-resilience-and-sustainable-cybersecurity\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"675\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/GRC.webp\" class=\"attachment-full size-full wp-image-29681\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/GRC.webp 1200w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/GRC-300x169.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/01\/GRC-1024x576.webp 1024w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/safetech.ro\/en\/the-grc-framework-transforms-nis2-requirements-into-resilience-and-sustainable-cybersecurity\/\" >\n\t\t\t\tThe GRC framework transforms NIS2 requirements into resilience and sustainable cybersecurity\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tFebruary 19, 2026\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-29782 post type-post status-publish format-standard has-post-thumbnail hentry category-company-news tag-compliance tag-risk-management tag-safetech-results tag-security-testing\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/safetech.ro\/en\/safetech-innovations-achieves-crest-accreditation-for-penetration-testing\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1280\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/02\/2372476939_1.jpg\" class=\"attachment-full size-full wp-image-29774\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2026\/02\/2372476939_1.jpg 1920w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/02\/2372476939_1-300x200.jpg 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2026\/02\/2372476939_1-1024x683.jpg 1024w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h5 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/safetech.ro\/en\/safetech-innovations-achieves-crest-accreditation-for-penetration-testing\/\" >\n\t\t\t\tSafetech Innovations achieves CREST accreditation for its Penetration Testing services\t\t\t<\/a>\n\t\t<\/h5>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tFebruary 11, 2026\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo Comments\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c124742 elementor-align-center elementor-widget elementor-widget-ld_button\" data-id=\"c124742\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<a\n\t\t\t\thref=\"https:\/\/safetech.ro\/blog\/\"class=\"elementor-button btn btn-solid btn-hover-txt-switch btn-hover-txt-switch-y btn-xsm btn-icon-right btn-icon-circle btn-icon-custom-size btn-icon-shaped btn-icon-solid btn-has-label\"\t\t\t>\n\t\t\t\t\t\t\t\t\t<span data-text=\"SEE ALL ARTICLES\" class=\"btn-txt\" data-transition-delay=\"true\" data-delay-options=\"{&quot;elements&quot;: &quot;.lqd-chars&quot;, &quot;delayType&quot;: &quot;animation&quot;, &quot;startDelay&quot;: 0, &quot;delayBetween&quot;: 32.5}\" data-split-text=\"true\" data-split-options=\"{&quot;type&quot;: &quot;chars, words&quot;}\">\n\t\t\t\t\t\tSEE ALL ARTICLES\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"btn-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"lqd-icn-ess icon-ion-ios-arrow-forward\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9c106b6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9c106b6\" data-element_type=\"section\" data-e-type=\"section\" id=\"contact\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4a0d6b0\" data-id=\"4a0d6b0\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-9fae249 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9fae249\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-373873c\" data-id=\"373873c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ad8e100 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"ad8e100\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f641138f664\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h2 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h2\"  > Contact us<\/h2>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-f37bc6d elementor-widget elementor-widget-ld_cf722\" data-id=\"f37bc6d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_cf722.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t<div class=\"lqd-contact-form lqd-contact-form-inputs-underlined      lqd-contact-form-button-circle  \">\n\t\t\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f11788-o1\" lang=\"ro-RO\" dir=\"ltr\" data-wpcf7-id=\"11788\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/pages\/27414#wpcf7-f11788-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Formular de contact\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"11788\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"ro_RO\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f11788-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/fieldset>\n<div class=\"row\">\n\t<div class=\"col-md-6\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"text-438\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Full name\" value=\"\" type=\"text\" name=\"text-438\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"col-md-6\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"email-873\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"E-mail\" value=\"\" type=\"email\" name=\"email-873\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"col-md-6\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"text-448\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Subject\" value=\"\" type=\"text\" name=\"text-448\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"col-md-6\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"tel-969\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Phone\" value=\"\" type=\"tel\" name=\"tel-969\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"col-md-12\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"textarea-601\"><textarea cols=\"10\" rows=\"4\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Message\" name=\"textarea-601\"><\/textarea><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"col-md-12\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"acceptance-120\"><span class=\"wpcf7-form-control wpcf7-acceptance\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"acceptance-120\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\">I have read the &nbsp; <a href=\"https:\/\/safetech.ro\/wp-content\/uploads\/2023\/08\/INFORMARE-GENERALA-PRIVIND-PRELUCRAREA-DCP-EN.pdf\" target=\"_blank\">  notification regarding the processing of personal data<\/a>.<\/span><\/label><\/span><\/span><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div style=\"text-align: center; margin-top: 25px;\" class=\"col-md-12\">\n\t\t<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Send\" \/>\n\t\t<\/p>\n\t<\/div>\n<\/div><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Home KELA External Threat Exposure Reduction Cyber Threat Intelligence solution for proactive, continuous protection The KELA Cyber Threat Intelligence platform enables organizations to proactively identify<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":23339,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-27414","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages\/27414","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/comments?post=27414"}],"version-history":[{"count":17,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages\/27414\/revisions"}],"predecessor-version":[{"id":27555,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages\/27414\/revisions\/27555"}],"up":[{"embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/pages\/23339"}],"wp:attachment":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/media?parent=27414"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}