{"id":28113,"date":"2025-06-02T10:51:16","date_gmt":"2025-06-02T07:51:16","guid":{"rendered":"https:\/\/safetech.ro\/webinar-safetech-innovations-edr-and-xdr-the-anatomy-of-a-modern-cyber-defense\/"},"modified":"2025-06-13T09:42:32","modified_gmt":"2025-06-13T06:42:32","slug":"webinar-safetech-edr-and-xdr-the-anatomy-of-a-modern-cyber-defense","status":"publish","type":"post","link":"https:\/\/safetech.ro\/en\/webinar-safetech-edr-and-xdr-the-anatomy-of-a-modern-cyber-defense\/","title":{"rendered":"Webinar Safetech Innovations: EDR and XDR \u2013 the anatomy of a modern cyber defense"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"28113\" class=\"elementor elementor-28113 elementor-28081\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f2081e7 e-flex e-con-boxed e-con e-parent\" data-id=\"f2081e7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8502caa elementor-widget elementor-widget-ld_breadcrumb\" data-id=\"8502caa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_breadcrumb.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"lqd-breadcrumb-wrapper\"><nav role=\"navigation\" aria-label=\"Breadcrumbs\" class=\"breadcrumbs\"><ol class=\"breadcrumb reset-ul inline-nav inline-ul comma-sep-li\"><li class=\"breadcrumb-item active\"><a href=\"https:\/\/safetech.ro\/en\/\" rel=\"home\"><span>Home<\/span><\/a><\/li><\/ol><\/nav><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-867673e elementor-widget elementor-widget-text-editor\" data-id=\"867673e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Webinar Safetech Innovations: EDR and XDR \u2013 the anatomy of a modern cyber defense<\/h3><p>On May 29, 2025, Safetech Innovations held the webinar &#8220;EDR and XDR: The Anatomy of a Modern Cyber Defense&#8221;, an event dedicated to professionals interested in understanding the current context of cyber threats, the implications of European regulations in the field and the robust solution to address these challenges, consisting of the EDR\/XDR Cynet platform and Safetech&#8217;s cyber threat monitoring and response services.<\/p><p>Participants had the opportunity to learn essential details about the requirements of the NIS2 Directive and the DORA Regulation, two major legislative initiatives that set new IT security standards in Europe. During the session, Safetech Innovations experts \u2013 C\u0103t\u0103lin Gherghiceanu (Presales Manager) and C\u0103lin T\u0103ma\u0219 (Cybersecurity Specialist) \u2013 exemplified, including through practical demonstrations of the capabilities of the Cynet platform, how a complete EDR\/XDR solution can strengthen the cyber defense of organizations. As an official Cynet Security partner in Romania, Safetech Innovations offers this advanced solution both as a reseller and as a Managed Security Services Provider (MSSP).  <\/p><h3>The role of EDR, NDR and XDR in the anatomy of a resilient and antifragile system<\/h3><p>C\u0103t\u0103lin Gherghiceanu opened the webinar by presenting two environmental models \u2013 <strong>VUCA (Volatility, Uncertainty, Complexity, and Ambiguity)<\/strong>, but also the more recent <strong>BANI (Brittle, Anxious, Non-linear, Incomprehensible)<\/strong> \u2013 based on which he highlighted the cybersecurity challenges that organizations can face. Using these models as reference points, the Safetech Innovations specialist outlined the main response strategies and cybersecurity objectives to be achieved, as well as the technologies and mechanisms that can support their achievement, as follows: <\/p><ul><li><strong>VUCA (Rational, Planned Control)<\/strong>: Continuous monitoring, patch management, threat intelligence, risk analysis, anticipated scenarios, GRC (Governance, Risk, Compliance), awareness, clear policies, actor profiling, SIEM (Security Information and Event Management), SOAR (Security Orchestration, Automation and Response), segmentation, redundancy, Disaster Recovery\/ Business Continuity plans, regular audits, clear procedures, well-defined responsibilities, on-chain coordination, procedural simulations.<\/li><li><strong>BANI (lucid, antifragile adaptation)<\/strong>: Chaos engineering, AI\/ML for anomalies, black swan drill simulations, autonomous detection, distributed reaction, local autonomy, decision-making empathy, lucid improvisation, antifragile architectures, Zero Trust, automated failover, active backup, collapse tolerance, playbook under stress, adaptive leadership, empathic communication, psychological support.<\/li><\/ul><p>The manager highlighted the essential role of standards and regulations, which provide clear directions for implementing an effective cyber defense strategy. He also drew a parallel with the human body \u2013 a source of inspiration both for adopting new technologies and for adapting them according to organizational specifics, so that they can be used as efficiently as possible. Subsequently, C\u0103t\u0103lin Gherghiceanu reviewed the most modern technologies in the field of cybersecurity, with a focus on EDR, NDR and XDR, and highlighted how they contribute to aligning organizations with the requirements of current regulations, such as the NIS2 Directive and the DORA Regulation.  <\/p><p><em>&#8220;EDR, NDR and XDR offer multiple detection mechanisms, provide very good visibility, usually end-to-end, on assets within the network, have automatic isolation and response capabilities through SOAR playbooks, and are also able to learn from the events they observe\/monitor, and from the behavior of users and devices. (&#8230;) We have concluded that at the level of devices, network, applications, data, and users in the network we want to protect, EDR\/NDR\/XDR can directly support approximately 70% (17\/25) of the Cyber Defense Matrix\/NIST CSF quadrants. As a result, from a network that is intended to be resilient, these technologies cannot be missing,&#8221;  <\/em>said C\u0103t\u0103lin Gherghiceanu.<\/p><p>Next, C\u0103t\u0103lin Gherghiceanu provided the main coordinates of the Cynet all-in-one platform, which is based on an EDR solution, with XDR capabilities.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b747402 elementor-widget elementor-widget-image\" data-id=\"b747402\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"780\" height=\"395\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/slide-2-1024x518.webp\" class=\"attachment-large size-large wp-image-28096\" alt=\"Cynet EDR XDR\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/slide-2-1024x518.webp 1024w, https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/slide-2-300x152.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/slide-2.webp 1920w\" sizes=\"(max-width: 780px) 100vw, 780px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d3570cc elementor-widget elementor-widget-text-editor\" data-id=\"d3570cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p> <\/p><p>In the MITRE ATT&amp;CK evaluations, Cynet ranks first in the EDR solution category for the second consecutive year, due to its outstanding performance in the standard configuration: it was able to detect and prevent all types of attacks tested, without knowing them in advance and without generating false alerts \u2013 with a rate of 0% false positives. <em>&#8220;From our point of view \u2013 because Safetech Innovations uses this solution including as a SOC platform, so we have concrete and real feedback from the market \u2013 the solution is very efficient and comes at an affordable cost&#8221;<\/em>, added C\u0103t\u0103lin Gherghiceanu. He also did a detailed analysis of how the Cynet platform helps comply with NIS2 and DORA regulations. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-88f53f5 elementor-widget elementor-widget-image\" data-id=\"88f53f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"780\" height=\"439\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/slide-3-1024x576.webp\" class=\"attachment-large size-large wp-image-28098\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/slide-3-1024x576.webp 1024w, https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/slide-3-300x169.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/slide-3.webp 1920w\" sizes=\"(max-width: 780px) 100vw, 780px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e5eacc elementor-widget elementor-widget-text-editor\" data-id=\"1e5eacc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p> <\/p><p>In the second part of the webinar, C\u0103lin T\u0103ma\u0219 held a series of practical demonstrations through which he highlighted, through concrete examples, the strengths of the Cynet platform and how it differs from other EDR solutions. He also explained the platform&#8217;s extensive capabilities, which raise the level of protection offered to the standards of an XDR system. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-baf199e elementor-widget elementor-widget-image\" data-id=\"baf199e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"780\" height=\"439\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/webinar-1-1024x576.webp\" class=\"attachment-large size-large wp-image-28100\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/webinar-1-1024x576.webp 1024w, https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/webinar-1-300x169.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/webinar-1.webp 1920w\" sizes=\"(max-width: 780px) 100vw, 780px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c1a9bb elementor-widget elementor-widget-text-editor\" data-id=\"6c1a9bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p> <\/p><p>The Safetech Innovations specialist detailed the process of installing the platform and agents, how the integration with cloud environments is achieved, the benefits of these integrations and the types of data collected. <br>The demo highlighted how Cynet protects customer infrastructure in real-time and provided an overview of the investigation process.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8336176 elementor-widget elementor-widget-image\" data-id=\"8336176\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"780\" height=\"439\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/webinar-3-1024x576.webp\" class=\"attachment-large size-large wp-image-28102\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/webinar-3-1024x576.webp 1024w, https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/webinar-3-300x169.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/webinar-3.webp 1920w\" sizes=\"(max-width: 780px) 100vw, 780px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-80fdd7f elementor-widget elementor-widget-text-editor\" data-id=\"80fdd7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p> <\/p><p>At the same time, the advanced tools made available by Cynet for security analysts and operators were also presented, which allow advanced investigations, beyond the automatic ones carried out natively by the platform.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f4ce718 elementor-widget elementor-widget-image\" data-id=\"f4ce718\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"780\" height=\"439\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/webinar-4-1024x576.webp\" class=\"attachment-large size-large wp-image-28104\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/webinar-4-1024x576.webp 1024w, https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/webinar-4-300x169.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/webinar-4.webp 1920w\" sizes=\"(max-width: 780px) 100vw, 780px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d354fb3 elementor-widget elementor-widget-text-editor\" data-id=\"d354fb3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p> <\/p><p>You can watch the presentations from the webinar in the video recording of the webinar &#8220;EDR and XDR: The Anatomy of a Modern Cyber Defense&#8221;.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ed22dd7 elementor-widget elementor-widget-video\" data-id=\"ed22dd7\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=qZecLTM9fqQ&quot;,&quot;start&quot;:201,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b10ef4c elementor-widget elementor-widget-text-editor\" data-id=\"b10ef4c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Safetech Innovations can provide access to the Cynet platform for a trial or PoC (Proof of Concept), organize technical demonstrations and provide customized evaluations, either budgetary or adapted to the concrete scenario you want to cover. In addition, we can complete the implementation with specialized services from <strong><a href=\"https:\/\/safetech.ro\/en\/services\/cybersecurity-operations-outsourcing\/soc-outsourcing-services\/\">our own security center, STI CERT<\/a><\/strong>.<\/p><p>This first webinar marks the beginning of a series dedicated to the most effective modern cybersecurity solutions. We invite you to join us at the next event, which will take place on June 11, 2025, at 15:00, and will address the theme <strong><a href=\"https:\/\/events.teams.microsoft.com\/event\/c1f3a64b-6f82-469d-bea4-a051883d17a8@fde38a1f-7a8e-486b-bd69-cb415b9e75a5\" target=\"_blank\" rel=\"noopener\">\u201eModern SOC: Smart Centralization and Local Autonomy with Open XDR\u201d<\/a><\/strong>.<\/p><p>For additional information you can contact us at sales @ safetech.ro or by phone at +40 21 316 0565.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Safetech Innovations held the webinar &#8220;EDR and XDR: The Anatomy of a Modern Cyber Defense&#8221;, an event dedicated to professionals interested in understanding the current context of cyber threats, the implications of European regulations in the field and the robust solution to deal with these challenges, consisting of the Cynet EDR\/XDR platform and Safetech&#8217;s cyber threat monitoring and response services.<\/p>\n","protected":false},"author":2,"featured_media":28083,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[125],"tags":[102,103,116,117,104,106,121,107,145,113,115],"class_list":["post-28113","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company-news","tag-automation","tag-cert-en","tag-cynet-en","tag-edr-en","tag-efficiency-improvement","tag-monitoring-and-response","tag-ndr-en","tag-outsourcing","tag-siem-en","tag-systems-integration","tag-xdr-en"],"_links":{"self":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/posts\/28113","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/comments?post=28113"}],"version-history":[{"count":10,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/posts\/28113\/revisions"}],"predecessor-version":[{"id":28198,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/posts\/28113\/revisions\/28198"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/media\/28083"}],"wp:attachment":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/media?parent=28113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/categories?post=28113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/tags?post=28113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}