{"id":28187,"date":"2025-06-12T17:09:11","date_gmt":"2025-06-12T14:09:11","guid":{"rendered":"https:\/\/safetech.ro\/webinar-safetech-innovations-the-modern-soc-smart-centralization-and-local-autonomy-with-open-xdr\/"},"modified":"2025-06-12T17:52:05","modified_gmt":"2025-06-12T14:52:05","slug":"webinar-safetech-the-modern-soc-smart-centralization-and-local-autonomy-with-open-xdr","status":"publish","type":"post","link":"https:\/\/safetech.ro\/en\/webinar-safetech-the-modern-soc-smart-centralization-and-local-autonomy-with-open-xdr\/","title":{"rendered":"Webinar Safetech Innovations: The Modern SOC \u2013 Smart Centralization and Local Autonomy with Open XDR"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"28187\" class=\"elementor elementor-28187 elementor-28169\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f2081e7 e-flex e-con-boxed e-con e-parent\" data-id=\"f2081e7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8502caa elementor-widget elementor-widget-ld_breadcrumb\" data-id=\"8502caa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_breadcrumb.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"lqd-breadcrumb-wrapper\"><nav role=\"navigation\" aria-label=\"Breadcrumbs\" class=\"breadcrumbs\"><ol class=\"breadcrumb reset-ul inline-nav inline-ul comma-sep-li\"><li class=\"breadcrumb-item active\"><a href=\"https:\/\/safetech.ro\/en\/\" rel=\"home\"><span>Home<\/span><\/a><\/li><\/ol><\/nav><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-867673e elementor-widget elementor-widget-text-editor\" data-id=\"867673e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Webinar Safetech Innovations: The Modern SOC \u2013 Smart Centralization and Local Autonomy with Open XDR<\/h3><p>On June 11, 2025, Safetech Innovations held the webinar &#8220;Modern SOC: Smart Centralization and Local Autonomy with Open XDR&#8221;, during which the company&#8217;s specialists \u2013 C\u0103t\u0103lin Gherghiceanu, Presales Manager, and C\u0103lin T\u0103ma\u0219, Cybersecurity Specialist \u2013 provided valuable insights into the role of Open XDR (Extended Detection and Response) platforms in ensuring the efficient functioning of a modern security operations center (SOC). Safetech Innovations specialists have outlined the optimal model for managing security operations at the organizational level, focusing on defining the architecture of a SOC adapted to current challenges. <\/p><p>As a case study, Safetech Innovations representatives presented the Stellar Cyber Open XDR platform. They highlighted the key functionalities of the solution and how it supports compliance with NIS2 and DORA requirements, through a unified and automated approach to cybersecurity. Stellar Cyber Open XDR covers the entire security operations cycle \u2013 from monitoring, detection, and response, to risk assessment, incident reporting, and auditing.  <\/p><h3>Resilience through centralization and antifragility through local autonomy<\/h3><p>C\u0103t\u0103lin Gherghiceanu opened the webinar by recalling the environmental models presented in <strong><a href=\"https:\/\/safetech.ro\/en\/webinar-safetech-edr-and-xdr-the-anatomy-of-a-modern-cyber-defense\/\">the first event of this series of webinars<\/a><\/strong>, dedicated to modern cyber protection solutions \u2013 VUCA (Volatility, Uncertainty, Complexity, and Ambiguity) and BANI (Brittle, Anxious, Non-linear, Incomprehensible). These concepts, explained the manager of Safetech Innovations, reflect the challenges of operating in a rapidly changing world and can be applied in shaping an organization&#8217;s cybersecurity. <\/p><p>The VUCA model defines an unstable, unpredictable and interdependent environment (dependencies between systems, subsystems, customers and suppliers), with ambiguity and difficulties in clearly interpreting situations. It can evolve, against the background of a Black Swan event, in a BANI context, in which the systems considered to be highly reliable suddenly collapse under the pressure of external shocks, the staff feels a lot of stress, and apparently minor causes can generate huge and often inexplicable effects against the background of multiple variables. How do the VUCA and BANI environments affect the incident management model and security operations in an organization? When it comes to a BANI context, the dependence on centralized systems becomes a vulnerability. It is necessary to ensure local autonomy, locally distributed decision-making capacity, as well as the implementation of redundancy and diversification with alternative security solutions.    <\/p><p><em>&#8220;When it happens that the system collapses, and the centralized platform no longer works or can no longer connect to the grid, we need local autonomy. In this case, detection and response mechanisms that work at the edge, microsegmentation and Software-Defined Networking (SDN) are useful in order to be able to rearrange traffic, limit damage and isolate groups. (&#8230;) Safe-to-fail mechanisms are also very useful, a newer concept, which is not widely applied today, and which means that we can test what happens if we perform a certain action, even at the risk of creating problems, in order to respond effectively in a situation that we have never faced before,&#8221;  <\/em>said C\u0103t\u0103lin Gherghiceanu.<\/p><p>Next, the manager briefly presented the evolution of SOC platforms from the traditional classic SIEM, defined by manual workflow and long reaction time, to modern technologies such as Next-Gen SIEM, SOAR and XDR (having their own sensors and built-in EDR). Open XDR, which enables cross-layer integration between various equipment, applications, systems, subsystems, network domains, additionally provides unified visibility and hybrid sensing, with integration capabilities with a large number of third-party solutions and vendors natively. <\/p><h3>Stellar Cyber Open XDR, a solid platform for a modern SOC<\/h3><p>C\u0103t\u0103lin Gherghiceanu presented the architecture of the Stellar Cyber Open XDR platform, built on two essential &#8220;layers&#8221;: a data lake and a layer for detection and correlation. On this basis, the platform offers capabilities such as NDR (Network Detection and Response), TIP (Threat Intelligence Platform), SOAR (Security Orchestration, Automation and Response), IDS (Intrusion Detection System), Sandbox for malware and UEBA (User and Entity Behavior Analytics). <\/p><p>Stellar Cyber Open XDR can ingest very large volumes of data, from hundreds of various sources, with which it integrates natively, such as EDR (Endpoint Detection and Response), IAM (Identity and Access Management), email security, SASE (Secure Access Service Edge), cloud services and SaaS (Software as a Service) applications.<\/p><p><em>&#8220;Through mechanisms such as data lake, SIEM, detection and correlation, the Stellar Cyber Open XDR platform, built on a centralized design, enables accurate predictions and a fast and efficient response. To achieve the massive ingestion of data from various sources \u2013 both from different systems and from different manufacturers \u2013 an &#8220;open&#8221; architecture is needed, which allows native integration. This architecture also makes decentralization possible. How? By integrating with tools such as EDRs or third-party firewalls \u2013 tools that, even if the connection to the network is broken, can be used locally to apply quick measures,&#8221;    <\/em>explained the manager from Safetech Innovations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b747402 elementor-widget elementor-widget-image\" data-id=\"b747402\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"780\" height=\"439\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/Slide-2-1-1024x576.webp\" class=\"attachment-large size-large wp-image-28174\" alt=\"Stellar Cyber Open XDR 1\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/Slide-2-1-1024x576.webp 1024w, https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/Slide-2-1-300x169.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/Slide-2-1.webp 1920w\" sizes=\"(max-width: 780px) 100vw, 780px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d3570cc elementor-widget elementor-widget-text-editor\" data-id=\"d3570cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p> <\/p><p>C\u0103t\u0103lin Gherghiceanu also briefly presented how the Stellar Cyber Open XDR platform meets the requirements imposed by the NIS2 and DORA regulations, while highlighting the services through which Safetech Innovations complements these capabilities.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-88f53f5 elementor-widget elementor-widget-image\" data-id=\"88f53f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"780\" height=\"439\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/Slide-1-1-1024x576.webp\" class=\"attachment-large size-large wp-image-28177\" alt=\"Stellar Cyber Open XDR 2\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/Slide-1-1-1024x576.webp 1024w, https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/Slide-1-1-300x169.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/Slide-1-1.webp 1920w\" sizes=\"(max-width: 780px) 100vw, 780px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e5eacc elementor-widget elementor-widget-text-editor\" data-id=\"1e5eacc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p> <\/p><p>In the second part of the webinar, C\u0103lin T\u0103ma\u0219 gave a practical demonstration of the most important capabilities of the Stellar Cyber platform, with a focus on how it can detect, prevent and block attack attempts in real time. The solution provides complete visibility into IT infrastructure by aggregating and normalizing events into a single dashboard. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-baf199e elementor-widget elementor-widget-image\" data-id=\"baf199e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"780\" height=\"439\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/Stellar-Cyber-demo-1-1024x576.webp\" class=\"attachment-large size-large wp-image-28179\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/Stellar-Cyber-demo-1-1024x576.webp 1024w, https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/Stellar-Cyber-demo-1-300x169.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/Stellar-Cyber-demo-1.webp 1920w\" sizes=\"(max-width: 780px) 100vw, 780px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c1a9bb elementor-widget elementor-widget-text-editor\" data-id=\"6c1a9bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p> <\/p><p>Among the key functionalities presented during the demonstration were:<\/p><ul><li>The early and automatic detection of threats by correlating data from various sources (network, endpoints, cloud, applications);<\/li><li>The risk assessment and the prioritisation of incidents based on behavioural analysis (UEBA), risk scores and smart alerts;<\/li><li>The facilities and tools for quickly and effectively conducting security incident investigations,<\/li><li>The automated response, with examples in the isolation of compromised devices, blocking IP addresses, activating predefined or manually added playbooks, as well as<\/li><li>The auditability by generating logs and detailed reports on suspicious activities, incidents and actions taken.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8336176 elementor-widget elementor-widget-image\" data-id=\"8336176\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"780\" height=\"439\" src=\"https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/Stellar-Cyber-demo-2-1024x576.webp\" class=\"attachment-large size-large wp-image-28181\" alt=\"\" srcset=\"https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/Stellar-Cyber-demo-2-1024x576.webp 1024w, https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/Stellar-Cyber-demo-2-300x169.webp 300w, https:\/\/safetech.ro\/wp-content\/uploads\/2025\/06\/Stellar-Cyber-demo-2.webp 1920w\" sizes=\"(max-width: 780px) 100vw, 780px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d354fb3 elementor-widget elementor-widget-text-editor\" data-id=\"d354fb3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p> <\/p><p>The cybersecurity specialist also demonstrated how Safetech Innovations&#8217; SOC team \u2013 STI CERT \u2013 uses this solution to ensure continuous monitoring, advanced alert analysis and response to security incidents.<\/p><p>We invite you to watch the full presentations given by our colleagues in the video recording of the webinar &#8220;Modern SOC \u2013 smart centralization and local autonomy with Open XDR&#8221;.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ed22dd7 elementor-widget elementor-widget-video\" data-id=\"ed22dd7\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=0Tdej4IqRwU&quot;,&quot;start&quot;:235,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b10ef4c elementor-widget elementor-widget-text-editor\" data-id=\"b10ef4c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p> <\/p><p>Safetech Innovations offers a complete portfolio of services, covering all the components necessary for an Information Security Management System (ISMS), including GRC (governance, risk and compliance) consultancy, implementation and maintenance of cybersecurity systems, security testing, ISMS audit and SOC outsourcing. Through <strong><a href=\"https:\/\/safetech.ro\/en\/services\/cybersecurity-operations-outsourcing\/soc-outsourcing-services\/\">STI CERT \u2013 its own SOC team<\/a><\/strong>, <br>with continuous activity for over 10 years \u2013 Safetech Innovations ensures continuous monitoring 24\/7, with the support of more than 30 experts organized on three levels of expertise. Its professionalism was internationally recognized in 2024, when STI CERT was included in the Top 250 MSSPs made by MSSP Alert, occupying the highest position among Romanian companies. With a solid experience of 15 years in the local and international market, Safetech Innovations is a reliable partner in the field of cybersecurity.   <\/p><p>For more information, you can contact us at sales @ safetech.ro or by phone at +40 21 316 0565.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Safetech Innovations held the webinar &#8220;The Modern SOC: Intelligent Centralization and Local Autonomy with Open XDR&#8221;, during which the company&#8217;s specialists outlined the optimal model for managing security operations at the organizational level, focusing on defining the architecture of a SOC adapted to current challenges.<\/p>\n","protected":false},"author":2,"featured_media":28172,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[125],"tags":[102,103,117,104,106,121,107,145,124,113,115],"class_list":["post-28187","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company-news","tag-automation","tag-cert-en","tag-edr-en","tag-efficiency-improvement","tag-monitoring-and-response","tag-ndr-en","tag-outsourcing","tag-siem-en","tag-stellar-cyber-en","tag-systems-integration","tag-xdr-en"],"_links":{"self":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/posts\/28187","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/comments?post=28187"}],"version-history":[{"count":2,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/posts\/28187\/revisions"}],"predecessor-version":[{"id":28190,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/posts\/28187\/revisions\/28190"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/media\/28172"}],"wp:attachment":[{"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/media?parent=28187"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/categories?post=28187"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/safetech.ro\/en\/wp-json\/wp\/v2\/tags?post=28187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}