Icon Facebook Icon Twitter Icon Linkedin
Loading
LOADING
Services

CYBER SECURITY

Build Your Digital Castle Today!

Get your valuable data under protection with cyber security

Just as our valuable assets need protection in the real world, our data and resources - our valuable assets on digital platforms - also need similar protection. One of the most important steps of digital transformation is to become aware of the value of our data and take precautions well in advance against situations such as theft.

Today when cyber-attacks and crimes are becoming increasingly serious, cyber security is one of the indispensable services for protecting a company’s data and important resources in digital media. This service is at the intersection of computer sciences, electronic engineering, and mathematics and plays a vital role at the point of protection of all our available data digitally.

Firewall protection (Dedicated/Shared)

Firewall protection service provides security for the protection of information assets in the data center or on the customer side at a dedicated or shared level according to the project details. Confidentiality and integrity of information are provided by working with the products of leading companies.

All rules and policies are installed centrally on devices. Organization-specific security infrastructure can be created, and optionally, redundant systems can be used that can ensure the uninterrupted operability of the system.

Service components are monitored 24/7 with central management systems.

IPS/ISD management (Dedicated/Shared)

IPS/ISD management service protects your servers against attacks with the signature database that detects and blocks attacks to your systems via the internet and intranet. Confidentiality and integrity of information are aimed by working with the products of leading companies.

Organization-specific security infrastructure can be created, and optionally, redundant systems can be used that can ensure the uninterrupted operability of the system.

Service components are monitored 24/7 with central management systems

URL Filtering/Proxy (Dedicated/Shared)

URL Filtering Service enables organizations to block access to pages from websites categorized according to the contents that do not comply with company policies. Under the proxy service, organization networks are protected against web-based anti-virus, spyware etc. malicious codes via a shared proxy server. Since it is a solution on the gateway level, there is no need to install software on user computers.

Confidentiality and integrity of information are aimed for by working with the products of leading companies.

Organization-specific security infrastructure can be created, and optionally, redundant systems can be used that can ensure the uninterrupted operability of the system.

Service components are monitored 24/7 with central management systems.

SSL VPN service

SSL VPN allows users to connect remotely and securely to the organization network. SSL VPN devices allocated within the service allows organizations to work integrated with the Active Directory to perform group-based access authorizations. The service can also work together with the OTP service.

Organization-specific security infrastructure can be created, and optionally, redundant systems can be used that can ensure the uninterrupted operability of the system. Service components are monitored 24/7 with central management systems.

AntiVirus/AntiSpam (Dedicated/Shared)

Shared Antivirus/AntiSpam service protects against e-mails incoming from the Internet to the organizational network by protection against “Spams, Viruses, Trojans”. This way, clean and secure e-mails are transmitted to the organization and all harmful e-mails are blocked at the internet gateway.

Optionally, AntiVirus/AntiSpam can also be provided as dedicated, and redundant structures can be used to ensure the uninterrupted running of the system. Service components are monitored 24/7 with central management systems.

DDOS (Distributed Denial-Of-Service Attack) Blocking Service

DDOS management service provides a DDOS blocking service from the service provider against a volumetric DDOS attack at internet access and servers open to the internet. It may be provided as a dedicated service optionally to use for scenarios that have different forms of protection.

Service components are monitored 24/7 with central management systems.

Load Balancing Service/WAF Service

Load Balancing Service/WAF Service allows distributing the incoming traffic to web services across different servers so that the load is distributed and thus the time of response to a request can be reduced. Also, the harmful attack access services in incoming requests can be optionally blocked with the WAF service.

Organization-specific security infrastructure can be created, and optionally, redundant systems can be used that can ensure the uninterrupted operability of the system. Service components are monitored 24/7 with central management systems.

Proactive Threat Monitoring and Log Management Service

Proactive Threat Monitoring and Log Management Service monitors and watches the systems 7 days a week and 24 hours a day proactively. The aim is to detect security incidents that may occur in the organizations’ communication and information technology infrastructure and potential incidents in advance to prevent any damage. In addition, it allows keeping of the logs for the period required by laws and legal obligations (the Compliance Law 5651) and reporting them upon request.

Proactive Threat Monitoring Service

• Monitors threats on associated logs instantly 7 days and 24 hours from IBM's security operations centers available worldwide and takes actions against detected threats
• Takes precautions against potential risks with the rule sets associated using the world's largest threat and security vulnerability database
• Analyzes real-time and past threats• With the IBM X-Force research team that researches and monitors vulnerabilities and attacks worldwide, takes precautions in case vulnerabilities are detected in existing logs
• Receives weekly and monthly trend analysis reports that include the policy exceptions and user behavior trends

Log Management Service

• Collecting the distributed customer logs in a central database to make them accessible via a single web interface
• Storing and reporting the logs when necessary in accordance with the Law numbered 5651• The opportunity to expand the available architecture in case of an increase of log capacities
• Creating custom correlation rules for customer needs utilizing the log correlation capability in the new SIEM infrastructure
• Providing access and search of the logs via WEB interface with the support of a reporting page

Scroll Down Page
Scroll Down Page

SERVICES