Cyber Security Managed Services

Firewall Protection (Dedicated/Shared)

Firewall protection service provides security for the protection of information assets in the data center or on the customer side at a dedicated or shared level according to the project details. Confidentiality and integrity of information are provided by working with the products of leading companies.

All rules and policies are installed centrally on devices. Organization-specific security infrastructure can be created, and optionally, redundant systems can be used that can ensure the uninterrupted operability of the system.

Service components are monitored 24/7 with central management systems.

IPS/ISD management (Dedicated/Shared)

IPS/ISD management service protects your servers against attacks with the signature database that detects and blocks attacks to your systems via the internet and intranet. Confidentiality and integrity of information are aimed by working with the products of leading companies.

Organization-specific security infrastructure can be created, and optionally, redundant systems can be used that can ensure the uninterrupted operability of the system.

Service components are monitored 24/7 with central management systems

URL Filtering/Proxy (Dedicated/Shared)

URL Filtering Service enables organizations to block access to pages from websites categorized according to the contents that do not comply with company policies. Under the proxy service, organization networks are protected against web-based anti-virus, spyware etc. malicious codes via a shared proxy server. Since it is a solution on the gateway level, there is no need to install software on user computers.

Confidentiality and integrity of information are aimed for by working with the products of leading companies.

Organization-specific security infrastructure can be created, and optionally, redundant systems can be used that can ensure the uninterrupted operability of the system.

Service components are monitored 24/7 with central management systems.

SSL VPN service

SSL VPN allows users to connect remotely and securely to the organization network. SSL VPN devices allocated within the service allows organizations to work integrated with the Active Directory to perform group-based access authorizations. The service can also work together with the OTP service.

Organization-specific security infrastructure can be created, and optionally, redundant systems can be used that can ensure the uninterrupted operability of the system. Service components are monitored 24/7 with central management systems.

AntiVirus/AntiSpam (Dedicated/Shared)

Shared Antivirus/AntiSpam service protects against e-mails incoming from the Internet to the organizational network by protection against “Spams, Viruses, Trojans”. This way, clean and secure e-mails are transmitted to the organization and all harmful e-mails are blocked at the internet gateway.

Optionally, AntiVirus/AntiSpam can also be provided as dedicated, and redundant structures can be used to ensure the uninterrupted running of the system. Service components are monitored 24/7 with central management systems.

DDOS (Distributed Denial-Of-Service Attack) Blocking Service

DDOS management service provides a DDOS blocking service from the service provider against a volumetric DDOS attack at internet access and servers open to the internet. It may be provided as a dedicated service optionally to use for scenarios that have different forms of protection.

Service components are monitored 24/7 with central management systems.

Load Balancing Service/WAF Service

Load Balancing Service/WAF Service allows distributing the incoming traffic to web services across different servers so that the load is distributed and thus the time of response to a request can be reduced. Also, the harmful attack access services in incoming requests can be optionally blocked with the WAF service.

Organization-specific security infrastructure can be created, and optionally, redundant systems can be used that can ensure the uninterrupted operability of the system. Service components are monitored 24/7 with central management systems.

Proactive Threat Monitoring and Log Management Service

Proactive Threat Monitoring and Log Management Service monitors and watches the systems 7 days a week and 24 hours a day proactively. The aim is to detect security incidents that may occur in the organizations’ communication and information technology infrastructure and potential incidents in advance to prevent any damage. In addition, it allows keeping of the logs for the period required by laws and legal obligations (the Compliance Law 5651) and reporting them upon request.

Proactive Threat Monitoring Service

  •   Monitors threats on associated logs instantly 7 days and 24 hours from IBM’s security operations centers available worldwide and takes actions against detected threats
  •   Takes precautions against potential risks with the rule sets associated using the world’s largest threat and security vulnerability database
  •   Analyzes real-time and past threats• With the IBM X-Force research team that researches and monitors vulnerabilities and attacks worldwide, takes precautions in case vulnerabilities are detected in existing logs
  •   Receives weekly and monthly trend analysis reports that include the policy exceptions and user behavior trends

Log Management Service

  •   Collecting the distributed customer logs in a central database to make them accessible via a single web interface
  •   Storing and reporting the logs when necessary in accordance with the Law numbered 5651• The opportunity to expand the available architecture in case of an increase of log capacities
  •   Creating custom correlation rules for customer needs utilizing the log correlation capability in the new SIEM infrastructure
  •   Providing access and search of the logs via WEB interface with the support of a reporting page

We’re here to help you.

Please find detailed information on the processing of your personal data in the .
If you submit your CV via the above Contact Form, your CV will be destroyed without taking into account your requests. For your job applications, you can contact us by the contact address we have specified in the About Us section of our website.