Advanced Security Solutions

Content

Content

Advanced Security

Advanced Security

Web Application Firewall (WAF): WAF is used to block malicious requests by performing detailed packet inspection on HTTP / HTTPS / SOAP / XML / Web Services.

DDOS Attack Prevention (Application Level): DDOS, the most common type of attack over the Internet, provides protection against attacks. At the application level DDOS attack type, service interruption can be made even though the internet bandwidth is not full.

Network Access Security (NAC): It is a solution to the needs of all devices such as authentication, classification and authorization during entry into a wired or wireless network.

Advanced Security

Advanced Security

Log Management: The collected logs from all your server and network systems are hashed and stored in electronic time stamped service. Tübitak time stamp is used as time mark.

Database Firewall: It is a system that provides detailed reporting of all activities on your database at 5W1H level. It is an important solution for compliance with many regulations, especially KVK

Web Application Firewall (WAF)

  • You can filter the contents of web applications.
  • White list model allows you to block all traffic except for certain actions that are allowed.
  • You can allow all traffic except certain actions prohibited by the black list model.
  • Map of web pages is extracted by examining incoming and outgoing requests with learning based model.
  • When you prefer our shared WAF service;
  • You receive service without hardware and software investment costs.
  • You receive service without annual maintenance and hosting costs.
  • If you prefer our WAF Service, then;
  • You will receive service through equipment specially reserved for you.

DDOS Attack Prevention (Application Level)

  • 24/7 accessibility of systems is improved by providing protection against attack types such as WEB, DNS, RDP, implemented in application level in service type served in inline mode.
  • If you prefer our shared DDOS service:
  • You get service without any hardware cost.
  • You receive service without annual maintenance and hosting costs.
  • If you prefer our DDOS service:
  • You will receive service through equipment specially reserved for you.

Network Access Security (NAC)

  • Network access security solutions provide answers to questions such as who or what device is connected to the network, what services, applications and versions are running.
  • No networking device other than your computer can be used as an access point by unwanted persons.
  • If you prefer our Shared Network Access Service:
  • You get service without any hardware cost.
  • You receive service without annual maintenance and hosting costs.
  • If you prefer our Dedicated Network Access Service:
  • You will receive service through equipment specially reserved for you.

Log Management

  • Our Log Management service enables us to record the transactions that the people we have specified on the objects we have determined and the tracking components we have set (access, delete,create, browse) on that object.
  • Our log management service has met both legal requirements and international standards (ISO27001) for information leakage and prevention of security breaches.
  • Shared Log Management When you prefer our service:
  • You will receive service without any hardware cost,
  • You receive service without annual maintenance and hosting costs.
  • Dedicated Log Management When you prefer our service:
  • You will receive service through equipment specially reserved for you.

Database Firewall

  • Unauthorized access is prevented by ensuring the security of your company's sensitive data.
  • You control who has access to databases and servers, and when and how far.
  • Shared Database Firewall If you prefer our service:
  • You will receive service without any hardware and software costs,
  • You receive service without annual maintenance and hosting costs.
  • When you choose the Dedicated Database Firewall Service:
  • You are getting service through hardware specially reserved for you.
How can we help you?

Discover KoçSistem's solutions that create value to your business! Turkey's leading technology company KoçSistem!

I authorize my personal data to be used in marketing activities for the creation of specific services and electronic messages to my contact information. I have read and accept the KVKK Information Text.