Network Access Control
Network Access Control (NAC) is a network security system created to prevent or control the access of other internet infrastructures to the internet infrastructure of institutions.
Firewall
The firewall, which can also be called a firewall or firewall, keeps the inbound and outbound internet traffic of the computer and network under control with…
IPS
IPS – Intrusion Prevention System is a network security protocol configured to detect and block security breaches and threats. It targets malicious movements…
SIEM
SIEM (Security Information and Event Management) is very important in terms of interpreting and managing many different data such as access on network…
Hotspot
A hotspot is an internet connection that is generally used in public places and offered with a Wi-Fi infrastructure for wireless access within a certain…
Endpoint Security
Endpoint security, which can be translated as endpoint security, is a protection system that aims to prevent previously undefined threats with behavior…
Data Lost Prevention
With the short definition of Data Loss Prevention (DLP/Data Loss Prevention), “How will the data be stored?, Where will the data be used?, How will the data…
Application Security
Application Security covers the measures taken to increase the security of an application by finding, fixing and preventing security vulnerabilities.
Disc Encryption
Disc Encryption is a technology that transforms the information on the disc into an unreadable code…
File And Folder Encryption
File and folder encryption ensures that files and folders containing important data for the company cannot be…
Database Security
The databases, where the sensitive information of the users and customers of the companies are stored, are…
Cloud Security
Cloud Security is a set of cyber security systems aimed at protecting daat stored in the cloud.
Data Classification
Data classification is a system that expresses the categorization of data, which are the most important assets of institutions, in terms…
IT Asset Management
Systems established to monitor the inventory and status of your IT assets, to view and manage different purchases from a…
Mobile Device Management
Mobile Device Management is a management system that aims to remotely control and secure smartphones and tablets for business security.
Privileged Access Management
Privileged Access Management, which can be translated as Privileged Account Management, is…
AD Management
The set of applications that allow AD objects to be easily managed and reported by authorities is called AD Management.
AD Monitoring
It is a software system that allows you to monitor the logs created on domain controllers and file servers in real time.