- Next Generation Firewall
New generation firewalls are integrated security solutions that can prevent different threats in terms of cyber security.
- End User Security Solutions
- Data Leakage Prevention (DLP)
In order to protect the critical information of corporations in the field of competition, measures should be taken in order to protect the critical information of the institutions in the field of competition and to protect the critical information of the institutions in the field of competition with the security standards (KVKK, GDPR, etc.), the unauthorized circulation of internal information (salary payrolls, etc.) with the focus of unauthorized use of personal data. DLP solutions should be used to prevent critical classified data from going out.
- Security Incident Management and Correlation System (SIEM)
It is possible to detect and analyze events by collecting logs of security devices and relational analysis of logs collected.
- Intrusion Detection and Prevention (IPS / IDS)
Attacks based on signature are detected and precautions are taken.
- DDoS Attack Prevention
Volumetric attacks aiming to consume bandwidth are replaced by attacks in the application layer over time. To prevent this type of attack, DDoS attack prevention products are positioned.
- SSL inspection
Solving SSL encryption in firewalls is a serious burden. However, a certain percentage of encrypted traffic cannot be decrypted. With Standalone SSL inspection solutions, unencrypted traffic is transferred to security devices and serious gains are achieved in terms of performance and security.
- Load Balancing and Application Management (ADC)
These are products that enable the distribution of the load on multiple devices to the relevant devices in an ideal way.
- Web Application Firewall (WAF)
Web-based applications can have security gaps. Attacks over these vulnerabilities can cause serious problems to institutions. With the use of WAF, web-based applications are secured.
- Authorized Access and Password Management (PAM)
PAM systems are used to monitor and control the activities of personnel at the executive level. Systems are defined how they can be accessed with the authority of the administrator, an initiative space is provided on the systems only within the specified framework and every transaction is recorded.
- Network Access Control (NAC)
It is the system that provides only authorized devices and users access to the corporate network. It does not provide network access to unauthorized or device / users who do not comply with certain security policies.
- Network Traffic Routing Solutions (NPB)
Network traffic management products that manage copy traffic circulating within the network, filter and transmit a specific type of traffic from a total traffic or combine multiple traffic.