Security

Your security need meet their solutions with KoçSistem’s expertise.

World’s becoming more and more digital with the advance of technology results in an increase in security vulnerability. System, device and application security becomes much more important.

Meet KoçSistem’s end-to-end smart security solutions for your security needs in all these layers.

With KoçSistem, be sure of the security of your systems, benefiting from our end-to-end smart security solutions with a focus on all your IT needs instead of security services focusing only on a single point.

Managed Security Services

Your Security Meet Find Their Solutions with Koçsistem’s Expertise!

Developments such as processes’ becoming complex, increase in data volume, diversification of end devices, and increase in security vulnerability have made system, device and application securities much more important. According to a research by Gartner, it is anticipated that intrusions on systems will increase due to factors such as increase,day by day, in the big data, prevalence of use of mobile devices, cloud systems’ becoming more accepted, and therefore, the volume of the expenses on security systems and solutions will increase from an existing level of 62 billion $ to 86 billion $ in 2016.

KoçSistem offers manageable risk and sustainable service quality thanks to its competent human resources and up-to-date technology infrastructure. It responds to all your security needs both in a dedicated way, and through the cloud infrastructure, with its end-to-end service approach and expert staff; and while decreasing both hardware and operational security costs, it increases security levels and management skills as well. As the first Security Operations Center (SOC) service provider of Turkey, solutions are offered to all security needs, from monitoring to management.

What are the advantages of Managed Security Service?

  • Service Level Agreements;
  • Security monitoring (SOC) on a 7×24 basis;
  • End-to-end management and holistic consultancy;
  • Location-independent management;
  • Technological updating;
  • Reporting (Availability, Performance, etc.)
  • Competent human resources;
  • Provision of business continuity.

Our services at a glance:

  • Security Operations Center (SOC)
  • Shared Firewall management
  • Dedicated Firewall management
  • Virtual Dedicated Firewall management
  • Shared IPS management
  • Dedicated IPS management
  • Shared DDOS management
  • Dedicated DDOS management
  • Shared WAF management
  • Dedicated WAF management
  • Shared Load Balancer management
  • Dedicated Load Balancer management
  • Shared Anti-Spam management
  • Dedicated Anti-Spam management
  • Share Web Filtering management
  • Dedicated Web Filtering management
  • Shared Network Access Control (NAC) management
  • Dedicated Network Access Control (NAC) management
  • Shared Log management
  • Dedicated Log management
  • Shared SIEM management
  • Dedicated SIEM management
  • Shared SSL VPNmanagement
  • Dedicated SSL VPNmanagement
  • Shared Site-to-Site VPN management
  • Dedicated Site-to-Site VPN management
  • Vulnerability Scan management
  • Security Operations Center

    Firewall:

    Basically, it is used for the provision of network traffic from, and to, internet in a controlled way. Thus, the security of your systems is leveraged by limiting any access other than the authorized ones. This service can be offered as Shared Firewall, Dedicated Firewall and Virtual Dedicated Firewall, and it can be provided for systems both at KoçSistem Data Center and at the customers’ locations.

    Intrusion Prevention System (IPS):

    These are systems ensuring the prevention of intrusions on customers’ systems which can be conducted either through known intrusion methods or through behavioral methods going beyond normal. Offered as either Shared IPS or Dedicated IPS, this service can be provided for systems both at KoçSistem Data Center, and at the customers’ locations.

    Web Application Firewall (WAF):

    These are systems incorporating special protection methods against intrusions developed for web application servers. Offered as either Shared WAF or Dedicated WAF, this service can be provided for systems both at KoçSistem Data Center, and at the customers’ locations. Shared WAF service can also be provided for systems outside KoçSistem Data Center by utilizing a virtual dedicated structure.

    Application Level DDOS Intrusion Prevention:

    With this system, protection against DDOS intrusions, the most common intrusion type realized through internet, is offered. In the DDOS intrusion type realized at the application level, service interruption can be created even though the internet bandwidth is not filled. In this inline mode service type, the 7×24 accessibility of systems is increased through provision of protection against the WEB, DNS, RDP, etc. intrusion types conducted at application level. Shared DDOS or Dedicated DDOS services can be preferred.

    Web Filtering (URL):

    It is used for the controlled provision of customers’ access to web sites. Thus, access to sites publishing malicious content or which could cause performance loss can be limited. This service can be offered as Shared Web Filtering or Dedicated Web Filtering.

    Anti-Spam:

    These are systems used for filtering spam or e-mails incorporating security threats. Offered as either Shared Anti-Spam or Dedicated Anti-Spam, this service can be provided for mail servers both at KoçSistem Data Center, and at the customers’ locations.

     

  • Proactive Security

    Log Management:

    This constitutes a service by which the logs gathered from all servers and network systems are kept as hash or electronic time-stamped via IBM QRadar system. As timestamp, TUBITAK’s timestamp is used. Offered as either Shared Log Management or Dedicated Log Management, this service can be provided for systems both at KoçSistem Data Center, and at the customers’ locations.

    Vulnerability Tests:

    This is a service type which reveals the security gaps available in the whole system or network up to the level of application. This scanning service can be performed on the determined source network segment and at determined intervals.

    Penetration Tests:

    This service aims to find out security gaps by using various methods and to present the extent of risk by accessing systems via these gaps. This service can be performed at designated network sections according to defined periods.

    SIEM Management:

    This is a service type that ensures the correlation of logs gathered from all the systems of the customers who receive Log Management services through IBM QRadar system, and thus, generation of alarms. In this service type provided by the SOC Team consisting of 10+ members with IBM QRadar competence, no limits are applied for the rules of correlation to be created. Offered as either Shared SIEM Management or Dedicated SIEM Management, this service can be provided for systems both at KoçSistem Data Center, and at the customers’ locations.

  • Data Center Security

    Load Balancer:

    These are systems enabling the provision of the same service with various algorithms by multiple servers. Thus, issues such as capacity utilization, updating and maintenance are facilitated and it is ensured that the systems are always accessible. Offered as either Shared Load Balancer or Dedicated Load Balancer, this service can be provided for systems both at KoçSistem Data Center and at the customers’ locations.

    Intrusion Prevention System (IPS):

    These are systems ensuring the prevention of intrusions on customers’ systems which can be conducted either through known intrusion methods or through behavioral methods going beyond normal. Offered as either Shared IPS or Dedicated IPS, this service can be provided for systems both at KoçSistem Data Center, and at the customers’ locations.

    Web Application Firewall (WAF):

    These are systems incorporating special protection methods against intrusions developed for web application servers. Offered as either Shared WAF or Dedicated WAF, this service can be provided for systems both at KoçSistem Data Center, and at the customers’ locations.

    Shared WAF service can also be provided for systems outside KoçSistem Data Center by utilizing a virtual dedicated structure.

    Application Level DDOS Intrusion Prevention:

    With this system, protection against DDOS intrusions, the most common intrusion type realized through internet, is offered. In the DDOS intrusion type realized at the application level, service interruption can be created even though the internet bandwidth is not filled. In this inline mode service type, the 7×24 accessibility of systems is increased through provision of protection against the WEB, DNS, RDP, etc. intrusion types conducted at application level. Shared DDOS or Dedicated DDOS services can be preferred.

     

  • Network Security

    KoçSistem offers end-to-end customized solutions in areas such as Network, Data, Platform and End Point Security, to ensure the security of all IT layers of an organization.

    What are the advantages Security Solutions?

    • With KoçSistem, be sure of the security of your systems, benefiting from our end-to-end security solutions with a focus on all your IT needs, instead of security services focusing only on a single point.
    • Benefiting from the experiences of our competent staff, you reduce your costs by decreasing the number of possible errors thanks to our securer IT processes and security solutions that will minimize the information loss.
    • You benefit from the knowledge of our competent technical staff, which pursue current technological advances and have gained experience by participating in many projects.
    • You can reach us 24 hours and 7 days, for any requests and problems related with our solutions, thanks to our SLA-based service approach.
  • End Point Security

    VPN:

    This is the structure that caters for the customers’ need for secure access to their own systems (SSL, VPN, and IPSEC) or to other companies’ systems (site-to-site) through insecure media such as the internet. Offered as Shared SSL VPN, Dedicated SSL VPN, Shared Site-to-Site VPN, or Dedicated Site-to-Site VPN, this service can be provided for systems both at KoçSistem Data Center, and at the customers’ locations.

    Hotspot:

    With this dedicated service type ensuring special internet access for visitors, many authentication methods can be used. One of many authentication methods, such as SMS, card entry, card pass system integration, or NVI, can be determined according to the need of the customer. In addition to provision of internet access to visitors, logging needs, pursuant to Law no. 5651, can be met, if requested.

    Network Access Control (NAC):

    These are solutions aimed at the needs of identity authentication, classification and authorization during cable or wireless network access of all devices. Thanks to these solutions’ responses to questions such as who connected or which devices are connected to the network, the services, applications and versions operating on such devices, are given through traceability, and at the same time, it is ensured that any network ends cannot be used as access point by unauthorized persons beyond your knowledge. Offered as either Shared NAC or Dedicated NAC, this service is provided for end users at the customers’ locations.



Network Security Services

fiziksel_guvenlik_hizmetleri_flow

KoçSistem offers end-to-end customized solutions in areas such as Network, Data, Platform and End Point Security to ensure the security of all IT layers of an organization.
 

What are the advantages of Security Solutions?

With KoçSistem, be sure of the security of your systems by benefiting from our end-to-end security solutions with a focus on all your IT needs instead of security services focusing only on a single point.

Benefiting from the experiences of our competent staff, you reduce your costs by decreasing the number of possible errors thanks to our securer IT processes and security solutions that will minimize the information loss.

You benefit from the knowledge of our competent technical staff which pursue current technological advances and have gained experience by participating in many projects.

Thanks to our SLA-based service approach, you can reach us 24 hours and 7 days, for any requests and problems related with our solutions.

Physical Security Services

KoçSistem develops projects for the implementation of security systems of significant facilities, such as plazas, campuses and airports, by utilizing various electronic security systems like IP video technologies, video content analyses, over-wire detection systems and card pass systems, and integrating such systems with each other.

What are the advantages of Physical Security Solutions?

With the physical security management platform developed by KoçSistem, you can manage various security and business systems on a single platform.

Thanks to this platform, you can ensure reduction of human errors and a more efficient security management through the integration of information received from different security and business systems into work flows.

With the management of all security sub-systems and business systems under a single software, you can enable central control and rapid decision-making.

You can increase your operational productivity with its flexible design and information systems-friendly architecture.

fiziksel_guvenlik_hizmetleri_flow
How can we help you?






Site İçinde Arama