NEW GENERATION CYBER SECURITY MANAGEMENT SYSTEM

The SIEMPLUS CSM platform, which has the ability to automatically update the correlation rules, is a new generation integrated SIEM solution that enables the attack to be detected without the need for the user to write a correlation rule for any known vulnerability. With the additional modules it has, it ensures both the fastest detection of cyber threats and the detection of all oddities on the network. SIEMPLUS CSM Platform; It has been designed as a combination of many different products in order to detect the problems that may occur in the system, to check the accuracy of the problems experienced and to detect the problems that may occur in the future. SIEMPLUS CSM also enables the best management of the cyber security operation thanks to the Alarm Management System on which it is hosted.

It is the module that provides the most advanced threat detection with central collection of all kinds of logs produced in the system and 6.500+ ready-made correlation rules defined on it. Its advanced and user-friendly interfaces, which ensure that all kinds of rules suitable for the needs of the institution can be written in the simplest way, ensure the creation of a sustainable security infrastructure.

It is the module that determines the vulnerabilities used by the attackers and how they should be eliminated. In this way, possible risk points are eliminated and the security level of the system is increased.

It is the working module for detecting the anomalies that may occur on the server.

It is the module that monitors the status of ports and services on the server and active devices on the network. In addition, flow analysis on the terminal units connected to the center is also provided.

It is a module that allows to monitor activities such as reading, deleting, changing on a certain file or folder on server or user computers. In this way, suspicious activities on the files are monitored and alarms are generated.

Thanks to the world's largest threat database, which is constantly updated hourly, all kinds of vulnerabilities are detected. This module also provides automatic updating of correlation rules in order to generate detection and alarm on the system.

It is the module that ensures that the odds detected on the system are followed by the administrators and managed in the best way.

Examining the traffic between the two servers with the application management module on it, helps to extract all the details about the applications and to reveal the strangeness in the systems. Thanks to its enhanced learning intelligence, it enables all details to be extracted and oddities to be detected on applications. (in development)

It is the module that manages adding rules to firewall systems, active devices, operating systems or security applications after alarms related to threats on the system, and manages scenario-based approvals and actions. (in development)

It is a module developed to transmit logs produced by servers and applications in cloud systems to the Central system.

It is an intelligence research module in which the information of corporations disclosed in the dark web, deep web and internet world is checked and attack plans are investigated.

It is the module that provides reporting activities for maintaining the system in the best way with ready report templates that can meet different needs in accordance with ISO 27001 and PCI DSS on the collected logs. It is also available on special screens where the user can create their own custom reports.

Apart from these modules, the SIEMPLUS CSM - Cyber Security Management System is the set of interfaces planned by user authorization and the reactions to be given after the alarms in order to manage the system in the best way. With its holistic approach, it is the only solution that ensures the fastest detection of threats on the network, the organization's living in harmony with the cyber world with the lowest risk, and the healthy management of cyber security operations.

What it means ?

Cyber security end user control over their computer as part of a central structure, authorizations and controls provide and end-user activity is detected on computers and find out the usual activities of an unusual, suspicious action automatically send an alert to the competent Control Authority automatic stopping, both internal and external cyber threats is one of the most effective measures that can be taken against. In this way, it is possible to monitor user activity on end-user computers, filter, block malicious behavior, and inform corporate administrators in such cases.

Important Features That Distinguish TERAMIND From Competitors

Other products found throughout the world that do not have properties; optical character recognition, and Turkish language support actively monitoring the record screen, and all media justification from the user (on the computer, a web page, on the application), users can track all activities and the process of directing the work of secret agents, the agent is installed on the computer to get a load hardware, open-source operating system have.

In addition Teramind has the following features;

  • Monitor active screen and past Screen Records
  • Tracking websites that users visit
  • Tracking the applications that users use
  • Automatic code of conduct
  • Agent setup and Removal Operations via remote connection
  • Instant mail, app messaging tracking
  • Monitoring of all file operations performed on the user's computer
  • Project management integration(basecamp, jira, trello, redmine)
  • SIEM Integration(It works integrated with all SIEM products.)
  • Efficiency analysis (Keeps track of staff working times.)
  • Network monitoring (Analyzes all network traffic coming out of the user's computer in the framework of ports and protocols.)
  • OCR (Optical Character Recognition) : defines every word that can be seen with the eye on the user's screen. This allows you to search for relevant words.
  • Social Media Tracking (Facebook, Twitter...)
  • LDAP Integration
  • Determination of external storage unit usage
  • RDP tracking

Virtual hacking lab environment

With the 'HackexLab' virtual laboratory environment designed by the experienced staff of ArmiS Bilişim through real-life scenarios, you will be able to develop your skills and capabilities in the field of cyber security, refresh your information and test yourself. Every step of a classic penetration test on machines waiting for you on the network you connect to via VPN; you will be able to perform the tasks of collecting information, network discovery, vulnerability scanning, infiltration attempts, access and protection, clearing traces.

An easy-to-manage web panel where you can see and save your progress.

A virtual and realistic network environment built with VPN technology that you can access from anywhere.

Instead of CTF logic, it's scenarios that our real experts face in real life.

Instead of CTF logic, it's scenarios that our real experts face in real life.

It is a module that monitors the status of ports and services on servers and active devices on the network. Flow analysis on the end units connected to the center is also provided.

Regular scenario additions for new vulnerabilities and attack techniques.

Ability to ask experienced hack|ex experts for any problems you may encounter via ticket.

What it means ?

A continuous Identity, Credential and Access Management (ICAM) software solution is the foundational component of ANY Zero Trust solution. RESILIANT ID™ enables the right individual to access the right applications and services at the right time, for the right reason. Are you who you claim to be and what are you permitted to access?
 
RESILIANT Zero Trust Zone™ protects specific applications and services providing who can access what, where, when, and for how long based upon the credentials issued in RESILIANT ID™. The Zero Trust Zone envelopes and cloaks critical applications and services in a specified Trust Zone so they are ONLY accessible to those who have the appropriate credential to access them. Anyone else will not even see the Applications and Services within the Trust Zone
  • Affordable identity management and risk protection with scalability for all devices, servers, networks and high-volume users.
  • Simple API integration into business infrastructure without any additional internal investment or hardware
  • Engage in proactive user authentication and verification at every access point, keeping your business safe from unverified and unexpected dangerous intrusions. Only authenticated users are granted access to the specific applications, systems or IT environments for which they are authorized.
  • Verify and protect user privacy globally in 140 languages, 250+ countries and territories, with 10,000+ different ID document templates covered. No liability for private data storage.
  • Automatically complies with privacy regulations, data management standards (GDPR, ISO) and zero trust architecture models (NIST, CISA, EO 14028) by nature of the system and its features.
  • Unique Demographic BIAS mitigation in Biometric analysis – our patented IdNFTTM is for all the citizens of the world!

What it means ?

The new generation, which can work without Radius and Agent integration, has been completely developed with domestic and national resources, and allows you to keep the security, manageability and control of your corporate network in your hands.
 

Easy Operation

With its easy-to-use interface, you can perform all operations quickly and easily via the panel. Dec. It is not complicated like other NAC products.
 

There is No Radius Dependence

You can quickly ensure your network security without the need to configure extra Radius network devices on your corporate network.
 

There is No Agent Installation

You can keep your network secure without the need to install any agents on the devices of end users connecting to your corporate network.
 

Advanced Rule Set

You can make VLAN assignments according to Mac addresses, according to the Antivirus program, according to the Windows version, according to installed programs and running services on end-user devices.
 

Switch-Based Assignment

For users who comply with the access rules, you can make different WLAN assignments independently of each other on each switch and ensure your network security.

Department (OU) Based Assignment

With the Active Directory integration, you can easily make custom VLAN assignments based on the Department (OU- Organizational Unit).
 

Hybrid Model

You can make VLAN assignments according to Mac addresses, according to the Antivirus program, according to the Windows version, according to installed programs and running services on end-user devices.
 

Automatic Device Detection

The endpoint devices in your network environment are detected in detail up to their brand and model by automatic traffic scanning / analysis.
 

Integrated Work with Ip Phones

It automatically detects IP phones and works smoothly and quickly with the computers behind the phone.
 

Easy Integration with Other Products

By offering API support, it can be easily integrated by exchanging two-way data with other software.
         

What it means ?

SSpot is a security software developed for tracking, time-stamped logging and control of your wired / wireless internet access service you offer in your business in accordance with the law No. 5651. With Sspot you can control and manage all your connection traffic. TC ID No. control, SMS verification, Filtering, etc. you can take advantage of many features.
 
SSpot is widely used in institutions, public spaces, open spaces, shopping malls, public transportation vehicles, airports, etc. it is designed for uninterrupted and secure internet at many points.
 
You can extend the internet access of your guests for any period of time, cancel the access instantly, reopen the canceled access and log the person's activities with a time stamp as stipulated by law No. 5651. You can also see the characteristics of the device to which people are connected.

Easy Operation

Filtration System

Secure and Uninterrupted Communication

Full Backup

Features

  • Logging in Accordance with the Law 5651
  • Compatible with KVKK
  • DNS Filtering
  • Widelan Feature
  • DHCP Forcing
  • Centralized Monitoring
  • Central Management
  • Survey via E-mail and Application
  • Login integration with Social Media applications (Instagram, Google+, etc.)
  • 7/24 Technical Support

Strengthen your cyber defense shield with actionable threat intelligence

ClearSky is made up of intelligence researchers and cyber experts who monitor, analyze and categorize attack groups and cyberattacks around the world. Our experts monitor and evaluate the methods, infrastructure, tools and targets of APT groups and other cyber attackers (24X7). We use our own unique set of tools that will go “deep” into the gathering sites and evaluate their cyber weapons and attack infrastructures. We serve organizations well beyond the company's perimeter by collecting relevant and customer-specific data, giving them early warning alerts and helping them mitigate attacks. Our unique ClearSkySec © methodology is based on years of experience in reducing cyber attacks for expertise in the financial sector, the public sector and the pharmaceutical and critical infrastructure sectors.

Solution Components and More

We know that each organization has its own unique cyber threats, state-related, industry-related, application-related, and also different preventative methods applied to reduce attacks. We know that SIEM and SOC staff cannot cover all aspects of cyber defense, and we help them face new threats on a daily basis. Our threat intelligence solution provides an external layer of protection added to existing internal layers. Using our ClearSkySec © methodology, we provide critical data to help organizations focus their security resources on the prevention and Prevention of relevant cyber threats.
Solution components;
  • Threat map and advanced cyberspace vision.
  • Match the main attack groups targeting the organization.
  • A list of weapons and infrastructures owned by the attackers.
  • Attack vectors distributed by each actor.
  • Identifying vigilant and activist hackers.
  • Real-time cyber attack operations team.