The SIEMPLUS CSM platform, which has the ability to automatically update the correlation rules, is a new generation integrated SIEM solution that enables the attack to be detected without the need for the user to write a correlation rule for any known vulnerability. With the additional modules it has, it ensures both the fastest detection of cyber threats and the detection of all oddities on the network. SIEMPLUS CSM Platform; It has been designed as a combination of many different products in order to detect the problems that may occur in the system, to check the accuracy of the problems experienced and to detect the problems that may occur in the future. SIEMPLUS CSM also enables the best management of the cyber security operation thanks to the Alarm Management System on which it is hosted.
It is the module that provides the most advanced threat detection with central collection of all kinds of logs produced in the system and 6.500+ ready-made correlation rules defined on it. Its advanced and user-friendly interfaces, which ensure that all kinds of rules suitable for the needs of the institution can be written in the simplest way, ensure the creation of a sustainable security infrastructure.
It is the module that determines the vulnerabilities used by the attackers and how they should be eliminated. In this way, possible risk points are eliminated and the security level of the system is increased.
It is the working module for detecting the anomalies that may occur on the server.
It is the module that monitors the status of ports and services on the server and active devices on the network. In addition, flow analysis on the terminal units connected to the center is also provided.
It is a module that allows to monitor activities such as reading, deleting, changing on a certain file or folder on server or user computers. In this way, suspicious activities on the files are monitored and alarms are generated.
Thanks to the world's largest threat database, which is constantly updated hourly, all kinds of vulnerabilities are detected. This module also provides automatic updating of correlation rules in order to generate detection and alarm on the system.
It is the module that ensures that the odds detected on the system are followed by the administrators and managed in the best way.
Examining the traffic between the two servers with the application management module on it, helps to extract all the details about the applications and to reveal the strangeness in the systems. Thanks to its enhanced learning intelligence, it enables all details to be extracted and oddities to be detected on applications. (in development)
It is the module that manages adding rules to firewall systems, active devices, operating systems or security applications after alarms related to threats on the system, and manages scenario-based approvals and actions. (in development)
It is a module developed to transmit logs produced by servers and applications in cloud systems to the Central system.
It is an intelligence research module in which the information of corporations disclosed in the dark web, deep web and internet world is checked and attack plans are investigated.
It is the module that provides reporting activities for maintaining the system in the best way with ready report templates that can meet different needs in accordance with ISO 27001 and PCI DSS on the collected logs. It is also available on special screens where the user can create their own custom reports.
Apart from these modules, the SIEMPLUS CSM - Cyber Security Management System is the set of interfaces planned by user authorization and the reactions to be given after the alarms in order to manage the system in the best way. With its holistic approach, it is the only solution that ensures the fastest detection of threats on the network, the organization's living in harmony with the cyber world with the lowest risk, and the healthy management of cyber security operations.
With the 'HackexLab' virtual laboratory environment designed by the experienced staff of ArmiS Bilişim through real-life scenarios, you will be able to develop your skills and capabilities in the field of cyber security, refresh your information and test yourself. Every step of a classic penetration test on machines waiting for you on the network you connect to via VPN; you will be able to perform the tasks of collecting information, network discovery, vulnerability scanning, infiltration attempts, access and protection, clearing traces.
An easy-to-manage web panel where you can see and save your progress.
A virtual and realistic network environment built with VPN technology that you can access from anywhere.
Instead of CTF logic, it's scenarios that our real experts face in real life.
Instead of CTF logic, it's scenarios that our real experts face in real life.
It is a module that monitors the status of ports and services on servers and active devices on the network. Flow analysis on the end units connected to the center is also provided.
Regular scenario additions for new vulnerabilities and attack techniques.
Ability to ask experienced hack|ex experts for any problems you may encounter via ticket.