top of page

Search Results

27 results found with an empty search

  • APIFort | Cyberport

    APIFORT, geniş bir güvenlik tehditleri ve zayıflıklar yelpazesine karşı API'ler korumak amacıyla tasarlanmış gelişmiş bir siber güvenlik çözümüdür. APIFORT, modern web uygulamalarını, mikro servisler ve bulut, yerinde (on-prem) ve hibrit ortamlardaki API'leri korur. APIFort Nedir? APIFort, API’leri (yani yazılımlar arası veri iletişim noktalarını) modern siber tehditlere karşı koruyan gelişmiş bir API güvenlik çözümüdür. Hem bulut hem şirket içi (on-premise) hem de karma (hybrid) ortamlardaki API’leri korur. Neden API Güvenliği Önemli? API’ler artık web uygulamaları ve mikroservislerin merkezindedir. Bu yüzden: Veri hırsızlığı, Yetkisiz erişim, Anomali (şüpheli trafik) tespiti, Kritik verilerin korunması, OWASP API güvenlik riskleri, Güvenlik standartlarına uyum gibi büyük risklerle karşılaşılır. APIFort bu riskleri azaltmak için geliştirilmiştir. APIFort’un Temel Özellikleri ✔️ Otomatik API keşfi: Tüm API’leri ve uç noktaları bulur. ✔️ Gerçek zamanlı saldırı tespiti: Anında API saldırılarını fark eder. ✔️ Anomali ve davranış analizi: Trafikteki şüpheli hareketleri yakalar. ✔️ Risk skoru: API’lerin güvenlik riskini puanlar. ✔️ Kritik veri tespiti: Hassas verileri bulur ve izler. ✔️ Shadow/Orphan/Zombie API tespiti: Belgelenmemiş veya unutulmuş API’leri ortaya çıkarır. ✔️ Güvenli kodlama desteği ve sürekli test desteği sağlar. Nasıl Çalışır? APIFort: API’lerinizi otomatik olarak tarar ve envanterini oluşturur, Trafiği izler ve anormal davranışları öğrenir, Gerçek zamanlı olarak saldırıları tespit eder, Riskli noktaları skorlayıp önceliklendirir, Güvenlik ekiplerine net bilgiler sunar. APIFort, API güvenliğini görünür, izlenebilir ve sürekli korunan bir hale getirir; riskleri otomatik olarak tespit eder, saldırılara karşı gerçek zamanlı savunma sağlar ve mevcut güvenlik süreçlerinizle entegre olur. Entegrasyon ve Kolay Kullanım SOAR Rapid7 InsightConnect Splunk Phantom Cortex XSOAR (Demsto) Evrensel Entegrasyon General WebHooks Public APIs Atlassian Jira SIEM Splunk SIEM Splunk Phantom Cortex XSOAR (Demisto) Mesajlaşma Uygulamaları Slack MS Teams Telegram < Back APIFort Protect APIs, Secure the Future

  • TDM | Cyberport

    Yazılım test sürecinin önemli bileşenlerinden biri test verilerinin yönetimidir. Test verisi yönetimi, bir kuruluşun gerçek verilerini güvenilir bir şekilde taklit eden veri kümelerinin oluşturulmasıdır ve böylece sistem ve uygulama geliştiricileri daha titiz ve geçerli sistem testleri gerçekleştirebilirler. Gerçek veriler, güvenlik ve mevzuat kaygıları nedeniyle genellikle bir test sisteminde kullanım için uygun değildirler. A key component of the software testing process is test data management. Test data management is the creation of data sets that reliably mimic an organization’s real data so that system and application developers can perform more rigorous and valid system testing. Real data is generally not suitable for use in a test system due to security and regulatory concerns. In order to protect data that contains personal information from development and testing teams, this data must be modified for testing. TDM is used in corporate companies to generate test data. As a result of digitalization and increasing application usage, the production and management needs of institutions to meet this need are also increasing. With our software solutions and KVKK application, the Test Data Management (TDM) product, which mimics the real data of institutions and creates data sets, will now ensure the protection of sensitive data from the developer teams of institutions. In addition, the Test Data Management (TDM) product has entered the product catalogue of global software provider OpenText to be sold worldwide. Benefits: Test data preparation is a large part of the total effort spent on testing. Test Data Management significantly reduces the time required for this effort. Ensures the security, consistency and integrity of test data. It prevents people's sensitive data from being visible to development and testing teams. Provides test data similar to real data. Transfers test data between environments faster than before. Provides bidirectional test data transfer between databases and files. It helps organizations develop higher quality software. Dashboard It is a management tool that allows the entire test operation to be monitored on a single screen, based on personnel. Current Data Generation Suite & Case study reports can be viewed. Success and failure rates are shown in Daily Transaction Counts and Weekly Transactions. Additionally, when Data Generation Suite & Case is selected, the Status Report and Duration Report are displayed at the bottom of the page for that transaction. History Screen You can see all your transactions on the History screen and follow them from this area. Data Generation Suite & Case transaction details can be accessed. Successful and unsuccessful details are shown. Each transaction output can be accessed from this area. Details of successful and unsuccessful logs can also be accessed from this screen. Project Screen These are the pages where new projects are created and the created projects are listed, by determining which project the test data will be created within. More than one project can be created. Projects can be granted authorization to specific users. Business Flows can be defined individually on a project basis. You can easily query Selectable Business Flow and Selectable Users fields using Filtering. You can update your Project from the listing page and manage it as you wish. Project & Suite Management Domain and Product Definitions can be made. Authorization and user-based role definition can be made. Authorization can be done on a user and group basis. Data Generation Suite & Case Management and Reporting can be done. Data Generation Suite Management: Test work of projects can be separated and grouped. The created groups are listed. Test data is obtained from these groups. Here, the user can select all or any Data Generation Cases he/she wants and run them by giving parameters. Test Case Management Test data with the desired flexibility can be produced. By giving priority, the system will work efficiently. Collective management can be achieved. Rapid adaptation to changing systems will be ensured. It can be run according to the parameter values of the Cases selected on the Data Generation Suite & Case screens. Status information is shown on the listing page. The data generated for successful cases can be accessed from the history page. You can also see which parameter was used for which operation on the history page. Dynamic Data Generation All SDM capabilities are available. Data Transfer, Masking, Recovery Web Service Integration Rapid adaptation to changing systems will be ensured. < Back Test Data Management (TDM)

  • Cyberport Bilisim Hizmetleri

    Siber Güvenlik, API Güvenlik, LLM, Yapay Zeka, Mobil Güvenliği, Veri Güvenlik, Veri Maskeleme, API Pentest, Outsourcing, Cyberport As Cyberport Information Services, we bring a brand new perspective to the business world with innovative projects in the digital world. We help companies gain competitive advantage in the rapidly changing digital environment. New technologies, fast solutions... Who Are We? Ürünler Ürünler Products Our products are brought together to optimize your business processes, increase efficiency and provide competitive advantage. Discover the digital potential of your company, let's write the future together. API Pentest & API Security Data Security & Data Discovery Artificial Intelligence (AI) Solutions Mobile Security Services Hizmetler Cybersecurity Solutions Data Discovery and Innovation Big Data Analytics LLM & AI Security Dynamic Data Masking Network Security Solutions Mobile Application Security Mobile Web and e-Commerce Projects Data Security Human Resources and Process Management Contact Location Esenyalı Mah. Yanyol Cad. Varyap Plaza No:16 İç Kapı No: 247 Pendik / İstanbul Phone Phone: +90 850 309 7130 Fax : +90 850 522 3403 Mail info@cyberportbilisim.com Linkedin

  • Cyberport Bilisim Hizmetleri

    API Güvenliği, LLM, Mobil ve Veri Güvenlik, Maskeleme hizmetlerinde uzman çözüm ortağınız. Proaktif koruma. Ürünler Ürünler Mobile Security Our mobile security technology is an advanced protection system that monitors your application in real-time, detecting, blocking, and reporting potential attacks in detail. Integrated into the application, it proactively detects not only external threats but also potential risks through internal behavioral analysis. Thanks to various security mechanisms, it stops attack attempts, prevents unauthorized access, and ensures uninterrupted security by continuously monitoring the integrity of the application. MWGuard

  • WizeBuddy | Cyberport

    WizeBuddy, şirketinizin insanlarını, belgelerini, uygulamalarını ve süreçlerini tek bir arayüzde sorunsuz bir şekilde birbirine bağlayan AI destekli bir Sanal Asistandır. What Does WizeBuddy Do? WizeBuddy is an AI-powered Virtual Assistant that seamlessly connects your company's people, documents, applications, and processes in a single interface. Use Cases - Human Resources Departments CV Search Assistant: Speed up your recruitment process! It finds the most suitable candidates from thousands of CVs in seconds and recommends them for you. Onboarding Assistant: Manage your new employee onboarding processes seamlessly. Discover the AI solution that automatically manages documentation, training, and all process steps. Contracts Virtual Assistant: Take your contract processes to the next level with the AI assistant that gives you quick access to all the information you need about contracts. Save time with instant access to the right information. AI Process Automation Assistant: Save time and money by automating your business processes with AI. It quickly handles routine tasks for you and automates your process flows. Employee Request Support Assistant: Provide instant support to employees and streamline human resources processes with AI. Where does the service come from? Optimize your time and workload by instantly answering a wide range of employee questions, such as "How do I list my leave?" Email Assistant: Organizes your inbox, instantly replies to your emails, and helps you communicate more effectively. Make email management effortless. Voice Assistant: Understands user conversations and answers questions. Saves time, increases accessibility, and provides quick access to information. - IT Help Desks Voice Response Assistant: Understands user conversations and answers questions. Saves time, increases accessibility, and provides quick access to information. - Sales Department Voice Response Assistant: Understands customer requests and answers questions. Saves time, increases accessibility, and provides quick access to information. Benefits Effective Task Automation Smart Integrations 24/7 Availability Cost and Time Savings 40% Reduction in Opened Tasks 40% Reduction in Workforce Improvement in Employee and Customer Satisfaction Ready-to-Use Integrations for Every Organization Microsoft Teams . SAP Successfactors Microsoft Sharepoint . Workday Kolay IK . Azure CosmosDB Confluence . ElasticSearch File Connector . Jira Salesforce . Whatsapp Email . Slack AWS S3 . Google Drive Zendesk . Azure Blobe Storage All Databases . Outlook . Google Calendar < Back WizeBuddy Your Virtual Assistant

  • Hizmetler | Cyberport

    Siber Güvenlik Çözümleri, Veri Keşfi ve İnovasyon, İnsan Kaynakları ve Süreç Yönetimi, LLM & Yapay Zeka Güvenliği, Dinamik Veri Maskeleme, Mobil Web ve e-Ticaret Projeleri,Mobil Uygulama Güvenliği,Büyük Veri Analitiği​​ Who Are We? < Back Siber Güvenlik Çözümleri Veri Keşfi ve İnovasyon Mobil Web ve e-Ticaret Projeleri LLM & Yapay Zeka Güvenliği Dinamik Veri Maskeleme Ağ Güvenliği Çözümleri Mobil Uygulama Güvenliği Büyük Veri Analitiği Veri Güvenliği İnsan Kaynakları ve Süreç Yönetimi

  • Cyberport Bilisim Hizmetleri

    Yapay Zeka, API Güvenliği, LLM, Mobil ve Veri Güvenlik, Maskeleme hizmetlerinde uzman çözüm ortağınız. Proaktif koruma. Ürünler Ürünler API Security & API Pentesting Since APIs form the backbone of digital services, API Security and API Penetration Testing processes are the most critical way to proactively identify vulnerabilities in these vital gateways to secure your systems against cyberattacks. APIFort ApiStrike

  • LLMFort | Cyberport

    Kullanıcı ile model etkileşimi izleyen, potansiyel zararlı komutları modele ulaşmadan analiz edip engelleyen savunma katmanıdır. LLMFort Your AI Security Solution - Control Commands, Manage Risks. LLM Security? Large Language Models (LLMs) are revolutionizing the business world while also creating a new attack surface in organizations' security architectures. Traditional security tools are insufficient to detect language-based and context-manipulation-based threats like prompt injection. Therefore, an advanced defense layer is needed that monitors all user-model interactions, analyzing and blocking potentially harmful commands before they reach the model. LLM Firewall makes this interaction secure, monitorable, and controllable. 5 Notable LLM Cases 1. Samsung and ChatGPT (Data Leak): Employees leaked sensitive corporate data by pasting confidential source code and meeting notes directly into ChatGPT to request assistance. 2. OpenAI and ChatGPT (Personal Information Leak): A platform bug allowed some users to view chat threads and leaked Plus subscribers' payment information (Personal Information Leak). 3. Microsoft Copilot (Indirect Injection): Malicious commands hidden in emails tricked Copilot into digesting corporate data and sending it to an attacker URL. 4. Google NotebookLM (RAG Leak): A malicious document exposed a vulnerability in RAG (external data) systems by stealing information from other confidential documents in the model's memory. 5. Common Jailbreak Case (System Command Exposure): Jailbreaking techniques like "DAN" have allowed major models to bypass security filters and expose hidden system commands that govern their behavior. What is LLMFort? LLMFort is an intelligent security shield that secures the use of enterprise AI. It centrally monitors all user and application interactions, preventing prompt injection, data leaks, and policy violations before they reach the model. LLMFort prevents artificial intelligence from becoming an uncontrolled risk and enables your organization to demonstrate its innovation power with confidence. Key Features of LLMFort 01 LLM Discovery 02 Inline/Out-band Prompt Control 03 AI Guardrail Rules 04 EnterpriseChat UI 05 Current LLM Inventory 06 Regex / Keyword Rules 07 OWAPS Top 10 GENAI 08 Enhanced Integrations How Does LLMFort Protect? 1- Captures and Analyzes Communication: It handles all LLM requests from users (Chat) or applications (API) as a central proxy and initiates the security audit process. 2- Performs Multi-Layered Security Scanning: Instantly applies predefined corporate policies. It processes prompts through a multi-layered scan using advanced keyword, Regex, and semantic analysis engines. 3- Detects Risks and Violations: As a result of the scan, it instantly identifies risks and vulnerabilities such as prompt injection, data leakage (PII, Secrets), violations of company policy, or toxic content. 4- Instantly Intervenes Based on Rules: Instantly applies the action defined in the rule (Block, Mask, or Deny) based on the detected risk. This eliminates the threat before it even reaches the LLM model. LLMFort Architecture - Inline Firewall LLMFort Architecture - Out-band Centralized Permission and Policy Management 100% Auditable Communication Corporate Identity Integration Local Power, Global Vision LLMFort is an LLM security platform developed with 100% domestic technology. Full Compliance with Legislation and Personal Data Protection Law (KVKK): Local infrastructure facilitates regulatory compliance. Local Support and Service: Rapid response, effective communication without language barriers, and sustainable service quality. Flexible Development and Organization-Specific Adaptation: Rapid response to changing needs, customizable architecture.Data Security: All data is hosted domestically, minimizing external dependency and the risk of data leakage. Fast Procurement and Project Processes: Uninterrupted installation, integration, and support. SOAR Rapid7 InsightConnect Splunk Phantom Cortex XSOAR (Demsto) Messaging Apps Slack MS Teams Telegram SIEM Splunk SIEM Splunk Phantom Cortex XSOAR (Demisto) Universal Integration General WebHooks Public APIs Atlassian Jira DevOps Tools PagerDuty Atlassian OpsGenie Jenkins Azure DevOps < Back

  • Api Güvenliği, Pentest, LLM, Yapay Zeka, Veri Keşfi, Mobil Veri Güvenlik, Maskeleme, Yapay Zeka, Cyberport

    Hassas verilerin takibi hem kişisel verilerin korunması hem de verinin kötüye kullanım vakaları için çok önemlidir ve büyük veri ortamlarında, hassas verilerin takibi oldukça zordur. Bu nedenle, hassas verilerin takibini sağlamak için bir araca ihtiyaç vardır. Data Touch (DT), data toplayan ve barındıran uygulamalarla entegre olan ve bilgileri birleştirerek verilere ayrıcalık kazandıran bir araçtır. Tracking sensitive data is very important for both personal data protection and data misuse cases, and in big data environments, tracking sensitive data is quite difficult. Therefore, a tool is needed to ensure tracking of sensitive data. Data Touch (DT) is a tool that integrates with applications that collect and host data and combines information to give privilege to data. Data Touch enables you to perceive your data with a wide range of analysis options. It helps you make data-driven decisions much more intelligently while securing your data security and privacy concerns. DT focuses on two main issues: sensitive data monitoring and data usage. Features: Visualization: Shows all projects in the same environment (from Discovery) with detailed information on purpose-built charts. Sorts projects by size and graphs classified data (sensitive and non-sensitive), sensitive types, and who accessed the data on the dashboard. Data usage: Shows details of projects (scanned by Discovery), consumers (who accessed the data), how and when they accessed it. These details can be filtered by entering a date range. Filtered tables can be exported and reported on with Excel Export. Data Analysis: Shows the details of queries for the project in three ways. Query details, The inquiries made, Queries for sensitive types. Data Heatmaps: Creates different heatmaps with predefined options for more detailed analysis of any data within the application. Table Query Count Heatmap: Shows the total number of queries for each table on a given date. Application Count Heatmap: Shows the total number of queries accessing each table from each application. Table Action Type Count Heatmap: Shows the total number of queries by action type (select, update, delete, etc.) for each table. Sensitive Type Time Heatmap: Shows the total number of queries within the selected time period for each sensitive type. Data Touch provides a privileged data inventory by tracking all usage of data held in organizations’ data warehouses by detecting applications that touch data. Using this detailed information and many data analyses provided by Data Touch, organizations can better manage data, optimize access and usage of data, reduce their carbon footprint, save data storage space by eliminating unnecessary data, increase business efficiency and reduce total costs. Data Touch also offers solutions for protecting personal sensitive data, which can be the biggest concern of organizations. Thus, they can take more security measures for their applications and data. < Back Data Touch

  • İletişim | Cyberport

    Cyberport Bilişim Hizmetleri olarak dijital dünyaya yenilikçi projelerle, iş dünyasına yepyeni bir bakış açısı getiriyoruz. Firmaların, hızla değişen dijital ortamda rekabet avantajı elde etmelerine yardımcı oluyoruz. Who Are We? Location Esenyalı Mah. Yanyol Cad. Varyap Plaza No:16 İç Kapı No: 247 Pendik / İstanbul Phone Phone: +90 850 309 7130 Fax : +90 850 522 3403 Mail info@cyberportbilisim.com Linkedin < Back

Esenyalı Mah. Yanyol St. Varyap Plaza No: 16 Interior Door No: 247 Pendik / Istanbul

All Rights Reserved – © Cyberport Bilisim. 2023

Personal Data Protection | Privacy Policy | Information Security Information

bottom of page