top of page

Search Results

27 results found with an empty search

  • Biz Kimiz | Cyberport

    Cyberport Bilişim Hizmetleri olarak dijital dünyaya yenilikçi projelerle, iş dünyasına yepyeni bir bakış açısı getiriyoruz. Firmaların, hızla değişen dijital ortamda rekabet avantajı elde etmelerine yardımcı oluyoruz. Who Are We? Who Are We? CyberPort Informatics is a company aiming to provide a fresh perspective to the business world. With our 25 years of experience in the mobile, aviation, banking, insurance, and retail sectors, and our technology-savvy consultants, we aim to produce fast and efficient solutions for our clients. As Cyberport Informatics, we help companies achieve fast, measurable, and cost-effective projects in their digital transformation journey by providing professional team support and new technology assistance. As your business partner, we offer: • Cybersecurity Solutions • LLM and Artificial Intelligence Security • Mobile Application Security • Data Security • Data Discovery and Anonymization • Dynamic Data Masking • Big Data Analytics • AI Contract Management • AI HR Onboarding Process Management • Mobile, web, and e-commerce project development services < Back

  • Cyberport Bilisim Hizmetleri

    Api Güvenliği, Pentest, LLM, Yapay Zeka, Mobil Veri Güvenlik, Maskeleme, Yapay Zeka, API Güvenliği, LLM, Mobil ve Veri Güvenlik, Maskeleme hizmetlerinde uzman çözüm ortağınız. Proaktif koruma. Ürünler Ürünler Data Security & Data Discovery Discover our solutions designed to explore and understand your data—the most valuable asset of the digital age—with a wide range of analytical options. While fully safeguarding your data security and privacy concerns, we focus on sensitive data monitoring and usage, ensuring all access and changes to your critical database systems occur in a planned and secure manner without the need to enable auditing, thus helping you make much smarter, data-driven decisions. Data Focus Datascope Test Data Management (TDM) Dataspin Data Touch Dataspin

  • BitBox | Cyberport

    Cyberport, işletmelerin dijital dönüşüm yolculuğunda öncü bir ortak olarak öne çıkıyor. Profesyonel ekip temini, yeni teknoloji desteği ve agile yöntemlerle, firmaların hızlı, ölçülebilir ve maliyet etkin projeler gerçekleştirmesine liderlik ediyoruz. Şirketinize Özel Yazılım Çözümleri, Dış Kaynak Sağlama (Outsourcing) Hizmeti, Dijital Dönüşüm Danışmanlığı, Yönetilebilir Hizmet Danışmanlığı, Yazılım Geliştirme, Ürünlerimiz: Wizebuddy, BitBox, APIFort, ApiStrike, Data Focus, Test Verisi Yönetimi Secure your assets with BitBox… BitBox is a product that your company will need to work with digital assets. We offer you our BitBox application suite to manage your digital asset operations and a complete development platform to build your business on blockchain. We offer custody services and end-to-end wallet solutions. Protect your crypto keys with industry-leading security technologies. Become a “qualified” custodian. With BitBox, we provide the flexibility to deploy blockchains on a single platform as part of our custody solutions. On the platform, you can provide the ability to receive and send assets, keep the user's balance and track transactions. Offer white label exchange as a service solution to trading companies. With the Bitbox Trading Platform, exchanges have the flexibility to provide users with the ability to buy and sell assets. Integration is easy with ready-to-use BitBox APIs. BitBox features excellent integration with banks, crypto exchanges, and blockchains. Exchanges, retail aggregators, and software companies use our wallet and API technology to power their backend systems. < Back BitBox

  • Datascope | Cyberport

    DATASKOPE ürününün temel işlevi kritik veri tabanı sistemlerine yapılan erişimlerin ve değişikliklerin beklenen, planlı ve istenen şekilde olduğundan emin olmaktır. Tüm bu işlemleri veri tabanında denetim özelliğini açmadan yapabilirsiniz. The main function of the DATASKOPE product is to ensure that access and changes to critical database systems are as expected, planned and desired. You can do all these operations without activating the audit feature in the database. DATASKOPE detects, classifies, generates alarms and reports the events that occur in your database systems. It is a database audit product that allows you to easily access information about who accessed sensitive data and which operations were performed at what intervals, and allows authorities to be informed about the events with predefined alarm rules. You can perform the following audits and report with DATASKOPE: Login – Allows you to track successful and unsuccessful logins to the database. Data content change – Allows you to track commands such as SELECT, UPDATE, DELETE, EXEC, etc. Access Tracking – Allows you to track who accessed sensitive data. Database Administrator Audit – Tracks user creation, deletion, etc. and allows you to take action. Classified Audit – Allows you to decide who can view transactions based on user, database, table, command. Reporting – Allows you to get reports that comply with standards such as ISO27001, COBIT, PCI, SOX. NoSQL Search Engine Horizontally and vertically scalable. Geographically and locally redundant Distributed search across multiple units Automatic backup and archiving Automatic masking of sensitive data T.R. identity recognition and masking Credit card recognition and masking Email recognition and masking RegEx (Regular Expressions) desteği < Back Datascope

  • Ürünler | Cyberport

    Ürünlerimiz, iş süreçlerinizi optimize etmek, verimliliği artırmak ve rekabet avantajı sağlamak için bir araya getirildi. Şirketinizin dijital potansiyelini keşfedin, geleceği birlikte yazalım. Who Are We? Who Are We? CyberPort Informatics is a company aiming to provide a fresh perspective to the business world. With our 25 years of experience in the mobile, aviation, banking, insurance, and retail sectors, and our technology-savvy consultants, we aim to produce fast and efficient solutions for our clients. As Cyberport Informatics, we help companies achieve fast, measurable, and cost-effective projects in their digital transformation journey by providing professional team support and new technology assistance. As your business partner, we offer: • Cybersecurity Solutions • LLM and Artificial Intelligence Security • Mobile Application Security • Data Security • Data Discovery and Anonymization • Dynamic Data Masking • Big Data Analytics • AI Contract Management • AI HR Onboarding Process Management • Mobile, web, and e-commerce project development services API Pentest & API Security Data Security & Data Discovery Artificial Intelligence (AI) Solutions Mobile Security < Back

  • WizeBuddy | Cyberport

    WizeBuddy, şirketinizin insanlarını, belgelerini, uygulamalarını ve süreçlerini tek bir arayüzde sorunsuz bir şekilde birbirine bağlayan AI destekli bir Sanal Asistandır. What Does WizeBuddy Do? WizeBuddy is an AI-powered Virtual Assistant that seamlessly connects your company's people, documents, applications, and processes in a single interface. Use Cases - Human Resources Departments CV Search Assistant: Speed up your recruitment process! It finds the most suitable candidates from thousands of CVs in seconds and recommends them for you. Onboarding Assistant: Manage your new employee onboarding processes seamlessly. Discover the AI solution that automatically manages documentation, training, and all process steps. Contracts Virtual Assistant: Take your contract processes to the next level with the AI assistant that gives you quick access to all the information you need about contracts. Save time with instant access to the right information. AI Process Automation Assistant: Save time and money by automating your business processes with AI. It quickly handles routine tasks for you and automates your process flows. Employee Request Support Assistant: Provide instant support to employees and streamline human resources processes with AI. Where does the service come from? Optimize your time and workload by instantly answering a wide range of employee questions, such as "How do I list my leave?" Email Assistant: Organizes your inbox, instantly replies to your emails, and helps you communicate more effectively. Make email management effortless. Voice Assistant: Understands user conversations and answers questions. Saves time, increases accessibility, and provides quick access to information. - IT Help Desks Voice Response Assistant: Understands user conversations and answers questions. Saves time, increases accessibility, and provides quick access to information. - Sales Department Voice Response Assistant: Understands customer requests and answers questions. Saves time, increases accessibility, and provides quick access to information. Benefits Effective Task Automation Smart Integrations 24/7 Availability Cost and Time Savings 40% Reduction in Opened Tasks 40% Reduction in Workforce Improvement in Employee and Customer Satisfaction Ready-to-Use Integrations for Every Organization Microsoft Teams . SAP Successfactors Microsoft Sharepoint . Workday Kolay IK . Azure CosmosDB Confluence . ElasticSearch File Connector . Jira Salesforce . Whatsapp Email . Slack AWS S3 . Google Drive Zendesk . Azure Blobe Storage All Databases . Outlook . Google Calendar < Back WizeBuddy Your Virtual Assistant

  • Hizmetler | Cyberport

    Siber Güvenlik Çözümleri, Veri Keşfi ve İnovasyon, İnsan Kaynakları ve Süreç Yönetimi, LLM & Yapay Zeka Güvenliği, Dinamik Veri Maskeleme, Mobil Web ve e-Ticaret Projeleri,Mobil Uygulama Güvenliği,Büyük Veri Analitiği​​ Who Are We? < Back Siber Güvenlik Çözümleri Veri Keşfi ve İnovasyon Mobil Web ve e-Ticaret Projeleri LLM & Yapay Zeka Güvenliği Dinamik Veri Maskeleme Ağ Güvenliği Çözümleri Mobil Uygulama Güvenliği Büyük Veri Analitiği Veri Güvenliği İnsan Kaynakları ve Süreç Yönetimi

  • Cyberport Bilisim Hizmetleri

    Yapay Zeka, API Güvenliği, LLM, Mobil ve Veri Güvenlik, Maskeleme hizmetlerinde uzman çözüm ortağınız. Proaktif koruma. Ürünler Ürünler API Security & API Pentesting Since APIs form the backbone of digital services, API Security and API Penetration Testing processes are the most critical way to proactively identify vulnerabilities in these vital gateways to secure your systems against cyberattacks. APIFort ApiStrike

  • LLMFort | Cyberport

    Kullanıcı ile model etkileşimi izleyen, potansiyel zararlı komutları modele ulaşmadan analiz edip engelleyen savunma katmanıdır. LLMFort Your AI Security Solution - Control Commands, Manage Risks. LLM Security? Large Language Models (LLMs) are revolutionizing the business world while also creating a new attack surface in organizations' security architectures. Traditional security tools are insufficient to detect language-based and context-manipulation-based threats like prompt injection. Therefore, an advanced defense layer is needed that monitors all user-model interactions, analyzing and blocking potentially harmful commands before they reach the model. LLM Firewall makes this interaction secure, monitorable, and controllable. 5 Notable LLM Cases 1. Samsung and ChatGPT (Data Leak): Employees leaked sensitive corporate data by pasting confidential source code and meeting notes directly into ChatGPT to request assistance. 2. OpenAI and ChatGPT (Personal Information Leak): A platform bug allowed some users to view chat threads and leaked Plus subscribers' payment information (Personal Information Leak). 3. Microsoft Copilot (Indirect Injection): Malicious commands hidden in emails tricked Copilot into digesting corporate data and sending it to an attacker URL. 4. Google NotebookLM (RAG Leak): A malicious document exposed a vulnerability in RAG (external data) systems by stealing information from other confidential documents in the model's memory. 5. Common Jailbreak Case (System Command Exposure): Jailbreaking techniques like "DAN" have allowed major models to bypass security filters and expose hidden system commands that govern their behavior. What is LLMFort? LLMFort is an intelligent security shield that secures the use of enterprise AI. It centrally monitors all user and application interactions, preventing prompt injection, data leaks, and policy violations before they reach the model. LLMFort prevents artificial intelligence from becoming an uncontrolled risk and enables your organization to demonstrate its innovation power with confidence. Key Features of LLMFort 01 LLM Discovery 02 Inline/Out-band Prompt Control 03 AI Guardrail Rules 04 EnterpriseChat UI 05 Current LLM Inventory 06 Regex / Keyword Rules 07 OWAPS Top 10 GENAI 08 Enhanced Integrations How Does LLMFort Protect? 1- Captures and Analyzes Communication: It handles all LLM requests from users (Chat) or applications (API) as a central proxy and initiates the security audit process. 2- Performs Multi-Layered Security Scanning: Instantly applies predefined corporate policies. It processes prompts through a multi-layered scan using advanced keyword, Regex, and semantic analysis engines. 3- Detects Risks and Violations: As a result of the scan, it instantly identifies risks and vulnerabilities such as prompt injection, data leakage (PII, Secrets), violations of company policy, or toxic content. 4- Instantly Intervenes Based on Rules: Instantly applies the action defined in the rule (Block, Mask, or Deny) based on the detected risk. This eliminates the threat before it even reaches the LLM model. LLMFort Architecture - Inline Firewall LLMFort Architecture - Out-band Centralized Permission and Policy Management 100% Auditable Communication Corporate Identity Integration Local Power, Global Vision LLMFort is an LLM security platform developed with 100% domestic technology. Full Compliance with Legislation and Personal Data Protection Law (KVKK): Local infrastructure facilitates regulatory compliance. Local Support and Service: Rapid response, effective communication without language barriers, and sustainable service quality. Flexible Development and Organization-Specific Adaptation: Rapid response to changing needs, customizable architecture.Data Security: All data is hosted domestically, minimizing external dependency and the risk of data leakage. Fast Procurement and Project Processes: Uninterrupted installation, integration, and support. SOAR Rapid7 InsightConnect Splunk Phantom Cortex XSOAR (Demsto) Messaging Apps Slack MS Teams Telegram SIEM Splunk SIEM Splunk Phantom Cortex XSOAR (Demisto) Universal Integration General WebHooks Public APIs Atlassian Jira DevOps Tools PagerDuty Atlassian OpsGenie Jenkins Azure DevOps < Back

  • Api Güvenliği, Pentest, LLM, Yapay Zeka, Veri Keşfi, Mobil Veri Güvenlik, Maskeleme, Yapay Zeka, Cyberport

    Hassas verilerin takibi hem kişisel verilerin korunması hem de verinin kötüye kullanım vakaları için çok önemlidir ve büyük veri ortamlarında, hassas verilerin takibi oldukça zordur. Bu nedenle, hassas verilerin takibini sağlamak için bir araca ihtiyaç vardır. Data Touch (DT), data toplayan ve barındıran uygulamalarla entegre olan ve bilgileri birleştirerek verilere ayrıcalık kazandıran bir araçtır. Tracking sensitive data is very important for both personal data protection and data misuse cases, and in big data environments, tracking sensitive data is quite difficult. Therefore, a tool is needed to ensure tracking of sensitive data. Data Touch (DT) is a tool that integrates with applications that collect and host data and combines information to give privilege to data. Data Touch enables you to perceive your data with a wide range of analysis options. It helps you make data-driven decisions much more intelligently while securing your data security and privacy concerns. DT focuses on two main issues: sensitive data monitoring and data usage. Features: Visualization: Shows all projects in the same environment (from Discovery) with detailed information on purpose-built charts. Sorts projects by size and graphs classified data (sensitive and non-sensitive), sensitive types, and who accessed the data on the dashboard. Data usage: Shows details of projects (scanned by Discovery), consumers (who accessed the data), how and when they accessed it. These details can be filtered by entering a date range. Filtered tables can be exported and reported on with Excel Export. Data Analysis: Shows the details of queries for the project in three ways. Query details, The inquiries made, Queries for sensitive types. Data Heatmaps: Creates different heatmaps with predefined options for more detailed analysis of any data within the application. Table Query Count Heatmap: Shows the total number of queries for each table on a given date. Application Count Heatmap: Shows the total number of queries accessing each table from each application. Table Action Type Count Heatmap: Shows the total number of queries by action type (select, update, delete, etc.) for each table. Sensitive Type Time Heatmap: Shows the total number of queries within the selected time period for each sensitive type. Data Touch provides a privileged data inventory by tracking all usage of data held in organizations’ data warehouses by detecting applications that touch data. Using this detailed information and many data analyses provided by Data Touch, organizations can better manage data, optimize access and usage of data, reduce their carbon footprint, save data storage space by eliminating unnecessary data, increase business efficiency and reduce total costs. Data Touch also offers solutions for protecting personal sensitive data, which can be the biggest concern of organizations. Thus, they can take more security measures for their applications and data. < Back Data Touch

Esenyalı Mah. Yanyol St. Varyap Plaza No: 16 Interior Door No: 247 Pendik / Istanbul

All Rights Reserved – © Cyberport Bilisim. 2023

Personal Data Protection | Privacy Policy | Information Security Information

bottom of page