top of page

Search Results

33 results found with an empty search

  • ERPGuard | Cyberport

    ERPGuard, işletmelerin SAP sistemlerini daha güvenli hale getirmek ve uyumluluk süreçlerini optimize etmek için tasarlanmış yenilikçi bir çözümdür. Bu yazılım, SAP güvenliğiyle ilgili en kritik ihtiyaçlara yanıt verirken, işletmenize pek çok avantaj sunar. The main function of the DATASKOPE product is to ensure that access and changes to critical database systems are as expected, planned and desired. You can do all these operations without activating the audit feature in the database. DATASKOPE detects, classifies, generates alarms and reports the events that occur in your database systems. It is a database audit product that allows you to easily access information about who accessed sensitive data and which operations were performed at what intervals, and allows authorities to be informed about the events with predefined alarm rules. You can perform the following audits and report with DATASKOPE: Login – Allows you to track successful and unsuccessful logins to the database. Data content change – Allows you to track commands such as SELECT, UPDATE, DELETE, EXEC, etc. Access Tracking – Allows you to track who accessed sensitive data. Database Administrator Audit – Tracks user creation, deletion, etc. and allows you to take action. Classified Audit – Allows you to decide who can view transactions based on user, database, table, command. Reporting – Allows you to get reports that comply with standards such as ISO27001, COBIT, PCI, SOX. NoSQL Search Engine Horizontally and vertically scalable. Geographically and locally redundant Distributed search across multiple units Automatic backup and archiving Automatic masking of sensitive data T.R. identity recognition and masking Credit card recognition and masking Email recognition and masking RegEx (Regular Expressions) desteği < Back Datascope

  • Our References | Cyberport

    Cyberport Bilişim Hizmetleri olarak dijital dünyaya yenilikçi projelerle, iş dünyasına yepyeni bir bakış açısı getiriyoruz. Firmaların, hızla değişen dijital ortamda rekabet avantajı elde etmelerine yardımcı oluyoruz. Our References < Back

  • Kişisel Verilerin Korunması | Cyberport

    Cyberport Bilişim Hizmetleri olarak, 6698 sayılı Kişisel Verilerin Korunması Kanunu (“KVKK”) ve ilgili mevzuat kapsamında kişisel verilerinizin korunmasına büyük önem vermekteyiz. The main function of the DATASKOPE product is to ensure that access and changes to critical database systems are as expected, planned and desired. You can do all these operations without activating the audit feature in the database. DATASKOPE detects, classifies, generates alarms and reports the events that occur in your database systems. It is a database audit product that allows you to easily access information about who accessed sensitive data and which operations were performed at what intervals, and allows authorities to be informed about the events with predefined alarm rules. You can perform the following audits and report with DATASKOPE: Login – Allows you to track successful and unsuccessful logins to the database. Data content change – Allows you to track commands such as SELECT, UPDATE, DELETE, EXEC, etc. Access Tracking – Allows you to track who accessed sensitive data. Database Administrator Audit – Tracks user creation, deletion, etc. and allows you to take action. Classified Audit – Allows you to decide who can view transactions based on user, database, table, command. Reporting – Allows you to get reports that comply with standards such as ISO27001, COBIT, PCI, SOX. NoSQL Search Engine Horizontally and vertically scalable. Geographically and locally redundant Distributed search across multiple units Automatic backup and archiving Automatic masking of sensitive data T.R. identity recognition and masking Credit card recognition and masking Email recognition and masking RegEx (Regular Expressions) desteği < Back Datascope

  • Wizedata | Cyberport

    Wizedata Veri Güvenliği Platformu, kişisel ve hassas verileri gerçek zamanlı olarak koruyan, platformdan bağımsız çalışan ve yüksek performanslı bir yazılım çözümüdür. Dataspin Data Security Platform: Powerful and Platform Independent Protection for Sensitive Data Dataspin Data Security Platform is a platform-independent and high-performance software solution that protects personal and sensitive data in real time. While the importance of data security and privacy is rapidly increasing today, Dataspin offers comprehensive data security to businesses through a single platform. It enables the hiding, reorganization and encryption of personal data with dynamic masking features that provide both security and control. Why Dataspin? Dataspin not only ensures the security of sensitive data; it also offers comprehensive solutions for the proper management of data and compliance with legal regulations. The main advantages of the platform are as follows: Real-Time Protection and Dynamic Masking: Dataspin protects your data in real time and provides an effective defense against security threats. The dynamic masking feature enables the hiding, organization and encryption of data; thus, data security is maximized. Platform Independent Operation: Dataspin, which can be integrated with all systems, provides flexibility to businesses and can be used in different environments by working independently of devices or platforms. Compliance with Global and Local Laws: In addition to international legal regulations such as CCPA, GDPR, LGDP, it also provides full compliance with the KVKK legislation in Turkey. In this way, companies protect their data and act in accordance with legal regulations. A Single Platform Solution Compliant with All Legislation Dataspin supports legal compliance such as KVKK and GDPR by providing data security from a single center, data discovery, database (DB) activity monitoring and data masking solutions. It allows businesses to centralize, manage and accelerate their data security processes. It offers a powerful solution for protecting databases against external and internal threats, especially faced by companies and institutions. Powerful Data-Centric Security Software Dataspin adopts a strong data-centric security approach to keep businesses' data safe. It monitors and prevents unauthorized access to databases. It provides comprehensive security by considering internal risks as well as external threats. It helps keep sensitive data safe, especially for large institutions, with detailed access controls. Secure Your Data, Reduce Risk Dataspin simplifies data security processes and accelerates compliance. The platform combines features such as data discovery, data protection and granular access controls to effectively manage your data. In this way, it reduces the risk in your business, increases data security and helps you comply with all legal regulations. Dataspin , offers comprehensive solutions in data security by meeting your privacy and security needs on a single platform. It is a strong ally to secure sensitive data, ensure compliance and reduce risk in your business. With its flexible and secure structure offered on a single platform, Dataspin is the ideal solution for every business that wants to meet the new data security norms of the digital world. < Back Dataspin Data Security Solution

  • Datascope | Cyberport

    DATASKOPE ürününün temel işlevi kritik veri tabanı sistemlerine yapılan erişimlerin ve değişikliklerin beklenen, planlı ve istenen şekilde olduğundan emin olmaktır. Tüm bu işlemleri veri tabanında denetim özelliğini açmadan yapabilirsiniz. The main function of the DATASKOPE product is to ensure that access and changes to critical database systems are as expected, planned and desired. You can do all these operations without activating the audit feature in the database. DATASKOPE detects, classifies, generates alarms and reports the events that occur in your database systems. It is a database audit product that allows you to easily access information about who accessed sensitive data and which operations were performed at what intervals, and allows authorities to be informed about the events with predefined alarm rules. You can perform the following audits and report with DATASKOPE: Login – Allows you to track successful and unsuccessful logins to the database. Data content change – Allows you to track commands such as SELECT, UPDATE, DELETE, EXEC, etc. Access Tracking – Allows you to track who accessed sensitive data. Database Administrator Audit – Tracks user creation, deletion, etc. and allows you to take action. Classified Audit – Allows you to decide who can view transactions based on user, database, table, command. Reporting – Allows you to get reports that comply with standards such as ISO27001, COBIT, PCI, SOX. NoSQL Search Engine Horizontally and vertically scalable. Geographically and locally redundant Distributed search across multiple units Automatic backup and archiving Automatic masking of sensitive data T.R. identity recognition and masking Credit card recognition and masking Email recognition and masking RegEx (Regular Expressions) desteği < Back Datascope

  • Çerez Politikası | Cyberport

    Cyberport Bilişim Hizmetleri olarak, 6698 sayılı Kişisel Verilerin Korunması Kanunu (“KVKK”) ve ilgili mevzuat kapsamında kişisel verilerinizin korunmasına büyük önem vermekteyiz. The main function of the DATASKOPE product is to ensure that access and changes to critical database systems are as expected, planned and desired. You can do all these operations without activating the audit feature in the database. DATASKOPE detects, classifies, generates alarms and reports the events that occur in your database systems. It is a database audit product that allows you to easily access information about who accessed sensitive data and which operations were performed at what intervals, and allows authorities to be informed about the events with predefined alarm rules. You can perform the following audits and report with DATASKOPE: Login – Allows you to track successful and unsuccessful logins to the database. Data content change – Allows you to track commands such as SELECT, UPDATE, DELETE, EXEC, etc. Access Tracking – Allows you to track who accessed sensitive data. Database Administrator Audit – Tracks user creation, deletion, etc. and allows you to take action. Classified Audit – Allows you to decide who can view transactions based on user, database, table, command. Reporting – Allows you to get reports that comply with standards such as ISO27001, COBIT, PCI, SOX. NoSQL Search Engine Horizontally and vertically scalable. Geographically and locally redundant Distributed search across multiple units Automatic backup and archiving Automatic masking of sensitive data T.R. identity recognition and masking Credit card recognition and masking Email recognition and masking RegEx (Regular Expressions) desteği < Back Datascope

  • Foramind | Cyberport

    Zihin haritalama, bilgileri ve fikirleri görselleştirerek geliştiren ve organize eden etkin bir öğrenme ve düşünme tekniğidir. Bilgilerin ve fikirlerin hazırlayan kişinin yaratıcılığı ölçüsünde özgürce ve yapısal olarak standart bir metodoloji içerisinde oluşturulmasını sağlar. Mind mapping is an effective learning and thinking technique that visualizes and organizes information and ideas. It allows information and ideas to be created freely and structurally within a standard methodology, to the extent of the creativity of the person who prepared them. Areas of Use: Meeting Planning Brainstorming Taking Notes Creative Thinking Memory Improvement FORAMIND, Turkey's first and only Mind Mapping software, is Turkey's leading software in this field with its user-friendly interface, customizable technical infrastructure and Turkish menus. They are diagrams created by visualizing the ideas, thoughts and information in our minds and transferring them to paper or a suitable software. Benefits: Mind maps are a fantastic tool for discovering great ideas. Provides meaningful learning. It helps in memorization and retention. It is an interesting way of learning. It makes complex problems easier to understand. It increases your productivity. The biggest benefit of Mind Mapping is its flexibility. You can create maps using ready-made templates in appropriate categories. You can list mind maps and mark your favorite maps. It has a user-friendly interface. Provides sharing options from within the software. It has the flexibility to create a special management panel and users for institutions. It has features that you can use for free. *You can create maps using ready-made templates in appropriate categories. *You can list mind maps and mark your favorite maps. *User-friendly interface * Sharing options from within the software. *Features you can use for free < Back Foramina

  • Outsourcing | Cyberport

    İş dünyasında fark yaratmanın formülü, kurum faaliyetlerinde minimum insan kaynağı, minimum zaman kaybı ve maksimum verimlilikle kusursuz bir operasyon yürütmeye dayanır. Sizin için geliştirdiğimiz uçtan uca anahtar teslim servislerimizle, bilgi teknolojileri alanında kurumunuzun ihtiyacı olan tüm operasyonel yönetimi uzman ekiplerimizle üstleniyoruz. The formula for making a difference in the business world is based on conducting a flawless operation with minimum human resources, minimum time loss and maximum efficiency in corporate activities. With our end-to-end turnkey services that we have developed for you, we undertake all the operational management your organization needs in the field of information technologies with our expert teams. We invite you to meet our measurable and sustainable services and to initiate the digital transformation reform in your organization. What is Outsourcing? Outsourcing is a method widely preferred by businesses in the information age to reduce costs. Institutions transfer some in-house operations to expert companies in their fields, and thus companies can focus on more important operations for the company such as production, R&D and sales. Outsource companies, on the other hand, carry out the operations they undertake with expert teams in their fields in shorter periods of time and within the framework of more affordable costs, and provide added value for the customer in terms of efficiency, time, money and human resources. Outsourcing is a service type that is widely demanded especially in the information technologies sector, and the majority of these services consist of software development services. Institutions focus on their own work thanks to the external resources they receive support for the software development they need for a certain period of time, and some fixed costs that have become a burden for the institution become temporary. OUR OUTSOURCING SERVICES Project Management (Project Manager, Project Technical Leader) Software Analysis (Business Analyst) Software Architecture Service (Software Architect, System Engineer) Software Development Service (Software Team Leader, Software Development Specialist) Software Testing Service (Software Test Manager, Software Test Specialist) Software Infrastructure Service (Software Test Manager, Software Version Manager, Software Infrastructure Specialist) Software Maintenance Service (Software Support Specialist) Software Quality Service (Software Quality Manager, Software Quality Specialist) Usage and Development of Reporting Tools Product Management Robotic Process Automation (RPA) Consultancy Data Design and Expertise < Back Outsourcing

  • Software Development | Cyberport

    Kurumsal verimlilik ve rekabette avantaj elde etmenin en güçlü yollarından biri, ihtiyaca yönelik teknoloji ve yazılım geliştirmeleridir. Cyberport olarak, yazılımın yalnızca kodlamadan ibaret olmadığının bilinciyle; kodlama, tasarım ve işlevselliği kompakt biçimde bir araya getiriyoruz. Müşterilerimizin ihtiyaçlarına doğru çözümlerle yanıt vermenin yanı sıra, uluslararası pazarda da ilgi gören teknolojiler geliştiriyoruz. One of the most powerful ways to achieve corporate efficiency and competitive advantage is through technology and software developments tailored to needs. As Cyberport, we are aware that software is not just coding; we bring coding, design and functionality together in a compact manner. In addition to responding to our customers' needs with the right solutions, we also develop technologies that are popular in the international market. Software technologies are also a discipline that feeds on creativity. For this reason, as Cyberport, we follow global trends and take care to stay up-to-date and work to produce pioneering ideas that we determine the trend ourselves. Within the scope of these studies; advanced software in the fields of the internet of things, big data analysis, security technologies and mobile applications are developed by our expert teams who are well-equipped in the field of technology and transformed into effective solutions that optimize important processes such as sales automation systems or tools prepared for HR processes. Thanks to the services we develop specifically for their needs, we ensure that our business partners who receive service from us reach technological and effective solutions that catch up with global trends in the fastest way possible. < Back Software Development

  • Digital Transformation | Cyberport

    Kurumunuzun; Bilişim ve İletişim Teknolojilerinin sağladığı imkanları hangi seviyede üretim süreçlerine yansıtabildiğini değerlendiren ve gelişim alanlarını belirleyerek Dijital Dönüşüm Stratejilerinize girdi sağlayan danışmanlık hizmetidir. It is a consultancy service that evaluates the level at which your organization can reflect the opportunities provided by Information and Communication Technologies to its production processes and provides input to your Digital Transformation Strategies by determining the areas of development. In your Digital Transformation projects, we determine your maturity level with the knowledge and experience of our consultants and support the creation of your strategies and their implementation in the field. As Cyberport, we analyze the company's technical infrastructure, processes, people and organization to strengthen both the organization's short-term performance and maintain long-term sustainable improvement by helping companies create their digital transformation strategies and implement them to increase their performance through digital technologies. With the Digital Maturity Level methodology, institutions are evaluated under 6 dimensions. Governance, technological infrastructure, applications, data management and analytical competencies are measured and how much the work done supports and enables digital transformation is measured. Following the analysis conducted with the Digital Maturity Level methodology, the current level of your company is evaluated by our expert consultants in one of 5 different stages, strategic priorities are determined and a development plan is prepared together with your management team. As Cyberport, we combine business and technology expertise and accelerate the transition from idea to implementation. We evaluate your organization's current IT infrastructure and support you in designing the infrastructure you will need in the future in line with your strategies. We inform and guide you about technological developments that will give you a competitive advantage. We support you to analyze your organization's processes and business methodologies and move them to digital environments and increase your automation with the opportunities provided by Information and Communication Technologies. We know that providing customer and employee-focused experiences requires appropriate and purposeful digital transformation strategic initiatives. We support you in changing the mindsets of your employees and through our digital transformation consulting services, we can help you benefit from new ways of working through more effective technology, processes and systems. Our team of experts is here to provide digital transformation consulting that helps your organization unleash the innovative power of applied intelligence from data, cognitive technologies and digitalization; providing great experiences and improved operational efficiency. Partner with us to achieve great results through organizational agility. < Back Digital Transformation Consultancy

Esenyalı Mah. Yanyol St. Varyap Plaza No: 16 Interior Door No: 247 Pendik / Istanbul

Personal Data Protection | Privacy Policy | Information Security Information

All Rights Reserved – © Cyberport Bilisim. 2023

bottom of page