Information Security
Forensic Computer Services;

Artı & Artı, the elucidation of cyber crime and computer forensics specialists experienced in-house, now proven by the high success rate obtained so far, and is a leading company in computer forensics in Turkey.

Artı & Artı, he has made a lot of incident response and forensics analysis in the sector since 2008 in forensics computer forensics laboratory services increasingly more felt need in order to provide international standards established in Turkey.


Penetration Testing Services;

In your application, your external or internal network access to outside information that you have permission to open each end user access and ensure the security of critical confidential information, Information Technology is becoming increasingly difficult due to the complex structure that evolves al.

Penetration testing, security experts and like-minded approach to the system as well as aggressive as those carried out by UNIDIR controlled in real time simulation of an attack.

You can see the status of your application that you can practice in the case of an attack carried out penetration testing results can be detected and reported security makes your system more secure by eliminating openings.

Penetration Testing Types

Network
Penetration
Test

Web Application
Penetration
Test

Wireless
Penetration
Test

Optional
Options

Vulnerability Scan

IT infrastructure of your client, the server, which is a security scan performed to determine that there are the ever discovered security vulnerabilities on network devices, applications and assets.

Network / Application Penetration Testing services performed within the scope of this screening process is used both as open source software licensed software proven in the industry.

Configuration Review

Network / Applications / Wireless Penetration Testing services is one of the optional steps in the configuration examination.

Under the scope of configuration review, the compliance with generally accepted security criteria of your active network devices (switches, routers, firewalls, IPS, etc.), web-based applications and client computers is reviewed by Artı & Artı security experts, with definitions and settings reviewed on these devices.

In this study, Artı & Artı security experts access to console themselves in a way never perform, accompanied by an authorized person in your companys IT departamın configuration revision is carried out.

Support Provided in Electronic Security;


Network Security
  • UTM tools
  • Firewall
  • VPN
  • Anti-Spyware
  • Anti-Spam
  • Web Filtering
  • Bandwidth Management
  • Multiple Link Management
  • Internet Access Security Testing and Analysis process
  • E-mail Security Solutions
  • Network Access Control (NAC) Solutions
  • 5651 and Log Correlation Solutions
  Virtual Server Security
  • Web reputation with protection against malicious software, host-based firewalls, intrusion detection / prevention, integrity monitoring, log inspection, encryption and comprehensive security features including trusted SSL certificates worldwide.
  • Deployment flexibility with software options or service provision. Includes all multi user features for easy service processes.
  • Physical, virtual, cloud and hybrid such as reduced cost and complexity that have been optimized thanks to a high level to reduce the number of security control in the environment and the effects of the rules of procedure for the management from a single platform
End-User Security
  • Anti-Virus
  • Intrusion Prevention System
  • User-Based Firewall
  • Physical Port Restrictions
  • Strong Authentication
  • Smart Card
  Event Monitoring and Management System
  • Normalization
  • Categorization
  • Integration
  • Event Correlation (Correlation)
  • Risk Assessment