Basic Security Solutions

Manageable Risk, Sustainable Service Quality

System, device, application security has become much more important as processes become more complex, along with increasing amount of data, increasing diversity of peripheral devices and increasing security vulnerabilities.

KoçSistem offers manageable risk and sustainable service quality with its competent human resources and up-to-date technology infrastructure.

Basic Security

Basic Security

Firewall: Thanks to our Firewall Management service, which is used to provide network traffic from and to the Internet in a controlled manner, all accesses except the permitted ones are restricted, increasing the security of your systems.

Intrusion Prevention (IPS): KoçSistem's IPS service, which provides your company's virtual network security, detects and eliminates attacks coming over the internet. Thanks to the IPS service, you can protect your company's information and job security with real-time alerts in case of an attack.

Load Balancing: It is our service model that ensures the continuity and redundancy of your systems by distributing the traffic on such assets to different servers and ensuring that they continue to work uninterruptedly.

Basic Security

Basic Security

SSL VPN: SSL VPN service securely connects your employees to your corporate network over the internet. Thus, even if they are not in the company, they continue to work efficiently as if they were at the office.

Site to Site VPN: Site to site VPN allows you to establish a secure connection between your company's offices located at more than one point or over a common network created between you and other companies.

Basic Security

Basic Security

Web / URL Filtering: KoçSistem regulates your internet usage in line with the policies to be determined by your company, by preventing harmful software and unwanted content from websites. This ensures that internet users in your company can browse the internet safely.

E-Mail Filtering: By preventing unauthorized e-mail (spam) traffic, it prevents potential damages to your company via e-mail.

Hotspot (5651): Under the law No 5651 on the regulation of broadcasts on the internet, it enables your guests to access the internet securely (URL Filtering) over your internet network, with authentication methods, and logs this traffic.


Firewall

  • Your company monitors your network traffic within the framework of custom defined rules.
  • Protect you from the Internet against threats that your network may face.
  • When you choose our Shared Firewall Service;
  • You receive service without hardware and software investment costs.
  • You receive service without annual maintenance and hosting costs.
  • When you choose our Virtual Dedicated Firewall Service;
  • In addition to the benefits of our Shared Firewall service, you receive service from a specially defined Virtual structure.
  • Dedicated Firewall When you prefer our service;
  • You will receive service through equipment specifically reserved for you.

Intrusion Prevention (IPS)

  • Signature-based detection allows network traffic and attack sign list comparison.
  • Real-time intrusion detection is performed.
  • Your network can detect and block the right attacks.
  • You can check your network traffic.
  • If you prefer our Shared IPS Service:
  • You receive service without hardware and software investment costs.
  • You will receive services without annual maintenance, hosting and license fees.
  • If you prefer our IPS service, then
  • You will receive service through equipment specially reserved for you.

Load Balancing

  • HTTP / HTTPS / FTP and load distribution for all your services.
  • Ensuring session continuity without service interruption.
  • Reduce the load on servers with SSL termination.
  • If you prefer our Shared Load Balancing Service:
  • You receive service without hardware and software investment costs,
  • You receive service without annual maintenance and hosting costs.
  • If you prefer our Load Balancing Service:
  • You will receive service through equipment specially reserved for you.

SSL VPN

  • Remote access to the company network
  • Increased employee performance
  • Saving time
  • Remotely access all files and applications on your corporate network.
  • When you choose our shared SSL VPN service;
  • As the management is done through the central system, we offer this service without hardware and licensing costs.
  • You receive service without annual maintenance and hosting costs.
  • If you prefer our SSL VPN service, then;
  • You will be licensed on dedicated hardware and your server will be serviced with Client to Site VPN support.

Web / URL Filter

  • Secure internet access is provided.
  • You use your bandwidth for Internet access much more efficiently.
  • If you prefer our Shared Web / URL Filtering Service:
  • With centralized software and reporting, you get service without any investment cost.
  • You receive service without annual maintenance and hosting costs.
  • If you prefer our Web / URL service:
  • You can create your company's security policy and make user-based reporting by filtering the websites you want, thanks to our service we offer with a special license through a dedicated hardware provider.

Site to Site VPN

  • You have secure access between offices at different points.
  • You can securely access office networks at different points in your company.
  • You can communicate securely with the companies you work with over a common network.
  • When you choose our Shared Site to Site VPN Service:
  • You receive service without hardware and software investment costs.
  • You receive service without annual maintenance and hosting costs.
  • If you prefer Site to Site VPN Service:
  • You will receive service through equipment specially reserved for you.

Hotspot (5651)

  • Provides secure internet access for all users entering your network on your network.
  • If any publication on your network constitutes an offense, it will be ensured that the responsibilities are identified in a short period of time as a result of the retained logs.
  • Allows the user to perform IP - to - ID mapping as they log in with authentication processes such as SMS.
How can we help you?

Discover KoçSistem's solutions that create value to your business! Turkey's leading technology company KoçSistem!