Holistic Security Technologies
Platin Bilişim providing end-user security, infrastructure, border and application security, database and cloud security services to customers under holistic security technologies.
Infrastructure, Border and Application Security
Internet Security – Proxy
ProxySG combines a broad set of features that protect your organization from the ever-increasing complexity and threats in your web traffic. Standing between users and the internet, ProxySG examines the content to identify malicious payloads and then filters, categorizes, blocks or modifies web content to reduce risks and prevent data loss. Broadcom ProxySG installation, maintenance and operating services are provided by Platin Bilişim.
Cloud Based Web Security – WSS
Broadcom Web Security Service protects your organization from cyberattacks using an advanced proxy architecture that terminates, inspects and controls high volumes of web and cloud traffic, even when encrypted with SSL/TLS. With the changing working conditions, users' need for external access has increased. Security devices located within the company are insufficient to produce effective solutions for out-of-office users. With the Broadcom Web Security Service, effective use of corporate security products is provided for out-of-office users. Broadcom WSS installation, maintenance and operating services are provided by Platin Bilişim.
Content Analysis and Sandbox – CAS
Sandbox is a security system that analyzes, understands and takes action against threats that traditional security systems fail to detect. By positioning Broadcom with other security products, it is effective in detecting advanced attacks that are difficult to detect, can circumvent traditional intrusion prevention systems, and exploit Zeroday vulnerabilities. It is also an important component of Advanced Threat Protection (ATP) systems. Broadcom CAS installation, maintenance and operating services are provided by Platin Bilişim and CAS can work as On-Premise or Cloud.
Web isolation is technology that protects against malicious web content and e-mails containing links to these web contents. Therefore, they cannot perform malware and other advanced attacks on the enterprise. It also prevents users from sending corporate credentials and other sensitive information to unknown and malicious websites by processing their pages in read-only mode. Web Isolation installation, maintenance and operating services are provided by Platin Bilişim. Broadcom web Isolation is a cloud solution that can integrate with other Broadcom security products.
SSL offloader is the process of decrypting the traffic sent via SSL to a web server and/or removing SSL-based encryption from incoming traffic to reduce the encryption load. SSL visibility is a comprehensive solution that makes SSL / TLS "blind spots" visible using high-security encryption methods and nourishes other security devices. Devices see all encrypted traffic, examine it and reveal potential threats. Today, companies make very serious investments in web security, but unless encrypted internet traffic (HTTPS) is decrypted, other security products cannot be expected to work effectively. Broadcom SSL Visibility installation, maintenance and operating services are provided by Platin Bilişim.
Corporate Email Security – SMG
It is a software solution positioned between the mail server and the outside world (internet). Email Gateway; provides a secure e-mail gateway and protection against e-mail-borne threats. It is an effective firewall for your e-mails and scans incoming e-mails for malicious content and e-mails can be encrypted if needed. As Platin Bilişim, we provide installation, maintenance and operation services of Broadcom SMG and Email.Cloud products. It can work in On-Premise, Cloud and Hybrid structures.
Data and End-User Security
End-User Security – EPP
It is a security platform installed on endpoint devices with tasks such as preventing malicious software attacks, detecting malicious activities and providing data for incident response. As Platin Bilişim, we provide installation, maintenance and operating services of Broadcom EPP products.
Endpoint Detection and Response – EDR
Security systems that combine next-generation antivirus elements with additional tools to provide real-time anomaly detection and alerting, forensic analysis, and endpoint remediation capabilities. As Platin Bilişim, we provide installation, maintenance and operation services of Broadcom EDR product.
Data Loss Prevention – DLP
It is a data security technology that enables monitoring and protection of transmission of sensitive data by unauthorized use in a network. As Platin Bilişim, we provide installation, maintenance and operating services of Broadcom DLP product.
Disk, File and E-mail Encryption – PGP/SEE
File encryption; Encryption of critical data and today's regulations (KVKK, GDPR, etc.) has become a necessity for all corporate businesses. This need is met with file encryption technologies.
Disk encryption; especially important data disks with critical end-user and corporate applications are working, lost, etc. In such cases, it ensures that the data in it is inaccessible to third parties.
Email encryption; is the encryption of email messages to prevent content from being read by entities other than the intended recipients. It is a software prepared to protect the data of companies.
As Platin Bilişim, we provide installation, maintenance and operation services for Broadcom encryption solutions.
PAM – Privilege Access Management – Thycotic
Thycotic Secret Server solution; It provides secure usage with central password safe by storing authorized accounts in an encrypted manner. It also makes service, application, administrator and root accounts visible in the environment and prevents it from spreading inappropriately.
At the same time, which users can access the passwords can be defined and an authorization matrix can be created. For safer use of passwords; Complex formations can be made when changing passwords. Session Monitoring technology also allows real-time viewing of all privileged sessions and monitoring the live stream of an active session.
The Thycotic Privilege Manager product enables the discovery of administrator-right-required applications in your environment (domain independent). Users can be provided with administrative rights for the specified processes. Restrictive policies can be applied for users with administrator rights. It makes it possible to discover and edit users with local administrator rights in your environment. Thycotic solution adopts the least authority “Least Privilege” method.
As Platin Bilişim, we provide installation, maintenance and operating services of Thycotic PAM products.
It keeps you secure and compliant when using approved and unapproved cloud apps and services across SaaS, PaaS, and IaaS platforms. Named a leader by Gartner and Forrester, Broadcom CASB enables you to achieve unmatched cloud application security with the deepest visibility, tightest data security, and strongest threat protection.
Broadcom Secure Access Cloud is a SaaS solution that provides more secure and granular access management to any corporate resource hosted on-premises or in the cloud. It uses Zero Trust Access policies to provide point-to-point connectivity without agents or devices and eliminates network-level threats.
Karmasis-DATASKOPE detects, classifies, generates alarms and reports the events taking place in your database systems. It is a database audit product that allows you to easily access the information of who has accessed sensitive data and what operations are performed at what intervals, and informs the authorities about the events with predefined alarm rules.
Login: Allows you to track successful and unsuccessful logins to the database.
Data Content Exchange: Allows tracking of commands SELECT, UPDATE, DELETE, EXEC, etc.
Access Tracking: It provides tracking of who has accessed sensitive data.
Data Manager Audit: Keeps track of transactions user creation, deletion, etc. and allows you to take action.
Classified Control: Allows you to decide who can view transactions on the basis of user, database, table, command.
Reporting: It allows you to get reports in accordance with standards such as ISO27001, COBIT, PCI, SOX.