Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Sürekli gelişen Bilgi Teknolojileri sonucu birçok farklı marka network cihazları üretilmiş ve birçok farklı model ürün geliştirilerek piyasaya sunulmuştur. Aynı markanın dahi farklı yönetim araçlarına (CLI) sahip çok sayıda ürünü bulunmaktadır. Bu çeşitlilik, ağ cihazlarının yönetimini zorlaştırmakta ve nitelikli personel ihtiyacı doğurmaktadır.

Doğru tasarlanmayan, eksik yapılandırılan, güvenlik politikaları uygulanmayan, katılaştırılmayan ve güvensiz servisler kullanılan ağ cihazları kurum genelinde ciddi güvenlik açıklarına yol açmaktadır. Düşük maliyetli ve önemsiz görülen ağ cihazları üzerinden yapılan saldırılar, kurumun network sistemini çalışamaz hale getirmekte ve telafisi olmayan sonuçlar (veri sızıntısı, hizmet kesintisi) doğurmaktadır. Bilinenin aksine kurumlara yapılan saldırıların büyük bir bölümü, internet yerine kurum içerisindeki yerel ağlar üzerinden gerçekleştirilir.

IBM tarafından 2015 yılında yapılan bir araştırma sonucu atakların %60’ının şirket içerisinden geldiği tespit edilmiştir. SECHARD network cihazlarının (Switch, Router, Firewall) güvenliğini sağladığından dolayı içeriden ve dışarıdan yapılan atakları algılayıp, engellemektedir.

...

    Şekil 1 All necessary to create a useful strategy and ensure Information Security Managing perations is extremely tiring for you. Likewise, it creates a huge workload and pressure on your IT and Information Security team. This is when Zero Trust Documents published by organizations such as NIST guide us and help us create the right strategy. Our SecHard product, which has a versatile capacity to provide information security, facilitates these complex processes with its integrated approach and provides you with a complete Zero Trust. It also lightens the workload of your Information Security experts with time and cost advantages.
"Zero trust (ZT) is the term used for an evolving set of cybersecurity paradigms that move defenses from static, network-based environments to a focus on users, assets and resources. Zero trust architecture (ZTA) uses zero trust principles to plan industrial and enterprise infrastructure and workflows. Zero trust assumes that no implicit trust is given to assets or user accounts based solely on their physical location or network location (i.e. internet versus local area networks) or asset ownership (corporate or personally owned). Authentication and authorization (both subject and device) are separate functions performed prior to establishing a session to an enterprise resource.

For the Zero Trust model to be effective, organizations need to implement comprehensive information security and resilience practices. When balanced with existing cybersecurity policies and guidance, identity and access management, continuous monitoring and security hardening (best practices), using ZTA and a managed risk approach can protect against common threats and improve an organization's security posture.

The most difficult part of implementing and managing a Zero Trust policy is security hardening. Thousands of devices need hundreds of settings changes. SecHard's security hardening module generates a gap analysis report in minutes according to industry standards and automatically makes improvements in seconds.

Before SecHard, implementing a Zero Trust Architecture required buying and managing a large number of products, but now our inspiring product SecHard brings you POWER PEACE.

SECHARD PROVIDES ALL THE NECESSARY CONTROLS OF THE "ZERO TRUST" MODEL ON A SINGLE PLATFORM.

Due to the continuous development in the field of information and communication technologies, different manufacturers have developed and launched network devices with various models and features. Even the same brand has products with different management tools (CLI). This diversity makes resource management difficult and requires qualified personnel.

Resources that are not designed correctly, incompletely configured, security policies are not applied, not hardened and used with insecure services cause serious security vulnerabilities throughout the organization. Attacks through network devices, which are considered to be low-cost, render the organization's network system inoperable and cause irreparable consequences such as data leakage and service interruption. Contrary to popular belief, most of the attacks on organizations are carried out over local networks within the organization instead of the internet.

As shown in Figure 1, as a result of a study conducted by IBM in 2015, it was determined that 60% of the attacks come from within the company. SECHARD network devices, (Switch, Router, Firewall) operating systems, web server and database server security, detect and prevent internal and external attacks.

Image Added

     Figure 1. - Most Cyber Attacks Are An Inside Job