You can find the details and video of our Webinar held on Thursday, July 9, 2020, below.
THE ARCHITECTURE CHANGING THE RULES IN CYBER SECURITY: ZERO TRUST NETWORK ACCESS
80% of the applications opened to business partners in 2022 will be accessible through ZTNA.
In 2023, 60% of large companies will start to prefer ZTNA over VPN in their new investments
There are many applications that you share with those who work from home or remotely, 3rd parties or business partners and that you use to transmit this data. Even if you have taken all the necessary cyber security measures within the organization, it is often not possible to control the network and devices from the other party.
With Zero Trust Network Access, users are isolated from network access in the organization and applications are isolated from the internet. This situation; It minimizes the risks that even compromised devices can pose on the corporate network. Unlike network-centric solutions such as VPNs and firewalls, ZTNA basically allows only the applications used to communicate with each other in an isolated environment, rather than connecting to the corporate network and being exposed to the internet.
Today's dynamic business environment and mobile workforce with access to corporate resources need stakeholders and affiliates. TransientAccess guarantees “zero secure” access without providing network access and “exposing” corporate resources to the internet.
[vc_video link=”https://youtu.be/DhJix-85lOY” el_width=”100″]
[mnky_heading title=”SORU-CEVAP” line_color=”#dd1818″][vc_empty_space]
[vc_toggle title=”Uzaktan çalışma dönemine geçildiği bu süreçte bu çözüm VPN teknolojisinin yerini ne şekilde alacak?”]
We anticipate that it will gradually replace VPN, starting with access to critical applications, due to the added security and operational efficiency we offer.
[/vc_toggle]
[vc_toggle title=”VPN ile entegre mi çalışıyor yoksa VPN’i tamamen ortadan kaldırıyor mu? “]
We cannot say that it works integrated with VPN. However, it is possible to run them side by side. However, Gartner, NSA, etc. As stated by the authorities, we expect it to be almost completely replaced by VPN in 2023.
[/vc_toggle]
[vc_toggle title=”KVKK açısından bu çözümün yeri nedir?”]
KVKK states that no personal information should be available on the internet without a password. Our solution, on the other hand, meets this need by encrypting the data passing through the internet end-to-end. In addition, we prevent needs with additional security features (encrypting downloaded files, preventing copy/paste function, preventing screenshots).
[/vc_toggle]
[vc_toggle title=”Micro segmentasyondan bahsettiniz, saldırgan ağa eriştiğinde yaylımını nasıl engelliyorsunuz?”]
First of all, we would like to point out that in our technology, the end user does not access the central network. In other words, the center is included in the network and does not get an IP address from there. Only one-time temporary network is established between related applications (such as outlook->exchange). After use, this net is thrown away. As soon as the network is established, the application on the end user device is included in this network after being isolated from the operating system by taking it into a micro container. At this point, any application and/or harmful effect on the isolated application by being enclosed in a micro container cannot reach the central network.
[/vc_toggle]
[vc_toggle title=”Uygulamanın ürettiği bir çıktıyı (rapor vs. ) kendi makinanıza alıp print almak isterseniz ya da kendi makinanızdaki bir file’i uygulamaya upload etmek istediğinizde nasıl kullanıyorsunuz?”]
If the File Encryption option is activated, the file will not be readable if it is uploaded to other machines.
[/vc_toggle]
[vc_toggle title=”Çalışanlar bu kullanımı kendileri deactive edebiliyorlar mı ?”]
No. Employees cannot deactivate security features themselves.
[/vc_toggle]
[vc_toggle title=”Kullanıcıya özel olarak network access rules oluşturabilir miyiz ?”]
Yes. User-based or group-based policies can be created.
[/vc_toggle]
[vc_toggle title=”Erişim yetkilendirmesi yaparken aynı departman içerisinde aynı görev ve sorumluluklara sahip çalışanlara farklı erişim kuralları atayabilir miyiz? Yoksa grup olarak bu uygulamalar üzerinden mi yazıyoruz bu atamaları?”]
Yes. User-based or group-based policies can be created.
[/vc_toggle]
[vc_toggle title=”Loglama tool’una da yönlendirilebiliyor mu?”]
The logs created on the controller component can be automatically directed to the related log collection and analysis software using Python scripts or rest apis.
[/vc_toggle]
[vc_toggle title=”VPN yönetimi için çok fazla zaman hacanıyor IT ekiplerinin bu çözümü yönetmek için sistem tarafında ne kadar müdahil olması gerekiyor? “]
Policies can be defined very easily. The product is designed with safe and easy-to-use principles.
[/vc_toggle]
[vc_toggle title=”Bir public place’te oluşabilecek cihaza sızılma durumunda MİtM nasıl engelleniyor?”]
In our TransientAccess solution, a 2048bit encrypted temporary and one-time network is established between the application on the end user device and the target application in the center, and this network prevents MITM attacks.
[/vc_toggle]
[vc_toggle title=”NAC ile entege bir çalışma yapısı oluşturulabilir mi? Ağa tanımlanan cihaza otomatik kurallar uygulanabilir mi? “]
Regarding NAC, anti-debug mode, anti-vm, anti-jailbreak protections can be implemented on both managed and unmanaged devices without any integration with our solution.
[/vc_toggle]
[vc_empty_space]
[mnky_heading title=”KONUŞMACILAR” line_color=”#dd3333″][vc_empty_space][vc_row_inner][vc_column_inner width=”1/2″][vc_column_text]Moderatör
Erdem Eriş
CyberArts
Kurucu & Genel Müdür[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/2″][vc_single_image image=”2721″][/vc_column_inner][/vc_row_inner][vc_separator][vc_row_inner][vc_column_inner width=”1/2″][vc_column_text]Alper Çiçekli
CyberArts
Technical Account Manager[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/2″][vc_single_image image=”3051″][/vc_column_inner][/vc_row_inner][vc_separator][vc_row_inner][vc_column_inner width=”1/2″][vc_column_text]Selhan Bilsay
TransientX
CTO[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/2″][vc_single_image image=”3050″][/vc_column_inner][/vc_row_inner][vc_separator][vc_row_inner][vc_column_inner width=”1/2″][vc_column_text]Melih Kavala
TransientX
Ülke Satış Müdürü[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/2″][vc_single_image image=”3049″][/vc_column_inner][/vc_row_inner]
[vc_row][vc_column][vc_cta h2=”” add_button=”bottom” btn_title=”TIKLAYIN” btn_style=”flat” btn_shape=”square” btn_color=”danger” css_animation=”fadeInLeft” btn_link=”url:https%3A%2F%2Fcyberartspro.com%2Fteklif-isteme-formu%2F||target:%20_blank|”]KVKK, ISO 270001, Bilgi Güvenliği, Siber Güvenlik ve Bilgi Teknolojileri konularında destek ve teklif almak için lütfen[/vc_cta][/vc_column][/vc_row]