Blog EN

ISO 27001 Obligation under the Public Procurement Law

ISO 27001 is a globally accepted standard for effective information management. It helps organizations avoid costly security breaches. Organizations with ISO 27001 certification demonstrate to customers, business partners, and stakeholders that they take necessary steps in the event of a data breach, thus maintaining the reputation of the institution. While ISO 27001 certification is not

ISO 27001 Obligation under the Public Procurement Law Devamını Oku »

Blog EN

Usage of SMS Verification Code in Shopping

The digitization of shopping with advanced technology brings about amendments in the Personal Data Protection Law. Recently, significant regulations have been introduced by the Personal Data Protection Board regarding SMS verification codes sent to individuals during shopping at stores and commercial messages. Explicit Consent and Obligation to Inform: Article 5 of the law states that

Usage of SMS Verification Code in Shopping Devamını Oku »

Blog EN

Trend Micro Worry Free Services

console, provides detailed visibility and control over endpoint security, email security, and cloud application security throughout your organization. Utilizing high-quality machine learning, it analyzes files not only before execution but also uniquely during runtime, offering more reliable protection. This solution enables more effective scanning of files for potential threats and better management of your organization’s

Trend Micro Worry Free Services Devamını Oku »

Blog EN

Third-Party Lifecycle Automation

OneTrust supports supply chain management by facilitating the design of processes involving multiple departments, conducting risk analysis, managing supplier evaluations, and scheduling automated rules for contract renewals. Among these departments are procurement, information security, occupational health and safety, quality, and more. With Third-Party Lifecycle Automation: Supplier acceptance (onboarding) and termination (offboarding) process management. Supplier application

Third-Party Lifecycle Automation Devamını Oku »

Blog EN

Tufin – Security Policy Automation For The Agile Enterprise

Security Policy Automation for the Agile Enterprise Secure your network and cloud environments, and deploy a Zero Trust Architecture with the industry’s most powerful security policy automation technology. Achieve end-to-end network security across your hybrid enterprise infrastructure, powered by a single solution designed for both network and cloud security teams. The Tufin Orchestration Suit Comprised

Tufin – Security Policy Automation For The Agile Enterprise Devamını Oku »

Blog EN

Allot Solutions for Universities

Why Universities Need Allot? Managing the traffic generated during remote learning class hours Managing the traffic during course selection and add/drop periods Directing the intensity during student registration periods Supervising shared internet usage across multiple campus structures Managing application downloads and internet traffic on campuses and dormitories Managing file-sharing traffic between campuses Allot Technology Efficient

Allot Solutions for Universities Devamını Oku »

Blog EN

Complete Protection For Cloud Email & Productivity Suites

Over 90% of attacks against organizations start from a malicious email. Since email attacks usually involve the human factor, your Office 365 and G Suite environments are your organization’s weakest link. Closing this security gap requires protections from various threat vectors: phishing, malware, data theft and account-takeover. This might force you to choose between the

Complete Protection For Cloud Email & Productivity Suites Devamını Oku »

Blog EN

Onetrust

Invento, with its partnership agreement with OneTrust, the world’s fastest growing GRC company, offers application and management opportunities in data security, data discovery, compliance with regulations and many more areas on a single platform. Existing flows related to known frameworks such as KVKK, GDPR, ISO Standards can be used, as well as allowing you to

Onetrust Devamını Oku »

Scroll to Top