This post is also available in: Türkçe
Our Solutions for Database Security:
For example, access to an ERP or CRM database by a third party consultant must be authorized by the IT Administrator, and the relevant consultant should check what he or she is doing and what files he /she accesses during the access period.
Sibertis is working with Imperva and Datasunrise companies on Database Firewall. Within the scope of the project, we can offer the most appropriate solution to your budget and your needs. Both our solutions are fully compatible with GDPR. In addition, they can be fully integrated into all SIEM solutions.
Only the moving and accessed data is masked under the solution. There is no need to make any changes in the application. The actual information in the database remains intact. The data in transmission is encrypted and transmitted to the receiver in encrypted form.
Our partner, DataSunRise, provides the following features:
- Masking is done without touching the actual information.
- Many cloud-based or physical databases are supported.
- Multiple data masking techniques are applied.
- The masked data is also encrypted, thus preventing inadvertent data loss.
The solution we provide is fully compliant with GDPR coverage and is very easy to commission.
With the Data Discovery solution, it is determined where sensitive and confidential data is stored in the company. The retention conditions of the relevant data can be regulated through in-house policies and the availability of access authorizations, in accordance with regulations such as HIPAA, PCI DSS, SOX, GLBA.
We are working with DataSunRise on Data Discovery.
Our Partners in Database Security
Esentepe Mah. Büyükdere Cad. Tekfen Kulesi 8. Kat Levent 34394 Şişli/İstanbul
Tel: 0 212 371 8668
Ataşehir Operation Center
Vedat Günyol Cad. Flora Plaza 23. Kat Ofis No: 2302 Ataşehir/İstanbul
MEA Region Office – Dubai
Emirates Towers, Sheikh Zayed Road, Level 41, PO Box: 31303 Dubai/UAE
Tel: +971 4 319 7359
Endpoint Security and Tracking
• Endpoint Protection
• Full Disk/File Encryption
• Data loss/Leakage Protection
• Data Classification
• Endpoint Control and Tracking
• Mobile Device Management and Protection
Core Infrastructure Solutions
• Data Storage Solutions
• Storage Area Network Systems
Network Infrastructure Solutions
• Access Points
• Load Balancers
- Vulnerability Management, Penetration Tests
- Risk Management
- Telecom Infrastructure Security Assessment
- Industrial Systems Security Assessments
- Online Banking and ATM Networks Security Assessments
- WEB and Mobile Application Security Assessments