Contact Us: +90 216 386 6888 (Tr) / +971 (4) 401 8553 (UAE)


Solutions > Bilgi Güvenliği Çözümleri > Critical Infrastructure Security


There is a risk that any control system used for industrial purposes can be attacked without being connected to the Internet. There are many examples of this situation, such as the Stuxnet attack. In the event of a risk, a more severe picture may emerge, such as a complete collapse of the operation or production. In order to prevent this situation, we can offer critical infrastructure security solutions together with the Positive Technologies company, which we distribute. Our solutions include vulnerability scanning and analysis of systems.

Our Solutions for Critical Infrastructure Security:

Review our consulting services on Critical Infrastructure Security Screening and Assessment.

Review our Critical Infrastructure Consulting Services >


For more information about PT products, please contact us.

Industrial Control Systems – ICS Security

Today’s industrial infrastructure has become more automated than ever. Transportation, manufacturing, utilities, mining and all other industries are active every hour. Cyber security is very important, possible attacks can damage expensive equipment, stop operations and cause accidents.

Enterprise IT systems and production systems tend to unite, but we see that cyber security has been neglected in this process. A security breach in any part of the network may cause a company’s entire infrastructure to crash. Researchers of Positive Technologies have found that in 2017 more than 160,000 industrial control systems (ICS) components are directly connected to the Internet and open to outside access. In 2016, the company’s inspections carried out the penetration test that seized control systems by using security vulnerabilities.

Vulnerabilities in ICS components have always been attractive to attackers. According to the report published by PT in 2016, 75% of the deficits were found in ICS components manufactured by manufacturers such as Siemens, Schneider Electric, Advantech and Moxa. More importantly, more than half of these vulnerabilities were critical.

Industrial Security Incident Manager – ISIM of Positive Technologies, our business partner in the field of Critical Infrastructure Security, identifies intrusions, unauthorized authorizations, suspicious traffic, internet access points, weak passwords in all control systems on production lines and reported to the relevant authority.

Download Product Brochure

More information about Industrial Control Systems is available in the brochure at the link below.


The signaling protocols SS7 and Diameter networks are always vulnerable to attacks. Using vulnerabilities in these networks, attackers can easily perform the following attacks:

  • View conversations, view messages
  • Track subscribers’ locations
  • Can fraud USSD codes and billing systems
  • DoS attack on a subscriber, subscriber group, or entire network
  • Get sensitive data

The experts of Positive Technologies, in 2015, were able to retrieve sensitive information from SS7 and Diameter networks in 77 of every 100 penetration tests on Telecom networks, 67 of them attempted fraud, and 80 of them were included in the conversations without subscribers’ knowledge.

PT Telekom Attack detection solution instantly monitors the security of Telecom networks, instantly detect and report anomalies. With its rich analytics and management panel, Telecom Operators monitor the security of traffic on SS7 and Diameter networks and block attacks before they happen.

Contact Us


Istanbul Headquarters

Saray Mah Dr Adnan Büyükdeniz Cad , Cessas Plaza 2. Blok Kapı No 4/21, İstanbul, Umraniye 34768, Turkey

Tel: +90 216 386 6888

Ataşehir Operation Center

Vedat Günyol Cad. Flora Plaza 23. Kat Ofis No: 2302 Ataşehir/İstanbul

Tel: +90 216 359 7943

MEA Region Office – Dubai

Boulaverd Plaza Tower 1 Sheikh Mohammed Bin Rashid Boulevard, Downtown, Dubai, Dubai United Arab Emirates

Tel: +971 (4) 401 8553