Solutions > Information Security Solutions > Database Security
DATABASE SECURITY
In most cases, databases where your data is stored are only accessible to authorized persons and should be specifically protected. In addition, any personal information that goes to databases should be masked under GDPR and the relevant data should be easily found if necessary.
Our Solutions for Database Security:
Database Firewall
It is the most valuable resource information of businesses and this information should be kept securely in databases established by the relevant technical experts. Access to databases, authorizations and transactions must be arranged and controlled by the IT Manager and the top manager of the company.
For example, access to an ERP or CRM database by a third party consultant must be authorized by the IT Administrator, and the relevant consultant should check what he or she is doing and what files he /she accesses during the access period.
Sibertis is working with Imperva and Datasunrise companies on Database Firewall. Within the scope of the project, we can offer the most appropriate solution to your budget and your needs. Both our solutions are fully compatible with GDPR. In addition, they can be fully integrated into all SIEM solutions.
DATA MASKING
Under the General Data Protection Regulation (GDPR), the data should never be made to be associated with a specific or identifiable natural person. Therefore, the data should be masked while being stored, stored and sent by email. Data masking refers to the process of making certain people of the personal data undetectable by wiping or staring. For example, masking occurs when a part of the person’s credit card number is starred. (6698 **** **** 0006)
Only the moving and accessed data is masked under the solution. There is no need to make any changes in the application. The actual information in the database remains intact. The data in transmission is encrypted and transmitted to the receiver in encrypted form.
Our partner, DataSunRise, provides the following features:
- Masking is done without touching the actual information.
- Many cloud-based or physical databases are supported.
- Multiple data masking techniques are applied.
- The masked data is also encrypted, thus preventing inadvertent data loss.
The solution we provide is fully compliant with GDPR coverage and is very easy to commission.
DATA DISCOVERY
Research shows that both the public and private sector’s institutional memory is the result of unstructured data, which is increasing day by day. Big data analysis, processing, querying, accessing has become one of the most current issues today.
With the Data Discovery solution, it is determined where sensitive and confidential data is stored in the company. The retention conditions of the relevant data can be regulated through in-house policies and the availability of access authorizations, in accordance with regulations such as HIPAA, PCI DSS, SOX, GLBA.
We are working with DataSunRise on Data Discovery.
Our Partners in Database Security



Contact Us

Istanbul Headquarters
Saray Mah Dr Adnan Büyükdeniz Cad , Cessas Plaza 2. Blok Kapı No 4/21, İstanbul, Umraniye 34768, Turkey
Tel: +90 216 386 6888
Ataşehir Operation Center
Vedat Günyol Cad. Flora Plaza 23. Kat Ofis No: 2302 Ataşehir/İstanbul
Tel: +90 216 359 7943
MEA Region Office – Dubai
Boulaverd Plaza Tower 1 Sheikh Mohammed Bin Rashid Boulevard, Downtown, Dubai, Dubai United Arab Emirates
Tel: +971 (4) 401 8553
info@sibertis.com.tr
Endpoint Security and Tracking
• Endpoint Protection
• Full Disk/File Encryption
• Data loss/Leakage Protection
• Data Classification
• Endpoint Control and Tracking
• Mobile Device Management and Protection
System Infrastructure Security
• Server Security
• Storage Security
Database Security
• Infrastructure Firewall
• Data Masking
• Data Discovery
Netwrork Security
• New Generation Firewall
• WEB Protection and Filtering
• Email Protection
• Network Access Control – NAC
Application Security
• WEB Application Firewall (WAF)
• Application Inpection – AI
Cyber Security Incident Detection and Response
• Security Incident and Evidence Management (SIEM)
• Vulnerability Management
• Anti_APT
Critical Infrastructure Security
• Industrial Control Systems Security
• Telecom Infrastructure Security
Core Infrastructure Solutions
• Servers
• Data Storage Solutions
• Storage Area Network Systems
Network Infrastructure Solutions
• Switches
• Yönlendiriciler
• Access Points
• Load Balancers
Information Security Consultancy Services
- Vulnerability Management, Penetration Tests
- Risk Management
- Telecom Infrastructure Security Assessment
- Industrial Systems Security Assessments
- Online Banking and ATM Networks Security Assessments
- WEB and Mobile Application Security Assessments