DDoS Solutions

DDoS Solutions

DDOS attack types can be introduced as the most influential type of attack in Turkey. DDOS is the abbreviation of English words; “Distributed Denial Of Service”. Basically, these are the attacks carried out by malicious people for denial of access of the users to internet. It's possible to categorize these attacks as volumetric (volume-based), protocol and application layer attacks, as well as connection based and connectionless attacks.

The most common type of these attacks known by the public is the one named as volumetric attack which denies the access of internet service providers by occupying the bandwidth used for internet access. To be able to avoid such attacks, high capacity devices of the service providers must be directed to and located in centers which suppress DDOS related traffic and allow for regular traffic.

In Turkey, organizations can procure their internet connection from different service providers. Along with internet connection service, service providers also offer volumetric-weighted DDOS protection service to the users. However, types of attacks which can be named as "low density and low speed", especially those occurring at the application layer, might not be prevented via volumetric DDOS service. Such types of attacks doesn't disable the internet service completely, but for example, it might cause an application on a web service providing server to be disabled.

As Netas, we have been providing DDOS product, maintenance and service support for almost all internet service provider companies in Turkey for many years. We offer our relevant know-how to our customers by means of the DDOS solutions for corporate companies as well. As Netas, we stand by you for prevention of DDOS attacks carried out against your organization.

It's the type of attack denying the access of internet service providers by fully occupying bandwidth for internet access. To be able to avoid such attacks, high capacity devices of the service providers must be directed to and located in centers which suppress DDOS related traffic and allow for regular traffic.

In Turkey, organizations can procure their internet connection from different service providers. Along with internet connection service, service providers also offer volumetric-weighted DDOS protection service to the users. However, types of attacks which can be named as "low density and low speed", especially those occurring at the application layer, might not be prevented via volumetric DDOS service. Such types of attacks doesn't disable the internet service completely, but for example, it might cause an application on a web service providing server to be disabled.

As Netas, we have been providing DDOS product, maintenance and service support for almost all internet service provider companies in Turkey for many years. We offer our relevant know-how to our customers by means of the DDOS solutions for corporate companies as well. As Netas, we stand by you for prevention of DDOS attacks carried out against your organization.

Bank Payment Systems, e-Transformation and Key Management Solutions

Bank Payment Systems

HSM (Hardware Security Module) is a common name given to the special hardware, located in the center of payment systems and providing data security by performing cryptographic functions. HSM performs the operations of password management, message verification and particularly real time encryption of keys named PIN (Personal Identification Number) within a network to which a computer that is running relevant applications is connected. HSM devices are specially equipped with physical security units, as well. They accommodate special physical locks and hardware such as shock detector, and is recommended to be included in environments with restricted physical access. Data security is upgraded to the next level with HSM. Confidential document contents encrypted and stored in the database are protected even when there is an available database access. Decryption of confidential information is substantially difficult as there is no external access to the keys stored in the HSM device. Incoming and outgoing document content data is secured via encryption. You can upload financial seal certificate and qualified electronic certificate (NES) into HSM's and have a (smart card) capacity with the ability to perform a lot more operations per unit time (than smart card). With HSM, it's possible to sign a great number of documents or electronic mails very quickly.

e-Transformation (e-Signature, e-Invoice, e-Archive, e-Ticket, e-Notification and KEP) Services

As Netas, we provide our customers with both equipment service within the framework of our cooperation with Thales company, one of the leading HSM companies worldwide, on equipment side and E-signature, E-Invoice, E-Archive and Registered Electronic Mail (KEP) services with our business partners on the software side. Electronic Signature is an application which has exactly the same validity as wet signature which we use in our daily life as per Electronic Signature Law no. 5070.

Key Management Solutions

The concept of SSL (Secure Sockets Layer) has become even more essential in these days in which security needs have increased and security has become more of an issue. Within the scope of this standard, SSL is used to ensure security and confidentiality of the incoming data, to assure accuracy of the data sender and the data receiver, to verify the date and time of the data transmitted and for similar needs. Destruction caused by the access of attackers to the keys of SSL, which is running in such a critical position, would be excessive. In consequence of protection and management of SSL keys with Nshield HSM series of the Thales company, a high level of assurance is provided not to get caught defenseless against such an attack. Integrity of the SSL encryption / decryption process can be achieved through use of HSM's with FIPS 140-2 Level 3 and Common Criteria EAL 4+ independent certificate.

Local Maintenance

We've been working for more than 15 years with Thales company, which is the Market leader in Turkey and in the world, with respect to HSM. We keep providing maintenance support services to the uppermost banks in bank payment systems and electronic signature, invoice, archive and KEP services. We've been offering a non-stop service to our customers with our certified personnel and the competency which we acquired as a result of our close relationship with Thales company for many years. Our priorities include replacing faulty products of our customers within specified SLA times thanks to the HSM's available in our backup pool and ensuring an uninterrupted operation.

Data Center Security

NGFW

NGIPS ( Intrusion Prevention Systems ) / NGIDS ( Intrusion Detecetion Systems )

Threats which can't be caught by a standard firewall and still don't have a defined signature can cause undesirable damages to your infrastructure. Firewalls do not browse the content of the incoming package. They just check for the source, target, communication protocol and the port used within the rules you set. Thus, you mostly can't know if people navigating through your system resources are friendly or hostile.

Prevention of known and unknown threats is possible through collaboration of firewall and IPS/IDS systems. You can eliminate all threats by analyzing the content of all packages transmitted through your corporate network with highly advanced IPS/IDS solutions of worldwide known manufacturers offered by Netas.

Web Application Firewall

There are some threats against the complicating web traffic at your server which can't be detected by your firewall or IPS/IDS systems. These threats include risks such as data theft, privilege escalation attacks to your application and by-passing from a web application to all other systems inside. You can prevent abnormal traffic by performing detailed package inspection on HTTP / HTTPS / SOAP / XML-RPC / Web Services within this complicated traffic with the application security solutions provided by Netas. Using these systems is also recommended by certain security standards. Primary standards are ISO 27001 and PCI Data Security.

  • Ability to analyze and learn user behaviors,
  • Ability to avoid malicious software related attacks,
  • Ability to detect security vulnerabilities and generate solutions,
  • Ability to ensure protection of relevant protocols,
  • Ability to operate in compliance with regulations and reporting.

Virtualization Security:

This solution manages all L2 traffic inside and between physical servers hosting virtual servers in your environment. Thus, a security barrier against malicious software is created at upper layers. Agents at end points and components of the solution installed on servers can be managed and report can be received via management software to be installed on server.

Finding the right security strategy, advantages and benefits offered by virtualization and cloud data processing technology might be helpful for your organization:

  • Merging the number of servers used and less capital and operating expenses
  • Providing new services quickly and practically
  • Instant scalability
  • Integration of management by the security to be implemented automatically in virtualization solutions

Event Management

SIEM products are of vital importance against attacks towards the data center. The logs received from servers, security devices, network devices must be inspected individually, the behavioral differences within these logs, and abnormalities resulting from such differences must be identified. As Netas family, we've proven our experience in this respect by generating solutions for big data center projects for event association, i.e. correlation projects. By means of this experience and know-how, we position the correlation service in our customers' infrastructures with accurate solutions.

Personal Data Protection

Encryption Solutions

There are obligations incurred by the companies with regard to recording, processing, storing or anonymizing data which makes person identifiable or identifies the person before natural or legal persons. As Netas, we offer solutions for these liabilities with our consultancy, planning, analysis and training services. 
How does the process we offer work? Inspection and Compliance Program starts with the meetings to be held by our experts with senior managers of your organization on the type and scope of the organizational chart, data retention and processing activities of your organization, continues with the inspection and reporting of data retention and processing processes, and ends with the implementation of agreed solution map. 
Inspection and Compliance Program is a process, consisting of various phases and various procedures and performed in a specific time period. Levels of this process are as follows, respectively:

  • Planning
  • Preparation
  • Inspection
  • Reporting
  • Implementation
  • Final reporting

Security Operations Center Service

One of the many instruments used by organizations to ensure IT security is Security Operations Center service. Netas ensures that security analyses and correlations of the customers are performed on a 7/24 basis by its experienced and skilled personnel from a single center with the command and control center where IT infrastructure of organizations which are in need of active monitoring of security status is monitored continuously and interventions are made in case of an attack/a threat.

Processes such as business continuity, cyber threat intelligence analysis are implemented by means of the continuous monitoring and analysis of cyber events in this operations center and the alarm generation. Our services are provided through new technological components such as DDoS prevention, Centralized Trace Collection, Event Correlation and Alarm Generation System (SIEM) as well as New Generation Firewall, Intrusion Detection/Prevention System (IDS/IPS), Secure Remote Access (SSL VPN), Content Filtering, e-Mail/Internet Antivirus Gateways (AVGW), which are standard network security solutions.

Firstly, penetration tests are performed in the organization demanding service, and the results of these tests are reported to the organization in detail. Afterwards, Security Operations Center Service is initiated with the contract to be specifically drawn up for the organization.

VOIP Security

VoIP and web threats continue to increase rapidly in Turkey and in the world! With the developments in communication technologies (4G, VoLTE, VoWiFi), use of VoIP systems, which provide installation and operating cost advantage and rich services, increases. With the WebRTC technology, we can have audio and video communication over the Web. Along with these developments, fraud activities related to VoIP and Web systems increase and economic losses are experienced.
There is a need for security solutions providing in-depth package analysis at the level of application layer for detection of VoIP and Web system vulnerabilities and protection of these systems. You're safe with the "NOVA Cyber Security Solutions" and "Pentest Services" developed by Netas!

Click here for detailed information on Nova. 

Subscribe to Our Newsletter

Enter your email address to receive all news from NETAŞ!