{"id":432,"date":"2020-06-11T23:25:42","date_gmt":"2020-06-11T23:25:42","guid":{"rendered":"http:\/\/itblog.istek.k12.tr\/?p=432"},"modified":"2022-09-01T15:38:24","modified_gmt":"2022-09-01T15:38:24","slug":"sistemlerimizde-ve-google-hesaplarimizda-data-loss-prevention-dlp-uygulanmaktadir","status":"publish","type":"post","link":"https:\/\/itblog.istek.k12.tr\/index.php\/2020\/06\/11\/sistemlerimizde-ve-google-hesaplarimizda-data-loss-prevention-dlp-uygulanmaktadir\/","title":{"rendered":"Sistemlerimizde ve Google hesaplar\u0131m\u0131zda Data Loss Prevention (DLP) uygulanmaktad\u0131r:"},"content":{"rendered":"\n<p>En Temel g\u00fcvenlik kurallar\u0131ndan biri olarak, sistemlerimizde b\u00fct\u00fcn USB data portlar\u0131 engellidir. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/itblog.istek.k12.tr\/wp-content\/uploads\/2022\/08\/usb1.png\" alt=\"\" class=\"wp-image-1143\" width=\"287\" height=\"149\" srcset=\"https:\/\/itblog.istek.k12.tr\/wp-content\/uploads\/2022\/08\/usb1.png 600w, https:\/\/itblog.istek.k12.tr\/wp-content\/uploads\/2022\/08\/usb1-300x157.png 300w\" sizes=\"(max-width: 287px) 100vw, 287px\" \/><\/figure>\n\n\n\n<p>Kurumsal verilerimizin d\u0131\u015far\u0131ya kontrols\u00fcz \u015fekilde payla\u015f\u0131m\u0131n\u0131 engellenmesi ve verilerin&nbsp;g\u00fcvenli\u011fi i\u00e7in&nbsp;G.drive&nbsp;\u00fczerinden kullan\u0131c\u0131lar\u0131m\u0131z\u0131n payla\u015f\u0131m ayarlar\u0131 sadece kurum i\u00e7inde yap\u0131lacak \u015fekilde ayarlanm\u0131\u015ft\u0131r. Yani bir &#8220;@<a rel=\"noreferrer noopener\" href=\"http:\/\/istek.k12.tr\/\" target=\"_blank\">istek.k12.tr<\/a>&#8221; hesab\u0131 sadece &#8220;@<a rel=\"noreferrer noopener\" href=\"http:\/\/istek.k12.tr\/\" target=\"_blank\">istek.k12.tr<\/a>&nbsp;hesab\u0131 ile bir dosya\/klas\u00f6r payla\u015fabilmektir. Sadece Kamp\u00fcs m\u00fcd\u00fcrlerimiz, kurumsal \u00e7al\u0131\u015fanlar\u0131m\u0131z ve IT uzmanlar\u0131m\u0131z d\u0131\u015far\u0131ya payla\u015f\u0131m yapabilecektir. D\u0131\u015far\u0131dan birisi ile payla\u015fma ihtiyac\u0131 oldu\u011funda, yetkili bir ki\u015fi&nbsp;<a rel=\"noreferrer noopener\" href=\"mailto:bilgiislem@istek.k12.tr\" target=\"_blank\">bilgiislem@istek.k12.tr<\/a>&nbsp;ye mail atabilir yard\u0131m alabilir.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/itblog.istek.k12.tr\/wp-content\/uploads\/2022\/08\/d1ed.png\" alt=\"\" class=\"wp-image-1141\" width=\"52\" height=\"47\" srcset=\"https:\/\/itblog.istek.k12.tr\/wp-content\/uploads\/2022\/08\/d1ed.png 512w, https:\/\/itblog.istek.k12.tr\/wp-content\/uploads\/2022\/08\/d1ed-300x269.png 300w\" sizes=\"(max-width: 52px) 100vw, 52px\" \/><\/figure>\n\n\n\n<p>Email sistemlerimizde Google uygulamalar\u0131nda PoP3 ve SMTP portlar\u0131 da yine g\u00fcvenlik gere\u011fi kapat\u0131lm\u0131\u015ft\u0131r. Kullan\u0131c\u0131lar\u0131m\u0131z Google Kurumsal hesaplar\u0131n\u0131 en ideal \u015fekilde y\u00f6netmesi i\u00e7in, Google Chrome veya ba\u015fka bir g\u00f6r\u00fcnt\u00fcleyicide web aray\u00fcz\u00fcnden kontrol edilebilir veye ak\u0131ll\u0131 cihazlar\u0131na &#8220;Gmail&#8221; ve di\u011fer Google&nbsp; uygulamalar\u0131n\u0131 tek sefere mahsus indirip kullanabilecektir. G\u00fcvenlik gere\u011fi ak\u0131ll\u0131 cihazlarda var olan i\u015fletim sisteminin kendi Email istemci uygulamalar\u0131 kullan\u0131lamayacakt\u0131r.&nbsp; Gmail&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.google.android.gm&amp;hl=en&amp;gl=US\" target=\"_blank\">Android<\/a>&nbsp;|&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/apps.apple.com\/us\/app\/gmail-email-by-google\/id422689480\" target=\"_blank\">iOS<\/a>&nbsp;link.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/itblog.istek.k12.tr\/wp-content\/uploads\/2022\/08\/gm1.png\" alt=\"\" class=\"wp-image-1142\" width=\"163\" height=\"94\" srcset=\"https:\/\/itblog.istek.k12.tr\/wp-content\/uploads\/2022\/08\/gm1.png 617w, https:\/\/itblog.istek.k12.tr\/wp-content\/uploads\/2022\/08\/gm1-300x174.png 300w\" sizes=\"(max-width: 163px) 100vw, 163px\" \/><\/figure>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Data Loss Prevention (DLP)<\/strong><\/h1>\n\n\n\n<p>Veri g\u00fcvenliginin olduk\u00e7a kritik bir hal aldigi bug\u00fcnlerde, firmalar; edindikleri g\u00fcvenlik stratejileri ile \u00f6ne ge\u00e7mektedir. Dolayisiyla ortaya \u00e7ikan tabloda veri g\u00fcvenligini saglamak i\u00e7in kullanilan tool&#8217;lar da fark yaratabilmek ve daha g\u00fcvenli bir ortam olusturabilmek i\u00e7in; \u00fczerine d\u00fcs\u00fcn\u00fclmesi ve ara\u015ft\u0131r\u0131lmas\u0131 gereken bir hale gelmistir. DLP, \u015firketlerin hassas verilerinin, \u015firket i\u00e7inde nas\u0131l yer de\u011fi\u015ftirdi\u011fini g\u00f6zleyen ve kontroll\u00fc bir \u015fekilde; \u201cd\u0131\u015far\u0131 s\u0131zmalar\u0131n\u0131\u201d engelleyen bir teknolojidir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Veri Kayb\u0131 \u00d6nleme \u2013 Data Loss Prevention (DLP) Nedir ?<\/strong><\/h3>\n\n\n\n<p>DLP, kurumunuzun k\u0131ymetli verisi hakk\u0131nda \u00fc\u00e7&nbsp; temel hassas soruyu i\u00e7eren bir t\u00fcr i\u00e7erik fark\u0131ndal\u0131k ve g\u00fcvenlik teknolojisidir. Bu veri nerede depolanacak? Bu veri nas\u0131l kullan\u0131lacak? Kay\u0131p ve h\u0131rs\u0131zl\u0131k durumundan nas\u0131l korunabilirim? DLP genel tan\u0131m\u0131yla, \u015firketlerin hassas verilerinin, \u015firket i\u00e7inde nas\u0131l yer de\u011fi\u015ftirdi\u011fini g\u00f6zleyen ve kontroll\u00fc bir \u015fekilde; \u201cd\u0131\u015far\u0131 s\u0131zmalar\u0131n\u0131\u201d engelleyen bir teknolojidir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Veri Kayb\u0131 \u00d6nleme (DLP)<\/strong><\/h3>\n\n\n\n<p>-DLP ile; bilgi g\u00fcvenli\u011fi konusunda en geni\u015f koruma katman\u0131 sa\u011flanabilmektedir.<\/p>\n\n\n\n<p>-False positive&#8217;e olduk\u00e7a hassas bir yap\u0131 olu\u015fturmaktad\u0131r.<\/p>\n\n\n\n<p>-Tek console ile; policy managment, incident response, reporting ve administration noktas\u0131nda b\u00fcy\u00fck kolayl\u0131k sa\u011flamaktad\u0131r.<\/p>\n\n\n\n<p>-T\u00fcm communication kanallar\u0131na (cloud, email, web, endpoint and storage) dokunabilmekte ve bu noktalar \u00fczerindeki veri g\u00fcvenli\u011fini; yaz\u0131lan policy&#8217;lerle y\u00f6netebilmektedir.<\/p>\n\n\n\n<p>-Entegrasyon konusunda olduk\u00e7a geni\u015f bir \u00fcr\u00fcn yelpazesine sahip olan DLP, son g\u00fcnlerde en pop\u00fcler konulardan biri olan Symantec Information Centric Security ile entegrasyonu ile birlikte; KVKK&#8217;n\u0131n da gerektirdi\u011fi veri s\u0131n\u0131fland\u0131rmay\u0131; olduk\u00e7a kolay y\u00f6netilebilir bir platformda sunmaktad\u0131r.<\/p>\n\n\n\n<p>-Ayr\u0131ca third party; encryption, data classification, rights managment tool&#8217;lar\u0131 ile ilgili entegrasyon kolayl\u0131\u011f\u0131 da sunmaktad\u0131r.<\/p>\n\n\n\n<p>Bu durumda; veri ihlallerini \u00f6nlemek ve en y\u00fcksek d\u00fczeyde koruma sa\u011flayabilmek i\u00e7in, <strong>DLP<\/strong> \u00e7ok stratejik bir noktada durmaktad\u0131r.<\/p>\n\n\n\n<p>G\u00fcvenli\u011fi en y\u00fcksek seviyeye ta\u015f\u0131yabilmemiz ad\u0131na, dokunaca\u011f\u0131m\u0131z noktalar\u0131 4 ba\u015fl\u0131kta toplayabiliriz.<\/p>\n\n\n\n<p>&#8211; Endpoint<\/p>\n\n\n\n<p>&#8211; Network<\/p>\n\n\n\n<p>&#8211; Cloud<\/p>\n\n\n\n<p>&#8211; Storage<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/1f0NOAYRLK5Y6G0BFn_WhydqmxuZAEA-LTTSfpZyP4-alcbDmS5g2AamjgyVMRFRJzZSPPv1Gxohc69Utyttr0kYTahriHRvkXCOOBIgIX6WuTvi-df2NPzzZv-CP1VUfHy7DCrq\" alt=\"\"\/><\/figure>\n\n\n\n<p>Bu noktalarda alaca\u011f\u0131m\u0131z aksiyonlar da a\u015fa\u011f\u0131daki gibi olacakt\u0131r.<\/p>\n\n\n\n<p>&#8211; Discover<\/p>\n\n\n\n<p>&#8211; Monitor<\/p>\n\n\n\n<p>&#8211; Protect<\/p>\n\n\n\n<p><strong>Endpoint dedi\u011fimizde buna neler dahil olacakt\u0131r? Veri g\u00fcvenli\u011fini zirveye ta\u015f\u0131rken nerelerde dolan\u0131yoruz, hangi aksiyonlar\u0131 al\u0131yoruz?<\/strong><\/p>\n\n\n\n<p>Removable Storage, Desktop Email, Web Apps, Virtual Desktops; endpoint olarak g\u00f6sterebilece\u011fimiz noktalard\u0131r. Bu noktalarda Discover, Monitor, Prevent gibi aksiyonlar alabilmekteyiz.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/G8PE32Akcd1xdcAjOOPPqacIdMFWp9xoxjlaSwO5pNHdZHIwo0r8MuVgcF34DPzRF-r3vHY34VkLmFi0W-qIJCF-KbubeIHqzzLQoYGa2F4hwGtK-AGcEsTAaBx-cUg84at-vh7S\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/REFwZfCQI4Z_jYSW8ICT0vKpBgi2JtGQyoVlY5I89-Buo-yLwtp9SQvxTUGm9Jb34ma2DtTTGOUw_KWSZZeRNj6gJUX2__y1ZBrQkFSICLoTtP4d3PxbfKNpLZQsD8NMUJ852bV_\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong>Network dedi\u011fimizde buna neler dahil olacakt\u0131r? Veri g\u00fcvenli\u011fini zirveye ta\u015f\u0131rken, nerelerde dolan\u0131yoruz, hangi aksiyonlar\u0131 al\u0131yoruz?<\/strong><\/p>\n\n\n\n<p>Email, Web, FTP, IM, IPv6; network olarak g\u00f6sterebilece\u011fimiz noktalard\u0131r. Bu noktalarda; Monitor, Prevent for Web, Prevent for Email mod\u00fclleri ile prevent ve monitor aksiyonlar\u0131n\u0131 ald\u0131rabilmekteyiz.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/en9y8Kn6meC75YTufNM3vKDDI7Nm6ydtwOwttlITbq-BkkVl8Q5nFlT30jRUYe0mdXk3zT0HigshR2OtuPj7kkxnNve1k5c2qRlyLCW9N0DkUpL1pXvDwkJ6MYvs0O1KDjUsL8_O\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong>Storage dedi\u011fimizde buna neler dahil olacakt\u0131r? Veri g\u00fcvenli\u011fini zirveye ta\u015f\u0131rken, nerelerde dolan\u0131yoruz, hangi aksiyonlar\u0131 al\u0131yoruz?<\/strong><\/p>\n\n\n\n<p>File servers, databases, Exchange, sharepoint, Nas filers; duran veriyi ararken odaklanaca\u011f\u0131m\u0131z noktalard\u0131r. Bu noktalarda; Discover ve Protect aksiyonlar\u0131n\u0131 ald\u0131rabiliriz. Ayr\u0131ca Flex Response&#8217;u da desteklemesi sebebiyle olduk\u00e7a kuvvetli bir koruma ve aksiyon mekanizmas\u0131 sunmaktad\u0131r.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/x0P-2qrr4kEcEUTUgNnaM_HsShpSPuHFNDwfoCmK0HlJHdyPQRGzU4CiZ_kxKoZDj0xrQviqzKXYSYXW22YAMaD1_ST-LWhi1nRC1o_RuKM9yxvgdITOmyxHLBo4kyQ0vzj63not\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/itrcUGi1ped12g3OXBxIgokHQ3_eahgjJ2btqLz3FEpeIiVtv8Hw1Nmgci_nAIBYvDIg4DDpFT49P7M82u3IqJkrdprW13FE3TNCkgUP-el3lLdqU__0AK0M7ekr3k4R5sTkiaQT\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong>Cloud ded\u011fimizde buna neler dahil olacakt\u0131r? Veri g\u00fcvenli\u011fini zirveye ta\u015f\u0131rken, nerelerde dolan\u0131yoruz, hangi aksiyonlar\u0131 al\u0131yoruz?<\/strong><\/p>\n\n\n\n<p>Cloud Apps, O365 Exchange, Gmail, Box; cloud olarak m\u00fcdahele edebildi\u011fimiz noktalard\u0131r. Bu noktalarda; Detection service ve Cloud Service for Email gibi mod\u00fcllerle; verinin g\u00fcvenli\u011fini sa\u011flayabilmekteyiz.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/k4UeUwuEG4Bw_FJUiTGW-j2OgQMcjPDTayYctmxXy3w0u6MOBFJLFbpNxEGq0GlGsj4rhbTCtunHnHB7dLYL4M2_daS07ok2H7nOEzFSyUT4SPGDETGB40ta-KOc6_rgRjRYQG1q\" alt=\"\"\/><\/figure>\n\n\n\n<p>\u00c7ok \u00f6nemli oldu\u011fundan vurgulamakta fayda g\u00f6rd\u00fc\u011f\u00fcm\u00fcz kritik nokta ise; DLP; advanced machine learning, image recognition, fingerprinting ve describing technologies sayesinde False Positive say\u0131s\u0131n\u0131 \u00e7ok ba\u015far\u0131l\u0131 bir \u015fekilde minimize etmektedir.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/RYIB4TGvIzSPN113ji1g79AvXLN1Rz4cnOACv8bhCsUJyxK274YkSM0f4kA3dY5feeaWTT7ncAs_i1Q9Wvdf1kCZJqLB-3PeSZ8EWYYx88Djm5BNBtpGZLvx1DxCCeGyhsP9tojE\" alt=\"\"\/><\/figure>\n\n\n\n<p>Veri korumas\u0131nda DLP&#8217;ye; \u00e7e\u015fitli <strong>entegrasyonlarla<\/strong> boyut kazand\u0131rmam\u0131z da m\u00fcmk\u00fcnd\u00fcr. \u00c7\u00fcnk\u00fc hassas veriler 2.ki\u015filerle payla\u015f\u0131ld\u0131k\u00e7a, y\u00f6netilen ortam\u0131n d\u0131\u015f\u0131na \u00e7\u0131kt\u0131k\u00e7a, bulutta dola\u015ft\u0131k\u00e7a korumas\u0131z hale gelir. Bu sebeple g\u00fcvenli\u011fi geni\u015fletecek konseptlere ihtiya\u00e7 duymaktay\u0131z. bu konsepti geni\u015fletmek i\u00e7in sundu\u011fu \u00e7\u00f6z\u00fcmler ise a\u015fa\u011f\u0131daki gibidir.<\/p>\n\n\n\n<p>&#8211; Cloud Access Security Broker: CloudSOC (CASB)<\/p>\n\n\n\n<p>&#8211; Data Classification:&nbsp; <strong>Information Centric Tagging (ICT)<\/strong><\/p>\n\n\n\n<p>&#8211; Encryption: Information Centric Encryption (ICE)<\/p>\n\n\n\n<p>&#8211; User and Entity Behavior Analytics: Information Centric Analytics (ICA)<\/p>\n\n\n\n<p>&#8211; Web Gateways and Proxies User Authentication: ProxySG and Web Security Service (BlueCoat)<\/p>\n\n\n\n<p>&#8211; User Authentication: VIP<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/TcjU_ib2qBYSDGjhnJujEjXB6DlmpPMn1GckHZ-4tk3QN418moJvZeUV-4S7x4FZHbSE9LJb3FWyd3Xro-xEBulSSQ3Ddmjhz4Lv9fJ3HRVvu2I-aYPSyQIhw3ytDiJhkpBk-5p1\" alt=\"\"\/><\/figure>\n\n\n\n<p>&#8220;Peki Neden DLP?&#8221; dedi\u011finizde; bizim verecek cevab\u0131m\u0131z \u00e7ok. KVKK&#8217;n\u0131n g\u00f6be\u011findeki bu yaz\u0131l\u0131m\u0131, her firman\u0131n de\u011ferlendirmesi ve b\u00fcnyesine katmas\u0131 gerekti\u011fini d\u00fc\u015f\u00fcn\u00fcyoruz. Bu s\u00fcre\u00e7te de yan\u0131n\u0131zda olmaktan mutluluk duyaca\u011f\u0131z.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Veri Kayb\u0131 \u00d6nleme Y\u00f6netimi ve Raporlamas\u0131<\/strong><\/h3>\n\n\n\n<p>Veriniz , bir\u00e7ok uygulamay\u0131 ve cihaz\u0131 kapsayacak bi\u00e7imde yay\u0131ld\u0131\u011f\u0131ndan;&nbsp; g\u00fcvenli\u011finizi ve uyumluluk politikalar\u0131n\u0131 tutarl\u0131 bir bi\u00e7imde g\u00fc\u00e7lendirme kabiliyeti daha kritik bir hale gelmektedir. DLP \u00e7\u00f6z\u00fcm\u00fcn\u00fcn b\u00fct\u00fcnle\u015fik y\u00f6netimi konsolu, i\u015finizi kolayla\u015ft\u0131rmaktad\u0131r. Politikalar\u0131 bir defa yazd\u0131ktan sonra, bu politikalar\u0131 her yerde uygulayabilir ve kolay bir bi\u00e7imde; otomatik i\u015f ak\u0131\u015flar\u0131 ile vakalar\u0131 d\u00fczeltebilirsiniz. Ayn\u0131 zamanda; raporlama ara\u00e7lar\u0131n\u0131z\u0131 robotize etmenizi kolayla\u015ft\u0131r\u0131r ve daha ak\u0131lc\u0131 risk kararlar\u0131 alman\u0131z\u0131 sa\u011flar. B\u00f6ylelikle DLP nin de\u011ferini art\u0131r\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Bulut Bili\u015fim i\u00e7in Veri Kayb\u0131 \u00d6nleme (DLP)<\/strong><\/h3>\n\n\n\n<p>Bir\u00e7ok kurum i\u00e7in, kurum i\u00e7i uygulamalar\u0131 bulut bili\u015fim ortam\u0131na ta\u015f\u0131mak,&nbsp; ataleti oranlar\u0131n\u0131 ve maliyetleri d\u00fc\u015f\u00fcrmenin ak\u0131lc\u0131 bir y\u00f6ntemidir. Fakat; kontrol\u00fc ve g\u00f6r\u00fcn\u00fcrl\u00fc\u011f\u00fc kaybetmeden nas\u0131l bulutun avantajlar\u0131ndan faydalan\u0131labilir? Bulut Bili\u015fim i\u00e7in DLP, bu problemi robotize ke\u015fif, tarama ve \u00f6nleme yetenekleri ile&nbsp; \u00e7\u00f6zmektedir. (Microsoft Office 365 ve Box).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Altu\u00e7 \u0130\u00e7in Veri Kayb\u0131 \u00d6nleme (DLP)<\/strong><\/h3>\n\n\n\n<p>Mobil ve bulut adaptasyonun h\u0131zlanmas\u0131 sa\u011flansa dahi; geleneksel altu\u00e7lar hassas kurumsal veri i\u00e7in temel bir depolama arac\u0131 olmaya devam etmektedir. Altu\u00e7 i\u00e7in DLP, t\u00fcm bu bilgilerin g\u00fcvenli ve koruma alt\u0131nda olmas\u0131n\u0131 sa\u011flar. Hem fiziksel hem de sanal ortamda kullan\u0131c\u0131lar kurumsal a\u011f\u0131n\u0131za giri\u015f ve \u00e7\u0131k\u0131\u015f yapt\u0131klar\u0131 zaman verinizi ke\u015ffetme, tarama ve koruma imkan\u0131 sa\u011flamaktad\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>A\u011flar i\u00e7in Veri Kayb\u0131 \u00d6nleme<\/strong><\/h3>\n\n\n\n<p>\u00c7al\u0131\u015fmalar\u0131n g\u00f6sterdi\u011fine g\u00f6re; i\u015f ile ilgili dosyalar\u0131na d\u00fczenli bir bi\u00e7imde bireysel hesaplar\u0131ndan eri\u015fen \u00e7al\u0131\u015fanlar\u0131n say\u0131s\u0131, g\u00fcn ge\u00e7tik\u00e7e artmaktad\u0131r. B\u00f6ylelikle; e-posta ve web siteleri en yayg\u0131n data kayb\u0131 ara\u00e7lar\u0131 haline gelmeye ba\u015flam\u0131\u015ft\u0131r. A\u011flar i\u00e7in DLP, bu evrensel problemi en aza indirgemede yarar sa\u011flamaktad\u0131r. Geni\u015f bir a\u011f etraf\u0131ndaki a\u011f protokollerini tarama ve hem yetki verilen hem de yetki verilmeyen kullan\u0131c\u0131lar\u0131n kurum i\u00e7in gizli bilgi niteli\u011findeki bilgileri k\u00f6t\u00fcye kullan\u0131lmas\u0131n\u0131 engellemektedir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Depolama i\u00e7in Veri Kayb\u0131 \u00d6nleme (DLP)<\/strong><\/h3>\n\n\n\n<p>Yap\u0131land\u0131r\u0131lmam\u0131\u015f veri, her y\u0131l %70 ler oran\u0131nda alarm verecek bir bi\u00e7iminde b\u00fcy\u00fcmektedir. B\u00f6ylece; s\u00f6zkonusu veriyi verimli bir bi\u00e7imde saklama konusunda; kurumlar\u0131n problemler ya\u015famas\u0131 \u015fa\u015f\u0131rt\u0131c\u0131 de\u011fildir. Depolama i\u00e7in Symentec DLP, yap\u0131land\u0131r\u0131lmam\u0131\u015f t\u00fcm verinizi kontrol etmenize olanak sa\u011flar, b\u00f6ylelikle hi\u00e7bir zaman dikkatsiz \u00e7al\u0131\u015fanlar\u0131n ve k\u00f6t\u00fc niyetli sald\u0131r\u0131lar\u0131n kurumunuza bir zarar\u0131 olmaz.<\/p>\n\n\n\n<p>Data Loss Prevention ile cloud, mobil ve on-the-premises ortamlarda gizli veriyi tespit edebilir ve hareketlerini monitor edebilirsiniz.<\/p>\n\n\n\n<ul><li>Verinizin cloud, mobil ve on-the-premises yap\u0131larda nerede tutuldu\u011funu taray\u0131n,<\/li><li>Verinizin \u015firket i\u00e7i ve \u015firket d\u0131\u015f\u0131 a\u011flarda nas\u0131l kullan\u0131ld\u0131\u011f\u0131n\u0131, hareket etti\u011fini izleyin,<\/li><li>Verinizi \u00e7al\u0131nmaya ya da s\u0131zmaya kar\u015f\u0131 koruyun.<\/li><\/ul>\n\n\n\n<p>Gizli \u015firket verisinin son kullan\u0131c\u0131 makinelerinde, network \u00fczerinde, mobil cihazlar \u00fczerinde ve storage \u00fczerinde takip edilmesini, engellenmesini ve tespit edilmesini DLP ile sa\u011flayabilirsiniz.<\/p>\n\n\n\n<p>Platin Bili\u015fim\u2019in konusunda uzman kadrosu ile DLP s\u00fcre\u00e7lerini kurumsal g\u00fcvenlik anlay\u0131\u015f\u0131 ile b\u00fct\u00fcnle\u015ftirerek t\u00fcm ortamlarda veri g\u00fcvenli\u011finin temellerini olu\u015fturabilirsiniz.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Yeni \u00d6zellikler!<\/strong><\/h3>\n\n\n\n<p>Verinin cloud ortama ta\u015f\u0131nd\u0131\u011f\u0131 g\u00fcnlerde daha fazla g\u00fcvenlik, gizlilik ve uyumluluk endi\u015feleri olu\u015fmaktad\u0131r. DLP ile cloud ortamlarda g\u00f6r\u00fcn\u00fcrl\u00fck ve kontrol kazan\u0131n!<\/p>\n\n\n\n<ul><li>DLP Cloud Prevent fot Microsoft Office 365: Microsoft mail servisiniz ile entegre olarak gizli i\u00e7eriklli mesajlar\u0131n kontrol alt\u0131na al\u0131nmas\u0131 imkan\u0131n\u0131 sunar. Office 365 \u00fczerinde DLP yapabilirsiniz.<\/li><li>DLP Cloud Storage: cloud storage ortam\u0131n\u0131zda kontrol ve g\u00f6r\u00fcn\u00fcrl\u00fck sa\u011flar.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Neden DLP?<\/strong><\/h3>\n\n\n\n<ul><li>\u015eirket gizli verinizin nerede tutuldu\u011funda, nerelere g\u00f6nderildi\u011finde ve kimlerin eri\u015fti\u011finden emin de\u011filsiniz,<\/li><li>\u015eirketinizin gizli verisini davetsiz misafirlerden korumak i\u00e7in bir plan\u0131 var, fakat \u00e7al\u0131\u015fanlar\u0131n\u0131z\u0131n ya da i\u015f ortaklar\u0131n\u0131z\u0131n veri h\u0131rs\u0131zl\u0131\u011f\u0131 veya yanl\u0131\u015fl\u0131kla gizli veriyi d\u0131\u015far\u0131 \u00e7\u0131karmas\u0131na kar\u015f\u0131 korumas\u0131zsa,<\/li><li>\u015eirketinizin ve en \u00f6nemlisi m\u00fc\u015fterilerinizin mahrem verilerinin ba\u015fka ortamlarda payla\u015f\u0131lmas\u0131n\u0131 engelleyip, \u015firket g\u00fcvenilirli\u011finizi en \u00fcst seviyede tutmak istiyorsan\u0131z,<\/li><li>Rekabet Kurulu denetimlerine her zaman haz\u0131r olmak istiyorsan\u0131z,<\/li><\/ul>\n\n\n\n<p>DLP ile t\u00fcm bunlar\u0131 ger\u00e7ekle\u015ftirebilirsiniz.<\/p>\n\n\n\n<p>\u00d6rne\u011fin Google Workspace sistemimizde TC , IBAN, Kredi kart\u0131 vb bilgiler Google Drive da yer alam\u0131yor, kullan\u0131c\u0131y\u0131 uyar\u0131yor.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/UDoPkgmkddSy5ei9IZg_S1a1IBcd8W5dmAfhggukPIsv46w6judUWuZipLNJsUnk0O09Sjce8tUhtvFolkKNDSSy7r_VH-Oj6mFT0vLIUFIzaaSkdjRn1tkNU4RPd7L89F9K3ZDH\" alt=\"\"\/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>En Temel g\u00fcvenlik kurallar\u0131ndan biri olarak, sistemlerimizde b\u00fct\u00fcn USB data portlar\u0131 engellidir. Kurumsal verilerimizin d\u0131\u015far\u0131ya kontrols\u00fcz \u015fekilde payla\u015f\u0131m\u0131n\u0131 engellenmesi ve<\/p>\n","protected":false},"author":1,"featured_media":433,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[11,10,6],"tags":[],"_links":{"self":[{"href":"https:\/\/itblog.istek.k12.tr\/index.php\/wp-json\/wp\/v2\/posts\/432"}],"collection":[{"href":"https:\/\/itblog.istek.k12.tr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itblog.istek.k12.tr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itblog.istek.k12.tr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/itblog.istek.k12.tr\/index.php\/wp-json\/wp\/v2\/comments?post=432"}],"version-history":[{"count":3,"href":"https:\/\/itblog.istek.k12.tr\/index.php\/wp-json\/wp\/v2\/posts\/432\/revisions"}],"predecessor-version":[{"id":1150,"href":"https:\/\/itblog.istek.k12.tr\/index.php\/wp-json\/wp\/v2\/posts\/432\/revisions\/1150"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itblog.istek.k12.tr\/index.php\/wp-json\/wp\/v2\/media\/433"}],"wp:attachment":[{"href":"https:\/\/itblog.istek.k12.tr\/index.php\/wp-json\/wp\/v2\/media?parent=432"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itblog.istek.k12.tr\/index.php\/wp-json\/wp\/v2\/categories?post=432"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itblog.istek.k12.tr\/index.php\/wp-json\/wp\/v2\/tags?post=432"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}