Quick Access

Technologies

Firewall:
The Firewall technology controls incoming and outgoing packages according to theif source and targets, ports they connect and prevents unauthorized logins. Many Firewall seperates networks completely by using the NAT technology. 

Antivirus gateway:

It scans incoming and outgoing mail attachments, all FTP and HTTP traffic (including web-based mails). Antivirus getaway prevents viruses and worms before entering the network and prevents malicious situations beforehand. Packages are reunioned, scanned after fetching to Layer7 and  delivered to the network again.

Intrusion Detection:

IDS is alert based. It catches many attacking types, records and sends an alert. IPS stops the attack it identified.

VPN:
It operates as a secure, keyed tunnel. Todays most popular and secure VPN types are IPSec, PPTP, L2TP and SSL VPN. VPN can be made between 2 locations and dial-up users can make VPN securely over the internet.

AntiSpam:
Regular spam senders are held in lists. Anti Spam applications exercise control from these black lists. Spams can be prevented by using the hash information of the mail and determining mails which were sent to many persons at the same time. Also Bayesian algorithm is used widely in systems which can learn and compare new spams.

Web Filtering:

It provides prevention of sites including malicious and unwanted content. It consists of categories and allows specific categories to be blocked. These systems are regularly updated and generally subject to a fee.
Data Leakage Prevention (DLP)
DLP can prevent information communication leakage outside the network area and it uses an advanced engine for this purpose.  Also thanks to the DLP technology the auditing of data and files are provided in a legitimate accordance.
SSL Analysis
It is the feature of determining malicious content of keyed packages. Thus, you can get Secure protocols  under control.

Data Leakage Prevention (DLP)

DLP can prevent information communication leakage outside the network area and it uses an advanced engine for this purpose.  Also thanks to the DLP technology the auditing of data and files are provided in a legitimate accordance.

SSL Analysis
It is the feature of determining malicious content of keyed packages. Thus, you can get Secure protocols  under control.
 


Beyaz Bilgisayar Danışmanlık Hizmetleri Ltd. Şti.
Burhaniye Mah. Doğu Karadeniz Cad. Selvili Evler No:26 / E (Villa 5)
Beylerbeyi / Üsküdar / İSTANBUL
T : (0216) 557 72 72    F : (0216) 422 22 90    beyaz@beyaz.net
All rights reserved. All materials and texts used in the site are belonging to Beyaz Bilgisayar Ltd. Şti. None of the documents and graphics can be used without quoting authority. The website and its content are protected by copyright, related rights and other property rights in accordance with 'Turkish Law No. 5846 on Intellectual and Artistic Works' and with international laws and treaties concerning intellectual property and protection of privacy.