Ced Teknoloji Danışmanlık Bilişim ve Destek Hiz. Tic. A.Ş. Levent Neighborhood, Hardal Street, No:4 Beşiktaş - İstanbul +90 212 284 85 45 info@creentech.com.tr

Corporate Information Security

Home Services

Enterprise Information Security

Enterprise Information Security requires businesses to protect their digital assets and sensitive data against unauthorized access, use, disclosure, alteration, and destruction. At Creentech, our services in this area are designed to secure your infrastructure, detect threats in advance, and respond quickly to potential attacks.

With our security assessment services, we identify vulnerabilities in your systems, determine weak points through penetration testing and vulnerability scans. We also increase your employees' awareness level with social engineering tests.

Our solutions include firewalls, data loss prevention (DLP) systems, end-user device security (EDR), network access control (NAC), Privileged Access Management (PAM), and cloud security. With these tools, we protect your network, devices, and data against threats.

With our threat monitoring and cyber incident response services, we monitor your network traffic in real time via SIEM systems and respond quickly to security breaches.


At Creentech, our expert team and services are customized to your business's security needs, ensuring the security of your digital assets and preparing you for cyber threats.


Identity and Access Management (IAM & Access Control)

• PAM (Privileged Access Management): Controls access for authorized users and records sessions.
• MFA (Multi-Factor Authentication): Provides an additional layer of security in authentication.
• SSO (Single Sign-On): Enables multi-system access with a single sign-on.
• LDAP / Active Directory: Centralized user management and authentication infrastructure.


Endpoint Security

• EDR (Endpoint Detection & Response): Threat detection and response mechanism at endpoints.
• Antivirus / Antimalware: Provides basic malware protection.
• Application Control: Restricts the execution of specific applications.
• Device Control: USB, printer, etc. It restricts access to peripheral devices.


Network Security

• Firewall (NGFW): Filters internal and external network traffic.
• WAF (Web Application Firewall): Prevents attacks targeting web applications.
• IPS / IDS: Intrusion detection and prevention system.
• NAC (Network Access Control): Verifies and classifies devices connected to the network.
• Segmentation / Microsegmentation: Limits attack spread by dividing network traffic.
• VPN / ZTNA: Secure remote access solutions.

Data Security


• DLP (Data Loss Prevention): Prevents sensitive data from leaking out.
• Encryption: Data is encrypted both in transit and at rest. • Rights Management (IRM): Provides file-based authorization and monitoring.


Cyber ​​Threat Detection & Response

• SIEM: Collects security logs and generates correlation and alerts.
• SOAR: Provides automated response to security incidents.
• NDR: Network-based threat analysis and response.
• XDR: Holistic threat detection via EDR, NDR, email, and cloud systems.


Cloud Security

• CSPM: Detects cloud configuration errors. does.
• CWPP: Protects workloads on the cloud.
• CASB: Monitors and controls access to cloud applications.

Contact Us

Levent Neighborhood, Hardal Street, No. 4, Beşiktaş - Istanbul

info@creentech.com.tr

+90 212 284 85 45

© Ced Teknoloji Danışmanlık Bilişim ve Destek Hizmetleri Ticaret A.Ş. All Rights Reserved.

Our website does not sell products or services, and we do not collect cookies!