Safe Your Data!

We aim for a safer world with our corporate cyber security solutions…

Mernus

Services

With our deep knowledge and experience in information security, we develop solutions to protect our customers’ sensitive data, strengthen their defenses against cyber attacks and meet regulatory   requirements such as PCI, SOX, KVKK, GDPR, BDDK. We work closely to understand your company’s unique needs and secure your business processes.

Database Security (DAM)

Database security aims to keep access trace records of the data stored on the database in real time, prevent unwanted access and changes, detect vulnerabilities of database systems, and classify and protect sensitive data.

Dynamic Data Masking

Sensitive data in the query results that users make on databases are masked or hidden. In this way, sensitive data cannot be viewed even by authorized users. This process is an integral part of database security.

Data Classification

Data classification is the process of discovering and classifying sensitive data in structured and unstructured environments. In order to establish cyber security processes correctly, the points where sensitive data pass through are identified and the policies to be implemented are determined. It also helps regulatory compliance processes such as KVKK, GDPR, PCI-DSS.

File Activity Monitoring (FAM)

Access to files containing sensitive data stored on servers within the organization must be monitored in real time and unauthorized access must be prevented. Access to file servers during regulatory compliance processes must also be recorded and stored securely.

Network Security

With a 360-degree network security approach, you can detect threats at every stage. You can make your corporate and internet network more secure with new generation firewall technologies. A successful network security strategy must take a proactive approach and constantly evolve to provide a strong defense against innovative threats.

End Point Security

You can provide your hybrid employees with secure access to corporate resources from anywhere. You can proactively detect and prevent cyber threats with advanced analytics and behavioral models. You can holistically see the causal links between the attacker's actions and the affected assets.

Multi-Factor Authentication

Today, passwords are insufficient for authentication. Employees may store or share their passwords in unsecured environments. You can use multiple authentication technologies to eliminate such risks.

OT Network Security

In order to completely eliminate the security risks of business critical production environments, they must be completely isolated from the IT network. At this point, classical firewall solutions are insufficient. Necessary security measures should be taken while maintaining business continuity with OT Network Security solutions.

MERNUS

Safe Your Data!

Mernus Information Technologies was born from the coming together of two friends’ dreams, who have been providing consulting services in the field of Cyber security for over 20 years. Our mission is to share our knowledge with customers and protect them against cyber threats.

MERNUS

Frequently Asked Questions

All connections other than application and service based connections should be monitored in real time. Within the scope of audit and security processes, transactions to DCL, DDL, DML and critical objects should be reported. The report should include answers to 5N1K questions.

Today, the most valuable assets of organizations are undoubtedly their data. But is it possible to use and safely store your data without knowing which sources they are kept in and what their content is? How up-to-date can manually created inventory documents, inventories obtained as a result of employee surveys be kept? Is all the data that is multiplexed, copied to test environments, downloaded to user computers recorded in these documents? All these questions are the nightmare of information security teams. In order to feel safe in the face of all these questions, you need to automate regular scans on all resources of the organization and identify databases, data storage servers, e-mail and end-user computers where sensitive data is stored. Remember, to use and protect it effectively, you must first know where it is.

If you have effectively discovered where your sensitive data is located, you are now ready to protect it. In order to protect your sensitive data, it is necessary to monitor who accesses this data and what kind of operations are performed on it. It is necessary to know who is making changes to sensitive data stored in databases, who is accessing and reading this data, and to monitor these processes instantly. Restricting access to this data when necessary, or masking or encrypting the relevant fields will take security steps to the next level. In addition to databases, we should also monitor who accesses sensitive data stored on file servers and the operations performed on these files instantly. At the next level of security maturity, we can protect your sensitive data against any attack or data hijacking attempt by encrypting the files containing sensitive data.

Mernus Blog

MERNUS

Safe Your Data!

Mernus Information Technologies was born from the coming together of two friends’ dreams, who have been providing consulting services in the field of Cyber security for over 20 years. Our mission is to share our knowledge with customers and protect them against cyber threats.