Cyber Security Solutions

MAK DETAIL offers SOC services based on advanced technologies to ensure the cyber security of businesses. It monitors and analyzes security events in real time with SIEM (Security Information and Event Management). It provides uninterrupted monitoring and intervention with its 24/7 Operation Center (SOC). It offers fast and effective response to threats with SOAR (Security Orchestration, Automation and Response) solutions. It develops proactive solutions against possible attacks with Incident Response Consultancy and provides continuous protection with MDR (Managed Detection and Response) services. These services maximize the cyber security of businesses.
SOC
MAK DATA SOC acts as a central command center; it acts by considering the IT infrastructure of an organization, including networks, devices and information storage. Essentially, the SOC is a point of similarity for every event recorded in the organization being monitored. For each of these events, the SOC decides how to manage and how to act. By making these decisions, it ensures that attacks are detected in advance.
The purpose of the SOC is twofold;
Phase one: providing centralized monitoring capabilities to discover and identify security vulnerabilities.
The second stage: intervening in security incidents that could harm an organization’s structure, services, and even its customers. In general, a SOC aims to detect attacks and infiltrations that occur in an organization (which may also be its own organization) to which it provides monitoring and intervention services as soon as possible. To this end, it limits the potential impact and damage that an event can create through simultaneous monitoring and analysis of suspicious events. If a SOC can stop an attack while it is in progress, it will have already saved the organization it serves time and money, prevented data loss, and even protected the reputation of the brand.

File Integrity Monitoring
The file integrity monitoring solution monitors the File system and identifies changes in content, permissions, ownership and attribute value of files that you need to consider. In addition, the system locally identifies users and applications used to create or modify files.
Intrusion Detection
System agents scan monitored systems looking for malware, rootkits and suspicious anomalies. They can detect hidden files, obfuscated processes, or unregistered network eavesdroppers, as well as inconsistencies in system call responses.
MDR (Managed Detection and Response)
Mak Veri, Managed MDR (Managed Endpoint Detection and Response) prevents the occurrence of a malicious incident by intervening against incidents and data breaches that may occur in endpoint systems, while providing detailed information and analysis about the situation with its advanced architecture. With the main components of Monitoring, Detection, Collection and Intervention in the Managed EMR service, threats to systems are proactively detected 24/7 and data leaks are prevented with immediate intervention.

Security Orchestration, Automation and Response
Many tools and manual processes are used to protect data belonging to institutions, identify and prevent threats. SOAR (Security Orchestration Automation and Response), which is also used by Mak Veri SOC unit, increases threat/incident response capabilities in the face of increasing data diversity and quantity in an institution, simplifies business processes, performs manual operations of a cyber security personnel faster and more accurately in an automation environment, integrates different security applications and services with each other, detects suspicious behaviors faster, reduces notification/action time and automates notifications.
Siem Smart Security Service
MAK DATA is our security service managed by security experts, automatically informs the relevant people about the situation and ensures that the necessary actions are taken, and generates an alarm by detecting all abnormalities thanks to its smart rules. It ensures that meaningful data emerges by correlating the logs collected from different systems. The logs kept ensure your compliance with Law No. 5651.
Incident Response Consulting
It is a service that covers intervention and management of the process with pre-determined procedures to regulate the incident when an institution or organization encounters a security breach or cyber attack or after it has encountered one.