{"id":4974,"date":"2018-06-04T10:45:51","date_gmt":"2018-06-04T07:45:51","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=4974"},"modified":"2019-11-15T14:41:22","modified_gmt":"2019-11-15T11:41:22","slug":"endpoint-security-evolution","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/endpoint-security-evolution\/4974\/","title":{"rendered":"Kaspersky Lab en yeni sorunlara \u00e7\u00f6z\u00fcm buluyor"},"content":{"rendered":"<p>Son birka\u00e7 y\u0131ldaki vir\u00fcs salg\u0131nlar\u0131, veri s\u0131z\u0131nt\u0131lar\u0131 ve hedefli sald\u0131r\u0131lar siber g\u00fcvenli\u011fe y\u00f6nelik tutumlar\u0131 b\u00fcy\u00fck \u00f6l\u00e7\u00fcde de\u011fi\u015ftirdi. Art\u0131k hi\u00e7 kimse siber tehditlere kar\u015f\u0131 korunman\u0131n sadece sistem y\u00f6neticisine ait bir sorumluluk oldu\u011funu d\u00fc\u015f\u00fcnm\u00fcyor; her firman\u0131n bir savunma stratejisi olmal\u0131. Ancak siber g\u00fcvenlik i\u00e7in m\u00fcdahaleci olmayan bir yakla\u015f\u0131m yetmez, mesele \u201cbir antivir\u00fcs\u201d y\u00fcklemek kadar basit de\u011fildir. Bug\u00fcn ve gelecekte g\u00fcvende olmak i\u00e7in modern i\u015fletmelere \u00e7ok \u00e7e\u015fitli siber tehdide kar\u015f\u0131 koyabilecek, yeni nesil bir \u00e7\u00f6z\u00fcm gerekli.<\/p>\n<p>Tam istenildi\u011fi gibi olan kusursuz bir koruyucu \u00e7\u00f6z\u00fcm bir taraftan modern zorluklarla ba\u015f ederken di\u011fer taraftan belli bir i\u015fletmenin ihtiya\u00e7lar\u0131na da uyarlanabilmelidir. Burada siber g\u00fcvenlik d\u00fcnyas\u0131ndaki ba\u015fl\u0131ca e\u011filimleri inceleyecek ve temel B2B \u00e7\u00f6z\u00fcm\u00fcm\u00fcz\u00fcn en yeni s\u00fcr\u00fcm\u00fc olan Kaspersky Endpoint Security for Business\u2019\u0131n bunlara nas\u0131l kar\u015f\u0131l\u0131k verdi\u011fine g\u00f6z ataca\u011f\u0131z.<\/p>\n<h2>Fidye Yaz\u0131l\u0131m\u0131<\/h2>\n<p>Fidye yaz\u0131l\u0131m\u0131 son birka\u00e7 y\u0131ld\u0131r en \u00f6nemli 10 siber tehdit listesindeki yerini koruyor. En az iki adet \u00f6nemli salg\u0131n\u0131n (WannaCry ve ExPetr) yan\u0131 s\u0131ra daha k\u00fc\u00e7\u00fck \u00e7apl\u0131 di\u011fer birka\u00e7 olay y\u00fcz\u00fcnden hem k\u00fc\u00e7\u00fck i\u015fletmeler hem de firmalar a\u011f\u0131r zarar g\u00f6rd\u00fc. Uzmanlar\u0131m\u0131z\u0131n <a href=\"https:\/\/securelist.com\/ksb-threat-predictions-for-2018\/83169\/\" target=\"_blank\" rel=\"noopener\">tahminlerine g\u00f6re<\/a> fidye yaz\u0131l\u0131mlar\u0131yla bu y\u0131l da kar\u015f\u0131 kar\u015f\u0131ya kalaca\u011f\u0131z. K\u00f6t\u00fc niyetli ki\u015filer ev kullan\u0131c\u0131lar\u0131n\u0131n g\u00f6z\u00fcn\u00fc korkutman\u0131n kurumsal ma\u011fdurlardan fidye koparmak kadar karl\u0131 olmad\u0131\u011f\u0131n\u0131 a\u00e7\u0131k\u00e7a g\u00f6rerek y\u00fczlerini kurumlara d\u00f6nd\u00fcler. Ayr\u0131ca, \u00f6nceleri son kullan\u0131c\u0131lar\u0131n i\u015fletim sistemlerine odaklanm\u0131\u015fken \u015fimdi sunucular\u0131n i\u015fletim sistemlerini hedefleyen teknolojiler i\u00e7in daha fazla mesai harc\u0131yorlar.<\/p>\n<p><strong>Kar\u015f\u0131 \u00f6nlem: son derece uzmanla\u015fm\u0131\u015f koruyucu teknolojinin g\u00fc\u00e7lendirilmesi.<\/strong> \u00d6zellikle \u015fifreli zararl\u0131 yaz\u0131l\u0131ma kar\u015f\u0131 koruma sa\u011flayacak \u015fekilde tasarlanm\u0131\u015f bir alt sistemle dosyaya eri\u015fim denemeleri takip edilebilir ve \u015f\u00fcpheli faaliyetler tespit edilip durdurulabilir. Bu teknoloji kullan\u0131c\u0131lar\u0131n i\u015fletim sistemlerinde de sunucular\u0131n i\u015fletim sistemlerinde de ayn\u0131 \u015fekilde etkilidir. Ayr\u0131ca, genellikle \u00e7o\u011fu kullan\u0131c\u0131 bilgisinin kay\u0131tl\u0131 oldu\u011fu, m\u00fc\u015fterilere ait Windows tabanl\u0131 ayg\u0131tlarda, dosyalarda yap\u0131lan k\u00f6t\u00fc niyetli de\u011fi\u015fiklikler geri al\u0131narak bozulan bilgiler onar\u0131labilir.<\/p>\n<h2>Bedensiz ve yeni nesil tehditler<\/h2>\n<p>Siber su\u00e7lular tespit edilmekten ka\u00e7\u0131nmak i\u00e7in s\u00fcrekli olarak yeni y\u00f6ntemler icat ediyor. Baz\u0131 sald\u0131r\u0131larda dosya kullan\u0131lm\u0131yor. Baz\u0131lar\u0131nda geli\u015fmi\u015f kod gizleme y\u00f6ntemlerinden yararlan\u0131l\u0131yor. Bir k\u0131sm\u0131nda da sadece me\u015fru ara\u00e7lar kullan\u0131larak \u00e7al\u0131\u015fanlar\u0131n dikkatsizli\u011fine g\u00fcveniliyor. Baz\u0131 yarat\u0131c\u0131 gruplar s\u0131f\u0131r g\u00fcn a\u00e7\u0131klar\u0131n\u0131 bile ara\u015ft\u0131rarak bunlar\u0131 kendi \u00e7\u0131karlar\u0131 i\u00e7in kullan\u0131r. Son olarak, bu metotlar\u0131n t\u00fcm\u00fcn\u00fc birle\u015ftiren ustalar da vard\u0131r. Bu tehditlere kar\u015f\u0131 koymada \u00e7ok katmanl\u0131 bir \u00e7\u00f6z\u00fcm yeterli olmaz.<\/p>\n<p><strong>Kar\u015f\u0131 \u00f6nlem: \u00e7ok katmanl\u0131 makine \u00f6\u011frenimi (ML\u00b2) ve imzas\u0131z tespit metodlar\u0131<\/strong>. Yeni nesil koruma teknolojilerimiz statik modda (tehditlerin y\u00fcr\u00fctme \u00f6ncesi safhada tespiti i\u00e7in) ve dinamik \u015fekilde (aktifle\u015ftirilmi\u015f siber tehditleri yakalayarak) \u00e7al\u0131\u015fan makine \u00f6\u011frenimi algoritmalar\u0131n\u0131 temel al\u0131r. Bizim metotlar\u0131m\u0131z aras\u0131nda \u0130stismar\u0131 \u00d6nleyici bir alt sistem olan Davran\u0131\u015f Motoru, Kullan\u0131c\u0131 Tabanl\u0131 Sald\u0131r\u0131 Engelleme ve en yeni tehditleri tespit etmek i\u00e7in d\u00fczenli taban g\u00fcncellemeleri gerektirmeyen bulut teknolojileri vard\u0131r.<\/p>\n<h2>Hedefli sald\u0131r\u0131lar<\/h2>\n<p>Belirli i\u015fletmelere kar\u015f\u0131 hedefli sald\u0131r\u0131lar d\u00fczenlemek art\u0131k eskisi kadar maliyetli olmad\u0131\u011f\u0131 i\u00e7in bu t\u00fcr olaylar eskiye g\u00f6re \u00e7ok daha yayg\u0131nla\u015ft\u0131. Bu sald\u0131r\u0131lar hala geni\u015f bir a\u011f atmaya k\u0131yasla daha fazla miktarda kaynak ve eksiksiz bir haz\u0131rl\u0131k gerektiriyor ama ayn\u0131 zamanda \u00e7ok daha karl\u0131. Ve bunlar\u0131n tek hedefi de c\u00fczdan\u0131 kabar\u0131k, b\u00fcy\u00fck i\u015fletmeler de\u011fil. Bir tedarik zincirine yap\u0131lan sald\u0131r\u0131da k\u00fc\u00e7\u00fck bir firma bile istemeden olaya kar\u0131\u015fabilir, bu nedenle hi\u00e7bir i\u015fletme kendini bu t\u00fcr tehditlerden uzak g\u00f6remez.<\/p>\n<p><strong>Kar\u015f\u0131 \u00f6nlem: birbirini tamamlayan birka\u00e7 g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc kullanmaya dayal\u0131 b\u00fct\u00fcnle\u015fik bir g\u00fcvenlik stratejisi.<\/strong> \u00c7\u00f6z\u00fcm\u00fcm\u00fcz\u00fcn her i\u015f istasyonunda kurulu bulunan istemci k\u0131sm\u0131 Kaspersky Endpoint Detection and Response veya Kaspersky Anti-Targeted Attack platformuyla b\u00fct\u00fcnle\u015ftirilerek u\u00e7 nokta g\u00f6r\u00fcn\u00fcrl\u00fc\u011f\u00fc iyile\u015ftirilebilir ve ar\u0131zalara m\u00fcdahale prosed\u00fcrleri otomatikle\u015ftirilebilir.<\/p>\n<h2>Veri S\u0131z\u0131nt\u0131lar\u0131<\/h2>\n<p>Baz\u0131 end\u00fcstrilerde veri s\u0131z\u0131nt\u0131lar\u0131 ger\u00e7ek felaketlere yol a\u00e7m\u0131\u015ft\u0131r. M\u00fc\u015fteri ve personel kay\u0131tlar\u0131 karaborsada en \u00e7ok sat\u0131lan kalemlerdir. Y\u00fcr\u00fcrl\u00fc\u011fe giren Genel Veri Koruma Y\u00f6netmeli\u011fi \u0131\u015f\u0131\u011f\u0131nda bu durum \u00f6zellikle korkutucudur.<\/p>\n<p><strong>Kar\u015f\u0131 \u00f6nlem: \u015fifreleme teknolojilerine daha fazla odaklanma<\/strong>. Kaspersky Security Center Console en pop\u00fcler mobil ve masa\u00fcst\u00fc platformlardaki \u00e7e\u015fitli veri \u015fifreleme sistemlerinin uzaktaki bir merkezden idaresinde kullan\u0131labilir (macOS i\u00e7in FileVault 2 dahil). Ayr\u0131ca, bizim kendi \u015fifreleme teknolojilerimiz de bir dosyadaki veya b\u00fct\u00fcn diskteki verilerinizi koruyabilir.<\/p>\n<p>Elbette, bunlar\u0131n tamam\u0131 yeni ortaya \u00e7\u0131km\u0131\u015f de\u011fil. Kaspersky Endpoint Security for Business\u2019\u0131n yeni s\u00fcr\u00fcm\u00fcnde koruma d\u00fczeylerini artt\u0131ran, y\u00f6netmeyi ve \u00f6l\u00e7eklendirmeyi basitle\u015ftiren ve uygulama ve destek maliyetlerini d\u00fc\u015f\u00fcrmeye yard\u0131mc\u0131 olan g\u00fcncellenmi\u015f ya da yeni getirilmi\u015f \u00e7e\u015fitli \u00f6zellikler var. Bunlar\u0131n uygulamada ne i\u015fe yarad\u0131\u011f\u0131n\u0131 ve i\u015finize ne gibi faydalar sa\u011flad\u0131\u011f\u0131n\u0131 \u00f6\u011frenmek i\u00e7in, <a href=\"https:\/\/www.kaspersky.com.tr\/advert\/small-to-medium-business-security\/endpoint-advanced?redef=1&amp;THRU&amp;reseller=tr_kesb11launch_acq_ona_smm__onl_b2b_som_lnk____kesba___\" target=\"_blank\" rel=\"noopener\">resmi sitemizde \u00fcr\u00fcne ait sayfaya bak\u0131n<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial-leadgen\">\n","protected":false},"excerpt":{"rendered":"<p>Son birka\u00e7 y\u0131ldaki vir\u00fcs salg\u0131nlar\u0131, veri s\u0131z\u0131nt\u0131lar\u0131 ve hedefli sald\u0131r\u0131lar siber g\u00fcvenli\u011fe y\u00f6nelik tutumlar\u0131 b\u00fcy\u00fck \u00f6l\u00e7\u00fcde de\u011fi\u015ftirdi. Art\u0131k hi\u00e7 kimse siber tehditlere kar\u015f\u0131 korunman\u0131n sadece sistem y\u00f6neticisine ait bir sorumluluk oldu\u011funu d\u00fc\u015f\u00fcnm\u00fcyor.<\/p>\n","protected":false},"author":40,"featured_media":4975,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1194,1727],"tags":[1630,591,615,276,447,732,1361],"class_list":{"0":"post-4974","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-endpoint","10":"tag-fidye-yazilimi","11":"tag-hedefli-saldiri","12":"tag-nextgen","13":"tag-ransomware","14":"tag-siber-tehdit","15":"tag-true-cybersecurity"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/endpoint-security-evolution\/4974\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/endpoint-security-evolution\/13236\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/endpoint-security-evolution\/11054\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/endpoint-security-evolution\/15194\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/endpoint-security-evolution\/13462\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/endpoint-security-evolution\/12748\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/endpoint-security-evolution\/15853\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/endpoint-security-evolution\/15395\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/endpoint-security-evolution\/20249\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/endpoint-security-evolution\/22035\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/endpoint-security-evolution\/10267\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/endpoint-security-evolution\/10251\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/endpoint-security-evolution\/9148\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/endpoint-security-evolution\/16441\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/endpoint-security-evolution\/9583\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/endpoint-security-evolution\/20281\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/endpoint-security-evolution\/20210\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/endpoint\/","name":"Endpoint"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/4974","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=4974"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/4974\/revisions"}],"predecessor-version":[{"id":6934,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/4974\/revisions\/6934"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/4975"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=4974"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=4974"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=4974"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}