{"id":8531,"date":"2020-07-02T15:58:38","date_gmt":"2020-07-02T12:58:38","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=8531"},"modified":"2020-07-02T15:58:38","modified_gmt":"2020-07-02T12:58:38","slug":"integrated-security-solution","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/integrated-security-solution\/8531\/","title":{"rendered":"Karma\u015f\u0131k sald\u0131r\u0131lara kar\u015f\u0131 basit savunma mekanizmas\u0131"},"content":{"rendered":"<p>Mant\u0131ksal a\u00e7\u0131dan bir \u015firkete yap\u0131lan sald\u0131r\u0131lar\u0131n bir anlam\u0131 olmas\u0131 i\u00e7in elde edilecek potansiyel kazanc\u0131n sald\u0131r\u0131 d\u00fczenleme maliyetinden fazla olmas\u0131 gerekir. K\u0131sa bir s\u00fcre \u00f6nceye kadar siber su\u00e7lular bilgi birikimlerini birbirlerinden meslek s\u0131rr\u0131 gibi sakl\u0131yordu. Geli\u015fmi\u015f sald\u0131r\u0131lar i\u00e7in bir ihtimal darknet\u2019te sat\u0131lan ara\u00e7lar genellikle bulunam\u0131yor, bulunanlar da dudak u\u00e7uklatan fiyatlara sat\u0131l\u0131yordu. Ger\u00e7ek anlamda karma\u015f\u0131k sald\u0131r\u0131lar, sadece b\u00fcy\u00fck kurulu\u015flar\u0131 veya devlet kurumlar\u0131n\u0131 hedef al\u0131yordu. Bu nedenle KOB\u0130\u2019ler i\u00e7in toplu tehditlere kar\u015f\u0131 korunmak yeterliydi.<\/p>\n<p>Ancak, genel e\u011filimler de\u011fi\u015fti. Art\u0131k kamuya a\u00e7\u0131k olarak olmasa da serbest piyasada karma\u015f\u0131k sald\u0131r\u0131lar i\u00e7in periyodik olarak ara\u00e7lar yay\u0131nlan\u0131yor, giderek daha fazla k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m geli\u015ftiricisi eserlerini hizmet olarak k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m ad\u0131yla kiral\u0131yor ve siber su\u00e7lu gruplar\u0131 bir t\u00fcr kartel \u015feklinde bir araya geliyor. Sonu\u00e7 olarak sald\u0131r\u0131 d\u00fczenleme maliyeti d\u00fc\u015f\u00fcyor. Buna ba\u011fl\u0131 olarak da ba\u015fa ba\u015fnoktas\u0131 a\u015fa\u011f\u0131ya \u00e7ekiliyor ve siber su\u00e7lular KOB\u0130\u2019lere bile olduk\u00e7a geli\u015fmi\u015f ara\u00e7larla sald\u0131rabilecek duruma geliyor.<\/p>\n<p>Bir \u015firketin maruz kald\u0131\u011f\u0131 tehditler \u00e7al\u0131\u015fanlar\u0131n dikkatsizli\u011fi ve spam e-postalara ekli k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlarla s\u0131n\u0131rl\u0131 olduktan sonra geleneksel u\u00e7 nokta koruma \u00e7\u00f6z\u00fcmleri yeterli olabilir. Ama i\u015fletmenizin daha ciddi bir sald\u0131r\u0131n\u0131n hedefi olma ihtimali apa\u00e7\u0131k ortadayken yeni bir yakla\u015f\u0131ma ihtiyac\u0131n\u0131z var demektir. G\u00fcn\u00fcm\u00fczde k\u00fc\u00e7\u00fck bir \u015firketi hedef alsalar bile sald\u0131rganlar tedarik zinciri sald\u0131r\u0131lar\u0131 ger\u00e7ekle\u015ftirebilir, kurban\u0131n alt yap\u0131s\u0131nda y\u0131llarca fark edilmeden saklanabilir, casusluk yapabilir ve s\u0131f\u0131r g\u00fcn g\u00fcvenlik a\u00e7\u0131klar\u0131ndan ve me\u015fru yaz\u0131l\u0131mlarda \u00e7al\u0131\u015fan k\u00f6t\u00fc ama\u00e7l\u0131 ara\u00e7lardan faydalanabilir.<\/p>\n<p>Kurulu\u015f d\u00fczeyindeki \u015firketler bu tarz tehditlere kar\u015f\u0131 U\u00e7 Nokta Tespiti ve Yan\u0131t\u0131 \u00e7\u00f6z\u00fcmleri ba\u015fta olmak \u00fczere temel olarak farkl\u0131 savunma ara\u00e7lar\u0131 kullan\u0131r. Ancak bu platformlar i\u00e7in tam donan\u0131ml\u0131 g\u00fcvenlik operasyon merkeziniz olmasa bile en az\u0131ndan bilgi g\u00fcvenli\u011fi uzmanlar\u0131ndan olu\u015fan d\u00fczg\u00fcn bir ekibinizin olmas\u0131 gerekir. Her \u015firket, bu kadar \u00e7ok say\u0131da BT g\u00fcvenlik uzman\u0131n\u0131 b\u00fcnyesinde bar\u0131nd\u0131racak b\u00fct\u00e7eye sahip olmayabilir.<\/p>\n<p>Ama bu, kurumsal alt yap\u0131n\u0131n korunmas\u0131z b\u0131rak\u0131lmas\u0131 gerekti\u011fi anlam\u0131na gelmiyor. EPP ve EDR platformlar\u0131n ek ara\u00e7lar ile entegre ederek u\u00e7 nokta korumas\u0131yla ilgili yeni bir yakla\u015f\u0131m geli\u015ftirdik. B\u00f6ylece hem toplu hem de geli\u015fmi\u015f tehditleri kar\u015f\u0131layabilen otomatik bir \u00e7\u00f6z\u00fcm ortaya \u00e7\u0131kard\u0131k.<\/p>\n<p>Buradaki ana yenilik, Kaspersky Endpoint Detection and Response Optimum bile\u015feni. Bu \u00e7\u00f6z\u00fcm\u00fcm\u00fcz, \u00fcr\u00fcn hatt\u0131m\u0131zda tamamen otomatik Kaspersky Endpoint Security for Business ve hedefli APT sald\u0131r\u0131lar\u0131na kar\u015f\u0131 kurulu\u015f d\u00fczeyinde ve g\u00fc\u00e7l\u00fc bir \u00e7\u00f6z\u00fcm sunan Kaspersky EDR\u2019nin kesi\u015fim noktas\u0131nda yer al\u0131yor. Kaspersky EDR Optimum, bir\u00e7ok \u015firkette gerekli olan EDR senaryolar\u0131n\u0131 uygulaman\u0131za olanak tan\u0131r ve alt yap\u0131 g\u00f6r\u00fcn\u00fcrl\u00fc\u011f\u00fcne ek olarak olay inceleme ve yan\u0131tlama yetenekleri sunar.<br>\nBu yetenekler, Kaspersky EDR Optimum\u2019un sorunun temelini h\u0131zl\u0131 bir \u015fekilde belirlemesini, sald\u0131r\u0131n\u0131n ger\u00e7ek boyutunu ve kayna\u011f\u0131n\u0131 de\u011ferlendirmesini ve t\u00fcm i\u015f istasyonlar\u0131nda otomatik bir yan\u0131t vermesini sa\u011flar. Bu sayede sald\u0131r\u0131n\u0131n verece\u011fi hasar en aza indirilir ve i\u015f s\u00fcre\u00e7lerinin s\u00fcrekli\u011fi sa\u011flan\u0131r.<\/p>\n<p>Yeni \u00fcr\u00fcn\u00fcm\u00fcz\u00fcn en kayda de\u011fer \u00f6zelliklerinden biri kullan\u0131m kolayl\u0131\u011f\u0131d\u0131r. \u00dcr\u00fcn\u00fc kullanmak i\u00e7in y\u00fcksek d\u00fczeyde kullan\u0131c\u0131 uzmanl\u0131\u011f\u0131 gerekmez ve y\u00fcksek otomasyon d\u00fczeyi sayesinde bir EDR s\u0131n\u0131f\u0131 g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fcnden beklenenden daha az dikkat ve rutin bak\u0131m gerektirir. \u00dcr\u00fcn\u00fcn bu ana unsurlar\u0131 k\u00fc\u00e7\u00fck \u015firketlere, \u00f6nemli \u00f6l\u00e7\u00fcde kaynak harcamas\u0131 yapmadan ve s\u00fcre\u00e7lerini ba\u015ftan sona yeniden yap\u0131land\u0131rmadan karma\u015f\u0131k tehditlere kar\u015f\u0131 bir savunma mekanizmas\u0131 geli\u015ftirmeye ba\u015flama olana\u011f\u0131 sunar.<br>\n\u015eirketinizin ihtiya\u00e7 duydu\u011fu i\u015flevlere ba\u011fl\u0131 olarak entegre \u00e7\u00f6z\u00fcm\u00fcm\u00fcze posta sunucular\u0131n\u0131 ve internet ge\u00e7itlerini korumak i\u00e7in ek ara\u00e7lar\u0131n yan\u0131nda \u015f\u00fcpheli nesneleri izole bir ortamda incelemek i\u00e7in geli\u015fmi\u015f bir ara\u00e7 olan Kaspersky Sandbox da dahil edilebilir. Bu sayede geli\u015fmi\u015f, bilinmeyen ve karma\u015f\u0131k tehditleri ek kaynak kullanmadan otomatik olarak engelleyebilir ve BT y\u00fck\u00fcn\u00fcz\u00fc hafifletebilirsiniz.<\/p>\n<p>Zaman i\u00e7inde kendini kan\u0131tlam\u0131\u015f Kaspersky Endpoint Security for Business \u00e7\u00f6z\u00fcm\u00fcm\u00fcz\u00fc zaten kullan\u0131yorsan\u0131z ek bir lisans anahtar\u0131 etkinle\u015ftirerek bu \u00e7\u00f6z\u00fcme kolayca Kaspersky EDR Optimum yetenekleriniz aras\u0131na ekleyebilirsiniz. Entegre yakla\u015f\u0131m\u0131m\u0131z ve g\u00fcvenlik \u00e7\u00f6z\u00fcmlerimizin i\u015flevleri hakk\u0131nda daha fazla bilgi almak i\u00e7in <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security\/endpoint-security-solution?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">teklif sayfas\u0131n\u0131<\/a> ziyaret edebilir ve deneme s\u00fcr\u00fcm\u00fc talebinde bulunabilirsiniz.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Entegre bir yakla\u015f\u0131mla k\u00fc\u00e7\u00fck \u015firketler bile karma\u015f\u0131k sald\u0131r\u0131lar\u0131 geri p\u00fcsk\u00fcrtecek otomatik ara\u00e7lara sahip olabilir.<\/p>\n","protected":false},"author":700,"featured_media":8532,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[1363,2225],"class_list":{"0":"post-8531","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-edr","10":"tag-epp"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/integrated-security-solution\/8531\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/integrated-security-solution\/21500\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/integrated-security-solution\/16969\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/integrated-security-solution\/22708\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/integrated-security-solution\/20801\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/integrated-security-solution\/19584\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/integrated-security-solution\/23441\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/integrated-security-solution\/22205\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/integrated-security-solution\/28696\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/integrated-security-solution\/36075\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/integrated-security-solution\/15192\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/integrated-security-solution\/15721\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/integrated-security-solution\/13632\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/integrated-security-solution\/24603\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/integrated-security-solution\/28771\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/integrated-security-solution\/25633\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/integrated-security-solution\/22571\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/integrated-security-solution\/27784\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/integrated-security-solution\/27624\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/edr\/","name":"EDR"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8531","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=8531"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8531\/revisions"}],"predecessor-version":[{"id":8535,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8531\/revisions\/8535"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/8532"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=8531"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=8531"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=8531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}