{"id":9057,"date":"2020-11-30T16:18:48","date_gmt":"2020-11-30T13:18:48","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=9057"},"modified":"2020-11-30T16:18:48","modified_gmt":"2020-11-30T13:18:48","slug":"vdi-protection","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/vdi-protection\/9057\/","title":{"rendered":"Sanal masa\u00fcstlerini korumak"},"content":{"rendered":"<p>Ofis \u00e7al\u0131\u015fanlar\u0131n\u0131n kitlesel olarak uzaktan \u00e7al\u0131\u015fmaya ge\u00e7i\u015fi, bu alanda \u00e7al\u0131\u015fan teknoloji ve g\u00fcvenlik \u00e7\u00f6z\u00fcmleri \u015firketlerinin de ilgisini \u00e7ekiyor. Bir\u00e7ok kurulu\u015f, i\u015f s\u00fcre\u00e7lerini Sanal Masa\u00fcst\u00fc Altyap\u0131s\u0131 (<a href=\"https:\/\/www.kaspersky.com.tr\/blog\/thin-client-cybersecurity\/8787\/\" target=\"_blank\" rel=\"noopener noreferrer\">VDI<\/a>) ortamlar\u0131na ta\u015f\u0131maya ba\u015flad\u0131. VDI kullanmak, \u00e7al\u0131\u015fanlar\u0131n (ister uzak ister ofis i\u00e7indeki) t\u00fcm cihazlardan kurumsal kaynaklara ba\u011flanabilmesini sa\u011fl\u0131yor ve verileri kurumsal altyap\u0131 i\u00e7erisinde i\u015flemek de bir\u00e7ok g\u00fcvenlik sorununu ortadan kald\u0131r\u0131yor.<\/p>\n<p>VDI zaten birka\u00e7 y\u0131ld\u0131r kullan\u0131l\u0131yordu; bu teknoloji yeni de\u011fil. T\u0131p gibi baz\u0131 alanlarda olduk\u00e7a yayg\u0131n kullan\u0131l\u0131yor. VDI sayesinde, \u00f6rne\u011fin doktorlar, hasta verilerine her yerden eri\u015febiliyor; bu eri\u015fim, hastay\u0131 hastane i\u00e7inde transfer ederken veya ev ziyaretlerinde kritik \u00f6nem ta\u015f\u0131yor. VDI ayn\u0131 zamanda hastanenin veri merkezindeki verilerin gizlili\u011fini de koruyor. Dolay\u0131s\u0131yla, t\u0131bbi kurulu\u015flar, \u00e7al\u0131\u015fanlar\u0131n\u0131n i\u015flerini sanal masa\u00fcstlerine aktarmaya daha da a\u00e7\u0131k oluyor.<\/p>\n<p>Bununla birlikte, g\u00fcvenlik a\u00e7\u0131s\u0131ndan bakt\u0131\u011f\u0131m\u0131zda biz VDI\u2019\u0131 kurumsal altyap\u0131lar\u0131 her t\u00fcrl\u00fc sald\u0131r\u0131ya kar\u015f\u0131 koruyan her derde deva bir \u00e7\u00f6z\u00fcm olarak g\u00f6rm\u00fcyoruz. Elbette bu teknoloji sald\u0131r\u0131 y\u00fczeyini azalt\u0131yor, ancak bir\u00e7ok siber tehdit, sanal masa\u00fcstleri i\u00e7in de tehlike olu\u015fturmaya devam ediyor.<\/p>\n<p>\u00c7o\u011funlukla oldu\u011fu gibi, bu durumda da zay\u0131f halka insanlar: VDI ile ba\u011flanan bir sanal makine operat\u00f6r\u00fc, k\u00f6t\u00fc ama\u00e7l\u0131 bir e-posta ekini a\u00e7abilir veya b\u00fct\u00fcn i\u015fletim sistemine vir\u00fcs bula\u015ft\u0131ran bir internet sitesinden bir \u015feyler indirebilir. Sanal makineleri yeniden ba\u015flatmak t\u00fcm k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 yok etse de, bu yaz\u0131l\u0131mlar ba\u011flant\u0131 kesilmeden \u00f6nce de ciddi zararlar verebilir.<\/p>\n<p>Son Zerologon g\u00fcvenlik a\u00e7\u0131\u011f\u0131 bu konuda <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/cve-2020-1472-domain-controller-vulnerability\/8828\/\" target=\"_blank\" rel=\"noopener noreferrer\">\u00e7ok \u00e7arp\u0131c\u0131 bir \u00f6rnek<\/a>. Kullan\u0131c\u0131lardan biri kazara bir sanal makineye bu k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131 bula\u015ft\u0131r\u0131r ve yaz\u0131l\u0131m, alan kontrol\u00fcn\u00fc ele ge\u00e7irirse siber su\u00e7lular, oturum kapand\u0131ktan sonra bile \u015firketin a\u011f\u0131nda kalmaya devam edebiliyor.<\/p>\n<p>Geleneksel g\u00fcvenlik \u00e7\u00f6z\u00fcmlerinin bu g\u00f6reve uygun olmamas\u0131, sanal makineleri korumay\u0131 daha karma\u015f\u0131k hale getiriyor. Geleneksel \u00e7\u00f6z\u00fcmler, sanalla\u015ft\u0131rma platformuna a\u015f\u0131r\u0131 y\u00fckleniyor ve di\u011fer i\u015fler i\u00e7in gerekli olan kaynaklar\u0131 t\u00fcketiyor. Neyse ki, sanal ortamlar\u0131n g\u00fcvenli\u011fini sa\u011flamak i\u00e7in \u00f6zel olarak yarat\u0131lm\u0131\u015f baz\u0131 \u00e7\u00f6z\u00fcmler de var.<\/p>\n<h2>Kaspersky Hybrid Cloud Security<\/h2>\n<p>Bizim \u00fcr\u00fcn yelpazemizde de bulut ve hibrit a\u011flar\u0131 korumaya y\u00f6nelik \u00f6zel bir \u00fcr\u00fcn bulunuyor: Kaspersky Hybrid Cloud Security. Kaspersky Hybrid Cloud Security, siber tehditlere kar\u015f\u0131 amiral gemisi \u00e7\u00f6z\u00fcm\u00fcm\u00fcz Kaspersky Endpoint Security for Business ile ayn\u0131 seviyede koruma sa\u011flarken sanal altyap\u0131lara gereksiz y\u00fckler y\u00fcklemiyor. Dahas\u0131, fidye yaz\u0131l\u0131mlar\u0131, k\u00f6t\u00fcye kullan\u0131mlar, dosyas\u0131z sald\u0131r\u0131lar, e-posta ve internet tabanl\u0131 tehditler ve \u00e7ok daha fazlas\u0131 da dahil olmak \u00fczere en yeni k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlara kar\u015f\u0131 g\u00fcvenilir bir koruma sunuyor.<\/p>\n<p>Bu \u00e7\u00f6z\u00fcm\u00fc VDI ortamlar\u0131n\u0131 d\u00fc\u015f\u00fcnerek geli\u015ftirdik. B\u00fcy\u00fck VDI platformlar\u0131 (VMware Horizon, Citrix Virtual Apps and Desktops, Microsoft VDI) ile entegrasyonu destekliyor ve tek bir konsol \u00fczerinden y\u00f6netiliyor. \u00c7\u00f6z\u00fcm\u00fcn son g\u00fcncellemesinde lisanslama modelini de de\u011fi\u015ftirdik. Kaspersky Hybrid Cloud Security art\u0131k fiziksel altyap\u0131lardan sanal altyap\u0131lara ge\u00e7i\u015fi destekliyor ve halihaz\u0131rda \u00e7\u00f6z\u00fcmlerimizi kullanmakta olan m\u00fc\u015fterilerimiz i\u00e7in VDI adaptasyonu s\u00fcrecini kolayla\u015ft\u0131r\u0131yor. \u00dcr\u00fcn \u00f6zellikleri ve lisanslama hakk\u0131nda daha fazla bilgi almak i\u00e7in l\u00fctfen <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security\/virtualization-hybrid-cloud?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____khcs___\" target=\"_blank\" rel=\"noopener\">Kaspersky Hybrid Cloud Security sayfam\u0131za<\/a> g\u00f6z at\u0131n.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>VDI, \u00f6zel bir koruma gerektirir. Bunun i\u00e7in gerekli \u00e7\u00f6z\u00fcm\u00fc sunuyoruz. <\/p>\n","protected":false},"author":2581,"featured_media":9059,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[2038,2145,2311],"class_list":{"0":"post-9057","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-sanallastirma","10":"tag-uzaktan-calisma","11":"tag-vdi"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/vdi-protection\/9057\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/vdi-protection\/24264\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/vdi-protection\/29469\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/vdi-protection\/37703\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/vdi-protection\/14189\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/vdi-protection\/12298\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/vdi-protection\/29606\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/vdi-protection\/23084\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/vdi\/","name":"VDI"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9057","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=9057"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9057\/revisions"}],"predecessor-version":[{"id":9061,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9057\/revisions\/9061"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/9059"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=9057"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=9057"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=9057"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}