{"id":9594,"date":"2021-05-03T14:56:58","date_gmt":"2021-05-03T11:56:58","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=9594"},"modified":"2022-05-05T14:26:30","modified_gmt":"2022-05-05T11:26:30","slug":"managed-endpoint-detection-response","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/managed-endpoint-detection-response\/9594\/","title":{"rendered":"Hangi seviyede u\u00e7 nokta korumas\u0131na ihtiyac\u0131n\u0131z oldu\u011funu nas\u0131l anlars\u0131n\u0131z?"},"content":{"rendered":"<p><strong>Tek ba\u015f\u0131na u\u00e7 nokta korumas\u0131, bug\u00fcn bir\u00e7ok i\u015fletmenin kar\u015f\u0131 kar\u015f\u0131ya oldu\u011fu karma\u015f\u0131k siber tehditlere kar\u015f\u0131 koyacak kadar g\u00fc\u00e7l\u00fc olmayabilir. Peki, ihtiya\u00e7 duydu\u011funuz \u00e7\u00f6z\u00fcm\u00fcn hangisi oldu\u011funa nas\u0131l karar vermelisiniz?<\/strong><\/p>\n<p>U\u00e7 noktalar \u2013 yani sunucular, diz\u00fcst\u00fc bilgisayarlar ve mobil cihazlar gibi dijital ileti\u015fim ba\u011flant\u0131s\u0131n\u0131n herhangi bir u\u00e7 noktas\u0131 \u2013 siber su\u00e7lular\u0131n altyap\u0131n\u0131za girmek i\u00e7in en \u00e7ok tercih etti\u011fi yoldur. Pazar veri analiz firmas\u0131<a href=\"https:\/\/www.forbes.com\/sites\/louiscolumbus\/2019\/10\/27\/improving-endpoint-security-needs-to-be-a-top-goal-in-2020\/#42acd6b05608\" target=\"_blank\" rel=\"noopener nofollow\"> IDC\u2019nin 2019 y\u0131l\u0131 ara\u015ft\u0131rmas\u0131, ihlallerin y\u00fczde 70\u2019inin bir u\u00e7 noktada ba\u015flad\u0131\u011f\u0131n\u0131 g\u00f6steriyor<\/a>.<\/p>\n<p>Geleneksel, karma\u015f\u0131k veya geli\u015fmi\u015f, hedefli veya geli\u015fmi\u015f kal\u0131c\u0131 tehditler (APT\u2019ler) olmak \u00fczere birka\u00e7 t\u00fcr tehdit vard\u0131r. <a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\/endpoint\" target=\"_blank\" rel=\"noopener\">Klasik U\u00e7 Nokta Koruma Platformlar\u0131 (EPP\u2019ler)<\/a>, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m gibi geleneksel tehditlere kar\u015f\u0131 koruma sa\u011flama konusunda harika bir i\u015f \u00e7\u0131karsa da bug\u00fcn siber su\u00e7lular\u0131n daha fazla geli\u015fmi\u015f ara\u00e7lara sahip olmas\u0131yla birlikte karma\u015f\u0131k veya geli\u015fmi\u015f tehditler gittik\u00e7e daha yayg\u0131n hale geliyor.<\/p>\n<p>\u0130\u015flerini dijitalle\u015ftiren i\u015fletmeler genellikle g\u00fcvenlik konusunda fazladan birka\u00e7 beceriye de sahip olmak isterler. Ayr\u0131ca bu g\u00fcnlerde siber su\u00e7lular\u0131n geli\u015fmi\u015f ve karma\u015f\u0131k tehditlerinin hedefinde yaln\u0131zca tan\u0131nm\u0131\u015f \u015firketler ve ulus devletleri de\u011fil, her t\u00fcrden i\u015fletme yer al\u0131yor. \u0130\u015fte bu nedenle EPP\u2019nize U\u00e7 Nokta Tespit ve Yan\u0131t (EDR) eklemek h\u0131zla bir standart haline geliyor. Sonras\u0131nda Y\u00f6netilen Tespit ve Yan\u0131t (MDR), ayn\u0131 korumaya farkl\u0131 bir \u015fekilde sahip olman\u0131z\u0131 sa\u011flayan ba\u015fka bir yol sunar. Yaz\u0131m\u0131zda bu geli\u015fmi\u015f se\u00e7eneklerin ne i\u015fe yarad\u0131\u011f\u0131n\u0131, faydalar\u0131n\u0131 ve hangi t\u00fcr i\u015fletmelerin bunlara ihtiya\u00e7 duydu\u011funu ele alaca\u011f\u0131z.<\/p>\n<p><strong>U\u00e7 nokta tespiti ve yan\u0131t (EDR) nedir ve buna ne zaman ihtiyac\u0131n\u0131z olur?<\/strong><\/p>\n<p>Memnun oldu\u011funuz bir EPP\u2019ye sahipken, onun da \u00fczerinde bir EDR\u2019ye ihtiyac\u0131n\u0131z olup olmad\u0131\u011f\u0131n\u0131 d\u00fc\u015f\u00fcn\u00fcn. EDR, her b\u00fcy\u00fckl\u00fckteki i\u015fletmeye, kendilerini karma\u015f\u0131k ve geli\u015fmi\u015f tehditlere kar\u015f\u0131 koruma konusunda daha fazla \u00f6zellik sunar. Geli\u015fmi\u015f ve karma\u015f\u0131k tehditler, geleneksel tehditlere g\u00f6re daha az yayg\u0131n olmalar\u0131na ra\u011fmen, sonu\u00e7lar\u0131 \u00e7ok daha maliyetlidir ve i\u015finiz i\u00e7in olduk\u00e7a y\u0131k\u0131c\u0131 etkiye sahiptir.<\/p>\n<p>EDR size, karma\u015f\u0131k tehditlere kar\u015f\u0131 daha iyi g\u00f6r\u00fcn\u00fcrl\u00fck ve an\u0131nda yan\u0131t imkan\u0131 sunar. Tehditleri tan\u0131mlamay\u0131, ara\u015ft\u0131rmay\u0131 ve yan\u0131t vermeyi ama\u00e7lar ve bunun i\u00e7in s\u00fcrekli olarak u\u00e7 noktalar\u0131 izler.<\/p>\n<p>EDR\u2019niz, geli\u015fmi\u015f tespit motorlar\u0131, ger\u00e7ek zamanl\u0131 analiz ve korunan altyap\u0131n\u0131z boyunca elden ka\u00e7abilen tehdit av\u0131, inceleme ve bu tehditlere merkezi olarak yan\u0131t verme \u00f6zelli\u011fi gibi ara\u00e7lara sahip olabilir. U\u00e7 noktalara <a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\/threat-intelligence\" target=\"_blank\" rel=\"noopener\">tehdit istihbarat\u0131<\/a> ve g\u00f6r\u00fcn\u00fcrl\u00fck uygulanm\u0131\u015f olmal\u0131d\u0131r. Bu, <a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\/edr-security-software-solution\" target=\"_blank\" rel=\"noopener\">tespit ve yan\u0131t ile u\u00e7 nokta koruman\u0131z\u0131n seviyesini y\u00fckseltir<\/a>, olas\u0131 durumlara ili\u015fkin detayl\u0131 bir liste sunar.<\/p>\n<p>EDR size g\u00f6r\u00fcn\u00fcrl\u00fck, inceleme ve yan\u0131t i\u00e7in ara\u00e7lar sunar. B\u00f6ylece ekibiniz t\u00fcm u\u00e7 noktalarda neler oldu\u011funu g\u00f6rebilir ve tehdidin \u00f6l\u00e7e\u011fini anlayabilir. \u0130nceleme becerileri sayesinde tehditin k\u00f6k nedenini anlaman\u0131z\u0131 sa\u011flar. Tehdit av\u0131 ara\u00e7lar\u0131, siber g\u00fcvenlik uzmanlar\u0131n\u0131z\u0131n altyap\u0131n\u0131zda saklanan herhangi bir tehdidi aktif \u015fekilde ara\u015ft\u0131rma f\u0131rsat\u0131 sunar. Tehdit, tespit edilip analiz edildikten sonra art\u0131k \u00f6nemli olan ne kadar h\u0131zl\u0131 yan\u0131t verildi\u011fidir.<\/p>\n<p>Her i\u015fletme birbirinden farkl\u0131d\u0131r. Baz\u0131lar\u0131 kapsaml\u0131 siber g\u00fcvenlik uzmanl\u0131\u011f\u0131na sahipken, di\u011ferleri daha basit bir \u00e7\u00f6z\u00fcme ihtiya\u00e7 duyuyor olabilir.<\/p>\n<p>\u0130\u015fletmeniz \u015firket i\u00e7i siber g\u00fcvenlik uzmanl\u0131\u011fa sahipse, ayn\u0131 zamanda <a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\/anti-targeted-attack-platform\" target=\"_blank\" rel=\"noopener\">Kaspersky Anti-Targeted Attack Platform\u2019<\/a>un bir par\u00e7as\u0131 olarak da sunulan <a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\/endpoint-detection-response-edr\" target=\"_blank\" rel=\"noopener\">Kaspersky Endpoint Detection and Response<\/a>\u2018un sundu\u011fu daha iyi tehdit ke\u015ffi, tehdit av\u0131 ve merkezi olay m\u00fcdahalesinden yararlanabilirsiniz.<\/p>\n<p>Alternatif olarak, <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security\/optimum-security\" target=\"_blank\" rel=\"noopener\">Kaspersky Endpoint Detection and Response Optimum<\/a>, siber g\u00fcvenlik uzmanlar\u0131 olmayan BT departmanlar\u0131 i\u00e7in daha basit bir \u00e7\u00f6z\u00fcmd\u00fcr.<\/p>\n<p><strong>Ne zaman y\u00f6netilen tespit ve yan\u0131ta (MDR) ihtiya\u00e7 duyars\u0131n\u0131z?<\/strong><\/p>\n<p>EDR geli\u015fmi\u015f savunma yetenekleri sa\u011flar, ancak EDR\u2019yi kullanmas\u0131 i\u00e7in kendi siber g\u00fcvenlik uzmanlar\u0131n\u0131za sahip olman\u0131z gerekir. MDR ise savunman\u0131z\u0131 harici uzmanlar\u0131n y\u00f6netmesi anlam\u0131na gelir.<\/p>\n<p>MDR ile beceri sahibi uzmanlar size haftan\u0131n yedi g\u00fcn\u00fc, 24 saat s\u00fcrekli koruma sunarlar. Uzman bulmakta zorlanan veya k\u0131s\u0131tl\u0131 \u015firket i\u00e7i kaynaklara sahip olan kurulu\u015flar i\u00e7in ideal \u00e7\u00f6z\u00fcmd\u00fcr.<\/p>\n<p>MDR\u2019yi tercih eden i\u015fletmelerin \u00e7o\u011funlu\u011fu k\u00fc\u00e7\u00fck ila orta b\u00fcy\u00fckl\u00fckteki i\u015fletmelerdir. B\u00fcy\u00fck i\u015fletmeler a\u00e7\u0131s\u0131ndan bak\u0131ld\u0131\u011f\u0131nda MDR, \u015firket i\u00e7inde \u00e7ok say\u0131da siber g\u00fcvenlik uzman\u0131na sahip olmak yerine olaylar\u0131 tespit etmek, do\u011frulamak ve \u00f6nceliklendirmek i\u00e7in d\u0131\u015f kaynak kullanabilece\u011finiz anlam\u0131na gelir.<\/p>\n<p>\u0130\u015fletmeniz i\u00e7in en iyi se\u00e7ene\u011fin EDR mi yoksa MDR mi oldu\u011fundan emin de\u011filseniz, bu infografik her birinin sa\u011flad\u0131\u011f\u0131 faydalar\u0131n\u0131 g\u00f6steriyor. U\u00e7 noktalar, bilgileri olu\u015fturmak, iletmek ve depolamak i\u00e7in kulland\u0131\u011f\u0131m\u0131z \u015feyler olduklar\u0131 i\u00e7in genellikle savunmas\u0131zd\u0131r. Bunlar\u0131 kullanan \u00e7al\u0131\u015fanlar\u0131m\u0131z sosyal m\u00fchendislik yoluyla manip\u00fcle edilebilir veya anl\u0131k dikkatsizlikleri sonucunda yanl\u0131\u015f kararlar verebilirler. Bu nedenle <a href=\"https:\/\/asap.kaspersky.com\/tr\/\" target=\"_blank\" rel=\"noopener nofollow\">G\u00fcvenlik Fark\u0131ndal\u0131\u011f\u0131 E\u011fitimi<\/a> u\u00e7 noktan\u0131z\u0131 g\u00fc\u00e7lendirme konusunda yard\u0131mc\u0131 olur.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-9595 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2021\/05\/03144337\/199_EPP_EDR_MDR_comparison-inline-tr.png\" alt=\"\" width=\"2480\" height=\"6039\"><\/p>\n<p>Artan tehditler kar\u015f\u0131s\u0131nda EPP\u2019niz yeterince g\u00fc\u00e7l\u00fc kalamayabilir. \u0130\u015fte EDR\u2019nin h\u0131zla yeni standart haline gelmesinin nedeni budur. \u015eirket i\u00e7i siber g\u00fcvenlik uzmanl\u0131\u011f\u0131na sahip de\u011filseniz veya uzmanlar\u0131n\u0131z\u0131n i\u015f y\u00fck\u00fcn\u00fc hafifletmek istiyorsan\u0131z, MDR size yeni insanlar\u0131 i\u015fe alman\u0131za gerek kalmadan g\u00fcvenli\u011finizi art\u0131rma imkan\u0131 sunar.<\/p>\n<p>Kaspersky Optimum Security hakk\u0131nda daha fazla bilgi almak i\u00e7in <a href=\"https:\/\/go.kaspersky.com\/OptimumSecurity_TR.html?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=tr_kdaily_mh0090&amp;utm_content=sm-post&amp;utm_term=tr_kdaily_organic_7a906iix8mq7iig\" target=\"_blank\" rel=\"noopener nofollow\">t\u0131klay\u0131n<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tek ba\u015f\u0131na u\u00e7 nokta korumas\u0131, bug\u00fcn bir\u00e7ok i\u015fletmenin kar\u015f\u0131 kar\u015f\u0131ya oldu\u011fu karma\u015f\u0131k siber tehditlere kar\u015f\u0131 koyacak kadar g\u00fc\u00e7l\u00fc olmayabilir. Peki, ihtiya\u00e7 duydu\u011funuz \u00e7\u00f6z\u00fcm\u00fcn hangisi oldu\u011funa nas\u0131l karar vermelisiniz?<\/p>\n","protected":false},"author":2706,"featured_media":9596,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[591,447,725,553],"class_list":{"0":"post-9594","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-fidye-yazilimi","10":"tag-ransomware","11":"tag-siber-saldiri","12":"tag-zararli-yazilim-2"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/managed-endpoint-detection-response\/9594\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/managed-endpoint-detection-response\/18415\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/managed-endpoint-detection-response\/29103\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/zararli-yazilim-2\/","name":"zararl\u0131 yaz\u0131l\u0131m"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9594","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=9594"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9594\/revisions"}],"predecessor-version":[{"id":9601,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9594\/revisions\/9601"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/9596"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=9594"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=9594"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=9594"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}