MFA Domestic and Foreign Trading Limited Company
  • Giriş Yap

  • Hesabım
  • Şu kullanıcı olarak giriş yapıldı:

  • filler@godaddy.com


  • Hesabım
  • Oturumu kapat

  • Home
  • About Us
  • WORKING TOGETHER
  • PRODUCTS
    • Steel Bars
    • --> Hot Rolled Products
    • --> Forged Products
    • Ferro Alloys & Metals
    • Carbon Raw Materials
    • Graphite Electrodes
  • Contact
  • Daha fazlası
    • Home
    • About Us
    • WORKING TOGETHER
    • PRODUCTS
      • Steel Bars
      • --> Hot Rolled Products
      • --> Forged Products
      • Ferro Alloys & Metals
      • Carbon Raw Materials
      • Graphite Electrodes
    • Contact
MFA Domestic and Foreign Trading Limited Company

Şu kullanıcı olarak giriş yapıldı:

filler@godaddy.com

  • Home
  • About Us
  • WORKING TOGETHER
  • PRODUCTS
    • Steel Bars
    • --> Hot Rolled Products
    • --> Forged Products
    • Ferro Alloys & Metals
    • Carbon Raw Materials
    • Graphite Electrodes
  • Contact

Hesap


  • Hesabım
  • Oturumu kapat


  • Giriş Yap
  • Hesabım

SECURITY STARTS WITH AWARENESS ™

  

•How 1.8 m confidential documents leaked from such an institution like NSA? How nobody realized this? 


•Why the log management product or SIEM application did not generate an alarm while all movie archive of SONY was being stolen, and why DLP and similar security investments failed to prevent the leakage? 


•If a similar event occurs in your company, will be able to detect the responsible person?

Products

  

  • Infraskope SIEM+ Security Information & Event Management


  • Infraskope Agent - End User Control and Security 


  • Infraskope - Screen Recorder  


  • Infraskope AppTracker- Application Activity Tracking



Learn More

  

Dataskope- Database Activity Monitoring and Prevention 

Learn More

Infraskope SIEM+ Security Information & Event Management

Why Infraskope SIEM+?

Because with Infraskope, you also acquire experience. You don’t have to research many topics such as which events need to be collected from which operating system, which ones are important or unimportant, infrastructure changes required to collect logs, etc. When Infraskope is installed, these rules are ready to use.

Infraskope is designed to respond to different needs. You can respond to almost all scenarios with its collectors that can work either agent-based or agentless.

With Infraskope SIEM, you can monitor not only servers, network devices, and applications in your system room but also the weakest link, the end-users.

Infraskope Agent - End User Control and Security

Infraskope Agent

The human factor is the weakest link in security. All attack vectors rely on human error. Social engineering, a desire for revenge, espionage, a poorly written code snippet… they all target human weaknesses.

When developing our product, we approached it with the mindset of “If I were malicious…”. 

We asked ourselves questions such as, 

“How could I steal information from this system?”,

“How could I cause harm to this system?”, and 

“Which areas are not protected by the system administrator?” 

We shaped our product based on the lessons we learned from incidents that occurred in our customers.

Infraskope - Screen Recorder

What can you do with Screen Recorder?

  1.  Monitoring of critical servers and workstations: Tracking the operations performed on systems where critical data is stored is crucial for both security and business continuity. With Infraskope Screen Recorder, it is possible to monitor what system administrators (local/RDP) and remote support (RDP) employees of the company who provide support do on relevant systems.
  2. User-Based Recording Mode : With Infraskope Screen Recorder, you can monitor the sessions of specific users. This way, you can record the sessions of support staff accessing various systems, regardless of the system they connect from.
  3.  Keyword Tracking : Infraskope Screen Recorder can automatically generate alerts when certain keywords are detected during sessions. With this feature, you can automatically monitor keywords such as “@hotmail.com”, “@gmail.com”, “bomb”, “competitor company”, etc.
  4. Keyword Search, Fast Playback, and Video Export: Infraskope Screen Recorder allows you to search for keywords that appear within sessions. For instance, when conducting research, you can quickly identify which sessions contain the keyword “prime minister” in a matter of seconds. You don’t have to spend eight hours watching an eight-hour session. With advanced playback options, you can fast-forward through sessions or watch only the moments when activity occurs. Additionally, you can export an important session in different video formats. 
  5. Building Corporate Memory : Infraskope Screen Recorder can also be used to record what type of actions are taken during intervention in events. In this way, you can create a kind of video training library.

We enable you to centrally record operations performed on critical servers or workstations. We assist you in monitoring operations performed by remote support companies or “outsourced” personnel working for the company/organization. We record the screen while doing so, eliminating the need for dealing with log files. If there is any area in which critical keywords are mentioned for your organization, we ensure that the Cyber Security Manager receives an alert.

Infraskope AppTracker - Application Activity Tracking

One of the biggest problems for businesses is not knowing how efficiently the software licenses they procure for the continuity of their operations are being used. As they cannot measure which software is being used by how many people, they end up having to pay substantial fees for these licenses. With our product, AppTracker, we have focused on multiple issues and designed the most perfect solution.


What can you do with AppTracker?


Infraskope AppTracker records which user uses which application for how long on user and server systems. Since AppTracker operates at the location where the event takes place, it can access much more detailed logs. 


Examples of events that can be tracked with AppTracker include:


  • Tracking how long a user has been using a particular application – for example, how much time was spent working on an Excel document? 
  • Tracking how much time is spent actively using YouTube or social media sites 
  • Tracking hidden web activity – monitoring web activity that is not routed through a firewall or proxy server, or tracking internet activity performed on a computer through a connected mobile device
  • Tracking the use of applications such as TOR, VPNs, or Periscope Tracking the amount of time spent idle on the computer without any activity 


Dataskope - Database Activity Monitoring and Prevention

The main function of the DATASKOPE product is to ensure that access and changes made to critical database systems are expected, planned, and desired. You can perform all these operations without enabling the audit feature in the database.

Dataskope Agents can record all SQL transactions: DML, DDL, DCL, and TCL. It can do this without relying on local database logs, thus reducing performance degradation.


  

With DATASKOPE, you can perform the following audits and generate reports:

  

  1. Login – Allows you to track successful and unsuccessful login attempts to the database. 
  2. Data content change – Enables tracking of SELECT, UPDATE, DELETE, EXEC, and other similar commands.
  3. Access Tracking – Enables tracking of who accessed sensitive data.
  4. Database Administrator Audit – Tracks operations such as user creation and deletion, and enables you to take action.
  5. Classified Audit – Enables you to decide who can view operations at the user, database, table, and command level.
  6. Reporting – Enables you to obtain reports compliant with standards such as ISO27001, COBIT, PCI, SOX.


  

NoSQL Search Engine

  • Scalable horizontally and vertically
  • Geographically and locally redundant
  • Distributed search across multiple units 
  • Automatic backup and archiving 


DATASKOPE detects, classifies, generates alarms, and reports events occurring in your database systems. It is a database audit product that enables easy access to information about who accessed sensitive data and performed which operations at what intervals, and enables authorized personnel to be informed about events with predefined alarm rules. 


CopyrIght © 2018 www.mfatrade.com

Destekli