How Does Forey Work?
Always the best "Business Partner"
Network Security
- Field exploration and analysis is carried out with our expert engineers and a detailed report is published.
- According to the resulting report, the required implementation and work plan is drawn up.
- Server and network installations of “Manage Service” applications are made.
- The system can be monitored, reported and managed 24/7.
- Creates asset inventory.
- Creates and regulates security policies.
- It prepares global security policies together with expert engineers of Anti-Virus manufacturers.
- The institution begins to record the system for analysis of habits.
- It creates data protection policies specific to corporate behavior.
- Standard data leakage prevention policies are prepared together with expert engineers of DLP manufacturers.
- Creates local/cloud backup and disaster scenarios of corporate servers.
- It records the terminal entries of the servers that need to be accessed from inside and outside the institution.
- The institution's password inventory is created and delivered to the management in a sealed envelope.
- It enables central management and recording of in-house IT requests.
- Provides ITIL compliant in-house support training.
- Monthly performances of field IT managers are reported and SLA periods are monitored.
- End users' hardware changes are tracked and reported.
- Viruses etc. that threaten the system and are blocked. attacks are reported.
- The health status of the system is reported monthly.
- Internal movements of corporate data are tracked and reported.
- Since product licenses are realized in a rental model, a flexible working plan is provided.
- Central management is introduced and individual dependency is eliminated.