Company Name Contact Info Location
SECUNNİX SİBER TEKNOLOJİ HİZMETLERİ LİMİTED ŞİRKETİ
Üniversiteler Mah. 1605 Cad. Cyberpark Vakıf Binası No: 3 İç Kapı No: 109 Çankaya / / İSTANBUL / TÜRKİYE
Contact Info: +90 850 532 7369
Hall: 3
Stand: 311A
Product Groups
  • Informatics Consultancy
  • Software
  • Defense Industry

The founding story of Secunnix began in 2006 when the company s founders took their first step into the world of Cybersecurity. During those years, the team worked and contributed in many different areas of Cybersecurity, significantly contributing to the foundation of Cybersecurity in Turkey. With countless successes and numerous projects, our founding team came together to establish Secunnix to bring a different perspective to the Cybersecurity ecosystem. Secunnix is among the rare teams that proved their competence by completing Turkey s first state-supported Cybersecurity competition, the Tübitak Cyber Competition, in first place in 2013-2014. Aware that Cybersecurity is not just a set of written rules, the Secunnix team strives to offer you a unique Cybersecurity structure. While closely following developments and events in Cybersecurity, we also share even the smallest security breaches that may go unnoticed. Our company, which considers working with high-communication, successful teams in their field a corporate necessity, seeks solutions to technical problems by considering different perspectives. Our customer satisfaction-focused work philosophy is an essential value of our company. All of our current and future work and innovations are implemented with the goal of providing quality service to our clients.

xGuard Mail SecurityMail Security
PRODUCT DESCRIPTION:

xGuard continuously monitors security vulnerabilities and patches in on-premise e-mail systems. It warns the system administrator about critical vulnerabilities. Thanks to its user-friendly interface, it is very easy and comfortable to use. In short, xGuard offers a comprehensive, integrated and user-friendly solution for your e-mail security.

Penetration TestPenetration Test
PRODUCT DESCRIPTION:

Penetration Test Stages 01 Information Collection In cyber security, information gathering plays a critical role in the success of a penetration test. This phase aims to gather in-depth information about the target system or organisation. Through technical (whois/dns queries) and non-technical (search engines, social media, newsgroups, etc.) methods, information is collected that can help the attacker determine the strategy for the target. 02 Network Mapping In a penetration test, information about the target is collected, followed by verification and in-depth analysis of this information. Network mapping is used to determine the network structure and topological structure of the target. A detailed network map is created with processes such as port scans, service analyses and detection of network devices. 03 Classification At this stage, an in-depth analysis is performed on live systems. Detected ports, running services and version information of these services are collected by banner grabbing method. The information obtained is compared with vulnerability databases to identify potential vulnerabilities. Especially active network devices, administrative services and version information are focused on. 04 Vulnerability Detection In this critical phase, possible vulnerabilities on the target system are identified. In the light of the information obtained, the vulnerabilities of the target system are identified and the potential exploitation risks of these vulnerabilities are evaluated. Potential vulnerabilities are analysed in detail with automated vulnerability scanning tools and manual methods. At this stage, the potential for exploitation of the identified vulnerabilities is also assessed. Translated with DeepL.com (free version)

No represented companies found.

  • SECUNNIX