{"id":98197,"date":"2019-04-08T02:38:38","date_gmt":"2019-04-08T09:38:38","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=98197"},"modified":"2019-04-08T02:38:38","modified_gmt":"2019-04-08T09:38:38","slug":"cloud-security-transformed-evident-redlock-tr","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2019\/04\/cloud-security-transformed-evident-redlock-tr\/?lang=tr","title":{"rendered":"Bulut G\u00fcvenli\u011finde Yeni Bir D\u00f6nem - Evident ve RedLock"},"content":{"rendered":"<p>AWS, Azure ve Google Cloud dahil olmak \u00fczere \u00e7oklu bulut ortamlar\u0131nda s\u0131n\u0131f\u0131nda en iyi uyumluluk ve g\u00fcvenlik standartlar\u0131n\u0131 sunmak \u00fczere, alan\u0131nda \u00f6nc\u00fc olan Evident ve RedLock \u00fcr\u00fcnlerimizi birle\u015ftirerek \u00fcst\u00fcn \u00f6zellikli tek bir \u00fcr\u00fcn haline getirdik. Palo Alto Networks \u015fu anda birle\u015ftirilmi\u015f tek bir \u00fcr\u00fcn \u00fczerinden geli\u015fmi\u015f g\u00f6r\u00fcn\u00fcrl\u00fck, yap\u0131land\u0131rma izleme, s\u00fcrekli uyumluluk g\u00fcvencesi ve otomatik d\u00fczeltme \u00f6zelliklerine sahip tehdit alg\u0131lama i\u015flevleri sunan\u00a0tek\u00a0sat\u0131c\u0131d\u0131r.<\/p>\n<p><strong>Bulut g\u00fcvenli\u011fi analiz ve uyumluluk s\u00fcre\u00e7lerinin tamamlay\u0131c\u0131 \u00f6zelli\u011fi<\/strong><\/p>\n<p>\u00c7ok par\u00e7al\u0131 bulut ortamlar\u0131, i\u015f ve g\u00fcvenlik a\u00e7\u0131s\u0131ndan yeni zorluklar\u0131 da beraberinde getirir:<\/p>\n<ul>\n<li>Tek bir merkeze ba\u011fl\u0131 olmayan \u00e7oklu bulut ortamlar\u0131nda g\u00f6r\u00fcn\u00fcrl\u00fc\u011f\u00fc ve denetimi sa\u011flama.<\/li>\n<li>S\u00fcrekli de\u011fi\u015fen ve ta\u015f\u0131nan uygulamalarda karma\u015f\u0131k uyumluluk s\u00fcre\u00e7lerini (d\u00fczenlemeler ve g\u00fcvenlik a\u00e7\u0131s\u0131ndan) y\u00f6netme.<\/li>\n<li>Hassas verilerin g\u00fcvenli bir \u015fekilde toplanmas\u0131n\u0131, depolanmas\u0131n\u0131 ve payla\u015f\u0131lmas\u0131n\u0131 sa\u011flama.<\/li>\n<li>SecOps ekiplerinin tehditlere h\u0131zl\u0131 bir \u015fekilde yan\u0131t vermesini ve anormal davran\u0131\u015flar\u0131 tespit etmesini sa\u011flama.<\/li>\n<\/ul>\n<p>Genel buluttaki ba\u015far\u0131l\u0131 siber sald\u0131r\u0131lar\u0131 \u00f6nleme g\u00f6revimizde ilerlemenin tek yolunun\u00a0<u><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/03\/cloud-compliance\/\">bulut uyumlulu\u011fu alan\u0131nda lider olan<\/a><\/u>\u00a0Evident \u00fcr\u00fcn\u00fcn\u00fc\u00a0<u><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/10\/time-bring-together-cloud-compliance-security-analytics\/\">g\u00fcvenlik analizi ve tehdit alg\u0131lama alan\u0131nda lidere olan<\/a><\/u> RedLock ile birle\u015ftirmek oldu\u011funu fark ettik.<\/p>\n<p><strong>T\u00fcmle\u015ftirme ile g\u00fcvenlik a\u00e7\u0131s\u0131ndan daha iyi sonu\u00e7lar elde edin<\/strong><\/p>\n<p>RedLock, bulut kaynaklar\u0131n\u0131 ve hassas verileri ke\u015ffetmek i\u00e7in kural tabanl\u0131 g\u00fcvenlik en iyi uygulamalar\u0131 ile s\u0131n\u0131f\u0131n\u0131n en iyisi makine \u00f6\u011frenmesi \u00f6zelliklerini kullanarak AWS, Azure ve GCP \u00fczerindeki g\u00fcvenlik k\u00f6r noktalar\u0131n\u0131 ortadan kald\u0131r\u0131r. Riskli yap\u0131land\u0131rmalar\u0131 tespit eden \u00fcr\u00fcn a\u011fa y\u00f6nelik tehditleri, \u015f\u00fcpheli kullan\u0131c\u0131 davran\u0131\u015flar\u0131n\u0131, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131, veri s\u0131z\u0131nt\u0131lar\u0131n\u0131 ve konak g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 tan\u0131mlayabilir. Evident ile sunulan uyumluluk \u00f6zelliklerinin RedLock ile birle\u015ftirilmesi, m\u00fc\u015fterilerin d\u00fczenleme ve sekt\u00f6r uyumluluk duru\u015funu kolayda do\u011frulamas\u0131na imkan tan\u0131r. RedLock kullan\u0131c\u0131lar\u0131 tek t\u0131klamayla CIS, NIST, PCI, HIPAA, GDPR, ISO, SOC 2 ve daha fazlas\u0131 i\u00e7in denetime uygun, \u00f6zelle\u015ftirilebilir raporlar olu\u015fturabilir.<\/p>\n<p><strong>Bu yaln\u0131zca ba\u015flang\u0131\u00e7<\/strong><\/p>\n<p>Bulut g\u00fcvenli\u011fi platformumuzu yenilik\u00e7i, s\u0131n\u0131f lideri g\u00fcvenlik \u00f6zellikleri ve geni\u015f Palo Alto Networks Security Operating Platform ile t\u00fcmle\u015ftirme sayesinde geli\u015ftirmeye ve kurulu\u015flar\u0131n BT mimarilerinde g\u00fcvenlik korumalar\u0131n\u0131n tutarl\u0131l\u0131\u011f\u0131n\u0131 sa\u011flamaya devam ediyor olaca\u011f\u0131z.<\/p>\n<p>Palo Alto Networks m\u00fc\u015fterisi olmak i\u00e7in harika bir zaman. Dilerseniz Palo Alto Networks'\u00fcn genel bulut g\u00fcvenli\u011fi alan\u0131nda neden lider oldu\u011funu kendiniz deneyimleyebilirsiniz.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>AWS, Azure ve Google Cloud dahil olmak \u00fczere \u00e7oklu bulut ortamlar\u0131nda s\u0131n\u0131f\u0131nda en iyi uyumluluk ve g\u00fcvenlik standartlar\u0131n\u0131 sunmak \u00fczere, alan\u0131nda \u00f6nc\u00fc olan Evident ve RedLock \u00fcr\u00fcnlerimizi birle\u015ftirerek \u00fcst\u00fcn \u00f6zellikli tek bir &hellip;<\/p>\n","protected":false},"author":631,"featured_media":96990,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4827],"tags":[],"coauthors":[6733],"class_list":["post-98197","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized-tr"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/02\/corp-blog-cloud-600x300.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/98197","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/631"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=98197"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/98197\/revisions"}],"predecessor-version":[{"id":98198,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/98197\/revisions\/98198"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/96990"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=98197"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=98197"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=98197"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=98197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}