{"id":511,"date":"2023-12-18T00:48:35","date_gmt":"2023-12-18T00:48:35","guid":{"rendered":"https:\/\/dunemount.com\/services\/siber-guvenlik-ve-bilgi-guvenligi-hizmeti\/"},"modified":"2023-12-23T22:37:34","modified_gmt":"2023-12-23T22:37:34","slug":"cyber-security-and-information-security","status":"publish","type":"page","link":"https:\/\/www.dunemount.com\/en\/services\/cyber-security-and-information-security\/","title":{"rendered":"Cyber Security and Information Security"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:9%;--awb-padding-bottom:2%;--awb-padding-top-small:24%;--awb-padding-bottom-small:0%;--awb-margin-bottom-small:0%;--awb-background-color:var(--awb-color4);--awb-flex-wrap:wrap;\" ><div class=\"awb-background-pattern\" style=\"background-image:  url(data:image\/svg+xml;utf8,%3Csvg%20width%3D%2260%22%20height%3D%2260%22%20fill%3D%22none%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Cpath%20d%3D%22M6%204a2%202%200%2011-4%200%202%202%200%20014%200%22%20fill%3D%22rgba%28255%2C255%2C255%2C0.15%29%22%2F%3E%3C%2Fsvg%3E);opacity: 1 ;background-size:1.5%;mix-blend-mode:normal;\"><\/div><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:var(--awb-color5);--awb-font-size:16px;\"><h1 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;Open Sans&quot;;font-style:normal;font-weight:400;margin:0;font-size:1em;letter-spacing:0.02em;line-height:0.8;\">Services<\/h1><\/div><div class=\"fusion-text fusion-text-1 fusion-no-small-visibility\" style=\"--awb-font-size:36px;--awb-line-height:1.2;--awb-letter-spacing:0.02em;--awb-text-color:var(--awb-color2);--awb-text-font-family:&quot;Open Sans&quot;;--awb-text-font-style:normal;--awb-text-font-weight:600;\"><p>Cyber Security and<br \/>\nInformation Security<\/p>\n<\/div><div class=\"fusion-text fusion-text-2 fusion-no-medium-visibility fusion-no-large-visibility\" style=\"--awb-font-size:26px;--awb-line-height:1.2;--awb-letter-spacing:0.02em;--awb-text-color:var(--awb-color2);--awb-text-font-family:&quot;Open Sans&quot;;--awb-text-font-style:normal;--awb-text-font-weight:600;\"><p>Cyber Security and Information Security<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-small-visibility\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:4%;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInDown\" data-animationDuration=\"1.0\" data-animationDelay=\"0.2\" data-animationOffset=\"top-into-view\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-highlight fusion-loop-off fusion-highlight-underline fusion-title-size-paragraph\" style=\"--awb-text-color:var(--awb-color8);--awb-highlight-color:var(--awb-color5);--awb-margin-top:0px;--awb-font-size:24px;\" data-highlight=\"underline\"><p class=\"fusion-title-heading title-heading-left title-heading-tag\" style=\"font-family:&quot;Open Sans&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;letter-spacing:0.02em;line-height:1.5;\"><span class=\"fusion-highlighted-text-prefix\">Technological developments in today's world also bring risks and threats, and organizations need to change their existing<\/span> <span class=\"fusion-highlighted-text-wrapper\"><span class=\"fusion-highlighted-text\" style=\"color:var(--awb-color8);\">security models<\/span><\/span> <span class=\"fusion-highlighted-text-postfix\">with innovative approaches to keep up with this environment.<\/span><\/p><\/div><div class=\"fusion-text fusion-text-3\" style=\"--awb-font-size:18px;--awb-letter-spacing:0.02em;--awb-text-color:var(--awb-color7);--awb-text-font-family:&quot;Open Sans&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p><strong><em>Our cyber security and information security services:<\/em><\/strong><\/p>\n<\/div><div ><a class=\"fusion-button button-flat button-large button-custom fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:var(--awb-color1);--button_accent_hover_color:var(--awb-color1);--button_border_hover_color:var(--awb-color1);--button_gradient_top_color:var(--awb-color5);--button_gradient_bottom_color:var(--awb-color5);--button_gradient_top_color_hover:var(--awb-color4);--button_gradient_bottom_color_hover:var(--awb-color4);--button_margin-top:10px;\" target=\"_blank\" rel=\"noopener noreferrer\" href=\"\/wp-content\/uploads\/2023\/12\/DuneMount-Cyber-and-Information-Security.pdf\"><span class=\"fusion-button-icon-divider button-icon-divider-left\"><i class=\"fa-file-pdf far\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-button-text fusion-button-text-left\">Cyber and Information Security.pdf download<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:4%;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInDown\" data-animationDuration=\"2.0\" data-animationDelay=\"0.2\" data-animationOffset=\"top-into-view\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-4\" style=\"--awb-font-size:18px;--awb-letter-spacing:0.02em;--awb-text-color:var(--awb-color7);--awb-text-font-family:&quot;Open Sans&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>As <span class=\"fusion-highlight custom-textcolor highlight1 awb-highlight-marker\" style=\"--awb-color:var(--awb-color5);--awb-text-color:var(--awb-color8);\"><strong>DuneMount<\/strong><\/span>, we offer comprehensive solutions tailored to your needs to protect organizations&#8217; information assets and network components.<\/p>\n<p>Our solutions consist of a wide range of services compiled in accordance with international and national laws and best practices. Our goal is supporting the organizations with the most advanced security measures in line with the principles of confidentiality, integrity and availability, and to eliminate risks as much as possible or make them easier to manage.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-medium-visibility fusion-no-large-visibility\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:20px;--awb-padding-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:4%;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInDown\" data-animationDuration=\"1.0\" data-animationDelay=\"0.2\" data-animationOffset=\"top-into-view\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-highlight fusion-loop-off fusion-highlight-underline fusion-title-size-paragraph\" style=\"--awb-text-color:var(--awb-color8);--awb-highlight-color:var(--awb-color5);--awb-margin-top:0px;--awb-font-size:22px;\" data-highlight=\"underline\"><p class=\"fusion-title-heading title-heading-left title-heading-tag\" style=\"font-family:&quot;Open Sans&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;letter-spacing:0.02em;line-height:1.5;\"><span class=\"fusion-highlighted-text-prefix\">Technological developments in today's world also bring risks and threats, and organizations need to change their existing<\/span> <span class=\"fusion-highlighted-text-wrapper\"><span class=\"fusion-highlighted-text\" style=\"color:var(--awb-color8);\">security models<\/span><\/span> <span class=\"fusion-highlighted-text-postfix\">with innovative approaches to keep up with this environment.<\/span><\/p><\/div><div ><a class=\"fusion-button button-flat button-large button-custom fusion-button-default button-2 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:var(--awb-color1);--button_accent_hover_color:var(--awb-color1);--button_border_hover_color:var(--awb-color1);--button_gradient_top_color:var(--awb-color5);--button_gradient_bottom_color:var(--awb-color5);--button_gradient_top_color_hover:var(--awb-color4);--button_gradient_bottom_color_hover:var(--awb-color4);--button_margin-top:10px;\" target=\"_blank\" rel=\"noopener noreferrer\" href=\"\/wp-content\/uploads\/2023\/12\/DuneMount-Cyber-and-Information-Security.pdf\"><span class=\"fusion-button-icon-divider button-icon-divider-left\"><i class=\"fa-file-pdf far\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-button-text fusion-button-text-left\">Cyber and Information Security.pdf download<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInDown\" data-animationDuration=\"2.0\" data-animationDelay=\"0.2\" data-animationOffset=\"top-into-view\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-5\" style=\"--awb-font-size:18px;--awb-letter-spacing:0.02em;--awb-text-color:var(--awb-color7);--awb-text-font-family:&quot;Open Sans&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>As <span class=\"fusion-highlight custom-textcolor highlight1 awb-highlight-marker\" style=\"--awb-color:var(--awb-color5);--awb-text-color:var(--awb-color8);\"><strong>DuneMount<\/strong><\/span>, we offer comprehensive solutions tailored to your needs to protect organizations&#8217; information assets and network components.<\/p>\n<p>Our solutions consist of a wide range of services compiled in accordance with international and national laws and best practices. Our goal is supporting the organizations with the most advanced security measures in line with the principles of confidentiality, integrity and availability, and to eliminate risks as much as possible or make them easier to manage.<\/p>\n<p><strong><em>Our cyber security and information security services:<\/em><\/strong><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-small-visibility\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:40px;--awb-padding-bottom:40px;--awb-background-color:#f9f9f9;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInLeft\" data-animationDuration=\"1.0\" data-animationDelay=\"0.2\" data-animationOffset=\"top-into-view\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color4);--awb-font-size:18px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;Open Sans&quot;;font-style:normal;font-weight:700;margin:0;font-size:1em;letter-spacing:0.02em;line-height:1.2;\">Security Operation<\/h2><\/div><div class=\"fusion-separator\" style=\"align-self: flex-start;margin-right:auto;margin-top:0px;margin-bottom:2%;width:100%;max-width:15%;\"><div class=\"fusion-separator-border sep-single sep-dotted\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:var(--awb-color4);border-color:var(--awb-color4);border-top-width:1px;\"><\/div><\/div><div class=\"fusion-text fusion-text-6\" style=\"--awb-content-alignment:justify;--awb-font-size:16px;--awb-letter-spacing:0.02em;--awb-text-font-family:&quot;Open Sans&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>Our Security Operation service focuses on preventive and detection-oriented solutions to ensure an effective defense against cyber threats. This comprehensive service covers key topics such as penetration testing, secure code analysis and vulnerability management.<\/p>\n<\/div><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"1000\" height=\"1000\" alt=\"Security Operation\" title=\"Bilgi G\u00fcvenli\u011fi E\u011fitimi\" src=\"https:\/\/dunemount.com\/wp-content\/uploads\/2023\/12\/bilgi-guvenligi-1.jpg\" class=\"img-responsive wp-image-379\" srcset=\"https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/bilgi-guvenligi-1-200x200.jpg 200w, https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/bilgi-guvenligi-1-400x400.jpg 400w, https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/bilgi-guvenligi-1-600x600.jpg 600w, https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/bilgi-guvenligi-1-800x800.jpg 800w, https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/bilgi-guvenligi-1.jpg 1000w\" sizes=\"(max-width: 640px) 100vw, 600px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-padding-top:60px;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInRight\" data-animationDuration=\"2.0\" data-animationDelay=\"0.2\" data-animationOffset=\"top-into-view\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-7\" style=\"--awb-content-alignment:justify;--awb-font-size:16px;--awb-letter-spacing:0.02em;--awb-text-font-family:&quot;Open Sans&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p><strong>Penetration Testing:<\/strong> It is a proactive security assessment that aims to analyze the digital defense mechanisms of organizations and reveal their vulnerabilities\u00e7 It helps to make the organizational environment as secure as possible by identifying potential vulnerabilities with controlled attack simulations.As DuneMount, our penetration testing service model is offered as a one-time and\/or recurring service.<\/p>\n<p>Our studies are carried out with Black Box, White Box and Gray Box models based on the preferences of organizations by our experts using manual and licensed scanning products and both technical and logical vulnerabilities are detected.<\/p>\n<p><strong>Secure Code Analysis:<\/strong> As DuneMount, the security vulnerabilities of the software are detected by our experts using leading solutions. Necessary verification checks are made on the detected vulnerabilities and reported to our customers.<\/p>\n<p><strong>Vulnerability Management:<\/strong> It is a service for monitoring, evaluating and managing security vulnerabilities in the organization&#8217;s assets.One-time or periodic internal and external scans can be performed by our experts and related vulnerabilities can be tracked on behalf of the organization, solutions can be offered and action can be followed and\/or reported..<\/p>\n<\/div><div class=\"fusion-text fusion-text-8\" style=\"--awb-content-alignment:justify;--awb-font-size:16px;--awb-letter-spacing:0.02em;--awb-text-font-family:&quot;Open Sans&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>All our analysis and test results are created by using the best international reporting models.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container has-pattern-background has-mask-background hundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-medium-visibility fusion-no-large-visibility\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:20px;--awb-padding-right:0px;--awb-padding-bottom:0px;--awb-padding-left:0px;--awb-background-color:#f9f9f9;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInLeft\" data-animationDuration=\"1.0\" data-animationDelay=\"0.2\" data-animationOffset=\"top-into-view\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-left:30px;--awb-margin-left-small:30px;--awb-font-size:18px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;Open Sans&quot;;font-style:normal;font-weight:700;margin:0;font-size:1em;letter-spacing:0.02em;line-height:1.2;\">Security Operation<\/h2><\/div><div class=\"fusion-separator sep\" style=\"align-self: flex-start;margin-right:auto;margin-top:0px;margin-bottom:2%;width:100%;max-width:30%;\"><div class=\"fusion-separator-border sep-single sep-dotted\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:var(--awb-color4);border-color:var(--awb-color4);border-top-width:1px;\"><\/div><\/div><div class=\"fusion-text fusion-text-9\" style=\"--awb-content-alignment:justify;--awb-font-size:16px;--awb-letter-spacing:0.02em;--awb-margin-right:30px;--awb-margin-left:30px;--awb-text-font-family:&quot;Open Sans&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>Our Security Operation service focuses on preventive and detection-oriented solutions to ensure an effective defense against cyber threats. This comprehensive service covers key topics such as penetration testing, secure code analysis and vulnerability management.<\/p>\n<\/div><div class=\"fusion-image-element \" style=\"--awb-margin-right:0px;--awb-margin-left:0px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"1000\" height=\"1000\" alt=\"Security Operation\" title=\"Bilgi G\u00fcvenli\u011fi E\u011fitimi\" src=\"https:\/\/dunemount.com\/wp-content\/uploads\/2023\/12\/bilgi-guvenligi-1.jpg\" class=\"img-responsive wp-image-379\" srcset=\"https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/bilgi-guvenligi-1-200x200.jpg 200w, https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/bilgi-guvenligi-1-400x400.jpg 400w, https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/bilgi-guvenligi-1-600x600.jpg 600w, https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/bilgi-guvenligi-1-800x800.jpg 800w, https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/bilgi-guvenligi-1.jpg 1000w\" sizes=\"(max-width: 640px) 100vw, 600px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-padding-right:30px;--awb-padding-left:30px;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInRight\" data-animationDuration=\"2.0\" data-animationDelay=\"0.2\" data-animationOffset=\"top-into-view\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-10\" style=\"--awb-font-size:16px;--awb-letter-spacing:0.02em;--awb-text-font-family:&quot;Open Sans&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p><strong>Penetration Testing:<\/strong> It is a proactive security assessment that aims to analyze the digital defense mechanisms of organizations and reveal their vulnerabilities\u00e7 It helps to make the organizational environment as secure as possible by identifying potential vulnerabilities with controlled attack simulations.As DuneMount, our penetration testing service model is offered as a one-time and\/or recurring service.<\/p>\n<p>Our studies are carried out with Black Box, White Box and Gray Box models based on the preferences of organizations by our experts using manual and licensed scanning products and both technical and logical vulnerabilities are detected.<\/p>\n<p><strong>Secure Code Analysis:<\/strong> As DuneMount, the security vulnerabilities of the software are detected by our experts using leading solutions. Necessary verification checks are made on the detected vulnerabilities and reported to our customers.<\/p>\n<p><strong>Vulnerability Management:<\/strong> It is a service for monitoring, evaluating and managing security vulnerabilities in the organization&#8217;s assets.One-time or periodic internal and external scans can be performed by our experts and related vulnerabilities can be tracked on behalf of the organization, solutions can be offered and action can be followed and\/or reported..<\/p>\n<\/div><div class=\"fusion-text fusion-text-11\" style=\"--awb-content-alignment:justify;--awb-font-size:16px;--awb-letter-spacing:0.02em;--awb-text-font-family:&quot;Open Sans&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>All our analysis and test results are created by using the best international reporting models.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-small-visibility\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:40px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInLeft\" data-animationDuration=\"1.0\" data-animationDelay=\"0.2\" data-animationOffset=\"top-into-view\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color4);--awb-font-size:18px;\"><h3 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;Open Sans&quot;;font-style:normal;font-weight:700;margin:0;font-size:1em;letter-spacing:0.02em;line-height:1.2;\">Security Governance<\/h3><\/div><div class=\"fusion-separator\" style=\"align-self: flex-start;margin-right:auto;margin-top:0px;margin-bottom:2%;width:100%;max-width:15%;\"><div class=\"fusion-separator-border sep-single sep-dotted\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:var(--awb-color4);border-color:var(--awb-color4);border-top-width:1px;\"><\/div><\/div><div class=\"fusion-text fusion-text-12\" style=\"--awb-content-alignment:justify;--awb-font-size:16px;--awb-letter-spacing:0.02em;--awb-text-font-family:&quot;Open Sans&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>Our Security Governance services provide a robust, comprehensive and customized framework for managing and improving the security posture of the organizations.<\/p>\n<p>DuneMount incorporates many different services specific to security governance. These are respectively;<\/p>\n<\/div><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\"><img decoding=\"async\" width=\"1000\" height=\"1000\" alt=\"Security Governance\" title=\"Siber G\u00fcvenlik E\u011fitimi\" src=\"https:\/\/dunemount.com\/wp-content\/uploads\/2023\/12\/siber-guvenlik.jpg\" class=\"img-responsive wp-image-381\" srcset=\"https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/siber-guvenlik-200x200.jpg 200w, https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/siber-guvenlik-400x400.jpg 400w, https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/siber-guvenlik-600x600.jpg 600w, https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/siber-guvenlik-800x800.jpg 800w, https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/siber-guvenlik.jpg 1000w\" sizes=\"(max-width: 640px) 100vw, 600px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-13\" style=\"--awb-content-alignment:justify;--awb-font-size:16px;--awb-letter-spacing:0.02em;--awb-margin-top:30px;--awb-text-font-family:&quot;Open Sans&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p><strong>Incident Response Process Design:<\/strong> During an incident, a well-defined incident response plan is crucial. Our incident response process design service is a critical service to build end-to-end incident handling process including stakeholders, roles, responsibilities, and all other related components.Our main sub-services in this area;<\/p>\n<ul>\n<li>Establishing end-to-end process design by creating Incident Response Plan, Policy, and Procedure<\/li>\n<li>Creation of incident-based Playbooks<\/li>\n<li>Establishing a risk methodology specific to incident management and integrated with the organization&#8217;s Enterprise Risk Management structure or Information Security Risk structure<\/li>\n<li>Designing incident response teams based on roles and responsibilities and creating RACI matrices<\/li>\n<\/ul>\n<p><strong>Data Protection and Data Governance:<\/strong> Our services are designed to address technical requirements, process design and legal compliance in data protection and governance. We offer specific solutions and consulting services to our clients by analysing their existing data and data protection measures.Our main sub-services in this field;<\/p>\n<ul>\n<li>Personal Data Protection Law (&#8220;KVKK&#8221;) Consultancy and Audit<\/li>\n<li>Requirements and regulatory analysis for new data processing needs<\/li>\n<li>Data Classification within the organization<\/li>\n<li>Technology Readiness Assessment<\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-padding-top:40px;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInRight\" data-animationDuration=\"2.0\" data-animationDelay=\"0.2\" data-animationOffset=\"top-into-view\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-14\" style=\"--awb-content-alignment:justify;--awb-font-size:16px;--awb-letter-spacing:0.02em;--awb-text-font-family:&quot;Open Sans&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p><strong>Information Security Maturity Assessment:<\/strong> Our Information Security Maturity Assessment model has been carefully created based on both national and international standards, frameworks, and regulations.Our service includes assessing the current information security maturity of organizations, determining the target related to the mission and vision of the organization, and creating a customized roadmap for the organization based on the differences between the current step and the target step.<\/p>\n<p><strong>Data Loss Prevention (\u201cDLP\u201d):<\/strong> Data Loss Prevention (DLP) is one of the most difficult issues to manage in the security world. As DuneMount, we support organizations in terms of both technical, process and legislation.Our main sub-services in this field;<\/p>\n<ul>\n<li>Creating and\/or updating Data Inventory<\/li>\n<li>DLP rule and policy monitoring and revision<\/li>\n<li>Evaluation of processes in terms of applicability and legislation specific to DLP<\/li>\n<li>Developing the data classification strategy<\/li>\n<li>Creating the necessary documents related to the end-to-end DLP management process<\/li>\n<\/ul>\n<p><strong>Cyber and Information Security Governance Model:<\/strong> Hundreds of documents created under the name of security slow down the security processes of many organizations and cause them to get lost in an inextricable documentary world.As DuneMount, we offer organizations a manageable and effective cyber security and information security model by redesigning traditional document management processes.Our goal is designing the cyber security and information security processes of organizations from scratch or update the existing model using a more effective governance model.<\/p>\n<\/div><div class=\"fusion-image-element \" style=\"--awb-margin-top:0px;--awb-margin-right:0px;--awb-margin-bottom:0px;--awb-margin-left:0px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-4 hover-type-none\"><img decoding=\"async\" width=\"1000\" height=\"1000\" alt=\"Security Governance\" title=\"G\u00fcvenlik Y\u00f6neti\u015fimi\" src=\"https:\/\/dunemount.com\/wp-content\/uploads\/2023\/12\/guvenlik-yonetisimi.jpg\" class=\"img-responsive wp-image-391\" srcset=\"https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/guvenlik-yonetisimi-200x200.jpg 200w, https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/guvenlik-yonetisimi-400x400.jpg 400w, https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/guvenlik-yonetisimi-600x600.jpg 600w, https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/guvenlik-yonetisimi-800x800.jpg 800w, https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/guvenlik-yonetisimi.jpg 1000w\" sizes=\"(max-width: 640px) 100vw, 600px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-medium-visibility fusion-no-large-visibility\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:20px;--awb-padding-right:0px;--awb-padding-bottom:0px;--awb-padding-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInLeft\" data-animationDuration=\"1.0\" data-animationDelay=\"0.2\" data-animationOffset=\"top-into-view\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-left:30px;--awb-margin-left-small:30px;--awb-font-size:18px;\"><h3 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;Open Sans&quot;;font-style:normal;font-weight:700;margin:0;font-size:1em;letter-spacing:0.02em;line-height:1.2;\">Security Governance<\/h3><\/div><div class=\"fusion-separator sep\" style=\"align-self: flex-start;margin-right:auto;margin-top:0px;margin-bottom:2%;width:100%;max-width:30%;\"><div class=\"fusion-separator-border sep-single sep-dotted\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:var(--awb-color4);border-color:var(--awb-color4);border-top-width:1px;\"><\/div><\/div><div class=\"fusion-text fusion-text-15\" style=\"--awb-font-size:16px;--awb-letter-spacing:0.02em;--awb-margin-right:30px;--awb-margin-left:30px;--awb-text-font-family:&quot;Open Sans&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>Our Security Governance services provide a robust, comprehensive and customized framework for managing and improving the security posture of the organizations.<\/p>\n<p>DuneMount incorporates many different services specific to security governance. These are respectively;<\/p>\n<\/div><div class=\"fusion-image-element \" style=\"--awb-margin-right:0px;--awb-margin-left:0px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-5 hover-type-none\"><img decoding=\"async\" width=\"1000\" height=\"1000\" alt=\"Security Governance\" title=\"Siber G\u00fcvenlik E\u011fitimi\" src=\"https:\/\/dunemount.com\/wp-content\/uploads\/2023\/12\/siber-guvenlik.jpg\" class=\"img-responsive wp-image-381\" srcset=\"https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/siber-guvenlik-200x200.jpg 200w, https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/siber-guvenlik-400x400.jpg 400w, https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/siber-guvenlik-600x600.jpg 600w, https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/siber-guvenlik-800x800.jpg 800w, https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/siber-guvenlik.jpg 1000w\" sizes=\"(max-width: 640px) 100vw, 600px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-16\" style=\"--awb-font-size:16px;--awb-letter-spacing:0.02em;--awb-margin-right:30px;--awb-margin-left:30px;--awb-text-font-family:&quot;Open Sans&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p><strong>Information Security Maturity Assessment:<\/strong> Our Information Security Maturity Assessment model has been carefully created based on both national and international standards, frameworks, and regulations.Our service includes assessing the current information security maturity of organizations, determining the target related to the mission and vision of the organization, and creating a customized roadmap for the organization based on the differences between the current step and the target step.<\/p>\n<p><strong>Data Loss Prevention (\u201cDLP\u201d):<\/strong> Data Loss Prevention (DLP) is one of the most difficult issues to manage in the security world. As DuneMount, we support organizations in terms of both technical, process and legislation.Our main sub-services in this field;<\/p>\n<ul>\n<li>Creating and\/or updating Data Inventory<\/li>\n<li>DLP rule and policy monitoring and revision<\/li>\n<li>Evaluation of processes in terms of applicability and legislation specific to DLP<\/li>\n<li>Developing the data classification strategy<\/li>\n<li>Creating the necessary documents related to the end-to-end DLP management process<\/li>\n<\/ul>\n<p><strong>Cyber and Information Security Governance Model:<\/strong> Hundreds of documents created under the name of security slow down the security processes of many organizations and cause them to get lost in an inextricable documentary world.As DuneMount, we offer organizations a manageable and effective cyber security and information security model by redesigning traditional document management processes.Our goal is designing the cyber security and information security processes of organizations from scratch or update the existing model using a more effective governance model.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-12 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInRight\" data-animationDuration=\"2.0\" data-animationDelay=\"0.2\" data-animationOffset=\"top-into-view\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-margin-top:0px;--awb-margin-right:0px;--awb-margin-bottom:0px;--awb-margin-left:0px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-6 hover-type-none\"><img decoding=\"async\" width=\"1000\" height=\"1000\" alt=\"Security Governance\" title=\"G\u00fcvenlik Y\u00f6neti\u015fimi\" src=\"https:\/\/dunemount.com\/wp-content\/uploads\/2023\/12\/guvenlik-yonetisimi.jpg\" class=\"img-responsive wp-image-391\" srcset=\"https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/guvenlik-yonetisimi-200x200.jpg 200w, https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/guvenlik-yonetisimi-400x400.jpg 400w, https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/guvenlik-yonetisimi-600x600.jpg 600w, https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/guvenlik-yonetisimi-800x800.jpg 800w, https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/guvenlik-yonetisimi.jpg 1000w\" sizes=\"(max-width: 640px) 100vw, 600px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-17\" style=\"--awb-font-size:16px;--awb-letter-spacing:0.02em;--awb-margin-right:30px;--awb-margin-left:30px;--awb-text-font-family:&quot;Open Sans&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p><strong>Incident Response Process Design:<\/strong> During an incident, a well-defined incident response plan is crucial. Our incident response process design service is a critical service to build end-to-end incident handling process including stakeholders, roles, responsibilities, and all other related components.Our main sub-services in this area;<\/p>\n<ul>\n<li>Establishing end-to-end process design by creating Incident Response Plan, Policy, and Procedure<\/li>\n<li>Creation of incident-based Playbooks<\/li>\n<li>Establishing a risk methodology specific to incident management and integrated with the organization&#8217;s Enterprise Risk Management structure or Information Security Risk structure<\/li>\n<li>Designing incident response teams based on roles and responsibilities and creating RACI matrices<\/li>\n<\/ul>\n<p><strong>Data Protection and Data Governance:<\/strong> Our services are designed to address technical requirements, process design and legal compliance in data protection and governance. We offer specific solutions and consulting services to our clients by analysing their existing data and data protection measures.Our main sub-services in this field;<\/p>\n<ul>\n<li>Personal Data Protection Law (&#8220;KVKK&#8221;) Consultancy and Audit<\/li>\n<li>Requirements and regulatory analysis for new data processing needs<\/li>\n<li>Data Classification within the organization<\/li>\n<li>Technology Readiness Assessment<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-8 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-small-visibility\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:50px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-background-color:#f9f9f9;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-13 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInDown\" data-animationDuration=\"1.0\" data-animationDelay=\"0.3\" data-animationOffset=\"top-into-view\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-8 fusion-sep-none fusion-title-text fusion-title-size-five\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top:0px;--awb-margin-bottom:10px;--awb-margin-bottom-small:10PX;--awb-sep-color:var(--awb-color5);--awb-font-size:18px;\"><h5 class=\"fusion-title-heading title-heading-left\" style=\"font-family:var(--awb-typography2-font-family);font-weight:var(--awb-typography2-font-weight);font-style:var(--awb-typography2-font-style);margin:0;font-size:1em;letter-spacing:var(--awb-typography2-letter-spacing);text-transform:none;line-height:var(--awb-typography2-line-height);\">Contact Us<\/h5><\/div><div class=\"fusion-separator\" style=\"align-self: flex-start;margin-right:auto;width:100%;max-width:5%;\"><div class=\"fusion-separator-border sep-single sep-dotted\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:var(--awb-color4);border-color:var(--awb-color4);border-top-width:1px;\"><\/div><\/div><div class=\"fusion-title title fusion-title-9 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color8);--awb-margin-bottom:10px;--awb-font-size:36px;\"><h3 class=\"fusion-title-heading title-heading-left\" style=\"font-family:var(--awb-typography1-font-family);font-weight:var(--awb-typography1-font-weight);font-style:var(--awb-typography1-font-style);margin:0;font-size:1em;letter-spacing:var(--awb-typography1-letter-spacing);text-transform:var(--awb-typography1-text-transform);line-height:var(--awb-typography1-line-height);\">We are just<br \/>\na message away!<\/h3><\/div><div class=\"fusion-text fusion-text-18 fusion-text-no-margin\" style=\"--awb-font-size:var(--awb-typography4-font-size);--awb-line-height:var(--awb-typography4-line-height);--awb-letter-spacing:var(--awb-typography4-letter-spacing);--awb-text-transform:var(--awb-typography4-text-transform);--awb-text-color:var(--awb-color8);--awb-text-font-family:var(--awb-typography4-font-family);--awb-text-font-weight:var(--awb-typography4-font-weight);--awb-text-font-style:var(--awb-typography4-font-style);\"><p>For information about our company and services, please fill out the form on the side to reach us.<\/p>\n<p>Our consultants will get in touch with you as soon as possible.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-14 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInDown\" data-animationDuration=\"2.0\" data-animationDelay=\"0.3\" data-animationOffset=\"top-into-view\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-10 fusion-sep-none fusion-title-text fusion-title-size-five\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top:0px;--awb-margin-bottom:10px;--awb-margin-bottom-small:10PX;--awb-sep-color:var(--awb-color5);--awb-font-size:18px;\"><h5 class=\"fusion-title-heading title-heading-left\" style=\"font-family:var(--awb-typography2-font-family);font-weight:var(--awb-typography2-font-weight);font-style:var(--awb-typography2-font-style);margin:0;font-size:1em;letter-spacing:var(--awb-typography2-letter-spacing);text-transform:none;line-height:var(--awb-typography2-line-height);\">Contact Form<\/h5><\/div><div class=\"fusion-separator\" style=\"align-self: flex-start;margin-right:auto;margin-bottom:20px;width:100%;max-width:5%;\"><div class=\"fusion-separator-border sep-single sep-dotted\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:var(--awb-color4);border-color:var(--awb-color4);border-top-width:1px;\"><\/div><\/div><div class='fluentform ff-default fluentform_wrapper_4 ffs_custom_wrap'><form data-form_id=\"4\" id=\"fluentform_4\" class=\"frm-fluent-form fluent_form_4 ff-el-form-top ff_form_instance_4_1 ff-form-loading ffs_custom\" data-form_instance=\"ff_form_instance_4_1\" method=\"POST\" ><fieldset  style=\"border: none!important;margin: 0!important;padding: 0!important;background-color: transparent!important;box-shadow: none!important;outline: none!important; min-inline-size: 100%;\">\n                    <legend class=\"ff_screen_reader_title\" style=\"display: block; margin: 0!important;padding: 0!important;height: 0!important;text-indent: -999999px;width: 0!important;overflow:hidden;\">Form EN<\/legend><input type='hidden' name='__fluent_form_embded_post_id' value='511' \/><input type=\"hidden\" id=\"_fluentform_4_fluentformnonce\" name=\"_fluentform_4_fluentformnonce\" value=\"22e107d7d4\" \/><input type=\"hidden\" name=\"_wp_http_referer\" value=\"\/en\/wp-json\/wp\/v2\/pages\/511\" \/><div data-name=\"ff_cn_id_1\"  class='ff-t-container ff-column-container ff_columns_total_2  '><div class='ff-t-cell ff-t-column-1' style='flex-basis: 50%;'><div data-type=\"name-element\" data-name=\"names\" class=\" ff-field_container ff-name-field-wrapper\" ><div class='ff-t-container'><div class='ff-t-cell '><div class='ff-el-group  ff-el-form-hide_label'><div class=\"ff-el-input--label ff-el-is-required asterisk-right\"><label for='ff_4_names_first_name_' >Ad Soyad<\/label><\/div><div class='ff-el-input--content'><input type=\"text\" name=\"names[first_name]\" id=\"ff_4_names_first_name_\" class=\"ff-el-form-control\" placeholder=\"Name *\" aria-invalid=\"false\" aria-required=true><\/div><\/div><\/div><\/div><\/div><\/div><div class='ff-t-cell ff-t-column-2' style='flex-basis: 50%;'><div class='ff-el-group ff-el-form-hide_label'><div class=\"ff-el-input--label ff-el-is-required asterisk-right\"><label for='ff_4_email' aria-label=\"Eposta\">Eposta<\/label><\/div><div class='ff-el-input--content'><input type=\"email\" name=\"email\" id=\"ff_4_email\" class=\"ff-el-form-control\" placeholder=\"Email *\" data-name=\"email\"  aria-invalid=\"false\" aria-required=true><\/div><\/div><\/div><\/div><div data-name=\"ff_cn_id_2\"  class='ff-t-container ff-column-container ff_columns_total_2  '><div class='ff-t-cell ff-t-column-1' style='flex-basis: 50%;'><div class='ff-el-group ff-el-form-hide_label'><div class=\"ff-el-input--label ff-el-is-required asterisk-right\"><label for='ff_4_input_text' aria-label=\"\u015eirket Ad\u0131\">\u015eirket Ad\u0131<\/label><\/div><div class='ff-el-input--content'><input type=\"text\" name=\"input_text\" class=\"ff-el-form-control\" placeholder=\"Company Name *\" data-name=\"input_text\" id=\"ff_4_input_text\"  aria-invalid=\"false\" aria-required=true><\/div><\/div><\/div><div class='ff-t-cell ff-t-column-2' style='flex-basis: 50%;'><div class='ff-el-group ff-el-form-hide_label'><div class=\"ff-el-input--label ff-el-is-required asterisk-right\"><label for='ff_4_phone' aria-label=\"Telefon\">Telefon<\/label><\/div><div class='ff-el-input--content'><input name=\"phone\" class=\"ff-el-form-control ff-el-phone ff_el_with_extended_validation\" type=\"tel\" placeholder=\"Phone *\" data-name=\"phone\" id=\"ff_4_phone\" inputmode=\"tel\"  aria-invalid='false' aria-required=true><\/div><\/div><\/div><\/div><div data-name=\"ff_cn_id_3\"  class='ff-t-container ff-column-container ff_columns_total_1  '><div class='ff-t-cell ff-t-column-1' style='flex-basis: 100%;'><div class='ff-el-group ff-el-form-hide_label'><div class=\"ff-el-input--label ff-el-is-required asterisk-right\"><label for='ff_4_description' aria-label=\"Mesaj\">Mesaj<\/label><\/div><div class='ff-el-input--content'><textarea aria-invalid=\"false\" aria-required=true name=\"description\" id=\"ff_4_description\" class=\"ff-el-form-control\" placeholder=\"Message *\" rows=\"3\" cols=\"2\" data-name=\"description\" ><\/textarea><\/div><\/div><div class='ff-el-group    ff-el-input--content'><div class='ff-el-form-check ff-el-tc'><label aria-label='Terms and Conditions: I have read the Privacy Notice regarding the processing of my personal data through the contact form. Contains 1 link. Use tab navigation to review.' class='ff-el-form-check-label ff_tc_label' for=gdpr-agreement_32903a037a7660986cb1d619b17a5761><span class='ff_tc_checkbox'><input type=\"checkbox\" name=\"gdpr-agreement\" class=\"ff-el-form-check-input ff_gdpr_field\" data-name=\"gdpr-agreement\" id=\"gdpr-agreement_32903a037a7660986cb1d619b17a5761\"  value='on' aria-invalid='false' aria-required=true><\/span> <div class='ff_t_c'>I have read the <a href=\"\/gizlilik-politikasi\/\">Privacy Notice<\/a> regarding the processing of my personal data through the contact form.<\/div><\/label><\/div><\/div><\/div><\/div><div class='ff-el-group ' ><div class='ff-el-input--content'><div data-fluent_id='4' name='g-recaptcha-response'><div\n\t\tdata-sitekey='6LebeMYqAAAAACaiYc1BD_trfMWHutb6rNULSfZE'\n\t\tid='fluentform-recaptcha-4-1'\n\t\tclass='ff-el-recaptcha g-recaptcha'\n\t\tdata-callback='fluentFormrecaptchaSuccessCallback'><\/div><\/div><\/div><\/div><div class='ff-el-group ff-text-left ff_submit_btn_wrapper'><button type=\"submit\" class=\"ff-btn ff-btn-submit ff-btn-md ff_btn_style wpf_has_custom_css\" >Submit<\/button><\/div><\/fieldset><\/form><div id='fluentform_4_errors' class='ff-errors-in-stack ff_form_instance_4_1 ff-form-loading_errors ff_form_instance_4_1_errors'><\/div><\/div>        <script type=\"text\/javascript\">\n            window.fluent_form_ff_form_instance_4_1 = {\"id\":\"4\",\"settings\":{\"layout\":{\"labelPlacement\":\"top\",\"helpMessagePlacement\":\"with_label\",\"errorMessagePlacement\":\"inline\",\"cssClassName\":\"\",\"asteriskPlacement\":\"asterisk-right\"},\"restrictions\":{\"denyEmptySubmission\":{\"enabled\":false}}},\"form_instance\":\"ff_form_instance_4_1\",\"form_id_selector\":\"fluentform_4\",\"rules\":{\"names[first_name]\":{\"required\":{\"value\":true,\"message\":\"Bu alan gereklidir\",\"global\":false,\"global_message\":\"This field is required\"}},\"names[middle_name]\":{\"required\":{\"value\":false,\"message\":\"This field is required\",\"global\":false,\"global_message\":\"This field is required\"}},\"names[last_name]\":{\"required\":{\"value\":false,\"message\":\"This field is required\",\"global\":false,\"global_message\":\"This field is required\"}},\"email\":{\"required\":{\"value\":true,\"message\":\"Bu alan gereklidir\",\"global\":false,\"global_message\":\"This field is required\"},\"email\":{\"value\":true,\"message\":\"Bu alan ge\\u00e7erli bir e-posta i\\u00e7ermelidir\",\"global\":false,\"global_message\":\"This field must contain a valid email\"}},\"input_text\":{\"required\":{\"value\":true,\"message\":\"Bu alan gereklidir\",\"global\":false,\"global_message\":\"This field is required\"}},\"phone\":{\"required\":{\"value\":true,\"message\":\"Bu alan gereklidir\",\"global\":false,\"global_message\":\"This field is required\"},\"valid_phone_number\":{\"value\":true,\"message\":\"Telefon numaras\\u0131 ge\\u00e7erli de\\u011fil\",\"global\":false,\"global_message\":\"Phone number is not valid\"}},\"description\":{\"required\":{\"value\":true,\"message\":\"Bu alan gereklidir\",\"global\":false,\"global_message\":\"This field is required\"}},\"gdpr-agreement\":{\"required\":{\"value\":true,\"message\":\"This field is required\",\"global_message\":\"This field is required\",\"global\":true}},\"g-recaptcha-response\":[]},\"debounce_time\":300};\n                    <\/script>\n        <\/div><\/div><\/div><\/div>\n<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-9 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-medium-visibility fusion-no-large-visibility\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:30px;--awb-background-color:#f9f9f9;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-15 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInDown\" data-animationDuration=\"1.0\" data-animationDelay=\"0.3\" data-animationOffset=\"top-into-view\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-11 fusion-sep-none fusion-title-text fusion-title-size-five\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top:0px;--awb-margin-bottom:10px;--awb-margin-bottom-small:10PX;--awb-sep-color:var(--awb-color5);--awb-font-size:18px;\"><h5 class=\"fusion-title-heading title-heading-left\" style=\"font-family:var(--awb-typography2-font-family);font-weight:var(--awb-typography2-font-weight);font-style:var(--awb-typography2-font-style);margin:0;font-size:1em;letter-spacing:var(--awb-typography2-letter-spacing);text-transform:none;line-height:var(--awb-typography2-line-height);\">Contact Us<\/h5><\/div><div class=\"fusion-separator\" style=\"align-self: flex-start;margin-right:auto;width:100%;max-width:10%;\"><div class=\"fusion-separator-border sep-single sep-dotted\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:var(--awb-color4);border-color:var(--awb-color4);border-top-width:1px;\"><\/div><\/div><div class=\"fusion-title title fusion-title-12 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color8);--awb-margin-bottom:10px;--awb-font-size:24px;\"><h3 class=\"fusion-title-heading title-heading-left\" style=\"font-family:var(--awb-typography1-font-family);font-weight:var(--awb-typography1-font-weight);font-style:var(--awb-typography1-font-style);margin:0;font-size:1em;letter-spacing:0.02em;text-transform:var(--awb-typography1-text-transform);line-height:var(--awb-typography1-line-height);\">We are just a message away!<\/h3><\/div><div class=\"fusion-text fusion-text-19 fusion-text-no-margin\" style=\"--awb-font-size:var(--awb-typography4-font-size);--awb-line-height:var(--awb-typography4-line-height);--awb-letter-spacing:var(--awb-typography4-letter-spacing);--awb-text-transform:var(--awb-typography4-text-transform);--awb-text-color:var(--awb-color8);--awb-text-font-family:var(--awb-typography4-font-family);--awb-text-font-weight:var(--awb-typography4-font-weight);--awb-text-font-style:var(--awb-typography4-font-style);\"><p>For information about our company and services, please fill out the form on the side to reach us. Our consultants will get in touch with you as soon as possible.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-16 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInDown\" data-animationDuration=\"2.0\" data-animationDelay=\"0.3\" data-animationOffset=\"top-into-view\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-13 fusion-sep-none fusion-title-text fusion-title-size-five\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top:0px;--awb-margin-bottom:10px;--awb-margin-bottom-small:10PX;--awb-sep-color:var(--awb-color5);--awb-font-size:18px;\"><h5 class=\"fusion-title-heading title-heading-left\" style=\"font-family:var(--awb-typography2-font-family);font-weight:var(--awb-typography2-font-weight);font-style:var(--awb-typography2-font-style);margin:0;font-size:1em;letter-spacing:var(--awb-typography2-letter-spacing);text-transform:none;line-height:var(--awb-typography2-line-height);\">Contact Form<\/h5><\/div><div class=\"fusion-separator\" style=\"align-self: flex-start;margin-right:auto;margin-bottom:20px;width:100%;max-width:10%;\"><div class=\"fusion-separator-border sep-single sep-dotted\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:var(--awb-color4);border-color:var(--awb-color4);border-top-width:1px;\"><\/div><\/div><div class='fluentform ff-default fluentform_wrapper_4 ffs_custom_wrap'><form data-form_id=\"4\" id=\"fluentform_4\" class=\"frm-fluent-form fluent_form_4 ff-el-form-top ff_form_instance_4_2 ff-form-loading ffs_custom\" data-form_instance=\"ff_form_instance_4_2\" method=\"POST\" ><fieldset  style=\"border: none!important;margin: 0!important;padding: 0!important;background-color: transparent!important;box-shadow: none!important;outline: none!important; min-inline-size: 100%;\">\n                    <legend class=\"ff_screen_reader_title\" style=\"display: block; margin: 0!important;padding: 0!important;height: 0!important;text-indent: -999999px;width: 0!important;overflow:hidden;\">Form EN<\/legend><input type='hidden' name='__fluent_form_embded_post_id' value='511' \/><input type=\"hidden\" id=\"_fluentform_4_fluentformnonce\" name=\"_fluentform_4_fluentformnonce\" value=\"22e107d7d4\" \/><input type=\"hidden\" name=\"_wp_http_referer\" value=\"\/en\/wp-json\/wp\/v2\/pages\/511\" \/><div data-name=\"ff_cn_id_1\"  class='ff-t-container ff-column-container ff_columns_total_2  '><div class='ff-t-cell ff-t-column-1' style='flex-basis: 50%;'><div data-type=\"name-element\" data-name=\"names\" class=\" ff-field_container ff-name-field-wrapper\" ><div class='ff-t-container'><div class='ff-t-cell '><div class='ff-el-group  ff-el-form-hide_label'><div class=\"ff-el-input--label ff-el-is-required asterisk-right\"><label for='ff_4_2_names_first_name_' >Ad Soyad<\/label><\/div><div class='ff-el-input--content'><input type=\"text\" name=\"names[first_name]\" id=\"ff_4_2_names_first_name_\" class=\"ff-el-form-control\" placeholder=\"Name *\" aria-invalid=\"false\" aria-required=true><\/div><\/div><\/div><\/div><\/div><\/div><div class='ff-t-cell ff-t-column-2' style='flex-basis: 50%;'><div class='ff-el-group ff-el-form-hide_label'><div class=\"ff-el-input--label ff-el-is-required asterisk-right\"><label for='ff_4_2_email' aria-label=\"Eposta\">Eposta<\/label><\/div><div class='ff-el-input--content'><input type=\"email\" name=\"email\" id=\"ff_4_2_email\" class=\"ff-el-form-control\" placeholder=\"Email *\" data-name=\"email\"  aria-invalid=\"false\" aria-required=true><\/div><\/div><\/div><\/div><div data-name=\"ff_cn_id_2\"  class='ff-t-container ff-column-container ff_columns_total_2  '><div class='ff-t-cell ff-t-column-1' style='flex-basis: 50%;'><div class='ff-el-group ff-el-form-hide_label'><div class=\"ff-el-input--label ff-el-is-required asterisk-right\"><label for='ff_4_2_input_text' aria-label=\"\u015eirket Ad\u0131\">\u015eirket Ad\u0131<\/label><\/div><div class='ff-el-input--content'><input type=\"text\" name=\"input_text\" class=\"ff-el-form-control\" placeholder=\"Company Name *\" data-name=\"input_text\" id=\"ff_4_2_input_text\"  aria-invalid=\"false\" aria-required=true><\/div><\/div><\/div><div class='ff-t-cell ff-t-column-2' style='flex-basis: 50%;'><div class='ff-el-group ff-el-form-hide_label'><div class=\"ff-el-input--label ff-el-is-required asterisk-right\"><label for='ff_4_2_phone' aria-label=\"Telefon\">Telefon<\/label><\/div><div class='ff-el-input--content'><input name=\"phone\" class=\"ff-el-form-control ff-el-phone ff_el_with_extended_validation\" type=\"tel\" placeholder=\"Phone *\" data-name=\"phone\" id=\"ff_4_2_phone\" inputmode=\"tel\"  aria-invalid='false' aria-required=true><\/div><\/div><\/div><\/div><div data-name=\"ff_cn_id_3\"  class='ff-t-container ff-column-container ff_columns_total_1  '><div class='ff-t-cell ff-t-column-1' style='flex-basis: 100%;'><div class='ff-el-group ff-el-form-hide_label'><div class=\"ff-el-input--label ff-el-is-required asterisk-right\"><label for='ff_4_2_description' aria-label=\"Mesaj\">Mesaj<\/label><\/div><div class='ff-el-input--content'><textarea aria-invalid=\"false\" aria-required=true name=\"description\" id=\"ff_4_2_description\" class=\"ff-el-form-control\" placeholder=\"Message *\" rows=\"3\" cols=\"2\" data-name=\"description\" ><\/textarea><\/div><\/div><div class='ff-el-group    ff-el-input--content'><div class='ff-el-form-check ff-el-tc'><label aria-label='Terms and Conditions: I have read the Privacy Notice regarding the processing of my personal data through the contact form. Contains 1 link. Use tab navigation to review.' class='ff-el-form-check-label ff_tc_label' for=gdpr-agreement_611e6f5bb896e640239096f225eb4895><span class='ff_tc_checkbox'><input type=\"checkbox\" name=\"gdpr-agreement\" class=\"ff-el-form-check-input ff_gdpr_field\" data-name=\"gdpr-agreement\" id=\"gdpr-agreement_611e6f5bb896e640239096f225eb4895\"  value='on' aria-invalid='false' aria-required=true><\/span> <div class='ff_t_c'>I have read the <a href=\"\/gizlilik-politikasi\/\">Privacy Notice<\/a> regarding the processing of my personal data through the contact form.<\/div><\/label><\/div><\/div><\/div><\/div><div class='ff-el-group ' ><div class='ff-el-input--content'><div data-fluent_id='4' name='g-recaptcha-response'><div\n\t\tdata-sitekey='6LebeMYqAAAAACaiYc1BD_trfMWHutb6rNULSfZE'\n\t\tid='fluentform-recaptcha-4-2'\n\t\tclass='ff-el-recaptcha g-recaptcha'\n\t\tdata-callback='fluentFormrecaptchaSuccessCallback'><\/div><\/div><\/div><\/div><div class='ff-el-group ff-text-left ff_submit_btn_wrapper'><button type=\"submit\" class=\"ff-btn ff-btn-submit ff-btn-md ff_btn_style wpf_has_custom_css\" >Submit<\/button><\/div><\/fieldset><\/form><div id='fluentform_4_errors' class='ff-errors-in-stack ff_form_instance_4_2 ff-form-loading_errors ff_form_instance_4_2_errors'><\/div><\/div>        <script type=\"text\/javascript\">\n            window.fluent_form_ff_form_instance_4_2 = {\"id\":\"4\",\"settings\":{\"layout\":{\"labelPlacement\":\"top\",\"helpMessagePlacement\":\"with_label\",\"errorMessagePlacement\":\"inline\",\"cssClassName\":\"\",\"asteriskPlacement\":\"asterisk-right\"},\"restrictions\":{\"denyEmptySubmission\":{\"enabled\":false}}},\"form_instance\":\"ff_form_instance_4_2\",\"form_id_selector\":\"fluentform_4\",\"rules\":{\"names[first_name]\":{\"required\":{\"value\":true,\"message\":\"Bu alan gereklidir\",\"global\":false,\"global_message\":\"This field is required\"}},\"names[middle_name]\":{\"required\":{\"value\":false,\"message\":\"This field is required\",\"global\":false,\"global_message\":\"This field is required\"}},\"names[last_name]\":{\"required\":{\"value\":false,\"message\":\"This field is required\",\"global\":false,\"global_message\":\"This field is required\"}},\"email\":{\"required\":{\"value\":true,\"message\":\"Bu alan gereklidir\",\"global\":false,\"global_message\":\"This field is required\"},\"email\":{\"value\":true,\"message\":\"Bu alan ge\\u00e7erli bir e-posta i\\u00e7ermelidir\",\"global\":false,\"global_message\":\"This field must contain a valid email\"}},\"input_text\":{\"required\":{\"value\":true,\"message\":\"Bu alan gereklidir\",\"global\":false,\"global_message\":\"This field is required\"}},\"phone\":{\"required\":{\"value\":true,\"message\":\"Bu alan gereklidir\",\"global\":false,\"global_message\":\"This field is required\"},\"valid_phone_number\":{\"value\":true,\"message\":\"Telefon numaras\\u0131 ge\\u00e7erli de\\u011fil\",\"global\":false,\"global_message\":\"Phone number is not valid\"}},\"description\":{\"required\":{\"value\":true,\"message\":\"Bu alan gereklidir\",\"global\":false,\"global_message\":\"This field is required\"}},\"gdpr-agreement\":{\"required\":{\"value\":true,\"message\":\"This field is required\",\"global_message\":\"This field is required\",\"global\":true}},\"g-recaptcha-response\":[]},\"debounce_time\":300};\n                    <\/script>\n        <\/div><\/div><\/div><\/div>\n<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":423,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"footnotes":""},"class_list":["post-511","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v24.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Security and Information Security - DuneMount<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dunemount.com\/en\/services\/cyber-security-and-information-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security and Information Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dunemount.com\/en\/services\/cyber-security-and-information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"DuneMount\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-23T22:37:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/bilgi-guvenligi.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"750\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@dunemount\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"88 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.dunemount.com\/en\/services\/cyber-security-and-information-security\/\",\"url\":\"https:\/\/www.dunemount.com\/en\/services\/cyber-security-and-information-security\/\",\"name\":\"Cyber Security and Information Security - DuneMount\",\"isPartOf\":{\"@id\":\"https:\/\/www.dunemount.com\/en\/#website\"},\"datePublished\":\"2023-12-18T00:48:35+00:00\",\"dateModified\":\"2023-12-23T22:37:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.dunemount.com\/en\/services\/cyber-security-and-information-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.dunemount.com\/en\/services\/cyber-security-and-information-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.dunemount.com\/en\/services\/cyber-security-and-information-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Anasayfa\",\"item\":\"https:\/\/www.dunemount.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\/\/www.dunemount.com\/en\/services\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Security and Information Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.dunemount.com\/en\/#website\",\"url\":\"https:\/\/www.dunemount.com\/en\/\",\"name\":\"DuneMount\",\"description\":\"Cyber Security and Information Security\",\"publisher\":{\"@id\":\"https:\/\/www.dunemount.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.dunemount.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.dunemount.com\/en\/#organization\",\"name\":\"DuneMount\",\"url\":\"https:\/\/www.dunemount.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.dunemount.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/favicon.png\",\"contentUrl\":\"https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/favicon.png\",\"width\":270,\"height\":270,\"caption\":\"DuneMount\"},\"image\":{\"@id\":\"https:\/\/www.dunemount.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/dunemount\",\"https:\/\/www.instagram.com\/dunemount\/\",\"https:\/\/www.linkedin.com\/company\/dunemount\"],\"description\":\"DuneMount dan\u0131\u015fmanl\u0131k faaliyetleri aras\u0131nda g\u00fcvenlik dan\u0131\u015fmanl\u0131\u011f\u0131 \u00f6n plana \u00e7\u0131kmakla birlikte, m\u00fc\u015fterilerine teknoloji ve g\u00fcvenlik alan\u0131nda sunulabilecek b\u00fct\u00fcn hizmetleri en kaliteli \u015fekilde sunmay\u0131 hedeflemektedir.\",\"email\":\"serdar.karaman@dunemount.com\",\"legalName\":\"DuneMount Dan\u0131\u015fmanl\u0131k Hizmetleri\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Security and Information Security - DuneMount","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dunemount.com\/en\/services\/cyber-security-and-information-security\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security and Information Security","og_url":"https:\/\/www.dunemount.com\/en\/services\/cyber-security-and-information-security\/","og_site_name":"DuneMount","article_modified_time":"2023-12-23T22:37:34+00:00","og_image":[{"width":1920,"height":750,"url":"https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/bilgi-guvenligi.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@dunemount","twitter_misc":{"Est. reading time":"88 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.dunemount.com\/en\/services\/cyber-security-and-information-security\/","url":"https:\/\/www.dunemount.com\/en\/services\/cyber-security-and-information-security\/","name":"Cyber Security and Information Security - DuneMount","isPartOf":{"@id":"https:\/\/www.dunemount.com\/en\/#website"},"datePublished":"2023-12-18T00:48:35+00:00","dateModified":"2023-12-23T22:37:34+00:00","breadcrumb":{"@id":"https:\/\/www.dunemount.com\/en\/services\/cyber-security-and-information-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dunemount.com\/en\/services\/cyber-security-and-information-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.dunemount.com\/en\/services\/cyber-security-and-information-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Anasayfa","item":"https:\/\/www.dunemount.com\/en\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/www.dunemount.com\/en\/services\/"},{"@type":"ListItem","position":3,"name":"Cyber Security and Information Security"}]},{"@type":"WebSite","@id":"https:\/\/www.dunemount.com\/en\/#website","url":"https:\/\/www.dunemount.com\/en\/","name":"DuneMount","description":"Cyber Security and Information Security","publisher":{"@id":"https:\/\/www.dunemount.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dunemount.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.dunemount.com\/en\/#organization","name":"DuneMount","url":"https:\/\/www.dunemount.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dunemount.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/favicon.png","contentUrl":"https:\/\/www.dunemount.com\/wp-content\/uploads\/2023\/12\/favicon.png","width":270,"height":270,"caption":"DuneMount"},"image":{"@id":"https:\/\/www.dunemount.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/dunemount","https:\/\/www.instagram.com\/dunemount\/","https:\/\/www.linkedin.com\/company\/dunemount"],"description":"DuneMount dan\u0131\u015fmanl\u0131k faaliyetleri aras\u0131nda g\u00fcvenlik dan\u0131\u015fmanl\u0131\u011f\u0131 \u00f6n plana \u00e7\u0131kmakla birlikte, m\u00fc\u015fterilerine teknoloji ve g\u00fcvenlik alan\u0131nda sunulabilecek b\u00fct\u00fcn hizmetleri en kaliteli \u015fekilde sunmay\u0131 hedeflemektedir.","email":"serdar.karaman@dunemount.com","legalName":"DuneMount Dan\u0131\u015fmanl\u0131k Hizmetleri"}]}},"_links":{"self":[{"href":"https:\/\/www.dunemount.com\/en\/wp-json\/wp\/v2\/pages\/511","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dunemount.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.dunemount.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.dunemount.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dunemount.com\/en\/wp-json\/wp\/v2\/comments?post=511"}],"version-history":[{"count":8,"href":"https:\/\/www.dunemount.com\/en\/wp-json\/wp\/v2\/pages\/511\/revisions"}],"predecessor-version":[{"id":633,"href":"https:\/\/www.dunemount.com\/en\/wp-json\/wp\/v2\/pages\/511\/revisions\/633"}],"up":[{"embeddable":true,"href":"https:\/\/www.dunemount.com\/en\/wp-json\/wp\/v2\/pages\/423"}],"wp:attachment":[{"href":"https:\/\/www.dunemount.com\/en\/wp-json\/wp\/v2\/media?parent=511"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}