SERVICES
Considering the types and vectors of cyber-attacks affected by the rapidly changing dynamics of the digital world, institutions and organizations should adopt a predictive approach to their current situation against possible attacks and take strong steps towards improvement. Knowing in advance the cyber resilience and resilience posture of the institutional and organizational structures is the most critical step to be taken to identify and eliminate potential vulnerabilities.
Determining the level of cyber maturity increases the power of institutions and organizations to take measures against possible attacks. As HAVELSAN, thanks to our expert staff and the cyber maturity level assesment roof structure we have developed, we ensure that the overall picture is drawn quickly and effectively. We are active in identifying areas requiring improvement at the detail level. The main objectives of our high-quality service are as follows:
The main structure of our survey study, which is necessary to determine the maturity level, is based on Personal Data Protection Law (KVKK) No. 6698 Digital Transformation Office of the Presidency of Türkiye Information and Communication Security Guide, ISO 27001, ISO 27002, NIST.SP.800-53, CIS Control standard and framework documents. In addition, it has been created to include controls designed by our expert team according to customer needs and controls from other standards and frameworks other than these standards. Our unique question list is created individually for each customer, considering customer needs and contractual obligations.

Cyber security architecture is a framework that covers the security controls, processes and policies necessary to meet an organization’s cyber security needs and protect its information assets. Having a strong cyber security in the information technology environment, which is increasingly turning into a complex and integrated form with the effect of today's conditions, requires the construction of a strong security architecture.
As HAVELSAN, we evaluate the information technology infrastructure of our customers with a Zero Trust perspective. In meeting the security needs; we carry out the analysis and design process in accordance with the confidentiality, integrity and accessibility structure of the data by considering Mitre Attack Framework tactics and techniques. We strategically design requirements for securing data and resources wherever they are, addressing all components of devices, people, data, networks, workload, automation, management, visibility and analytics. With a multi-layered and holistic approach, we perform the following analyses and assessments in accordance with business objectives and risk management profiles.
We carry out Cyber Security Architecture Design within the framework of ISO/IEC 27001, NIST SP 800-53, FIPS, GDPR, PCI DSS, standards and the Presidential Information and Communication Security Guide.
In specialized areas:
Cloud security encompasses a set of procedures, policies and technologies that harden cloud computing environments against potential cyber security threats. The main purpose of cloud security is to protect the confidentiality, integrity and accessibility of information stored, processed and transferred in cloud computing environments. At the same time, cloud security is seen as a shared responsibility between the cloud provider and the customer.
Cloud providers offer a range of security services to protect cloud environments. These services can be listed as follows:
Cloud customers are also responsible for taking their own cloud security measures. These measures can be listed as follows:
Cloud security is critical to protect corporate information assets. Cloud customers should work with their cloud providers to take the necessary measures to protect their cloud environments against potential cyber security threats. As HAVELSAN, we design and implement cloud security architecture for cloud providers and cloud customers in accordance with international standards such as CSA CCM, ISO 27001, ISO 27017 and ISO 27018.
We provide consultancy, training and testing services required by organizations at all stages of Information Security Management System (ISMS) installation and operation processes, ranging from the determination of the scope to the warranty and maintenance period after certification, and offer turnkey solutions in the field of ISMS.
ISMS consultancy services we offer for the needs of our customers:
Cumhurbaşkanlığı Dijital Dönüşüm Ofisi Başkanlığı tarafından hazırlanan Bilgi ve İletişim Güvenliği Rehberi, kamu kurum ve kuruluşları ile kritik altyapı hizmeti veren işletmelerin uyması gereken tedbirleri içermektedir. HAVELSAN olarak kamu kurum ve kuruluşları ve kritik altyapı hizmeti veren işletmelere sunduğumuz danışmanlık hizmeti kapsamında, rehbere uyumluluk süreçlerinin denetimini uzman kadromuzla gerçekleştirmekteyiz.
Sunduğumuz nitelikli hizmetimiz; aşağıda belirtilen ana proje safhalarını kapsamaktadır.
HAVELSAN olarak varlık gruplarının belirlenmesi, yılda en az bir kez olmak üzere iç denetim yolu ile gerçekleştirilecek olan Bilgi ve İletişim Güvenliği Denetimi’nin yapılması, rehbere uyum sürecinin her aşaması dahil olmak üzere; özellikle tedbirlerin uygulanmasına yönelik kurumlar tarafından ihtiyaç duyulan ürün, danışmanlık, eğitim ve test hizmetlerinin sağlanması konularında çözüm ortaklığı sunmaktayız.
Ayrıca ISO27001 Bilgi Güvenliği Yönetim Sistemi belgelendirmesi olan kurumlarda, Bilgi ve İletişim Güvenliği Rehberi’ne uyum değerlendirmesi, rehber tedbirlerinin ISO27001 kontrolleri ile uygulanması, eksik kalınan noktaların belirlenmesi gibi hizmetleri, uzman kadromuz tarafından özel olarak hazırlanan kontrol listesi ile vermekteyiz.

Within the scope of the R&D Projects of the Presidency of the Republic of Türkiye Secretariat of Defense Industries, we develop defense solutions for Industrial Control Systems (ICS) in the field of Operational Technology (OT). With our domestic and national solutions, we carry out attack detection for the assets in the Operational Technology area in the project.
Our solutions cover the following main modules:
We ensure that the asset management of IT and OT devices is dynamically discovered, classified and device profiles are created and vulnerabilities for devices are extracted.
With the approach applied in industrial control systems, we collect data from end system devices and network traffic by placing sensors (data collection points) at different points of the topology in industrial control systems. We increase the visibility of the OT network segment by performing deep packet inspection on the packets of OT protocols (e.g. IEC 61850, IEC 60870-5-104, MODBUS, PROFINET, S7, DNP3, BACnet, ETERCAT, CIP etc.).
We use different intrusion detection methods for OT based systems as Anomaly Detection System.

As HAVELSAN, we offer a central management monitoring capability that enables the consolidation of the collected data in a central location. We provide event statistics and visualizations generated from sensor data from a single point in identifying any cyber-attack or abnormal event occurring in the Operational Technology (OT) infrastructure for users. We generate alarms with anomaly detection methods based on deep packet analysis results. In this way, we create a strong cyber defense mechanism for our customers by minimizing security vulnerabilities in industrial infrastructures.
With these advanced services, we develop solutions to increase cyber resilience in critical systems (energy and natural gas production facilities, nuclear facilities, water networks, health systems, land, air, sea and rail transportation control systems, etc.).