Provis Consultancy Services
provides solutions for your business.

PDPL Consultancy

There are many important changes for the companies with the Personal Data Protection Law of 6698. Some rules and obligations are determined in issues of storing, processing and providing security of the personal data for all organizations and institutions by the law. If the conditions of the law are not fulfilled, the real and legal persons may face imprisonment besides penalties. Even though some obligations are determined by PDPL, data recording and data transfer are not forbidden if they are carried out in accordance with the law.

Since the transition period has ended, it is important to provide compliance processes to PDPL rapidly and efficiently. For this reason, taking consultancy service from competent persons who are specialized in this subject provides advantage in terms of effort and costs. Since there are administrative, legal and technical processes in compliance to the law, a consultancy service covering all fields facilitates your processes.

As Provis, we offer end-to-end consultancy services in PDPL Adaptation Projects with K&P Legal Law Firm which is our business partner. We help our customers in taking all administrative, legal and technical precautions specified in the law for our customers with this service.

ISO 27001 Consultancy

ISO 27001 is a standard prepared to specify requirements and to create a model to install, operate, monitor, revise, maintain and improve an Information Security Management System. With ISO 27001 certificate, the companies independently show that they act in accordance with the applicable laws and regulations and provide information security with an efficient risk management and consider information security by defining corporate risks. By this means, the companies with ISO 27001 certificate gain a security advantage against competitor companies.

We offer consultancy services for the companies in order to install an Information Security Management System in compliance with ISO 27001 standards. These works consisting of risk analyses, determining proper controls and precautions, developing and documenting of policies, standards and procedures are carried out in accordance with the methodologies specified in the standard. Our anchor point in ISO 27001 BGYS (Information Security Management System) installation is the methodology of Plan-Apply-Check-Take Precaution (PUKO) which is included in ISO 27001 Information Security Management System Standard.

ISO 27001 Consultancy

ISO 27001 is a standard prepared to specify requirements and to create a model to install, operate, monitor, revise, maintain and improve an Information Security Management System. With ISO 27001 certificate, the companies independently show that they act in accordance with the applicable laws and regulations and provide information security with an efficient risk management and consider information security by defining corporate risks. By this means, the companies with ISO 27001 certificate gain a security advantage against competitor companies.

We offer consultancy services for the companies in order to install an Information Security Management System in compliance with ISO 27001 standards. These works consisting of risk analyses, determining proper controls and precautions, developing and documenting of policies, standards and procedures are carried out in accordance with the methodologies specified in the standard. Our anchor point in ISO 27001 BGYS (Information Security Management System) installation is the methodology of Plan-Apply-Check-Take Precaution (PUKO) which is included in ISO 27001 Information Security Management System Standard.

DLP Project Consultancy

If Data Leakage Prevention (DLP) Projects are not properly configured and managed, it is hard to achieve target. There are processes which will require inclusion of all teams with IT team in DLP projects. It is not possible to put DLP projects into practice successfully and efficiently without completing the steps of taking approval of the management, determining and categorizing sensitive and critical data, detection of the movement of the data on the move, determining of safe data flow paths and creating of data map. DLP policies are specially prepared for the customers in accordance with the data map created.

We complete projects by offering consultancy services besides product positioning in DLP and data categorization projects. In this context, we support our customers from the beginning up to completion of the project process.

SIEM Project Consultancy

Security Information and Event Management (SIEM) Solution is one of the most important and comprehensive solutions for security management by IT teams. It is essential to log of all system sources correctly, to display, filter, inquire these logs in a meaningful way, to correlate logs taken from different sources with security perspectives for SIEM projects. It is especially important to parse logs and to write correlation rules for establishing SIEM maturity.

We also offer consultancy services in addition to product supply, installation and configuration processes in SIEM projects. We support our customers in processes of writing of rules in accordance with your scenarios, creating of alarms and providing plugin integrations in solutions with correlation competencies.

SIEM Project Consultancy

Security Information and Event Management (SIEM) Solution is one of the most important and comprehensive solutions for security management by IT teams. It is essential to log of all system sources correctly, to display, filter, inquire these logs in a meaningful way, to correlate logs taken from different sources with security perspectives for SIEM projects. It is especially important to parse logs and to write correlation rules for establishing SIEM maturity.

We also offer consultancy services in addition to product supply, installation and configuration processes in SIEM projects. We support our customers in processes of writing of rules in accordance with your scenarios, creating of alarms and providing plugin integrations in solutions with correlation competencies.

Penetration Test Service

A penetration test is performed for a certain purpose and/or a scenario unlike vulnerability analysis.

It is one of the first steps of proactive security to test, check and report all kinds of vulnerability of the information systems by an external company and/or an institution. External tests are performed to disclose vulnerabilities by approaching all kinds of security gaps that the companies do not realize from a different aspect and working in a coordinated way. We offer these works as black box and white box as inner and outer tests for our customers. It is required to fill the scope form and to determine the details of the work to be done before working on it.

Do you want to
contact us directly?