{"id":15554,"date":"2016-10-06T08:40:33","date_gmt":"2016-10-06T05:40:33","guid":{"rendered":"https:\/\/www.proya.com.tr\/?page_id=15554"},"modified":"2021-11-18T01:05:24","modified_gmt":"2021-11-17T22:05:24","slug":"alienvault","status":"publish","type":"page","link":"https:\/\/www.proya.com.tr\/en\/alienvault\/","title":{"rendered":"AlienVault"},"content":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1637183847391{padding-left: 5% !important;background-image: url(https:\/\/www.proya.com.tr\/wp-content\/uploads\/2021\/11\/alien-vault-header.jpg?id=15551) !important;}&#8221;][vc_column css=&#8221;.vc_custom_1474490360423{padding-right: 9% !important;}&#8221;][vc_empty_space height=&#8221;30px&#8221;][vc_column_text]<\/p>\n<h3><span style=\"color: #ffffff;\">AlienVault<\/span><\/h3>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h5><span style=\"color: #ffffff; font-weight: 400;\">Unified Security Management &amp; Threat Intelligence<\/span><\/h5>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;60px&#8221;][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243;]<div id=\"mpc_tabs-6269ec2eaec4591\" class=\"mpc-tabs mpc-init mpc-transition mpc-tabs--left mpc-tabs--decor-line \"  data-active=\"\"><div class=\"mpc-tabs__nav mpc-align--top\"><ul><li class=\"mpc-tabs__nav-item mpc-parent-hover mpc-active\" data-tab_id=\"1473564475-1-24\"><div data-id=\"mpc_button-5469ec2eaec46f4\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_20 \" ><div class=\"mpc-button__content mpc-effect-type--none mpc-effect-side--none\"><span class=\"mpc-button__title mpc-transition\">Network Security<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--slide mpc-effect-side--right\"><\/div><\/div><\/li><li class=\"mpc-tabs__nav-item mpc-parent-hover\" data-tab_id=\"1473610789367-5-5\"><div data-id=\"mpc_button-2069ec2eaec5606\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_20 \" ><div class=\"mpc-button__content mpc-effect-type--none mpc-effect-side--none\"><span class=\"mpc-button__title mpc-transition\">Compliance Manager<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--slide mpc-effect-side--right\"><\/div><\/div><\/li><li class=\"mpc-tabs__nav-item mpc-parent-hover\" data-tab_id=\"1473564475-2-93\"><div data-id=\"mpc_button-3069ec2eaec64c7\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_20 \" ><div class=\"mpc-button__content mpc-effect-type--none mpc-effect-side--none\"><span class=\"mpc-button__title mpc-transition\">LOG Management &amp; SIEM<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--slide mpc-effect-side--right\"><\/div><\/div><\/li><li class=\"mpc-tabs__nav-item mpc-parent-hover\" data-tab_id=\"1473566785280-2-8\"><div data-id=\"mpc_button-2269ec2eaec7685\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_20 \" ><div class=\"mpc-button__content mpc-effect-type--none mpc-effect-side--none\"><span class=\"mpc-button__title mpc-transition\">Security Intelligence<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--slide mpc-effect-side--right\"><\/div><\/div><\/li><li class=\"mpc-tabs__nav-item mpc-parent-hover\" data-tab_id=\"1473566868825-3-10\"><div data-id=\"mpc_button-4569ec2eaec80d5\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_20 \" ><div class=\"mpc-button__content mpc-effect-type--none mpc-effect-side--none\"><span class=\"mpc-button__title mpc-transition\">Threat Management<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--slide mpc-effect-side--right\"><\/div><\/div><\/li><li class=\"mpc-tabs__nav-item mpc-parent-hover\" data-tab_id=\"1475732281047-5-2\"><div data-id=\"mpc_button-369ec2eaec9206\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_20 \" ><div class=\"mpc-button__content mpc-effect-type--none mpc-effect-side--none\"><span class=\"mpc-button__title mpc-transition\">Vulnerability Management<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--slide mpc-effect-side--right\"><\/div><\/div><\/li><\/ul><\/div><div class=\"mpc-tabs__content mpc-transition mpc-typography--mpc_preset_1\"><div class=\"mpc-tab mpc-container mpc-transition \" id=\"1473564475-1-24\" data-active=\"true\"><div class=\"mpc-tab__content\">[vc_column_text css=&#8221;.vc_custom_1637185740888{padding-bottom: 20px !important;}&#8221;]<strong>AlienVault<\/strong> is a company operating in the field of information security since 2007. AlienVault products protect businesses of all sizes against today&#8217;s most advanced threats.[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1637185751262{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h3><span style=\"color: #63ad22;\">AlienVault Network Security<\/span><\/h3>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1637185761547{padding-bottom: 20px !important;}&#8221;]All the mandatory security features you need are possible with the Unified Security Management platform. The fastest and easiest system to fully view the security status of your network and take action against vulnerabilities that threaten information security.[\/vc_column_text]<div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > See what&#039;s connected to your network.<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > Find sensitive systems and learn how to fix them.<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > Identify threats and behaviors with known malicious links.<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > Identify network behavior and identify suspicious activities.<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > Examine events with instantly linked data.<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > Use the step-by-step guide to learn the next step.<\/p>\n<\/div>[vc_empty_space height=&#8221;20px&#8221;]\t<div class=\"mkdf-video-banner-holder\">\n\t\t<a class=\"mkdf-video-banner-link\" href=\"https:\/\/www.youtube.com\/watch?v=rnfee7got6U\" data-rel=\"prettyPhoto[841270539]\">\n\t\t\t\t\t\t\t<img width=\"1680\" height=\"1050\" src=\"https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/AlienVault-USM-Overview.jpg\" class=\"attachment-full size-full\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/AlienVault-USM-Overview.jpg 1680w, https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/AlienVault-USM-Overview-300x188.jpg 300w, https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/AlienVault-USM-Overview-768x480.jpg 768w, https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/AlienVault-USM-Overview-1024x640.jpg 1024w\" sizes=\"(max-width: 1680px) 100vw, 1680px\" \/>\t\t\t\t\t\t<div class=\"mkdf-video-banner-overlay\">\n\t\t\t\t<div class=\"mkdf-vb-overlay-tb\">\n\t\t\t\t\t<div class=\"mkdf-vb-overlay-tc\">\n\t\t\t\t\t\t<span aria-hidden=\"true\" class=\"mkdf-icon-font-elegant arrow_triangle-right_alt2 mkdf-vb-play-icon\" ><\/span>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/a>\n\t<\/div>\n[vc_empty_space height=&#8221;20px&#8221;]<a href=\"https:\/\/www.proya.com.tr\/en\/contact\/\" title=\"PROYA Contact\"  data-id=\"mpc_button-5669ec2eaec54c6\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_20 mpc-display--block \" ><div class=\"mpc-button__content mpc-effect-type--none mpc-effect-side--none\"><span class=\"mpc-button__title mpc-transition\">Get Information Now<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--slide mpc-effect-side--right\"><\/div><\/a>[vc_empty_space height=&#8221;20px&#8221;]<\/div><\/div><div class=\"mpc-tab mpc-container mpc-transition \" id=\"1473610789367-5-5\" data-active=\"false\"><div class=\"mpc-tab__content\">[vc_column_text css=&#8221;.vc_custom_1637185949132{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h3><span style=\"color: #63ad22;\">AlienVault Compliance Manager<\/span><\/h3>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1637185987566{padding-bottom: 20px !important;}&#8221;]The secret to success is to simplify key security checks so that they can be performed automatically and regularly, effectively prioritizing remediation efforts and making visibility one. AlienVault Unified Security Management solutions automatically identify important audit activities, providing reports and alerts on those that require urgent action.<\/p>\n<p>AlienVault USM Compliance Benefits:[\/vc_column_text]<div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > Streamlines reporting and admin panels to make audits seamless.<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > It discovers all critical assets in your organization and continuously evaluates them for threats.<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > It detects threats with wireless, host-based and network-based IDS.<\/p>\n<\/div>[vc_empty_space height=&#8221;20px&#8221;]\t<div class=\"mkdf-video-banner-holder\">\n\t\t<a class=\"mkdf-video-banner-link\" href=\"https:\/\/www.youtube.com\/watch?v=LTa_c2C3rpQ\" data-rel=\"prettyPhoto[435474787]\">\n\t\t\t\t\t\t\t<img width=\"1298\" height=\"729\" src=\"https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/alien-vault-video-2.jpg\" class=\"attachment-full size-full\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/alien-vault-video-2.jpg 1298w, https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/alien-vault-video-2-300x168.jpg 300w, https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/alien-vault-video-2-768x431.jpg 768w, https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/alien-vault-video-2-1024x575.jpg 1024w\" sizes=\"(max-width: 1298px) 100vw, 1298px\" \/>\t\t\t\t\t\t<div class=\"mkdf-video-banner-overlay\">\n\t\t\t\t<div class=\"mkdf-vb-overlay-tb\">\n\t\t\t\t\t<div class=\"mkdf-vb-overlay-tc\">\n\t\t\t\t\t\t<span aria-hidden=\"true\" class=\"mkdf-icon-font-elegant arrow_triangle-right_alt2 mkdf-vb-play-icon\" ><\/span>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/a>\n\t<\/div>\n[vc_empty_space height=&#8221;20px&#8221;]<a href=\"https:\/\/www.proya.com.tr\/en\/contact\/\" title=\"PROYA Contact\"  data-id=\"mpc_button-1769ec2eaec6380\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_20 mpc-display--block \" ><div class=\"mpc-button__content mpc-effect-type--none mpc-effect-side--none\"><span class=\"mpc-button__title mpc-transition\">Hemen Bilgi Al\u0131n<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--slide mpc-effect-side--right\"><\/div><\/a>[vc_empty_space height=&#8221;20px&#8221;]<\/div><\/div><div class=\"mpc-tab mpc-container mpc-transition \" id=\"1473564475-2-93\" data-active=\"false\"><div class=\"mpc-tab__content\">[vc_column_text css=&#8221;.vc_custom_1637186135416{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h3><span style=\"color: #63ad22;\">AlienVault LOG Management &amp; SIEM<\/span><\/h3>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1637186143038{padding-bottom: 20px !important;}&#8221;]It offers an on-site SIEM with security controls and impeccable threat intelligence in AlienVault USM. Get critical information about your system upfront, making SIEM deployment significantly easier.[\/vc_column_text]<div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > SIEM \/ Event compatibility<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > Asset discovery and inventory<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > Sensitivity measurement<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > Finding violations<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > NetFlow visualization<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > It offers the full content of threats and a step-by-step response guide for attacks.<\/p>\n<\/div>[vc_empty_space height=&#8221;20px&#8221;]\t<div class=\"mkdf-video-banner-holder\">\n\t\t<a class=\"mkdf-video-banner-link\" href=\"https:\/\/www.youtube.com\/watch?v=XvXQSAPphK8\" data-rel=\"prettyPhoto[313346306]\">\n\t\t\t\t\t\t\t<img width=\"1297\" height=\"725\" src=\"https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/alien-vault-vid.jpg\" class=\"attachment-full size-full\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/alien-vault-vid.jpg 1297w, https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/alien-vault-vid-300x168.jpg 300w, https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/alien-vault-vid-768x429.jpg 768w, https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/alien-vault-vid-1024x572.jpg 1024w\" sizes=\"(max-width: 1297px) 100vw, 1297px\" \/>\t\t\t\t\t\t<div class=\"mkdf-video-banner-overlay\">\n\t\t\t\t<div class=\"mkdf-vb-overlay-tb\">\n\t\t\t\t\t<div class=\"mkdf-vb-overlay-tc\">\n\t\t\t\t\t\t<span aria-hidden=\"true\" class=\"mkdf-icon-font-elegant arrow_triangle-right_alt2 mkdf-vb-play-icon\" ><\/span>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/a>\n\t<\/div>\n[vc_empty_space height=&#8221;20px&#8221;]<a href=\"https:\/\/www.proya.com.tr\/en\/contact\/\" title=\"PROYA Contact\"  data-id=\"mpc_button-7169ec2eaec7576\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_20 mpc-display--block \" ><div class=\"mpc-button__content mpc-effect-type--none mpc-effect-side--none\"><span class=\"mpc-button__title mpc-transition\">Get Information Now<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--slide mpc-effect-side--right\"><\/div><\/a>[vc_empty_space height=&#8221;20px&#8221;]<\/div><\/div><div class=\"mpc-tab mpc-container mpc-transition \" id=\"1473566785280-2-8\" data-active=\"false\"><div class=\"mpc-tab__content\">[vc_column_text css=&#8221;.vc_custom_1637186321586{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h3><span style=\"color: #63ad22;\">AlienVault Security Intelligence<\/span><\/h3>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1637186332733{padding-bottom: 20px !important;}&#8221;]Security analysts are like detectives. During security issues and investigations, they have to find the answer to the &#8220;who&#8217;s guilty?&#8221; as fast as possible. This can be complicated, especially if the mountain of data is constantly being generated. Context is key: a single piece of information may mean nothing, but it can become an important piece of a large puzzle.<\/p>\n<p>Security intelligence is an important part of solving this puzzle. With a series of real-time events using the built-in mandatory security feature, AlienVault&#8217;s Unified Security Manager platform provides a view to see all the pieces of the puzzle at a glance.[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;]\t<div class=\"mkdf-video-banner-holder\">\n\t\t<a class=\"mkdf-video-banner-link\" href=\"https:\/\/www.youtube.com\/watch?v=I6E_5vSJLrk\" data-rel=\"prettyPhoto[1149040259]\">\n\t\t\t\t\t\t\t<img width=\"1297\" height=\"731\" src=\"https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/alien-vault-3.jpg\" class=\"attachment-full size-full\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/alien-vault-3.jpg 1297w, https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/alien-vault-3-300x169.jpg 300w, https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/alien-vault-3-768x433.jpg 768w, https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/alien-vault-3-1024x577.jpg 1024w\" sizes=\"(max-width: 1297px) 100vw, 1297px\" \/>\t\t\t\t\t\t<div class=\"mkdf-video-banner-overlay\">\n\t\t\t\t<div class=\"mkdf-vb-overlay-tb\">\n\t\t\t\t\t<div class=\"mkdf-vb-overlay-tc\">\n\t\t\t\t\t\t<span aria-hidden=\"true\" class=\"mkdf-icon-font-elegant arrow_triangle-right_alt2 mkdf-vb-play-icon\" ><\/span>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/a>\n\t<\/div>\n[vc_empty_space height=&#8221;20px&#8221;]<a href=\"https:\/\/www.proya.com.tr\/en\/contact\/\" title=\"PROYA Contact\"  data-id=\"mpc_button-2169ec2eaec7fbb\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_20 mpc-display--block \" ><div class=\"mpc-button__content mpc-effect-type--none mpc-effect-side--none\"><span class=\"mpc-button__title mpc-transition\">Get Information Now<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--slide mpc-effect-side--right\"><\/div><\/a>[vc_empty_space height=&#8221;20px&#8221;]<\/div><\/div><div class=\"mpc-tab mpc-container mpc-transition \" id=\"1473566868825-3-10\" data-active=\"false\"><div class=\"mpc-tab__content\">[vc_column_text css=&#8221;.vc_custom_1637186443716{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h3><span style=\"color: #63ad22;\">AlienVault Threat Management<\/span><\/h3>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1637186459077{padding-bottom: 20px !important;}&#8221;]Today, organizations face a harsh reality with threat management. The global scene of risks is expanding rapidly, but safety budgets are only sparingly. When organizations recognize that they cannot completely cover the gaps with the budget they have, they must go beyond traditional methods and change their approach to security programs. Regular incident response helps organizations prepare for impending dangers, mitigate the impact when they occur, and bring a bitcoin-friendly refresh to their security programs.<\/p>\n<p>Thanks to AlienVault USM&#8217;s threat manager:[\/vc_column_text]<div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > By identifying and eliminating indicators of vulnerabilities, you can then learn about their causes.<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > You can better coordinate your blocking efforts by discovering the information of your assets with the vulnerability scanning included.<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > Respond to upcoming threats with a detailed and tailored \u201chow-to\u201d guide.<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > Check that existing security controls are working properly.<\/p>\n<\/div>[vc_empty_space height=&#8221;20px&#8221;]\t<div class=\"mkdf-video-banner-holder\">\n\t\t<a class=\"mkdf-video-banner-link\" href=\"https:\/\/www.youtube.com\/watch?v=esrKC_DzVCc\" data-rel=\"prettyPhoto[153395617]\">\n\t\t\t\t\t\t\t<img width=\"1298\" height=\"726\" src=\"https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/alien-vault-4.jpg\" class=\"attachment-full size-full\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/alien-vault-4.jpg 1298w, https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/alien-vault-4-300x168.jpg 300w, https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/alien-vault-4-768x430.jpg 768w, https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/alien-vault-4-1024x573.jpg 1024w\" sizes=\"(max-width: 1298px) 100vw, 1298px\" \/>\t\t\t\t\t\t<div class=\"mkdf-video-banner-overlay\">\n\t\t\t\t<div class=\"mkdf-vb-overlay-tb\">\n\t\t\t\t\t<div class=\"mkdf-vb-overlay-tc\">\n\t\t\t\t\t\t<span aria-hidden=\"true\" class=\"mkdf-icon-font-elegant arrow_triangle-right_alt2 mkdf-vb-play-icon\" ><\/span>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/a>\n\t<\/div>\n[vc_empty_space height=&#8221;20px&#8221;]<a href=\"https:\/\/www.proya.com.tr\/en\/contact\/\" title=\"PROYA Contact\"  data-id=\"mpc_button-3469ec2eaec90fb\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_20 mpc-display--block \" ><div class=\"mpc-button__content mpc-effect-type--none mpc-effect-side--none\"><span class=\"mpc-button__title mpc-transition\">Get Information Now<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--slide mpc-effect-side--right\"><\/div><\/a>[vc_empty_space height=&#8221;20px&#8221;]<\/div><\/div><div class=\"mpc-tab mpc-container mpc-transition \" id=\"1475732281047-5-2\" data-active=\"false\"><div class=\"mpc-tab__content\">[vc_column_text css=&#8221;.vc_custom_1637186632972{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h3><span style=\"color: #63ad22;\">AlienVault Vulnerability Management<\/span><\/h3>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1637186643193{padding-bottom: 20px !important;}&#8221;]After identifying the vulnerabilities, remediation will be required. Remediation should be on the urgent to-do list, as thousands of vulnerabilities are discovered each year and seemingly endless security updates and patches are required. Vulnerability management is never &#8220;done&#8221;. Effective vulnerability management requires constant effort as new vulnerabilities are constantly discovered and organizations&#8217; IT structures change over time.<\/p>\n<p>With Vulnerability Manager:[\/vc_column_text]<div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > You can do asset discovery, vulnerability assessment, IDS, SIEM, and what streaming in one console.<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > With constant updates, you can add new rulesets, signatures, reports, etc. remains valid.<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > It offers full threat content and a step-by-step guide to response to attacks.<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > Collects and presents data in less than an hour.<\/p>\n<\/div>[vc_empty_space height=&#8221;20px&#8221;]\t<div class=\"mkdf-video-banner-holder\">\n\t\t<a class=\"mkdf-video-banner-link\" href=\"https:\/\/www.youtube.com\/watch?v=xCzokmrC6go\" data-rel=\"prettyPhoto[562997508]\">\n\t\t\t\t\t\t\t<img width=\"1297\" height=\"726\" src=\"https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/alien-vault-6.jpg\" class=\"attachment-full size-full\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/alien-vault-6.jpg 1297w, https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/alien-vault-6-300x168.jpg 300w, https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/alien-vault-6-768x430.jpg 768w, https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/alien-vault-6-1024x573.jpg 1024w\" sizes=\"(max-width: 1297px) 100vw, 1297px\" \/>\t\t\t\t\t\t<div class=\"mkdf-video-banner-overlay\">\n\t\t\t\t<div class=\"mkdf-vb-overlay-tb\">\n\t\t\t\t\t<div class=\"mkdf-vb-overlay-tc\">\n\t\t\t\t\t\t<span aria-hidden=\"true\" class=\"mkdf-icon-font-elegant arrow_triangle-right_alt2 mkdf-vb-play-icon\" ><\/span>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/a>\n\t<\/div>\n[vc_empty_space height=&#8221;20px&#8221;]<a href=\"https:\/\/www.proya.com.tr\/en\/contact\/\" title=\"PROYA Contact\"  data-id=\"mpc_button-3869ec2eaeca6e2\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_20 mpc-display--block \" ><div class=\"mpc-button__content mpc-effect-type--none mpc-effect-side--none\"><span class=\"mpc-button__title mpc-transition\">Get Information Now<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--slide mpc-effect-side--right\"><\/div><\/a>[vc_empty_space height=&#8221;20px&#8221;]<\/div><\/div><\/div><\/div>[\/vc_column][vc_column width=&#8221;1\/4&#8243; enable_sticky=&#8221;true&#8221; sticky_offset=&#8221;100&#8243; css=&#8221;.vc_custom_1475888554514{padding-right: 10% !important;padding-left: 10% !important;border-radius: 5px !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1637184260107{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h6><span style=\"color: #63ad22; font-weight: 500;\">SCREENSHOTS<\/span><\/h6>\n<p>[\/vc_column_text]<div class=\"mpc-carousel__wrapper mpc-waypoint\"><div id=\"mpc_carousel_slider-9969ec2eaeca8f5\" class=\"mpc-carousel-slider mpc-init mpc-effect--none  mpc-overlay--fade\"  data-mpcslick='{\"infinite\":true,\"autoplay\":true,\"slidesToShow\":3,\"slidesToScroll\":1,\"centerMode\":false,\"initialSlide\":0,\"autoplaySpeed\":1000,\"variableWidth\":true,\"rows\":1}' data-slick-cols=\"3\" data-align=\"middle-center\"><div onclick=\"\" class=\"mpc-carousel__item-wrapper\"><div class=\"mpc-item mpc-transition\"><div class=\"mpc-border\"><\/div><img width=\"760\" height=\"456\" src=\"https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/screen1.png\" class=\"mpc-transition attachment-large\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/screen1.png 760w, https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/screen1-300x180.png 300w\" sizes=\"(max-width: 760px) 100vw, 760px\" \/><div class=\"mpc-item-overlay mpc-transition\"><div class=\"mpc-overlay--vertical-wrap\"><div class=\"mpc-overlay--vertical\"><a href=\"https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/screen1.png\" rel=\"mpc[mpc_carousel_slider-9969ec2eaeca8f5]\" class=\"mpc-icon-anchor mpc-magnific-popup\"><i class=\"mpc-item-overlay__icon mpc-type--lightbox lnr lnr-magnifier mpc-icon--icon\"><\/i><\/a><\/div><\/div><\/div><\/div><\/div><div onclick=\"\" class=\"mpc-carousel__item-wrapper\"><div class=\"mpc-item mpc-transition\"><div class=\"mpc-border\"><\/div><img width=\"760\" height=\"456\" src=\"https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/screen2.png\" class=\"mpc-transition attachment-large\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/screen2.png 760w, https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/screen2-300x180.png 300w\" sizes=\"(max-width: 760px) 100vw, 760px\" \/><div class=\"mpc-item-overlay mpc-transition\"><div class=\"mpc-overlay--vertical-wrap\"><div class=\"mpc-overlay--vertical\"><a href=\"https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/screen2.png\" rel=\"mpc[mpc_carousel_slider-9969ec2eaeca8f5]\" class=\"mpc-icon-anchor mpc-magnific-popup\"><i class=\"mpc-item-overlay__icon mpc-type--lightbox lnr lnr-magnifier mpc-icon--icon\"><\/i><\/a><\/div><\/div><\/div><\/div><\/div><div onclick=\"\" class=\"mpc-carousel__item-wrapper\"><div class=\"mpc-item mpc-transition\"><div class=\"mpc-border\"><\/div><img width=\"760\" height=\"456\" src=\"https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/screen3.png\" class=\"mpc-transition attachment-large\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/screen3.png 760w, https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/screen3-300x180.png 300w\" sizes=\"(max-width: 760px) 100vw, 760px\" \/><div class=\"mpc-item-overlay mpc-transition\"><div class=\"mpc-overlay--vertical-wrap\"><div class=\"mpc-overlay--vertical\"><a href=\"https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/screen3.png\" rel=\"mpc[mpc_carousel_slider-9969ec2eaeca8f5]\" class=\"mpc-icon-anchor mpc-magnific-popup\"><i class=\"mpc-item-overlay__icon mpc-type--lightbox lnr lnr-magnifier mpc-icon--icon\"><\/i><\/a><\/div><\/div><\/div><\/div><\/div><div onclick=\"\" class=\"mpc-carousel__item-wrapper\"><div class=\"mpc-item mpc-transition\"><div class=\"mpc-border\"><\/div><img width=\"760\" height=\"456\" src=\"https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/screen4.png\" class=\"mpc-transition attachment-large\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/screen4.png 760w, https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/screen4-300x180.png 300w\" sizes=\"(max-width: 760px) 100vw, 760px\" \/><div class=\"mpc-item-overlay mpc-transition\"><div class=\"mpc-overlay--vertical-wrap\"><div class=\"mpc-overlay--vertical\"><a href=\"https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/screen4.png\" rel=\"mpc[mpc_carousel_slider-9969ec2eaeca8f5]\" class=\"mpc-icon-anchor mpc-magnific-popup\"><i class=\"mpc-item-overlay__icon mpc-type--lightbox lnr lnr-magnifier mpc-icon--icon\"><\/i><\/a><\/div><\/div><\/div><\/div><\/div><div onclick=\"\" class=\"mpc-carousel__item-wrapper\"><div class=\"mpc-item mpc-transition\"><div class=\"mpc-border\"><\/div><img width=\"760\" height=\"456\" src=\"https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/screen5.png\" class=\"mpc-transition attachment-large\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/screen5.png 760w, https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/screen5-300x180.png 300w\" sizes=\"(max-width: 760px) 100vw, 760px\" \/><div class=\"mpc-item-overlay mpc-transition\"><div class=\"mpc-overlay--vertical-wrap\"><div class=\"mpc-overlay--vertical\"><a href=\"https:\/\/www.proya.com.tr\/wp-content\/uploads\/2016\/10\/screen5.png\" rel=\"mpc[mpc_carousel_slider-9969ec2eaeca8f5]\" class=\"mpc-icon-anchor mpc-magnific-popup\"><i class=\"mpc-item-overlay__icon mpc-type--lightbox lnr lnr-magnifier mpc-icon--icon\"><\/i><\/a><\/div><\/div><\/div><\/div><\/div><span class=\"mpc-carousel__count mpc-typography--mpc_preset_1 mpc-align--bottom-right\" data-current-slide=\"1\" data-slides-amount=\"5\">\/<\/span><\/div><div class=\"mpc-navigation mpc-init mpc-align--left mpc-navigation--style_5 mpc-on-hover  mpc-nav-preset--mpc_preset_19\" data-mpcslider=\"mpc_carousel_slider-9969ec2eaeca8f5\"><div class=\"mpc-nav__arrow mpcslick-prev\"><div class=\"mpc-nav__icon mpc-transition\"><i class=\" eti eti_arrow_carrot-left\"><div class=\"mpc-nav__background mpc-transition mpc-effect-type--slide mpc-effect-side--bottom\"><\/div><\/i><\/div><\/div><\/div><div class=\"mpc-navigation mpc-init mpc-align--left mpc-navigation--style_5 mpc-on-hover  mpc-nav-preset--mpc_preset_19\" data-mpcslider=\"mpc_carousel_slider-9969ec2eaeca8f5\"><div class=\"mpc-nav__arrow mpcslick-next\"><div class=\"mpc-nav__icon mpc-transition\"><i class=\" eti eti_arrow_carrot-right\"><div class=\"mpc-nav__background mpc-transition mpc-effect-type--slide mpc-effect-side--bottom\"><\/div><\/i><\/div><\/div><\/div><\/div>[vc_empty_space height=&#8221;20px&#8221;][\/vc_column][\/vc_row][vc_row enable_bottom_separator=&#8221;true&#8221; bottom_separator_style=&#8221;arrow-right&#8221; bottom_separator_color=&#8221;#e6e4e4&#8243;][vc_column][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1637183847391{padding-left: 5% !important;background-image: url(https:\/\/www.proya.com.tr\/wp-content\/uploads\/2021\/11\/alien-vault-header.jpg?id=15551) !important;}&#8221;][vc_column css=&#8221;.vc_custom_1474490360423{padding-right: 9% !important;}&#8221;][vc_empty_space height=&#8221;30px&#8221;][vc_column_text] AlienVault [\/vc_column_text][vc_column_text] Unified Security Management &amp; Threat Intelligence [\/vc_column_text][vc_empty_space height=&#8221;60px&#8221;][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243;][\/vc_column][vc_column width=&#8221;1\/4&#8243; enable_sticky=&#8221;true&#8221; sticky_offset=&#8221;100&#8243; css=&#8221;.vc_custom_1475888554514{padding-right: 10% !important;padding-left: 10% !important;border-radius: 5px !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1637184260107{padding-bottom: 20px !important;}&#8221;] SCREENSHOTS [\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][\/vc_column][\/vc_row][vc_row enable_bottom_separator=&#8221;true&#8221; bottom_separator_style=&#8221;arrow-right&#8221; bottom_separator_color=&#8221;#e6e4e4&#8243;][vc_column][\/vc_column][\/vc_row]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full-width.php","meta":[],"categories":[],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/pages\/15554"}],"collection":[{"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/comments?post=15554"}],"version-history":[{"count":0,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/pages\/15554\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/media?parent=15554"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/categories?post=15554"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/tags?post=15554"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}