{"id":16518,"date":"2024-12-08T15:14:35","date_gmt":"2024-12-08T12:14:35","guid":{"rendered":"https:\/\/www.proya.com.tr\/veriket\/"},"modified":"2024-12-08T19:15:35","modified_gmt":"2024-12-08T16:15:35","slug":"veriket","status":"publish","type":"page","link":"https:\/\/www.proya.com.tr\/en\/veriket\/","title":{"rendered":"Veriket"},"content":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1733660071553{padding-left: 5% !important;background-image: url(https:\/\/www.proya.com.tr\/wp-content\/uploads\/2024\/12\/veriket-proya-header.jpg?id=16516) !important;}&#8221;][vc_column css=&#8221;.vc_custom_1474490360423{padding-right: 9% !important;}&#8221;][vc_empty_space height=&#8221;30px&#8221;][vc_column_text]<\/p>\n<h3><span style=\"color: #ffffff;\">Veriket Discovery Tool<\/span><\/h3>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h5><span style=\"color: #ffffff; font-weight: 400;\">Identify, Classify, and Protect Sensitive Data in Your Organization<\/span><\/h5>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;60px&#8221;][\/vc_column][\/vc_row][vc_row enable_top_separator=&#8221;true&#8221; top_separator_style=&#8221;slope-right&#8221; top_separator_color=&#8221;#e6e4e4&#8243;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1476278814474{padding-right: 10% !important;padding-left: 10% !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1733660473062{padding-bottom: 10px !important;}&#8221;]<\/p>\n<h2>Challenges of Data Distribution<\/h2>\n<p> <strong>Sensitive data<\/strong> resides in various environments such as computers, file-sharing platforms, email systems (Exchange, Outlook), and cloud services. Organizing, <strong>securing<\/strong>, and monitoring this data is a critical need. Managing <strong>file and folder access permissions manually<\/strong> is both cumbersome and time-consuming. Additionally, complying with legal standards such as <strong>PII, PHI, and PCI<\/strong> requires identifying not only structured data but also <strong>unstructured data<\/strong>.<br \/>\n<strong>Veriket<\/strong> helps organizations identify their sensitive data, analyze its usage, and take <strong>preventive measures against data breaches<\/strong> with its data discovery capabilities.<\/p>\n<h2>What is the Veriket Discovery Tool?<\/h2>\n<p> The <strong>Veriket Discovery Tool<\/strong> scans both structured and unstructured data to detect sensitive information across the following platforms: <\/p>\n<ul>\n<li><strong>Personal Computers (PCs)<\/strong><\/li>\n<li><strong>File-Sharing Platforms<\/strong><\/li>\n<li><strong>Email Systems<\/strong> (Exchange, Outlook, Gmail, OWA, Zimbra)<\/li>\n<li><strong>Cloud Services<\/strong> (Google Drive, OneDrive, Office 365, SharePoint)<\/li>\n<li><strong>Database Systems<\/strong><\/li>\n<\/ul>\n<p> <strong>Scanning processes<\/strong> can be run in batches, and the results are presented in detailed reports. These reports include information such as the location, type, handlers, and last accessed time of the files. <\/p>\n<h2>Key Advantages<\/h2>\n<ol style=\"padding-left: 0; list-style-type: none;\">\n<li><strong>1. No Additional Hardware Required<\/strong>\n<ul style=\"list-style-type: circle; margin-left: 20px;\">\n<li>Managed centrally via the Veriket Management Console without the need for servers or additional hardware.<\/li>\n<\/ul>\n<\/li>\n<li><strong>2. Automatic Data Classification<\/strong>\n<ul style=\"list-style-type: circle; margin-left: 20px;\">\n<li>Automatically classifies files based on their content and location.<\/li>\n<\/ul>\n<\/li>\n<li><strong>3. Centralized Policy Management<\/strong>\n<ul style=\"list-style-type: circle; margin-left: 20px;\">\n<li>Securely controls structured and unstructured data pools through centralized management.<\/li>\n<\/ul>\n<\/li>\n<li><strong>4. Online and Offline Support<\/strong>\n<ul style=\"list-style-type: circle; margin-left: 20px;\">\n<li>The tool works seamlessly in environments with or without internet connectivity.<\/li>\n<\/ul>\n<\/li>\n<li><strong>5. Fully Compatible with All Platforms<\/strong>\n<ul style=\"list-style-type: circle; margin-left: 20px;\">\n<li>Compatible with Windows, Linux\/Pardus, and Mac operating systems.<\/li>\n<\/ul>\n<\/li>\n<li><strong>6. High-Performance Scanning<\/strong>\n<ul style=\"list-style-type: circle; margin-left: 20px;\">\n<li>Scans data at a rate of 5 GB per minute using multi-threading technology.<\/li>\n<\/ul>\n<\/li>\n<li><strong>7. Resource Management<\/strong>\n<ul style=\"list-style-type: circle; margin-left: 20px;\">\n<li>Allows CPU usage to be limited during discovery; for example, it can be configured to use a maximum of 50%.<\/li>\n<\/ul>\n<\/li>\n<li><strong>8. Integration with DLP and DRM Solutions<\/strong>\n<ul style=\"list-style-type: circle; margin-left: 20px;\">\n<li>Integrates with DLP and DRM solutions to protect sensitive data.<\/li>\n<\/ul>\n<\/li>\n<li><strong>9. Cloud-Based Deployment<\/strong>\n<ul style=\"list-style-type: circle; margin-left: 20px;\">\n<li>Can be used via the SaaS model when needed.<\/li>\n<\/ul>\n<\/li>\n<li><strong>10. Solution for Group Companies<\/strong>\n<ul style=\"list-style-type: circle; margin-left: 20px;\">\n<li>Allows independent management of multiple subsidiaries from a single center (Tenant Management).<\/li>\n<\/ul>\n<\/li>\n<li><strong>11. Scheduling and Tagging<\/strong>\n<ul style=\"list-style-type: circle; margin-left: 20px;\">\n<li>Scans can be scheduled for specific dates and tags can be added to files simultaneously.<\/li>\n<\/ul>\n<\/li>\n<li><strong>12. Remote Scanning Capabilities<\/strong>\n<ul style=\"list-style-type: circle; margin-left: 20px;\">\n<li>Performs remote scans without installing agents on devices using FTP, SFTP, SSH, SMB protocols.<\/li>\n<\/ul>\n<\/li>\n<li><strong>13. OCR Technology<\/strong>\n<ul style=\"list-style-type: circle; margin-left: 20px;\">\n<li>Analyzes visual documents to identify text-based content.<\/li>\n<\/ul>\n<\/li>\n<li><strong>14. Compressed File Support<\/strong>\n<ul style=\"list-style-type: circle; margin-left: 20px;\">\n<li>Performs content analysis by scanning compressed files such as RAR, ZIP, 7ZIP, including all sub-levels.<\/li>\n<\/ul>\n<\/li>\n<li><strong>15. Dynamic Tagging<\/strong>\n<ul style=\"list-style-type: circle; margin-left: 20px;\">\n<li>Adds dynamic text (e.g., machine name, username, sensitivity level) to MS Office or PDF documents via headers\/footers and watermarks.<\/li>\n<\/ul>\n<\/li>\n<li><strong>16. Data Backup and Encryption<\/strong>\n<ul style=\"list-style-type: circle; margin-left: 20px;\">\n<li>Ensures critical sensitive files are backed up and encrypted.<\/li>\n<\/ul>\n<\/li>\n<li><strong>17. Data Masking<\/strong>\n<ul style=\"list-style-type: circle; margin-left: 20px;\">\n<li>Applies masking to sensitive data when logged to ensure protection.<\/li>\n<\/ul>\n<\/li>\n<li><strong>18. Error Detection<\/strong>\n<ul style=\"list-style-type: circle; margin-left: 20px;\">\n<li>Detects potential typos in documents through syntax checking.<\/li>\n<\/ul>\n<\/li>\n<li><strong>19. Control of Discovery Processes<\/strong>\n<ul style=\"list-style-type: circle; margin-left: 20px;\">\n<li>Enables real-time management of scanning processes with Start, Stop, and Cancel options.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<h2>Conclusion<\/h2>\n<p> The <strong>Veriket Discovery Tool<\/strong> enables organizations to quickly, effectively, and securely identify, classify, and protect their sensitive data. Its user-friendly interface, high-performance scanning speed, and advanced features simplify your data security processes and provide centralized management capabilities.<\/p>\n<p>[\/vc_column_text][vc_empty_space][vc_single_image image=&#8221;16514&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space]<a href=\"https:\/\/www.proya.com.tr\/iletisim\/\" title=\"Proya \u0130leti\u015fim\"  data-id=\"mpc_button-8269dd317e330e2\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_20 mpc-display--block \" ><div class=\"mpc-button__content mpc-effect-type--none mpc-effect-side--none\"><span class=\"mpc-button__title mpc-transition\">Hemen Bilgi Al\u0131n<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--slide mpc-effect-side--right\"><\/div><\/a>[vc_empty_space][\/vc_column][vc_column width=&#8221;1\/4&#8243; enable_sticky=&#8221;true&#8221; sticky_offset=&#8221;100&#8243; css=&#8221;.vc_custom_1476278940659{padding-right: 10% !important;padding-left: 10% !important;border-radius: 5px !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1475715004235{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h6><span style=\"color: #294b8b; font-weight: 500;\"> D\u0130\u011eER \u00dcRET\u0130C\u0130LER<\/span><\/h6>\n<p>[\/vc_column_text]<a href=\"http:\/\/www.proya.com.tr\/ivanti\" title=\"Heat Software\"  data-id=\"mpc_button-7769dd317e3329e\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_16 mpc-display--block \" ><div class=\"mpc-button__content mpc-effect-type--stay mpc-effect-side--left\"><i class=\"mpc-button__icon mpc-transition  icnm icnm-IcoMoon\"><\/i><span class=\"mpc-button__title mpc-transition\">Ivanti<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--fade mpc-effect-side--in\"><\/div><\/a><a href=\"http:\/\/www.proya.com.tr\/beyondtrust\/\" title=\"beyondtrust\"  data-id=\"mpc_button-2569dd317e3339e\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_16 mpc-display--block \" ><div class=\"mpc-button__content mpc-effect-type--stay mpc-effect-side--left\"><i class=\"mpc-button__icon mpc-transition  icnm icnm-play2\"><\/i><span class=\"mpc-button__title mpc-transition\">BeyondTrust<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--fade mpc-effect-side--in\"><\/div><\/a><a href=\"http:\/\/www.proya.com.tr\/alien-vault\/\" title=\"alien vault\"  data-id=\"mpc_button-3169dd317e3468a\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_16 mpc-display--block \" ><div class=\"mpc-button__content mpc-effect-type--stay mpc-effect-side--left\"><i class=\"mpc-button__icon mpc-transition  icnm icnm-reddit\"><\/i><span class=\"mpc-button__title mpc-transition\">AlienVault<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--fade mpc-effect-side--in\"><\/div><\/a><a href=\"https:\/\/www.proya.com.tr\/forescout\/\" title=\"ForeScout\"  data-id=\"mpc_button-3069dd317e348c1\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_16 mpc-display--block \" ><div class=\"mpc-button__content mpc-effect-type--stay mpc-effect-side--left\"><i class=\"mpc-button__icon mpc-transition  lnr lnr-eye\"><\/i><span class=\"mpc-button__title mpc-transition\">ForeScout<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--fade mpc-effect-side--in\"><\/div><\/a><a href=\"http:\/\/www.proya.com.tr\/mojo\/\" title=\"mojo\"  data-id=\"mpc_button-1469dd317e349cc\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_16 mpc-display--block \" ><div class=\"mpc-button__content mpc-effect-type--stay mpc-effect-side--left\"><i class=\"mpc-button__icon mpc-transition  fa fa-angle-double-up\"><\/i><span class=\"mpc-button__title mpc-transition\">Mojo (Airtight)<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--fade mpc-effect-side--in\"><\/div><\/a>[vc_empty_space][\/vc_column][\/vc_row][vc_row enable_bottom_separator=&#8221;true&#8221; bottom_separator_style=&#8221;arrow-right&#8221; bottom_separator_color=&#8221;#e6e4e4&#8243;][vc_column][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1733660071553{padding-left: 5% !important;background-image: url(https:\/\/www.proya.com.tr\/wp-content\/uploads\/2024\/12\/veriket-proya-header.jpg?id=16516) !important;}&#8221;][vc_column css=&#8221;.vc_custom_1474490360423{padding-right: 9% !important;}&#8221;][vc_empty_space height=&#8221;30px&#8221;][vc_column_text] Veriket Discovery Tool [\/vc_column_text][vc_column_text] Identify, Classify, and Protect Sensitive Data in Your Organization [\/vc_column_text][vc_empty_space height=&#8221;60px&#8221;][\/vc_column][\/vc_row][vc_row enable_top_separator=&#8221;true&#8221; top_separator_style=&#8221;slope-right&#8221; top_separator_color=&#8221;#e6e4e4&#8243;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1476278814474{padding-right: 10% !important;padding-left: 10% !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1733660473062{padding-bottom: 10px !important;}&#8221;] Challenges of Data<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full-width.php","meta":[],"categories":[118,119],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/pages\/16518"}],"collection":[{"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/comments?post=16518"}],"version-history":[{"count":2,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/pages\/16518\/revisions"}],"predecessor-version":[{"id":16520,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/pages\/16518\/revisions\/16520"}],"wp:attachment":[{"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/media?parent=16518"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/categories?post=16518"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/tags?post=16518"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}