{"id":32244,"date":"2025-07-08T21:34:07","date_gmt":"2025-07-08T18:34:07","guid":{"rendered":"https:\/\/gifted-raman.185-169-55-137.plesk.page\/?page_id=32244"},"modified":"2026-03-24T02:38:56","modified_gmt":"2026-03-23T23:38:56","slug":"siber-guvenlik","status":"publish","type":"page","link":"https:\/\/gifted-raman.185-169-55-137.plesk.page\/en\/siber-guvenlik\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"32244\" class=\"elementor elementor-32244\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-caa540f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"caa540f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-12cb4cc\" data-id=\"12cb4cc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-686d456 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"686d456\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-af166ba\" data-id=\"af166ba\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-65a2ad4 elementor-widget elementor-widget-section-title\" data-id=\"65a2ad4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"section-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t\r\n\t\t\t<div class=\"section-title style18 left\">\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t \r\n\t\t\t\t\t<h3 class=\"title\">Dijital Altyap\u0131n\u0131z\u0131 Modern Siber Tehditlere Kar\u015f\u0131 Koruyun<\/h3>\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t \r\n\t\t\t\t\t<p class=\"description\">Siber g\u00fcvenlik; kurumlar\u0131n sunucu, a\u011f, bulut ve uygulama altyap\u0131lar\u0131n\u0131 siber tehditlere kar\u015f\u0131 korumak i\u00e7in uygulanan teknik ve operasyonel g\u00fcvenlik s\u00fcre\u00e7lerinin b\u00fct\u00fcn\u00fcd\u00fcr.\n\nElsa olarak g\u00fcvenli\u011fi yaln\u0131zca bir \u00fcr\u00fcn veya ara\u00e7 olarak ele almay\u0131z. Risk analizi, g\u00fcvenlik mimarisi tasar\u0131m\u0131, s\u00fcrekli izleme ve m\u00fcdahale s\u00fcre\u00e7leri ile kurumsal BT altyap\u0131s\u0131n\u0131 b\u00fct\u00fcnsel bir yakla\u015f\u0131mla koruruz.\n\nAmac\u0131m\u0131z; sald\u0131r\u0131lar\u0131 yaln\u0131zca tespit etmek de\u011fil, riskleri olu\u015fmadan \u00f6nce g\u00f6r\u00fcn\u00fcr hale getirmektir.<\/p>\r\n\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-deac222 aboutss elementor-widget elementor-widget-dit-button\" data-id=\"deac222\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"dit-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t\t<div class=\"dreamit-button style13\">\r\n\t\t\t\t\t<div class=\"dreamit-button\">\r\n\t\t\t\t\t    <div class=\"btn_button\">\r\n    \t\t\t\t\t\t<a  class=\"button\" href=\"https:\/\/gifted-raman.185-169-55-137.plesk.page\/en\/iletisim\/\">\r\n    \t\t\t\t\t        Birlikte Planlayal\u0131m    \t\t\t\t\t        <i class=\"flaticon flaticon-right-arrow\"><\/i>\r\n    \t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\r\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-918f805\" data-id=\"918f805\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3aa214e elementor-widget elementor-widget-image\" data-id=\"3aa214e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/gifted-raman.185-169-55-137.plesk.page\/wp-content\/uploads\/2026\/03\/elsa-cyber-security-2-1024x576.webp\" class=\"attachment-large size-large wp-image-34179\" alt=\"\" srcset=\"https:\/\/gifted-raman.185-169-55-137.plesk.page\/wp-content\/uploads\/2026\/03\/elsa-cyber-security-2-1024x576.webp 1024w, https:\/\/gifted-raman.185-169-55-137.plesk.page\/wp-content\/uploads\/2026\/03\/elsa-cyber-security-2-300x169.webp 300w, https:\/\/gifted-raman.185-169-55-137.plesk.page\/wp-content\/uploads\/2026\/03\/elsa-cyber-security-2-768x432.webp 768w, https:\/\/gifted-raman.185-169-55-137.plesk.page\/wp-content\/uploads\/2026\/03\/elsa-cyber-security-2-1536x864.webp 1536w, https:\/\/gifted-raman.185-169-55-137.plesk.page\/wp-content\/uploads\/2026\/03\/elsa-cyber-security-2-18x10.webp 18w, https:\/\/gifted-raman.185-169-55-137.plesk.page\/wp-content\/uploads\/2026\/03\/elsa-cyber-security-2.webp 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-13e9128 elementor-widget elementor-widget-html\" data-id=\"13e9128\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elsa-top-services-section\">\n    <div class=\"elsa-top-services-grid\">\n        <div class=\"elsa-top-card\">\n            <div class=\"elsa-top-icon\"><i class=\"fas fa-shield-virus\"><\/i><\/div>\n            <h3 class=\"elsa-top-title\">Y\u00f6netilen G\u00fcvenlik Hizmetleri (MDR\/SOC)<\/h3>\n            <p class=\"elsa-top-desc\">Kurumsal BT altyap\u0131s\u0131nda olu\u015fan g\u00fcvenlik olaylar\u0131n\u0131 7\/24 izleyen ve m\u00fcdahale eden y\u00f6netilen g\u00fcvenlik hizmetleri sunuyoruz. Tehdit istihbarat\u0131, log analizi ve olay korelasyonu ile potansiyel sald\u0131r\u0131 giri\u015fimleri erken a\u015famada tespit edilir. G\u00fcvenlik analistleri olaylar\u0131 de\u011ferlendirir ve gerekli m\u00fcdahaleleri ger\u00e7ekle\u015ftirir. Bu yakla\u015f\u0131m kurumlar\u0131n g\u00fcvenlik operasyonlar\u0131n\u0131 s\u00fcrekli ve merkezi bir \u015fekilde y\u00f6netmesini sa\u011flar.<\/p>\n        <\/div>\n        <div class=\"elsa-top-card\">\n            <div class=\"elsa-top-icon\"><i class=\"fas fa-cloud-meatball\"><\/i><\/div>\n            <h3 class=\"elsa-top-title\">Cloud and SASE Security<\/h3>\n            <p class=\"elsa-top-desc\">Hibrit ve \u00e7oklu bulut ortamlar\u0131nda g\u00fcvenli eri\u015fim mimarisi kuruyoruz. Secure Access Service Edge (SASE) yakla\u015f\u0131m\u0131 ile kullan\u0131c\u0131 eri\u015fimleri, a\u011f g\u00fcvenli\u011fi ve bulut uygulamalar\u0131 tek bir g\u00fcvenlik \u00e7er\u00e7evesi alt\u0131nda y\u00f6netilir. AWS, Azure ve Google Cloud gibi platformlarda g\u00fcvenli eri\u015fim politikalar\u0131 uygulan\u0131r. Ama\u00e7; kullan\u0131c\u0131lar\u0131n nereden ba\u011fland\u0131\u011f\u0131ndan ba\u011f\u0131ms\u0131z olarak g\u00fcvenli eri\u015fim sa\u011flamakt\u0131r.<\/p>\n        <\/div>\n        <div class=\"elsa-top-card\">\n            <div class=\"elsa-top-icon\"><i class=\"fas fa-user-lock\"><\/i><\/div>\n            <h3 class=\"elsa-top-title\">Zero Trust G\u00fcvenlik Mimarisi<\/h3>\n            <p class=\"elsa-top-desc\">Zero Trust yakla\u015f\u0131m\u0131, a\u011f i\u00e7i veya d\u0131\u015f\u0131 hi\u00e7bir eri\u015fime varsay\u0131lan g\u00fcven verilmemesi prensibine dayan\u0131r. Kimlik do\u011frulama, rol bazl\u0131 eri\u015fim kontrol\u00fc ve \u00e7ok fakt\u00f6rl\u00fc do\u011frulama mekanizmalar\u0131 ile eri\u015fimler s\u00fcrekli do\u011frulan\u0131r. Bu yakla\u015f\u0131m, yetkisiz eri\u015fim riskini azalt\u0131r ve kurumsal a\u011f\u0131n g\u00fcvenli\u011fini art\u0131r\u0131r.<\/p>\n        <\/div>\n    <\/div>\n<\/div>\n\n<div class=\"elsa-process-section\">\n    <h2 class=\"elsa-process-main-title\">Siber G\u00fcvenlik S\u00fcrecimiz<\/h2>\n    \n    <div class=\"elsa-process-grid\">\n        <div class=\"elsa-step-card\">\n            <div class=\"elsa-step-number\">01<\/div>\n            <h3 class=\"elsa-step-title\">Risk Analizi ve G\u00fcvenlik De\u011ferlendirmesi<\/h3>\n            <p class=\"elsa-step-desc\">Kurumsal BT altyap\u0131s\u0131ndaki g\u00fcvenlik a\u00e7\u0131klar\u0131, eri\u015fim politikalar\u0131 ve sistem konfig\u00fcrasyonlar\u0131 analiz edilir. Bu a\u015famada kurumun mevcut g\u00fcvenlik olgunluk seviyesi belirlenir ve potansiyel riskler ortaya \u00e7\u0131kar\u0131l\u0131r.<\/p>\n        <\/div>\n        <div class=\"elsa-step-card\">\n            <div class=\"elsa-step-number\">02<\/div>\n            <h3 class=\"elsa-step-title\">G\u00fcvenlik Mimarisi Tasar\u0131m\u0131<\/h3>\n            <p class=\"elsa-step-desc\">Analiz sonu\u00e7lar\u0131na g\u00f6re kurumun ihtiya\u00e7lar\u0131na uygun g\u00fcvenlik mimarisi tasarlan\u0131r. A\u011f g\u00fcvenli\u011fi, eri\u015fim kontrol\u00fc, veri koruma ve izleme mekanizmalar\u0131 bu mimari i\u00e7inde yap\u0131land\u0131r\u0131l\u0131r.<\/p>\n        <\/div>\n        <div class=\"elsa-step-card\">\n            <div class=\"elsa-step-number\">03<\/div>\n            <h3 class=\"elsa-step-title\">Implementation and Integration<\/h3>\n            <p class=\"elsa-step-desc\">G\u00fcvenlik \u00e7\u00f6z\u00fcmleri mevcut BT altyap\u0131s\u0131na entegre edilir. Sistem konfig\u00fcrasyonlar\u0131 yap\u0131l\u0131r, g\u00fcvenlik politikalar\u0131 uygulan\u0131r ve test s\u00fcre\u00e7leri tamamlan\u0131r.<\/p>\n        <\/div>\n        <div class=\"elsa-step-card\">\n            <div class=\"elsa-step-number\">04<\/div>\n            <h3 class=\"elsa-step-title\">S\u00fcrekli \u0130zleme ve \u0130yile\u015ftirme<\/h3>\n            <p class=\"elsa-step-desc\">Devreye al\u0131nan g\u00fcvenlik yap\u0131s\u0131 s\u00fcrekli izlenir. G\u00fcvenlik olaylar\u0131 analiz edilir, yeni tehditlere kar\u015f\u0131 \u00f6nlemler g\u00fcncellenir ve d\u00fczenli raporlama ile g\u00fcvenlik durumu takip edilir.<\/p>\n        <\/div>\n    <\/div>\n<\/div>\n\n<div class=\"elsa-strategic-section\">\n    <h2 class=\"elsa-strategic-main-title\">Stratejik Katma De\u011fer<\/h2>\n    <div class=\"elsa-strategic-grid\">\n        <div class=\"elsa-strategic-card\">\n            <div class=\"elsa-card-icon\"><i class=\"fas fa-chart-line\"><\/i><\/div>\n            <h3 class=\"elsa-card-title\">G\u00fcvenlik Risklerinin Azalt\u0131lmas\u0131<\/h3>\n            <p class=\"elsa-card-text\">Merkezi izleme ve olay m\u00fcdahale s\u00fcre\u00e7leri sayesinde g\u00fcvenlik olaylar\u0131 erken a\u015famada tespit edilebilir. Bu yakla\u015f\u0131m, kritik veri ihlali ve sistem kesintisi riskini \u00f6nemli \u00f6l\u00e7\u00fcde azalt\u0131r.<\/p>\n        <\/div>\n        <div class=\"elsa-strategic-card\">\n            <div class=\"elsa-card-icon\"><i class=\"fas fa-eye\"><\/i><\/div>\n            <h3 class=\"elsa-card-title\">Operasyonel G\u00f6r\u00fcn\u00fcrl\u00fck<\/h3>\n            <p class=\"elsa-card-text\">Log y\u00f6netimi, g\u00fcvenlik izleme ve raporlama s\u00fcre\u00e7leri sayesinde kurumun BT altyap\u0131s\u0131ndaki g\u00fcvenlik durumu s\u00fcrekli izlenebilir hale gelir.<\/p>\n        <\/div>\n        <div class=\"elsa-strategic-card\">\n            <div class=\"elsa-card-icon\"><i class=\"fas fa-balance-scale\"><\/i><\/div>\n            <h3 class=\"elsa-card-title\">Reg\u00fclasyon ve Uyum S\u00fcre\u00e7leri<\/h3>\n            <p class=\"elsa-card-text\">D\u00fczenli g\u00fcvenlik kontrolleri; KVKK, ISO 27001 ve di\u011fer reg\u00fclasyonlara uyum s\u00fcre\u00e7lerini destekler. Kurumun g\u00fcvenlik s\u00fcre\u00e7leri denetime haz\u0131r hale gelir.<\/p>\n        <\/div>\n    <\/div>\n<\/div>\n\n<div class=\"elsa-cta-container\">\n    <div class=\"elsa-cta-content\">\n        <h3 class=\"elsa-cta-subtitle\">LET'S WORK TOGETHER<\/h3>\n        <h2 class=\"elsa-cta-title\">BT G\u00fcvenli\u011finizi G\u00fc\u00e7lendirin<\/h2>\n        <p class=\"elsa-cta-text\">Siber tehditler s\u00fcrekli de\u011fi\u015fiyor. G\u00fcvenlik yakla\u015f\u0131m\u0131 da s\u00fcrekli geli\u015fmek zorunda. Mevcut g\u00fcvenlik mimarinizi birlikte de\u011ferlendirelim ve kurumunuza uygun bir g\u00fcvenlik stratejisi olu\u015ftural\u0131m.<\/p>\n        <a href=\"\/en\/iletisim\/\" class=\"elsa-cta-button\">\n            G\u00fcvenlik De\u011ferlendirmesi Planlay\u0131n <i class=\"fas fa-arrow-right\"><\/i>\n        <\/a>\n    <\/div>\n<\/div>\n\n<div class=\"elsa-faq-section\">\n    <h2 class=\"elsa-faq-main-title\">Frequently Asked Questions<\/h2>\n    <div class=\"elsa-faq-container\">\n        <details class=\"elsa-faq-item\" name=\"faq\">\n            <summary class=\"elsa-faq-question\">1) Siber g\u00fcvenlik hizmeti neleri kapsar?<\/summary>\n            <div class=\"elsa-faq-answer\">\n                <p>Siber g\u00fcvenlik hizmetleri; a\u011f g\u00fcvenli\u011fi, eri\u015fim kontrol\u00fc, g\u00fcvenlik izleme, log y\u00f6netimi, tehdit analizi ve g\u00fcvenlik olaylar\u0131na m\u00fcdahale s\u00fcre\u00e7lerini kapsar. Ama\u00e7, kurumsal BT altyap\u0131s\u0131n\u0131 siber sald\u0131r\u0131lara kar\u015f\u0131 korumakt\u0131r.<\/p>\n            <\/div>\n        <\/details>\n        <details class=\"elsa-faq-item\" name=\"faq\">\n            <summary class=\"elsa-faq-question\">2) MDR ve SOC hizmetleri ne i\u015fe yarar?<\/summary>\n            <div class=\"elsa-faq-answer\">\n                <p>MDR (Managed Detection and Response) ve SOC (Security Operations Center) hizmetleri, kurumlar\u0131n BT altyap\u0131s\u0131ndaki g\u00fcvenlik olaylar\u0131n\u0131 7\/24 izler ve analiz eder. Bu hizmetler, potansiyel sald\u0131r\u0131lar\u0131n erken a\u015famada tespit edilmesini sa\u011flar.<\/p>\n            <\/div>\n        <\/details>\n        <details class=\"elsa-faq-item\" name=\"faq\">\n            <summary class=\"elsa-faq-question\">3) Zero Trust g\u00fcvenlik modeli nedir?<\/summary>\n            <div class=\"elsa-faq-answer\">\n                <p>Zero Trust modeli, a\u011f i\u00e7indeki hi\u00e7bir kullan\u0131c\u0131 veya cihaz\u0131n varsay\u0131lan olarak g\u00fcvenilir kabul edilmemesi prensibine dayan\u0131r. Her eri\u015fim iste\u011fi do\u011frulan\u0131r ve s\u00fcrekli olarak kontrol edilir.<\/p>\n            <\/div>\n        <\/details>\n        <details class=\"elsa-faq-item\" name=\"faq\">\n            <summary class=\"elsa-faq-question\">4) Bulut ortamlar\u0131nda g\u00fcvenlik nas\u0131l sa\u011flan\u0131r?<\/summary>\n            <div class=\"elsa-faq-answer\">\n                <p>Bulut g\u00fcvenli\u011fi; eri\u015fim kontrol\u00fc, veri \u015fifreleme, a\u011f g\u00fcvenli\u011fi ve s\u00fcrekli izleme s\u00fcre\u00e7leri ile sa\u011flan\u0131r. SASE ve Zero Trust mimarileri, hibrit ve \u00e7oklu bulut ortamlar\u0131nda g\u00fcvenli\u011fi g\u00fc\u00e7lendiren yakla\u015f\u0131mlar aras\u0131nda yer al\u0131r.<\/p>\n            <\/div>\n        <\/details>\n    <\/div>\n<\/div>\n\n<style>\n\/* =========================================\n   FULL SAYFA CSS ALANI\n   ========================================= *\/\n\n\/* 1. \u00dcst Hizmet Alanlar\u0131 *\/\n.elsa-top-services-section { max-width: 1200px !important; margin: 40px auto 80px auto !important; padding: 0 20px !important; font-family: inherit !important; }\n.elsa-top-services-grid { display: flex !important; gap: 30px !important; align-items: stretch !important; }\n.elsa-top-card { flex: 1 !important; background: #ffffff !important; padding: 40px 30px !important; border-radius: 8px !important; border: 1px solid #f0f0f0 !important; box-shadow: 0 4px 15px rgba(0,0,0,0.02) !important; transition: box-shadow 0.3s ease !important; }\n.elsa-top-card:hover { box-shadow: 0 8px 25px rgba(0,0,0,0.06) !important; }\n.elsa-top-icon { width: 50px !important; height: 50px !important; background: #ffffff !important; border-radius: 8px !important; display: flex !important; align-items: center !important; justify-content: center !important; font-size: 24px !important; color: #E62A36 !important; margin-bottom: 20px !important; box-shadow: 0 4px 10px rgba(230, 42, 54, 0.1) !important; }\n.elsa-top-title { font-size: 20px !important; font-weight: 700 !important; color: #172531 !important; margin-bottom: 15px !important; line-height: 1.3 !important; }\n.elsa-top-desc { font-size: 15px !important; line-height: 1.6 !important; color: #666666 !important; margin: 0 !important; }\n\n\/* 2. S\u00fcre\u00e7 CSS *\/\n.elsa-process-section { max-width: 1200px !important; margin: 60px auto !important; padding: 0 20px !important; font-family: inherit !important; }\n.elsa-process-main-title { text-align: center !important; font-size: 36px !important; font-weight: 800 !important; color: #172531 !important; margin-bottom: 50px !important; }\n.elsa-process-grid { display: grid !important; grid-template-columns: repeat(4, 1fr) !important; gap: 30px !important; }\n.elsa-step-card { background: #ffffff !important; padding: 35px 25px !important; border-radius: 12px !important; position: relative !important; box-shadow: 0 10px 30px rgba(0,0,0,0.04) !important; border-top: 4px solid #E62A36 !important; transition: transform 0.3s ease, box-shadow 0.3s ease !important; }\n.elsa-step-card:hover { transform: translateY(-5px) !important; box-shadow: 0 15px 40px rgba(230, 42, 54, 0.1) !important; }\n.elsa-step-number { font-size: 60px !important; font-weight: 900 !important; color: rgba(230, 42, 54, 0.08) !important; position: absolute !important; top: 10px !important; right: 20px !important; line-height: 1 !important; z-index: 1 !important; }\n.elsa-step-title { font-size: 20px !important; font-weight: 700 !important; color: #172531 !important; margin-bottom: 15px !important; position: relative !important; z-index: 2 !important; }\n.elsa-step-desc { font-size: 15px !important; line-height: 1.6 !important; color: #555555 !important; position: relative !important; z-index: 2 !important; margin: 0 !important; }\n\n\/* 3. Stratejik Katma De\u011fer CSS *\/\n.elsa-strategic-section { max-width: 1200px !important; margin: 80px auto !important; padding: 0 20px !important; font-family: inherit !important; }\n.elsa-strategic-main-title { text-align: center !important; font-size: 36px !important; font-weight: 800 !important; color: #172531 !important; margin-bottom: 50px !important; }\n.elsa-strategic-grid { display: flex !important; gap: 30px !important; align-items: stretch !important; }\n.elsa-strategic-card { flex: 1 !important; display: flex !important; flex-direction: column !important; background: #ffffff !important; padding: 40px 30px !important; border-radius: 12px !important; box-shadow: 0 10px 40px rgba(0,0,0,0.05) !important; border: 1px solid #f0f0f0 !important; transition: transform 0.3s ease, box-shadow 0.3s ease !important; }\n.elsa-strategic-card:hover { transform: translateY(-5px) !important; box-shadow: 0 15px 40px rgba(0,0,0,0.1) !important; }\n.elsa-card-icon { font-size: 36px !important; color: #E62A36 !important; margin-bottom: 20px !important; }\n.elsa-card-title { font-size: 22px !important; font-weight: 700 !important; color: #172531 !important; margin-bottom: 15px !important; line-height: 1.3 !important; }\n.elsa-card-text { font-size: 15px !important; line-height: 1.6 !important; color: #555555 !important; margin-bottom: 0 !important; }\n\n\/* 4. CTA CSS *\/\n.elsa-cta-container { background: #fdfdfd; padding: 60px 40px; border-radius: 15px; text-align: center; border: 1px solid #eee; box-shadow: 0 10px 30px rgba(0,0,0,0.03); margin: 60px auto !important; max-width: 900px; }\n.elsa-cta-subtitle { color: #E62A36; font-size: 14px; font-weight: 700; letter-spacing: 2px; margin-bottom: 15px; text-transform: uppercase; }\n.elsa-cta-title { font-size: 32px; font-weight: 700; color: #1a1a1a; margin-bottom: 20px; }\n.elsa-cta-text { font-size: 18px; color: #666; max-width: 700px; margin: 0 auto 35px auto; line-height: 1.6; }\n.elsa-cta-button { background-color: #E62A36; color: #ffffff !important; padding: 18px 40px; font-size: 16px; font-weight: 600; border-radius: 50px; text-decoration: none !important; display: inline-block; transition: all 0.3s ease; box-shadow: 0 5px 15px rgba(230, 42, 54, 0.3); }\n.elsa-cta-button i { margin-left: 10px; font-size: 14px; }\n.elsa-cta-button:hover { background-color: #c5232d; transform: translateY(-3px); box-shadow: 0 8px 20px rgba(230, 42, 54, 0.4); }\n\n\/* 5. SSS (FAQ) CSS *\/\n.elsa-faq-section { max-width: 900px !important; margin: 0 auto 80px auto !important; padding: 0 20px !important; font-family: inherit !important; }\n.elsa-faq-main-title { text-align: center !important; font-size: 32px !important; font-weight: 800 !important; color: #172531 !important; margin-bottom: 40px !important; }\n.elsa-faq-container { display: flex !important; flex-direction: column !important; gap: 15px !important; }\n.elsa-faq-item { background: #ffffff !important; border: 1px solid #eeeeee !important; border-radius: 8px !important; box-shadow: 0 4px 15px rgba(0,0,0,0.02) !important; overflow: hidden !important; transition: all 0.3s ease !important; }\n.elsa-faq-item[open] { border-color: #E62A36 !important; box-shadow: 0 8px 25px rgba(230, 42, 54, 0.08) !important; }\n.elsa-faq-question { padding: 20px 25px !important; font-size: 18px !important; font-weight: 700 !important; color: #172531 !important; cursor: pointer !important; list-style: none !important; position: relative !important; display: flex !important; align-items: center !important; justify-content: space-between !important; }\n.elsa-faq-question::-webkit-details-marker { display: none !important; }\n.elsa-faq-question::after { content: \"+\" !important; font-size: 24px !important; color: #E62A36 !important; font-weight: 400 !important; transition: transform 0.3s ease !important; }\n.elsa-faq-item[open] .elsa-faq-question::after { content: \"\u2212\" !important; transform: rotate(180deg) !important; }\n.elsa-faq-answer { padding: 0 25px 25px 25px !important; font-size: 16px !important; line-height: 1.6 !important; color: #555555 !important; border-top: 1px solid #f9f9f9 !important; margin-top: -5px !important; }\n.elsa-faq-answer p { margin: 15px 0 0 0 !important; }\n\n\/* Ortak Mobil Uyumluluk *\/\n@media (max-width: 992px) {\n    .elsa-top-services-grid, .elsa-strategic-grid { flex-direction: column !important; }\n    .elsa-process-grid { grid-template-columns: repeat(2, 1fr) !important; gap: 20px !important; }\n}\n@media (max-width: 768px) {\n    .elsa-process-grid { grid-template-columns: 1fr !important; }\n    .elsa-faq-main-title, .elsa-process-main-title, .elsa-strategic-main-title { font-size: 26px !important; }\n    .elsa-faq-question { font-size: 16px !important; padding: 15px 20px !important; }\n    .elsa-faq-answer { font-size: 15px !important; padding: 0 20px 20px 20px !important; }\n    .elsa-cta-title { font-size: 26px !important; }\n    .elsa-cta-text { font-size: 16px !important; }\n    .elsa-cta-container { padding: 50px 20px !important; margin: 40px auto !important; }\n}\n<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Dijital Altyap\u0131n\u0131z\u0131 Modern Siber Tehditlere Kar\u015f\u0131 Koruyun Siber g\u00fcvenlik; kurumlar\u0131n sunucu, a\u011f, bulut ve uygulama altyap\u0131lar\u0131n\u0131 siber tehditlere kar\u015f\u0131 korumak i\u00e7in uygulanan teknik ve operasyonel g\u00fcvenlik s\u00fcre\u00e7lerinin b\u00fct\u00fcn\u00fcd\u00fcr. Elsa olarak g\u00fcvenli\u011fi yaln\u0131zca bir \u00fcr\u00fcn veya ara\u00e7 olarak ele almay\u0131z. Risk analizi, g\u00fcvenlik mimarisi tasar\u0131m\u0131, s\u00fcrekli izleme ve m\u00fcdahale s\u00fcre\u00e7leri ile kurumsal BT altyap\u0131s\u0131n\u0131 b\u00fct\u00fcnsel bir [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/template-default.php","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-32244","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/gifted-raman.185-169-55-137.plesk.page\/en\/wp-json\/wp\/v2\/pages\/32244","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gifted-raman.185-169-55-137.plesk.page\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/gifted-raman.185-169-55-137.plesk.page\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/gifted-raman.185-169-55-137.plesk.page\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/gifted-raman.185-169-55-137.plesk.page\/en\/wp-json\/wp\/v2\/comments?post=32244"}],"version-history":[{"count":0,"href":"https:\/\/gifted-raman.185-169-55-137.plesk.page\/en\/wp-json\/wp\/v2\/pages\/32244\/revisions"}],"wp:attachment":[{"href":"https:\/\/gifted-raman.185-169-55-137.plesk.page\/en\/wp-json\/wp\/v2\/media?parent=32244"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}