{"id":12756,"date":"2026-05-05T13:15:46","date_gmt":"2026-05-05T13:15:46","guid":{"rendered":"https:\/\/detech.com.tr\/?page_id=12756"},"modified":"2026-05-05T13:52:35","modified_gmt":"2026-05-05T13:52:35","slug":"appsec","status":"publish","type":"page","link":"https:\/\/detech.com.tr\/en\/appsec\/","title":{"rendered":"AppSec"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"12756\" class=\"elementor elementor-12756\" data-elementor-settings=\"{&quot;element_pack_global_tooltip_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;element_pack_global_tooltip_width_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;element_pack_global_tooltip_width_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;element_pack_global_tooltip_padding&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_padding_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_padding_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_border_radius&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_border_radius_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_border_radius_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true}}\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5007bcc7 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"5007bcc7\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-411a1130 elementor-invisible\" data-id=\"411a1130\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-722abb42 wpr-fancy-text-rotate-1 wpr-advanced-text-style-animated wpr-animated-text-infinite-yes elementor-widget elementor-widget-wpr-advanced-text\" data-id=\"722abb42\" data-element_type=\"widget\" data-settings=\"{&quot;anim_loop&quot;:&quot;yes&quot;}\" data-widget_type=\"wpr-advanced-text.default\">\n\t\t\t\t\t\n\t\t<h3 class=\"wpr-advanced-text\">\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t<span class=\"wpr-advanced-text-preffix\">Full Protection at Every Layer of Your Applications!<\/span>\n\t\t\t\n\t\t<span class=\"wpr-anim-text wpr-anim-text-type-rotate-1\" data-anim-duration=\"1000,2000\" data-anim-loop=\"yes\">\n\t\t\t<span class=\"wpr-anim-text-inner\">\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\n\t\t\t\t\n\t\t<\/h3>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-653feb2 elementor-widget elementor-widget-text-editor\" data-id=\"653feb2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Manage application security end-to-end, from development to production. Detect vulnerabilities in your code before they reach production and protect your APIs and web applications in real-time.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41d1b41f wpr-button-icon-style-inline wpr-button-icon-position-right elementor-widget elementor-widget-wpr-button\" data-id=\"41d1b41f\" data-element_type=\"widget\" data-widget_type=\"wpr-button.default\">\n\t\t\t\t\t\t\n\t\t\t\n\t\t\n\t\t<div class=\"wpr-button-wrap elementor-clearfix\">\n\t\t<a class=\"wpr-button wpr-button-effect wpr-button-none\" data-text=\"\" href=\"\/en\/contact\/\">\n\t\t\t\n\t\t\t<span class=\"wpr-button-content\">\n\t\t\t\t\t\t\t\t\t<span class=\"wpr-button-text\">Contact Us<\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<span class=\"wpr-button-icon\"><svg class=\"e-font-icon-svg e-fas-long-arrow-alt-right\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M313.941 216H12c-6.627 0-12 5.373-12 12v56c0 6.627 5.373 12 12 12h301.941v46.059c0 21.382 25.851 32.09 40.971 16.971l86.059-86.059c9.373-9.373 9.373-24.569 0-33.941l-86.059-86.059c-15.119-15.119-40.971-4.411-40.971 16.971V216z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\n\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-74a36a68\" data-id=\"74a36a68\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5b972168 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"5b972168\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-460c365\" data-id=\"460c365\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-250aaa1d elementor-widget elementor-widget-heading\" data-id=\"250aaa1d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Seamless Security Across the Entire Application!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-674e6e0d elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"674e6e0d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-50d0fc99\" data-id=\"50d0fc99\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7d3459f2 wpr-promo-box-style-cover elementor-invisible elementor-widget elementor-widget-wpr-promo-box\" data-id=\"7d3459f2\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:100}\" data-widget_type=\"wpr-promo-box.default\">\n\t\t\t\t\t\n\t\t<div class=\"wpr-promo-box wpr-animation-wrap\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t<div class=\"wpr-promo-box-content\">\n\n\t\t\t\t\t\t\t\t<div class=\"wpr-promo-box-icon\">\n\t\t\t\t\t\t\t\t\t\t\t<i class=\"fas fa-code\"><\/i>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<h3 class=\"wpr-promo-box-title\"><span>SAST \u2014 Static Code Analysis<\/span><\/h3>\n\t\t\t\t\t\t\t\t\t<div class=\"wpr-promo-box-description\">\n\t\t\t\t\t\t<p><p>Vulnerabilities are detected in the development environment by scanning the source code without compilation. Instant feedback is provided with an IDE plugin.<\/p><\/p>\t\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-2909b3bd\" data-id=\"2909b3bd\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-67af79b9 wpr-promo-box-style-cover elementor-invisible elementor-widget elementor-widget-wpr-promo-box\" data-id=\"67af79b9\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:100}\" data-widget_type=\"wpr-promo-box.default\">\n\t\t\t\t\t\n\t\t<div class=\"wpr-promo-box wpr-animation-wrap\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t<div class=\"wpr-promo-box-content\">\n\n\t\t\t\t\t\t\t\t<div class=\"wpr-promo-box-icon\">\n\t\t\t\t\t\t\t\t\t\t\t<i class=\"fas fa-users\"><\/i>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<h3 class=\"wpr-promo-box-title\"><span>DAST \u2014 Dynamic Application Testing<\/span><\/h3>\n\t\t\t\t\t\t\t\t\t<div class=\"wpr-promo-box-description\">\n\t\t\t\t\t\t<p><p>Real attack simulations are applied to running applications. Vulnerabilities and misconfigurations in runtime are reported instantly.<\/p><\/p>\t\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-6c61097d\" data-id=\"6c61097d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4bf2d024 wpr-promo-box-style-cover elementor-invisible elementor-widget elementor-widget-wpr-promo-box\" data-id=\"4bf2d024\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:100}\" data-widget_type=\"wpr-promo-box.default\">\n\t\t\t\t\t\n\t\t<div class=\"wpr-promo-box wpr-animation-wrap\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t<div class=\"wpr-promo-box-content\">\n\n\t\t\t\t\t\t\t\t<div class=\"wpr-promo-box-icon\">\n\t\t\t\t\t\t\t\t\t\t\t<i class=\"glyph-icon flaticon-analytic\"><\/i>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<h3 class=\"wpr-promo-box-title\"><span>SCA \u2014 Software Composition Analysis<\/span><\/h3>\n\t\t\t\t\t\t\t\t\t<div class=\"wpr-promo-box-description\">\n\t\t\t\t\t\t<p><p>Known CVEs in open source libraries and dependencies are scanned, and license compliance risks are reported.<\/p><\/p>\t\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ee2b54a elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"ee2b54a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-140d49f\" data-id=\"140d49f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-534a781 wpr-promo-box-style-cover elementor-invisible elementor-widget elementor-widget-wpr-promo-box\" data-id=\"534a781\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:100}\" data-widget_type=\"wpr-promo-box.default\">\n\t\t\t\t\t\n\t\t<div class=\"wpr-promo-box wpr-animation-wrap\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t<div class=\"wpr-promo-box-content\">\n\n\t\t\t\t\t\t\t\t<div class=\"wpr-promo-box-icon\">\n\t\t\t\t\t\t\t\t\t\t\t<i class=\"fas fa-handshake\"><\/i>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<h3 class=\"wpr-promo-box-title\"><span>RASP - Zen Firewall<\/span><\/h3>\n\t\t\t\t\t\t\t\t\t<div class=\"wpr-promo-box-description\">\n\t\t\t\t\t\t<p><p>It blocks SQL injection, XSS, CSRF, and OWASP Top 10 attacks in the application layer in real time.<\/p><\/p>\t\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-c8f73cd\" data-id=\"c8f73cd\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7ba9ed9 wpr-promo-box-style-cover elementor-invisible elementor-widget elementor-widget-wpr-promo-box\" data-id=\"7ba9ed9\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:100}\" data-widget_type=\"wpr-promo-box.default\">\n\t\t\t\t\t\n\t\t<div class=\"wpr-promo-box wpr-animation-wrap\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t<div class=\"wpr-promo-box-content\">\n\n\t\t\t\t\t\t\t\t<div class=\"wpr-promo-box-icon\">\n\t\t\t\t\t\t\t\t\t\t\t<i class=\"fas fa-users\"><\/i>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<h3 class=\"wpr-promo-box-title\"><span>API Security<\/span><\/h3>\n\t\t\t\t\t\t\t\t\t<div class=\"wpr-promo-box-description\">\n\t\t\t\t\t\t<p><p>Automatically discovers your REST, GraphQL, and gRPC APIs, preventing unauthorized access and data exfiltration attempts.<\/p><\/p>\t\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-8080866\" data-id=\"8080866\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c8f2f68 wpr-promo-box-style-cover elementor-invisible elementor-widget elementor-widget-wpr-promo-box\" data-id=\"c8f2f68\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:100}\" data-widget_type=\"wpr-promo-box.default\">\n\t\t\t\t\t\n\t\t<div class=\"wpr-promo-box wpr-animation-wrap\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t<div class=\"wpr-promo-box-content\">\n\n\t\t\t\t\t\t\t\t<div class=\"wpr-promo-box-icon\">\n\t\t\t\t\t\t\t\t\t\t\t<i class=\"glyph-icon flaticon-analytic\"><\/i>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<h3 class=\"wpr-promo-box-title\"><span>AI Pentesting - Artificial Intelligence-Assisted Penetration Testing<\/span><\/h3>\n\t\t\t\t\t\t\t\t\t<div class=\"wpr-promo-box-description\">\n\t\t\t\t\t\t<p><p><span data-teams=\"true\">BEC, account takeover, and business logic vulnerabilities are detected in 200+ autonomous agents within hours, producing audit-quality reports.<\/span><\/p><\/p>\t\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-3265eb4 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"3265eb4\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ec09442 elementor-widget elementor-widget-heading\" data-id=\"ec09442\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Standing Side by Side with Global Leaders in Cybersecurity<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-81e2774 elementor-widget elementor-widget-text-editor\" data-id=\"81e2774\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tWe are strengthening cyber resilience in Turkey with the world's most trusted manufacturers in the fields of data classification, DLP, threat simulation, AI security and sensitive data discovery.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2ce5d737 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"2ce5d737\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-233e4230 elementor-invisible\" data-id=\"233e4230\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f391d5 wpr-fancy-text-rotate-1 wpr-advanced-text-style-animated wpr-animated-text-infinite-yes elementor-widget elementor-widget-wpr-advanced-text\" data-id=\"f391d5\" data-element_type=\"widget\" data-settings=\"{&quot;anim_loop&quot;:&quot;yes&quot;}\" data-widget_type=\"wpr-advanced-text.default\">\n\t\t\t\t\t\n\t\t<h3 class=\"wpr-advanced-text\">\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t<span class=\"wpr-advanced-text-preffix\">AppSec<\/span>\n\t\t\t\n\t\t<span class=\"wpr-anim-text wpr-anim-text-type-rotate-1\" data-anim-duration=\"1000,2000\" data-anim-loop=\"yes\">\n\t\t\t<span class=\"wpr-anim-text-inner\">\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\n\t\t\t\t\n\t\t<\/h3>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-51597c8a elementor-widget elementor-widget-text-editor\" data-id=\"51597c8a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Modern applications have a complex structure consisting of cloud infrastructures, microservices, APIs, and open-source libraries. Traditional security tools fall behind this complexity. Our APPsec solutions combine SAST, DAST, SCA, and WAF capabilities into a single workflow, making security an integral part of the development process.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-648670 wpr-button-icon-style-inline wpr-button-icon-position-right elementor-widget elementor-widget-wpr-button\" data-id=\"648670\" data-element_type=\"widget\" data-widget_type=\"wpr-button.default\">\n\t\t\t\t\t\t\n\t\t\t\n\t\t\n\t\t<div class=\"wpr-button-wrap elementor-clearfix\">\n\t\t<a class=\"wpr-button wpr-button-effect wpr-button-none\" data-text=\"\" href=\"\/en\/contact\/\">\n\t\t\t\n\t\t\t<span class=\"wpr-button-content\">\n\t\t\t\t\t\t\t\t\t<span class=\"wpr-button-text\">Contact Us<\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/span>\n\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\n\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5e55ddee\" data-id=\"5e55ddee\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2e33d3c wpr-feature-list-left wpr-feature-list-square elementor-widget elementor-widget-wpr-feature-list\" data-id=\"2e33d3c\" data-element_type=\"widget\" data-widget_type=\"wpr-feature-list.default\">\n\t\t\t\t\t<div class=\"wpr-feature-list-wrap\"><ul class=\"wpr-feature-list\"><li class=\"wpr-feature-list-item elementor-repeater-item-30940b8\"><div class=\"wpr-feature-list-icon-wrap\"><span class=\"wpr-feature-list-line\"><\/span><div class=\"wpr-feature-list-icon-inner-wrap\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-search\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M505 442.7L405.3 343c-4.5-4.5-10.6-7-17-7H372c27.6-35.3 44-79.7 44-128C416 93.1 322.9 0 208 0S0 93.1 0 208s93.1 208 208 208c48.3 0 92.7-16.4 128-44v16.3c0 6.4 2.5 12.5 7 17l99.7 99.7c9.4 9.4 24.6 9.4 33.9 0l28.3-28.3c9.4-9.4 9.4-24.6.1-34zM208 336c-70.7 0-128-57.2-128-128 0-70.7 57.2-128 128-128 70.7 0 128 57.2 128 128 0 70.7-57.2 128-128 128z\"><\/path><\/svg><\/div><\/div><div class=\"wpr-feature-list-content-wrap\"><h2 class=\"wpr-feature-list-title\"><a class=\"wpr-feature-list-url\" target=\"_blank\" rel=\"nofollow\">Aikido<\/a><\/h2><p class=\"wpr-feature-list-description\"><\/p><\/div><\/li><\/ul><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4f26b7e8 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"4f26b7e8\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;curve&quot;,&quot;shape_divider_bottom&quot;:&quot;curve&quot;,&quot;section_parallax_on&quot;:&quot;yes&quot;,&quot;section_parallax_x_value&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;section_parallax_value&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:-200,&quot;sizes&quot;:[]}}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n    <path class=\"elementor-shape-fill\" d=\"M1000,4.3V0H0v4.3C0.9,23.1,126.7,99.2,500,100S1000,22.7,1000,4.3z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n    <path class=\"elementor-shape-fill\" d=\"M1000,4.3V0H0v4.3C0.9,23.1,126.7,99.2,500,100S1000,22.7,1000,4.3z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4515eb73\" data-id=\"4515eb73\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-53ffcfce elementor-widget elementor-widget-heading\" data-id=\"53ffcfce\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our Solutions<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2b28cf6c elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"2b28cf6c\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-50e5499f elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"50e5499f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-3669c70a\" data-id=\"3669c70a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-74bf435 wpr-promo-box-style-classic wpr-promo-box-image-position-center elementor-invisible elementor-widget elementor-widget-wpr-promo-box\" data-id=\"74bf435\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:100}\" data-widget_type=\"wpr-promo-box.default\">\n\t\t\t\t\t\n\t\t<div class=\"wpr-promo-box wpr-animation-wrap\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t<div class=\"wpr-promo-box-content\">\n\n\t\t\t\t\t\t\t\t<div class=\"wpr-promo-box-icon\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<h3 class=\"wpr-promo-box-title\"><span>Aikido<\/span><\/h3>\n\t\t\t\t\t\t\t\t\t<div class=\"wpr-promo-box-description\">\n\t\t\t\t\t\t<p><p>Manage application security from development to production, end-to-end. Detect vulnerabilities in your code before production, and protect your APIs and web applications in real-time.<\/p><\/p>\t\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"wpr-promo-box-btn-wrap\">\n\t\t\t\t\t\t<a class=\"wpr-promo-box-btn\" href=\"\/en\/aikido\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-promo-box-btn-text\">More Information<\/span>\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-76d8960 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"76d8960\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fba134c bdt-backdrop-filter-yes bdt-filter-backdrop\" data-id=\"fba134c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-70d66df elementor-widget elementor-widget-heading\" data-id=\"70d66df\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Let's Build Your Cyber Security Together!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a524e0 elementor-widget elementor-widget-text-editor\" data-id=\"8a524e0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Let's analyze your needs and requirements together and configure the security architecture specific to your organization.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f0436a1 wpr-button-icon-position-left wpr-button-icon-style-inline elementor-widget elementor-widget-wpr-button\" data-id=\"f0436a1\" data-element_type=\"widget\" data-widget_type=\"wpr-button.default\">\n\t\t\t\t\t\t\n\t\t\t\n\t\t\n\t\t<div class=\"wpr-button-wrap elementor-clearfix\">\n\t\t<a class=\"wpr-button wpr-button-effect wpr-button-back-pulse\" data-text=\"\" href=\"\/en\/contact\/\">\n\t\t\t\n\t\t\t<span class=\"wpr-button-content\">\n\t\t\t\t\t\t\t\t\t<span class=\"wpr-button-text\">Contact Us<\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<span class=\"wpr-button-icon\"><i class=\"ion ion-email\"><\/i><\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\n\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Uygulamalar\u0131n\u0131z\u0131n Her Katman\u0131nda Tam Koruma! Geli\u015ftirme s\u00fcrecinden \u00fcretim ortam\u0131na kadar uygulama g\u00fcvenli\u011fini u\u00e7tan uca y\u00f6netin. Kodunuzdaki zafiyetleri \u00fcretim \u00f6ncesinde tespit edin, API&#8217;lar\u0131n\u0131z\u0131 ve web uygulamalar\u0131n\u0131z\u0131 ger\u00e7ek zamanl\u0131 koruyun. \u0130leti\u015fime Ge\u00e7 T\u00fcm Uygulama Y\u00fczeyinde Kesintisiz G\u00fcvenlik! SAST \u2014 Statik Kod Analizi Kaynak kodu, derleme olmaks\u0131z\u0131n taranarak g\u00fcvenlik a\u00e7\u0131klar\u0131 geli\u015ftirme ortam\u0131nda tespit edilir. IDE eklentisi ile anl\u0131k geri bildirim sunulur. DAST \u2014 Dinamik Uygulama Testi \u00c7al\u0131\u015fan uygulamaya ger\u00e7ek sald\u0131r\u0131 sim\u00fclasyonlar\u0131 uygulan\u0131r. Runtime&#8217;daki zafiyetler ve yanl\u0131\u015f yap\u0131land\u0131rmalar an\u0131nda raporlan\u0131r. SCA \u2014 Yaz\u0131l\u0131m Bile\u015fen Analizi A\u00e7\u0131k kaynak k\u00fct\u00fcphane ve ba\u011f\u0131ml\u0131l\u0131klar\u0131n\u0131zdaki bilinen CVE&#8217;ler taran\u0131r, lisans uyumluluk riskleri raporlan\u0131r. RASP &#8211; Zen Firewall SQL injection, XSS, CSRF ve OWASP Top 10 sald\u0131r\u0131lar\u0131n\u0131 uygulama katman\u0131nda, ger\u00e7ek zamanl\u0131 olarak engeller. API G\u00fcvenli\u011fi REST, GraphQL ve gRPC API&#8217;lar\u0131n\u0131z\u0131 otomatik ke\u015ffeder, yetkisiz eri\u015fim ve veri s\u0131zd\u0131rma giri\u015fimlerini engeller. AI Pentesting &#8211; Yapay Zeka Destekli S\u0131zma Testi BEC, hesap ele ge\u00e7irme ve i\u015f mant\u0131\u011f\u0131 a\u00e7\u0131klar\u0131n\u0131 200+ otonom ajan ile saatler i\u00e7inde tespit eder; denetim kalitesinde rapor \u00fcretir. Siber G\u00fcvenli\u011fi K\u00fcresel Liderleriyle Yan Yanay\u0131z Veri s\u0131n\u0131fland\u0131rma, DLP, tehdit sim\u00fclasyonu, yapay zeka g\u00fcvenli\u011fi ve duyarl\u0131 veri ke\u015ffi alanlar\u0131nda d\u00fcnyan\u0131n en g\u00fcvenilir \u00fcreticileriyle T\u00fcrkiye\u2019deki siber dayan\u0131kl\u0131l\u0131\u011f\u0131n\u0131 g\u00fc\u00e7lendiriyoruz. AppSec Modern uygulamalar; bulut altyap\u0131lar\u0131, mikroservisler, API&#8217;lar ve a\u00e7\u0131k kaynak k\u00fct\u00fcphanelerden olu\u015fan karma\u015f\u0131k bir yap\u0131ya sahiptir. Geleneksel g\u00fcvenlik ara\u00e7lar\u0131 bu karma\u015f\u0131kl\u0131\u011f\u0131n gerisinde kal\u0131r. APPsec \u00e7\u00f6z\u00fcmlerimiz; SAST, DAST, SCA ve WAF kapasitelerini tek bir i\u015f ak\u0131\u015f\u0131nda birle\u015ftirerek, g\u00fcvenli\u011fi geli\u015ftirme s\u00fcrecinin ayr\u0131lmaz bir par\u00e7as\u0131na d\u00f6n\u00fc\u015ft\u00fcr\u00fcr. \u0130leti\u015fime Ge\u00e7 Aikido \u00c7\u00f6z\u00fcmlerimiz Aikido Geli\u015ftirme s\u00fcrecinden \u00fcretim ortam\u0131na kadar uygulama g\u00fcvenli\u011fini u\u00e7tan uca y\u00f6netin. Kodunuzdaki zafiyetleri \u00fcretim \u00f6ncesinde tespit edin, API&#8217;lar\u0131n\u0131z\u0131 ve web uygulamalar\u0131n\u0131z\u0131 ger\u00e7ek zamanl\u0131 koruyun. Daha Fazla Bilgi Siber G\u00fcvenli\u011finizi Birlikte \u0130n\u015fa Edelim! \u0130htiya\u00e7 ve gereksinimlerinizi birlikte analiz edelim, kurumunuza \u00f6zel g\u00fcvenlik mimarisini birlikte yap\u0131land\u0131ral\u0131m. \u0130leti\u015fime Ge\u00e7<\/p>","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-12756","page","type-page","status-publish","hentry"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/detech.com.tr\/en\/wp-json\/wp\/v2\/pages\/12756","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/detech.com.tr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/detech.com.tr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/detech.com.tr\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/detech.com.tr\/en\/wp-json\/wp\/v2\/comments?post=12756"}],"version-history":[{"count":10,"href":"https:\/\/detech.com.tr\/en\/wp-json\/wp\/v2\/pages\/12756\/revisions"}],"predecessor-version":[{"id":12778,"href":"https:\/\/detech.com.tr\/en\/wp-json\/wp\/v2\/pages\/12756\/revisions\/12778"}],"wp:attachment":[{"href":"https:\/\/detech.com.tr\/en\/wp-json\/wp\/v2\/media?parent=12756"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}