{"id":9021,"date":"2016-12-07T11:12:57","date_gmt":"2016-12-07T09:12:57","guid":{"rendered":"https:\/\/ihs.com.tr\/blog\/?p=9021"},"modified":"2016-12-07T11:12:57","modified_gmt":"2016-12-07T09:12:57","slug":"trusteer-uc-nokta-korumasi-nedir","status":"publish","type":"post","link":"https:\/\/www.ihs.com.tr\/blog\/trusteer-uc-nokta-korumasi-nedir\/","title":{"rendered":"Trusteer U\u00e7 Nokta Korumas\u0131 Nedir?"},"content":{"rendered":"<p><span style=\"font-size: 14pt;\">Trusteer U\u00e7 Nokta Korumas\u0131 nedir ve bu korumaya neden ihtiyac\u0131m var? Teknoloji end\u00fcstrisinin t\u00fcketicileri koruyacak daha iyi ara\u00e7lar \u00fcretme anlam\u0131nda s\u00fcregelen \u00e7al\u0131\u015fmalar\u0131 esnas\u0131nda s\u0131k s\u0131k belirli alanlara odaklanan yaz\u0131l\u0131mlar ortaya \u00e7\u0131kmakta. Trusteer U\u00e7 Nokta Korumas\u0131 da \u00f6zellikle finansal frauda kar\u015f\u0131 m\u00fccadeleyi g\u00fc\u00e7lendirmek i\u00e7in tasarlanm\u0131\u015f ve bankalar taraf\u0131ndan online i\u015flemler esnas\u0131ndaki fraud ve kimlik h\u0131rs\u0131zl\u0131\u011f\u0131 ihtimallerini azaltmak i\u00e7in tavsiye edilen yasal bir programd\u0131r.\u00a0 \u0130lk olarak 2006 y\u0131l\u0131nda \u0130srail\u2019de kurulan Trusteer daha sonra 2013 y\u0131l\u0131nda IBM taraf\u0131ndan tahminen 800 milyon dolara sat\u0131n al\u0131nd\u0131.<\/span><\/p>\n<p><strong><span style=\"font-size: 14pt;\">Bankalar neden Trusteer\u2019\u0131 tavsiye ediyor?<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt;\">Trusteer U\u00e7 Nokta Korumas\u0131 \u00f6zellikle ZeuS, Silon, Torpig, SpyEye gibi me\u015fhur bankac\u0131l\u0131k Trojan yaz\u0131l\u0131mlar\u0131n\u0131n kullan\u0131c\u0131lara sald\u0131rmas\u0131n\u0131 \u00f6nlemek amac\u0131yla tasarlanm\u0131\u015f bir program. Online bankac\u0131l\u0131k i\u015flemlerine sald\u0131racak \u015fekilde tasarlanm\u0131\u015f k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar oturum a\u00e7ma esnas\u0131ndaki kimlik bilgilerini \u00e7alarak siber h\u0131rs\u0131zlar\u0131n online hesaplara ula\u015fmas\u0131n\u0131 veya ma\u011fdurlar\u0131n kimlik bilgilerini \u00e7almas\u0131n\u0131 sa\u011fl\u0131yor.<\/span><\/p>\n<p><a href=\"https:\/\/www.ihsteknoloji.com\/trusteer-finansal-fraud\/\" rel=\"attachment wp-att-9024\" target=\"_blank\"><img decoding=\"async\" class=\"alignnone wp-image-9024 size-medium\" src=\"https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2016\/12\/trusteer-300x171.jpg\" alt=\"trusteer\" width=\"300\" height=\"171\" srcset=\"https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2016\/12\/trusteer-300x171.jpg 300w, https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2016\/12\/trusteer-585x334.jpg 585w, https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2016\/12\/trusteer.jpg 700w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><span style=\"font-size: 14pt;\">Bu sald\u0131rganlar kullan\u0131c\u0131lar\u0131 istismar etme arac\u0131 olarak keyloggerlar\u0131, ekran g\u00f6r\u00fcnt\u00fcs\u00fc \u00e7almay\u0131 ve oltalama y\u00f6ntemlerini kullan\u0131yorlar. Trusteer da \u00f6zellikle bu sald\u0131r\u0131lara kar\u015f\u0131 koruma sa\u011flamak \u00fczere tasarlanm\u0131\u015f bir program. Detaylar\u0131 <a href=\"https:\/\/www.ihsteknoloji.com\/trusteer-finansal-fraud\/\" target=\"_blank\">IHS Kurumsal Trusteer<\/a> sayfas\u0131ndan inceleyebilirsiniz. Bankac\u0131lar da bu \u00fccretsiz program\u0131 ekstra bir koruma katman\u0131 olarak tavsiye ediyorlar \u00e7\u00fcnk\u00fc bankalar bu koruma program\u0131n\u0131 kendi taraflar\u0131nda kurmu\u015f durumdalar ve program her iki u\u00e7 da ayn\u0131 g\u00fcvenlik sistemini kullan\u0131yorsa en iyi rand\u0131man\u0131 veriyor (\u201cU\u00e7 Nokta\u201d ismi de buradan geliyor).<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Bankalar g\u00fcvenlik ve mevzuat konusundaki uyumluluk durumuna \u00f6nem verir. <a href=\"https:\/\/www.ihsteknoloji.com\/trusteer-finansal-fraud\/\" target=\"_blank\">Trusteer<\/a> platformu da bu \u015fartlar\u0131 sa\u011flad\u0131\u011f\u0131ndan bir\u00e7ok kurulu\u015f bu program\u0131 kullanmak \u00fczere IBM\u2019le ortakl\u0131\u011fa girmi\u015ftir. \u00dccretsiz dan\u0131\u015fmanl\u0131k ve ayr\u0131nt\u0131l\u0131 bilgi i\u00e7in <a href=\"https:\/\/www.ihsteknoloji.com\/trusteer-finansal-fraud\/\" target=\"_blank\">IHS Kurumsal Trusteer<\/a> sayfas\u0131n\u0131 inceleyebilirsiniz.<br \/>\n<\/span><\/p>\n<p><strong><span style=\"font-size: 14pt;\">Ger\u00e7ek d\u00fcnya<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt;\">Bilgisayar\u0131n\u0131z\u0131n yapmas\u0131 gereken tek \u015fey bankan\u0131zla ileti\u015fime ge\u00e7mek olsayd\u0131, Trusteer \u00e7ok basit bir program olurdu. Fakat \u00e7o\u011fumuz i\u00e7in ger\u00e7ek d\u00fcnya b\u00f6yle bir yer de\u011fil.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Trusteer bilgisayarlar\u0131m\u0131zdaki ana g\u00fcvenlik program\u0131n\u0131 destekleyecek ekstra bir g\u00fcvenlik katman\u0131 olarak \u00e7al\u0131\u015facak \u015fekilde tasarlanm\u0131\u015f olmas\u0131na ra\u011fmen, bir\u00e7ok kullan\u0131c\u0131 Trusteer ile ilgili \u00e7ok say\u0131da sorun bildirmi\u015fti. \u00a0\u0130nternet \u00fczerinden yap\u0131lan bu \u015fikayetler aras\u0131nda ilk kurulum s\u00fcrecinin zorlu\u011fu, di\u011fer programlarla uyumsuzluk, performansta g\u00f6zle g\u00f6r\u00fcl\u00fcr bir d\u00fc\u015f\u00fc\u015f ve kar\u0131\u015f\u0131k program kald\u0131rma s\u00fcreci bulunmaktayd\u0131.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">B\u00fct\u00fcn g\u00fcvenlik programlar\u0131 gibi, Trusteer da bilgisayar\u0131n\u0131z\u0131 normal bir \u015fekilde kullanman\u0131z\u0131 engelleyebilir, \u00e7\u00fcnk\u00fc tehdit olarak alg\u0131lad\u0131\u011f\u0131 her \u015feye (yanl\u0131\u015f pozitiflere) eri\u015fimi engeller. Bu da bir\u00e7ok durumda \u00e7ok can s\u0131k\u0131c\u0131 bir hal al\u0131r.<\/span><\/p>\n<p><strong><span style=\"font-size: 14pt;\">Trusteer U\u00e7 Nokta Korumas\u0131\u2019n\u0131 kullanmal\u0131 m\u0131s\u0131n\u0131z?<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt;\">T\u00fcm koruma sistemlerinde oldu\u011fu gibi, Trusteer U\u00e7 Nokta Korumas\u0131\u2019nda da her sorunu \u00e7\u00f6zecek tek bir \u00e7\u00f6z\u00fcm bulunmamakta. Bu nedenle Trusteer U\u00e7 Nokta Koruma program\u0131n\u0131 kullan\u0131p kullanmayaca\u011f\u0131n\u0131za karar vermeden \u00f6nce biraz \u00e7al\u0131\u015fman\u0131z gerekir.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Bankan\u0131z bu program\u0131 kurman\u0131z i\u00e7in size \u0131srar ediyorsa, kurulumu yapmadan \u00f6nce, hangi internet g\u00fcvenlik program\u0131n\u0131 kullan\u0131yorsan\u0131z o program\u0131n ismiyle \u201cTrusteer ve XXX (program\u0131n\u0131z) birlikte kullan\u0131l\u0131rken ya\u015fanan sorunlar\u201d gibi bir \u00f6n ara\u015ft\u0131rma yaparak ya\u015fayabilece\u011finiz spresifik sorunlardan haberdar olman\u0131z \u00e7ok \u00f6nemlidir. Bu tavsiyeye uyarsan\u0131z internet g\u00fcvenli\u011fi program\u0131n\u0131z\u0131n destek kaynaklar\u0131ndan bilgi edinece\u011finiz gibi, hat\u0131r\u0131 say\u0131l\u0131r miktarda kullan\u0131c\u0131 geri bildirimi de alacaks\u0131n\u0131zd\u0131r.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Google i\u00e7in bir arama tavsiyesi olarak; e\u011fer arama sorgunuzun sonuna trusteer.com eklerseniz sonu\u00e7lar size <a href=\"https:\/\/www.ihsteknoloji.com\/trusteer-finansal-fraud\/\" target=\"_blank\">Trusteer<\/a> web sitesindeki i\u00e7erikler d\u0131\u015far\u0131da b\u0131rak\u0131larak gelecektir. B\u00f6ylece yaln\u0131zca \u00fc\u00e7\u00fcnc\u00fc partilerden gelen yorumlar\u0131 g\u00f6r\u00fcrs\u00fcn\u00fcz.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Kurumsal kullan\u0131c\u0131lar uyum sorunu y\u00fcz\u00fcnden i\u015f ak\u0131\u015f\u0131nda ya\u015fanabilecek aksakl\u0131klar\u0131 \u00f6nlemek i\u00e7in \u00f6n denemelerini \u015firket i\u00e7in kritik olmayan bilgisayarlarda yapmal\u0131d\u0131rlar. \u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Trusteer U\u00e7 Nokta Korumas\u0131 nedir ve bu korumaya neden ihtiyac\u0131m var? Teknoloji end\u00fcstrisinin t\u00fcketicileri koruyacak daha iyi ara\u00e7lar \u00fcretme anlam\u0131nda s\u00fcregelen \u00e7al\u0131\u015fmalar\u0131&hellip;<\/p>\n","protected":false},"author":3,"featured_media":9023,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,390],"tags":[],"class_list":["post-9021","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-haberler","category-kurumsal"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9021","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=9021"}],"version-history":[{"count":3,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9021\/revisions"}],"predecessor-version":[{"id":9038,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9021\/revisions\/9038"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/media\/9023"}],"wp:attachment":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=9021"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=9021"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=9021"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}