While performing System Integration, Data Center Relocation, Disaster Recovery Center Installation, Database and System Management Optimization, Cyber Security and Penetration Test Services, Software Development and R&D Activities; with the participation of all its employees;

  • Maintaining the highest level of satisfaction by protecting the rights and privacy of our customers, employees and interested parties
  • Continuously improving its modern infrastructure by using the latest Technologies
  • To determine the quality objectives for our units and to evaluate our objectives periodically and to take measures if necessary
  • To fulfill the current standards, regulations, quality management system and all applicable legal requirements,
  • Continuously improve quality management system practices
  • As the company management, it is committed to ensuring customer satisfaction by making continuous improvement in accordance with the conditions of the quality management system, continuously improving the product quality and meeting the expectations of our customers in the best way.


    The main theme of TS EN ISO 27001 Information Security Management System; Software development, consultancy and support services on Information Systems and consultancy, training and engineering services related to these activities; To demonstrate that information security management is provided within human, infrastructure, software, hardware, organizational information, third-party information and financial resources, to ensure risk management, to measure quality and information security management process performance, and to establish relations with third parties on information security-related issues. to ensure regulation. In this direction

  • Our Information Security Policy
  • Managing information assets, determining the security values, needs and risks of assets, developing and implementing controls for security risks
  • To define the framework that will determine the methods for determining information assets, values, security needs, vulnerabilities, threats to assets, and frequency of threats.
  • Define a framework for assessing the privacy, integrity, accessibility impacts of threats on assets.
  • To set out the working principles for handling risks.
  • To monitor the risks continuously by reviewing the technological expectations in the context of the scope of service.
  • To meet the information security requirements arising from the national or international regulations to which it is subject, fulfilling the legal and relevant legislation requirements, meeting the obligations arising from the agreements, and Company responsibilities for internal and external stakeholders.
  • To reduce the impact of information security threats on service continuity and to contribute to continuity
  • To have the competence to respond quickly to information security incidents that may occur and to minimize the impact of the incident.
  • To maintain and improve the level of information security over time with a cost-effective control infrastructure.
  • To improve the reputation of the company, to protect it from negative effects based on information security.
  • Our Information Security Policy.