{"id":8408,"date":"2020-11-26T08:08:07","date_gmt":"2020-11-26T05:08:07","guid":{"rendered":"https:\/\/tecnologia.vamtam.com\/?p=8408"},"modified":"2025-01-27T14:29:24","modified_gmt":"2025-01-27T11:29:24","slug":"operasyonel-teknolojilerin-guvenligi-icin-cisco-cyber-vision","status":"publish","type":"post","link":"https:\/\/www.morten.com.tr\/en\/operasyonel-teknolojilerin-guvenligi-icin-cisco-cyber-vision\/","title":{"rendered":"Cisco Cyber Vision for Operational Technology (OT) Security"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"8408\" class=\"elementor elementor-8408\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d456a24 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d456a24\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-90331ea\" data-id=\"90331ea\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-30e77e92 elementor-widget elementor-widget-text-editor\" data-id=\"30e77e92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Author: Fatih Ermis | Senior Solution Consultant<\/strong><\/p><p style=\"font-weight: 400;\"><b><strong>Section 1: What is Cisco Cyber Vision?<\/strong><\/b><\/p><p style=\"font-weight: 400;\">The security layers used for IT have now become indispensable for OT security. Especially recently, most data leaks are made by infiltrating the inside through different means. It is seen that security products positioned for North-South internet traffic are not sufficient for such leaks. In addition to North-South traffic, similar data leaks can be prevented by routine anomaly\/vulnerability scans on the East-West, i.e. horizontal axis.<\/p><p style=\"font-weight: 400;\">Although most OT products work on intranet (closed circuit \/ closed to the internet) systems, information security gaps can occur at many points with different integrations. One of the biggest problems in OT technologies is visibility. One of the reasons for this is that there are too many devices in the structures and the structure is constantly being expanded uncontrollably by making additions. In addition, it can be added that a structure of this size cannot be intervened without any problems. Both the fact that critical services are running on it and that very serious financial losses can be experienced in the event of a problem can cause obstacles by the management in making the necessary improvements and\/or security additions.<\/p><p style=\"font-weight: 400;\">To prevent similar situations from occurring, Cisco aims to prevent such problems with its Cyber \u200b\u200bVision product, which increases the visibility of OT environments, reveals existing threats, and creates existing inventories.<\/p><p><img decoding=\"async\" src=\"https:\/\/www.morten.com.tr\/UpImages\/image20201126170003.png\" \/><\/p><p style=\"font-weight: 400;\">Cyber \u200b\u200bVision to your institution;<\/p><ul><li style=\"font-weight: 400;\">Providing full visibility for OT environments (assets and processes)<\/li><li style=\"font-weight: 400;\">Real-time monitoring of your dynamically changing inventory and network<\/li><\/ul><p style=\"font-weight: 400;\">( Dynamic Asset Management and Monitoring )<\/p><ul><li style=\"font-weight: 400;\">Providing the same information security for the OT network as for IT,<\/li><li style=\"font-weight: 400;\">It will take your organization's security to the next level with comprehensive threat intelligence.<\/li><\/ul><p style=\"font-weight: 400;\"><b><strong>Security Assessments<\/strong><\/b><\/p><p style=\"font-weight: 400;\">Securing your OT infrastructure starts with a clear view of your asset inventory, communication models, and accurately positioned network maps (network topologies). Cyber \u200b\u200bVision automatically generates a list of your industrial assets and detailed network maps.<\/p><p>\u00a0<img decoding=\"async\" src=\"https:\/\/www.morten.com.tr\/UpImages\/image20201126170025.png\" \/><\/p><p style=\"font-weight: 400;\"><b><strong>Network Segmentation<\/strong><\/b><\/p><p style=\"font-weight: 400;\">Industrial security applications (best practices) recommend that networks be moved to compatible architectures, and in order to prevent a possible attack from spreading to the entire architecture, network segmentation and the ability to create policies between these segmented networks provide great benefits to institutions in terms of information security vulnerabilities. In this area, Cisco Cyber \u200b\u200bVision product integrates with Cisco ISE (Identity Service Engine) to create asset groups and enables segmentation policies to be applied dynamically (dynamic network segmentation).<\/p><p style=\"box-sizing: inherit; margin-bottom: 1rem; font-size: 14px; line-height: 25px; text-rendering: optimizelegibility; color: #444444; font-family: 'Open Sans', sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; background-color: #fefefe; text-align: center;\">\u00a0<img decoding=\"async\" style=\"box-sizing: inherit; vertical-align: middle; border-width: 0px; border-style: initial; display: inline-block; padding-bottom: 10px; padding-right: 10px;\" src=\"https:\/\/www.morten.com.tr\/UpImages\/image20201126170047.png\" \/><\/p><p style=\"box-sizing: inherit; margin-bottom: 1rem; font-size: 14px; line-height: 25px; text-rendering: optimizelegibility; color: #444444; font-family: 'Open Sans', sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; background-color: #fefefe; text-align: center;\"><img decoding=\"async\" style=\"box-sizing: inherit; vertical-align: middle; border-width: 0px; border-style: initial; display: inline-block; padding-bottom: 10px; padding-right: 10px;\" src=\"https:\/\/www.morten.com.tr\/UpImages\/image20201126170225.png\" \/><\/p><p style=\"font-weight: 400;\">Standard IT cyber security solutions and methods may not always be sufficient to meet OT cyber security needs. In response to this need, Cisco has introduced its Cyber \u200b\u200bVision product for the security of OT technologies.<\/p><p style=\"font-weight: 400;\"><b><strong>Chapter 2: Cyber \u200b\u200bVision Installation<\/strong><\/b><\/p><p style=\"font-weight: 400;\">To download Cyber \u200b\u200bVision Center software;<\/p><p style=\"font-weight: 400;\"><a href=\"https:\/\/software.cisco.com\/download\/home\/286325414\/type\">https:\/\/software.cisco.com\/download\/home\/286325414\/type<\/a><\/p><p style=\"font-weight: 400;\">Features required for a virtual environment;<\/p><p style=\"font-weight: 400;\">You can install and test Cyber \u200b\u200bVision Center in a virtual environment with 2 CPUs, 6G RAM and 50GB HDD.<\/p><p><img decoding=\"async\" src=\"https:\/\/www.morten.com.tr\/UpImages\/image20201126170303.png\" \/><\/p><p style=\"font-weight: 400;\">The installation steps are as follows;<\/p><ul><li style=\"font-weight: 400;\">Cyber \u200b\u200bVision software is downloaded from Cisco's website<img decoding=\"async\" src=\"https:\/\/www.morten.com.tr\/UpImages\/image20201126170318.png\" \/><\/li><\/ul><ul><li style=\"font-weight: 400;\">The downloaded .ova file is uploaded to the virtual environment.<\/li><\/ul><p><img decoding=\"async\" src=\"https:\/\/www.morten.com.tr\/UpImages\/image20201126170421.png\" \/><\/p><ul><li>The installed virtual machine is opened and the system is started.<\/li><\/ul><p><img decoding=\"async\" src=\"https:\/\/www.morten.com.tr\/UpImages\/image20201126170431.png\" \/><\/p><ul><li style=\"font-weight: 400;\">Click \u201cStart\u201d to start the Cyber \u200b\u200bVision Center installation.<\/li><\/ul><p><img decoding=\"async\" src=\"https:\/\/www.morten.com.tr\/UpImages\/image20201126170446.png\" \/><\/p><ul><li style=\"font-weight: 400;\">Relevant DHCP settings are made.<\/li><\/ul><div><p style=\"box-sizing: inherit; margin-bottom: 1rem; font-size: 14px; line-height: 25px; text-rendering: optimizelegibility; color: #444444; font-family: 'Open Sans', sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; background-color: #fefefe; text-align: center;\" align=\"center\"><img decoding=\"async\" style=\"box-sizing: inherit; vertical-align: middle; border-width: 0px; border-style: initial; display: inline-block; padding-bottom: 10px; padding-right: 10px;\" src=\"https:\/\/www.morten.com.tr\/UpImages\/image20201126170545.png\" \/><\/p><p style=\"box-sizing: inherit; margin-bottom: 1rem; font-size: 14px; line-height: 25px; text-rendering: optimizelegibility; color: #444444; font-family: 'Open Sans', sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; background-color: #fefefe; text-align: center;\" align=\"center\"><img decoding=\"async\" style=\"box-sizing: inherit; vertical-align: middle; border-width: 0px; border-style: initial; display: inline-block; padding-bottom: 10px; padding-right: 10px;\" src=\"https:\/\/www.morten.com.tr\/UpImages\/image20201126170624.png\" \/><\/p><ul><li style=\"font-weight: 400;\">Once the configuration is complete, the necessary information is entered into the Cyber \u200b\u200bVision Center interface.<\/li><\/ul><p><img decoding=\"async\" src=\"https:\/\/www.morten.com.tr\/UpImages\/image20201126170649.png\" \/><\/p><p style=\"font-weight: 400;\">The Cyber \u200b\u200bVision Center main screen is designed very simply and the Dashboard screen includes event levels with descriptions as critical, high, medium and low.<\/p><p><img decoding=\"async\" src=\"https:\/\/www.morten.com.tr\/UpImages\/image20201126170700.png\" \/><\/p><p style=\"font-weight: 400;\">If we need to summarize Cyber \u200b\u200bVision in 4 main features, we can summarize it as collecting all the information of the inventories by collecting meaningful information from your OT network via passive sensors using DPI technology; taking these inventories under control, generating an alarm when any possible opening\/anomaly is detected and finally, providing comparative data for taking action by examining the records of past traffic movements.<\/p><p style=\"box-sizing: inherit; margin-bottom: 1rem; font-size: 14px; line-height: 25px; text-rendering: optimizelegibility; color: #444444; font-family: 'Open Sans', sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; background-color: #fefefe; text-align: center;\"><img decoding=\"async\" style=\"box-sizing: inherit; vertical-align: middle; border-width: 0px; border-style: initial; display: inline-block; padding-bottom: 10px; padding-right: 10px;\" src=\"https:\/\/www.morten.com.tr\/UpImages\/image20201126170730.png\" \/><img decoding=\"async\" style=\"box-sizing: inherit; vertical-align: middle; border-width: 0px; border-style: initial; display: inline-block; padding-bottom: 10px; padding-right: 10px;\" src=\"https:\/\/www.morten.com.tr\/UpImages\/image20201126170736.png\" \/><\/p><p style=\"box-sizing: inherit; margin-bottom: 1rem; font-size: 14px; line-height: 25px; text-rendering: optimizelegibility; color: #444444; font-family: 'Open Sans', sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; background-color: #fefefe; text-align: center;\"><img decoding=\"async\" style=\"box-sizing: inherit; vertical-align: middle; border-width: 0px; border-style: initial; display: inline-block; padding-bottom: 10px; padding-right: 10px;\" src=\"https:\/\/www.morten.com.tr\/UpImages\/image20201126170744.png\" \/><img decoding=\"async\" style=\"box-sizing: inherit; vertical-align: middle; border-width: 0px; border-style: initial; display: inline-block; padding-bottom: 10px; padding-right: 10px;\" src=\"https:\/\/www.morten.com.tr\/UpImages\/image20201126170748.png\" \/><\/p><p style=\"font-weight: 400;\">There are 2 options for Cyber \u200b\u200bVision Licensing. Essential and Advantage licenses. In addition\u00a0<\/p><p style=\"font-weight: 400;\"><img decoding=\"async\" style=\"box-sizing: inherit; vertical-align: middle; border-width: 0px; border-style: initial; display: inline-block; color: #444444; font-family: 'Open Sans', sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; text-align: center; background-color: #fefefe; padding-bottom: 10px; padding-right: 10px;\" src=\"https:\/\/www.morten.com.tr\/UpImages\/image20201126170805.png\" \/><\/p><p style=\"font-weight: 400;\">As with many of Cisco's security products, a 90-day Essential or Advantage trial license is available.<\/p><p style=\"box-sizing: inherit; margin-bottom: 1rem; font-size: 14px; line-height: 25px; text-rendering: optimizelegibility; color: #444444; font-family: 'Open Sans', sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; background-color: #fefefe; text-align: center;\" align=\"center\"><img decoding=\"async\" style=\"box-sizing: inherit; vertical-align: middle; border-width: 0px; border-style: initial; display: inline-block; padding-bottom: 10px; padding-right: 10px;\" src=\"https:\/\/www.morten.com.tr\/UpImages\/image20201126170813.png\" \/><\/p><p style=\"box-sizing: inherit; margin-bottom: 1rem; font-size: 14px; line-height: 25px; text-rendering: optimizelegibility; color: #444444; font-family: 'Open Sans', sans-serif; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; background-color: #fefefe; text-align: center;\" align=\"center\"><img decoding=\"async\" style=\"box-sizing: inherit; vertical-align: middle; border-width: 0px; border-style: initial; display: inline-block; padding-bottom: 10px; padding-right: 10px;\" src=\"https:\/\/www.morten.com.tr\/UpImages\/image20201126170821.png\" \/><\/p><p style=\"font-weight: 400;\">Cyber \u200b\u200bVision consists of 2 main components, Cyber \u200b\u200bvision center (Hardware and Software) and Sensors. Cyber \u200b\u200bvision center can be installed in a virtual environment.<\/p><p style=\"font-weight: 400;\">You can monitor security activities in your OT network from the Cyber \u200b\u200bVision Center interface.<\/p><p><img decoding=\"async\" src=\"https:\/\/www.morten.com.tr\/UpImages\/image20201126170831.png\" \/><\/p><\/div><p>With the Network Explore feature, the map of which TAGGED or unTAGED devices are communicating with whom will increase the visibility of your network.<\/p><p><img decoding=\"async\" src=\"https:\/\/www.morten.com.tr\/UpImages\/image20201126170838.png\" \/><\/p><p>You can easily access reports on what type of vulnerabilities there are in your network, the score information, and the vulnerabilities that need to be closed.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Author: Fatih Ermi\u015f | Solution Consultant<\/p>\n<p>Section 1: What is Cisco Cyber Vision?<\/p>\n<p>The layers of security required for IT are now a must for OT security as well.<\/p>","protected":false},"author":1,"featured_media":989893,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[115],"tags":[173],"class_list":["post-8408","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-blog","tag-cisco-cyber"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v25.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Operasyonel Teknolojilerin ( OT ) G\u00fcvenli\u011fi i\u00e7in Cisco Cyber Vision - Morten<\/title>\n<meta name=\"description\" content=\"Operasyonel Teknolojilerin ( OT ) G\u00fcvenli\u011fi i\u00e7in Cisco Cyber Vision - Morten\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.morten.com.tr\/en\/operasyonel-teknolojilerin-guvenligi-icin-cisco-cyber-vision\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Operasyonel Teknolojilerin ( OT ) G\u00fcvenli\u011fi i\u00e7in Cisco Cyber Vision\" \/>\n<meta property=\"og:description\" content=\"Operasyonel Teknolojilerin ( OT ) G\u00fcvenli\u011fi i\u00e7in Cisco Cyber Vision - Morten\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.morten.com.tr\/en\/operasyonel-teknolojilerin-guvenligi-icin-cisco-cyber-vision\/\" \/>\n<meta property=\"og:site_name\" content=\"Morten\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/BTEgitimMorten\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-26T05:08:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-27T11:29:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.morten.com.tr\/wp-content\/uploads\/2020\/11\/BLOG-Operasyonel-Teknolojilerin-OT-Guvenligi-icin-Cisco-Cyber-Vision-1-e1733402235364.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"386\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"dvususer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dvususer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.morten.com.tr\/operasyonel-teknolojilerin-guvenligi-icin-cisco-cyber-vision\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.morten.com.tr\/operasyonel-teknolojilerin-guvenligi-icin-cisco-cyber-vision\/\"},\"author\":{\"name\":\"dvususer\",\"@id\":\"https:\/\/www.morten.com.tr\/#\/schema\/person\/91a44ec134dd4d2bda435ff6c6975820\"},\"headline\":\"Operasyonel Teknolojilerin ( OT ) G\u00fcvenli\u011fi i\u00e7in Cisco Cyber Vision\",\"datePublished\":\"2020-11-26T05:08:07+00:00\",\"dateModified\":\"2025-01-27T11:29:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.morten.com.tr\/operasyonel-teknolojilerin-guvenligi-icin-cisco-cyber-vision\/\"},\"wordCount\":963,\"publisher\":{\"@id\":\"https:\/\/www.morten.com.tr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.morten.com.tr\/operasyonel-teknolojilerin-guvenligi-icin-cisco-cyber-vision\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.morten.com.tr\/wp-content\/uploads\/2020\/11\/BLOG-Operasyonel-Teknolojilerin-OT-Guvenligi-icin-Cisco-Cyber-Vision-1-e1733402235364.jpg\",\"keywords\":[\"Cisco Cyber\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.morten.com.tr\/operasyonel-teknolojilerin-guvenligi-icin-cisco-cyber-vision\/\",\"url\":\"https:\/\/www.morten.com.tr\/operasyonel-teknolojilerin-guvenligi-icin-cisco-cyber-vision\/\",\"name\":\"Operasyonel Teknolojilerin ( OT ) G\u00fcvenli\u011fi i\u00e7in Cisco Cyber Vision - Morten\",\"isPartOf\":{\"@id\":\"https:\/\/www.morten.com.tr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.morten.com.tr\/operasyonel-teknolojilerin-guvenligi-icin-cisco-cyber-vision\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.morten.com.tr\/operasyonel-teknolojilerin-guvenligi-icin-cisco-cyber-vision\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.morten.com.tr\/wp-content\/uploads\/2020\/11\/BLOG-Operasyonel-Teknolojilerin-OT-Guvenligi-icin-Cisco-Cyber-Vision-1-e1733402235364.jpg\",\"datePublished\":\"2020-11-26T05:08:07+00:00\",\"dateModified\":\"2025-01-27T11:29:24+00:00\",\"description\":\"Operasyonel Teknolojilerin ( OT ) G\u00fcvenli\u011fi i\u00e7in Cisco Cyber Vision - Morten\",\"breadcrumb\":{\"@id\":\"https:\/\/www.morten.com.tr\/operasyonel-teknolojilerin-guvenligi-icin-cisco-cyber-vision\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.morten.com.tr\/operasyonel-teknolojilerin-guvenligi-icin-cisco-cyber-vision\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.morten.com.tr\/operasyonel-teknolojilerin-guvenligi-icin-cisco-cyber-vision\/#primaryimage\",\"url\":\"https:\/\/www.morten.com.tr\/wp-content\/uploads\/2020\/11\/BLOG-Operasyonel-Teknolojilerin-OT-Guvenligi-icin-Cisco-Cyber-Vision-1-e1733402235364.jpg\",\"contentUrl\":\"https:\/\/www.morten.com.tr\/wp-content\/uploads\/2020\/11\/BLOG-Operasyonel-Teknolojilerin-OT-Guvenligi-icin-Cisco-Cyber-Vision-1-e1733402235364.jpg\",\"width\":800,\"height\":386},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.morten.com.tr\/operasyonel-teknolojilerin-guvenligi-icin-cisco-cyber-vision\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.morten.com.tr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Operasyonel Teknolojilerin ( OT ) G\u00fcvenli\u011fi i\u00e7in Cisco Cyber Vision\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.morten.com.tr\/#website\",\"url\":\"https:\/\/www.morten.com.tr\/\",\"name\":\"Morten\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.morten.com.tr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.morten.com.tr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.morten.com.tr\/#organization\",\"name\":\"Morten Bilgi ve \u0130leti\u015fim Hizmetleri A.\u015e.\",\"alternateName\":\"Morten\",\"url\":\"https:\/\/www.morten.com.tr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.morten.com.tr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.morten.com.tr\/wp-content\/uploads\/2024\/11\/mortenbt.webp\",\"contentUrl\":\"https:\/\/www.morten.com.tr\/wp-content\/uploads\/2024\/11\/mortenbt.webp\",\"width\":265,\"height\":116,\"caption\":\"Morten Bilgi ve \u0130leti\u015fim Hizmetleri A.\u015e.\"},\"image\":{\"@id\":\"https:\/\/www.morten.com.tr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/BTEgitimMorten\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.morten.com.tr\/#\/schema\/person\/91a44ec134dd4d2bda435ff6c6975820\",\"name\":\"dvususer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.morten.com.tr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ddb6fbf1df37151ad4ff2c3518920a29?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ddb6fbf1df37151ad4ff2c3518920a29?s=96&d=mm&r=g\",\"caption\":\"dvususer\"},\"sameAs\":[\"https:\/\/www.morten.com.tr\"],\"url\":\"https:\/\/www.morten.com.tr\/en\/author\/dvususer\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Operasyonel Teknolojilerin ( OT ) G\u00fcvenli\u011fi i\u00e7in Cisco Cyber Vision - Morten","description":"Operasyonel Teknolojilerin ( OT ) G\u00fcvenli\u011fi i\u00e7in Cisco Cyber Vision - Morten","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.morten.com.tr\/en\/operasyonel-teknolojilerin-guvenligi-icin-cisco-cyber-vision\/","og_locale":"en_US","og_type":"article","og_title":"Operasyonel Teknolojilerin ( OT ) G\u00fcvenli\u011fi i\u00e7in Cisco Cyber Vision","og_description":"Operasyonel Teknolojilerin ( OT ) G\u00fcvenli\u011fi i\u00e7in Cisco Cyber Vision - Morten","og_url":"https:\/\/www.morten.com.tr\/en\/operasyonel-teknolojilerin-guvenligi-icin-cisco-cyber-vision\/","og_site_name":"Morten","article_publisher":"https:\/\/www.facebook.com\/BTEgitimMorten","article_published_time":"2020-11-26T05:08:07+00:00","article_modified_time":"2025-01-27T11:29:24+00:00","og_image":[{"width":800,"height":386,"url":"https:\/\/www.morten.com.tr\/wp-content\/uploads\/2020\/11\/BLOG-Operasyonel-Teknolojilerin-OT-Guvenligi-icin-Cisco-Cyber-Vision-1-e1733402235364.jpg","type":"image\/jpeg"}],"author":"dvususer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dvususer","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.morten.com.tr\/operasyonel-teknolojilerin-guvenligi-icin-cisco-cyber-vision\/#article","isPartOf":{"@id":"https:\/\/www.morten.com.tr\/operasyonel-teknolojilerin-guvenligi-icin-cisco-cyber-vision\/"},"author":{"name":"dvususer","@id":"https:\/\/www.morten.com.tr\/#\/schema\/person\/91a44ec134dd4d2bda435ff6c6975820"},"headline":"Operasyonel Teknolojilerin ( OT ) G\u00fcvenli\u011fi i\u00e7in Cisco Cyber Vision","datePublished":"2020-11-26T05:08:07+00:00","dateModified":"2025-01-27T11:29:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.morten.com.tr\/operasyonel-teknolojilerin-guvenligi-icin-cisco-cyber-vision\/"},"wordCount":963,"publisher":{"@id":"https:\/\/www.morten.com.tr\/#organization"},"image":{"@id":"https:\/\/www.morten.com.tr\/operasyonel-teknolojilerin-guvenligi-icin-cisco-cyber-vision\/#primaryimage"},"thumbnailUrl":"https:\/\/www.morten.com.tr\/wp-content\/uploads\/2020\/11\/BLOG-Operasyonel-Teknolojilerin-OT-Guvenligi-icin-Cisco-Cyber-Vision-1-e1733402235364.jpg","keywords":["Cisco Cyber"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.morten.com.tr\/operasyonel-teknolojilerin-guvenligi-icin-cisco-cyber-vision\/","url":"https:\/\/www.morten.com.tr\/operasyonel-teknolojilerin-guvenligi-icin-cisco-cyber-vision\/","name":"Operasyonel Teknolojilerin ( OT ) G\u00fcvenli\u011fi i\u00e7in Cisco Cyber Vision - Morten","isPartOf":{"@id":"https:\/\/www.morten.com.tr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.morten.com.tr\/operasyonel-teknolojilerin-guvenligi-icin-cisco-cyber-vision\/#primaryimage"},"image":{"@id":"https:\/\/www.morten.com.tr\/operasyonel-teknolojilerin-guvenligi-icin-cisco-cyber-vision\/#primaryimage"},"thumbnailUrl":"https:\/\/www.morten.com.tr\/wp-content\/uploads\/2020\/11\/BLOG-Operasyonel-Teknolojilerin-OT-Guvenligi-icin-Cisco-Cyber-Vision-1-e1733402235364.jpg","datePublished":"2020-11-26T05:08:07+00:00","dateModified":"2025-01-27T11:29:24+00:00","description":"Operasyonel Teknolojilerin ( OT ) G\u00fcvenli\u011fi i\u00e7in Cisco Cyber Vision - Morten","breadcrumb":{"@id":"https:\/\/www.morten.com.tr\/operasyonel-teknolojilerin-guvenligi-icin-cisco-cyber-vision\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.morten.com.tr\/operasyonel-teknolojilerin-guvenligi-icin-cisco-cyber-vision\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.morten.com.tr\/operasyonel-teknolojilerin-guvenligi-icin-cisco-cyber-vision\/#primaryimage","url":"https:\/\/www.morten.com.tr\/wp-content\/uploads\/2020\/11\/BLOG-Operasyonel-Teknolojilerin-OT-Guvenligi-icin-Cisco-Cyber-Vision-1-e1733402235364.jpg","contentUrl":"https:\/\/www.morten.com.tr\/wp-content\/uploads\/2020\/11\/BLOG-Operasyonel-Teknolojilerin-OT-Guvenligi-icin-Cisco-Cyber-Vision-1-e1733402235364.jpg","width":800,"height":386},{"@type":"BreadcrumbList","@id":"https:\/\/www.morten.com.tr\/operasyonel-teknolojilerin-guvenligi-icin-cisco-cyber-vision\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.morten.com.tr\/"},{"@type":"ListItem","position":2,"name":"Operasyonel Teknolojilerin ( OT ) G\u00fcvenli\u011fi i\u00e7in Cisco Cyber Vision"}]},{"@type":"WebSite","@id":"https:\/\/www.morten.com.tr\/#website","url":"https:\/\/www.morten.com.tr\/","name":"Morten","description":"","publisher":{"@id":"https:\/\/www.morten.com.tr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.morten.com.tr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.morten.com.tr\/#organization","name":"Morten Information and Communication Services Inc.","alternateName":"Morten","url":"https:\/\/www.morten.com.tr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.morten.com.tr\/#\/schema\/logo\/image\/","url":"https:\/\/www.morten.com.tr\/wp-content\/uploads\/2024\/11\/mortenbt.webp","contentUrl":"https:\/\/www.morten.com.tr\/wp-content\/uploads\/2024\/11\/mortenbt.webp","width":265,"height":116,"caption":"Morten Bilgi ve \u0130leti\u015fim Hizmetleri A.\u015e."},"image":{"@id":"https:\/\/www.morten.com.tr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/BTEgitimMorten"]},{"@type":"Person","@id":"https:\/\/www.morten.com.tr\/#\/schema\/person\/91a44ec134dd4d2bda435ff6c6975820","name":"dvususer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.morten.com.tr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ddb6fbf1df37151ad4ff2c3518920a29?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ddb6fbf1df37151ad4ff2c3518920a29?s=96&d=mm&r=g","caption":"dvususer"},"sameAs":["https:\/\/www.morten.com.tr"],"url":"https:\/\/www.morten.com.tr\/en\/author\/dvususer\/"}]}},"_links":{"self":[{"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/posts\/8408"}],"collection":[{"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/comments?post=8408"}],"version-history":[{"count":16,"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/posts\/8408\/revisions"}],"predecessor-version":[{"id":995672,"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/posts\/8408\/revisions\/995672"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/media\/989893"}],"wp:attachment":[{"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/media?parent=8408"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/categories?post=8408"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/tags?post=8408"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}