{"id":1707,"date":"2025-03-25T20:50:34","date_gmt":"2025-03-25T17:50:34","guid":{"rendered":"https:\/\/cbernet.com\/eks-scada-security-solutions\/"},"modified":"2025-04-10T19:19:24","modified_gmt":"2025-04-10T16:19:24","slug":"eks-scada-security-solutions","status":"publish","type":"page","link":"https:\/\/cbernet.com\/en\/eks-scada-security-solutions\/","title":{"rendered":"EKS\/SCADA Security Solutions"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1707\" class=\"elementor elementor-1707 elementor-592\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1e0f05a e-con-full e-flex e-con e-parent\" data-id=\"1e0f05a\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;background_motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-feffe8e elementor-widget elementor-widget-heading\" data-id=\"feffe8e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">EKS\/SCADA Security Solutions<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-288c779 e-con-full e-flex e-con e-parent\" data-id=\"288c779\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-a94ee39 e-con-full e-flex e-con e-child\" data-id=\"a94ee39\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8864001 elementor-widget elementor-widget-text-editor\" data-id=\"8864001\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In a digitalized industrial world, Industrial Control Systems (ICS) and SCADA infrastructures form the backbone of critical systems from manufacturing to energy, transportation to water management. However, these systems require different and much more sensitive protection than traditional IT security approaches. The increasing sophistication of cyber threats makes production lines, power plants, oil refineries and other critical infrastructure facilities attractive targets for cyber attackers.  <\/p><p>As CBERNET, we guarantee the continuity and security of your business with the innovative solutions we offer in the field of ECS\/SCADA security. By protecting your critical systems from unauthorized access, malware and threats that can cause operational interruptions, we create a safer, more resilient and fully compliant infrastructure. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-99fd421 elementor-widget elementor-widget-heading\" data-id=\"99fd421\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">A Powerful Cybersecurity Shield for Your Industrial Systems<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb2be65 elementor-widget elementor-widget-text-editor\" data-id=\"bb2be65\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Securing SCADA and ECS infrastructures requires much more than just adding a firewall. To build a strong security architecture, we create a security model that proactively detects cyber threats, protects against attacks and works without disrupting operational efficiency. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-43978de elementor-widget elementor-widget-heading\" data-id=\"43978de\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">EKS\/SCADA Security Solutions<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-08eeeed elementor-widget elementor-widget-etheme_timeline\" data-id=\"08eeeed\" data-element_type=\"widget\" data-widget_type=\"etheme_timeline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        \n        <div class=\"etheme-timeline-wrapper\" data-layout=\"left\" data-step-position=\"top\" data-item-animation=\"auto\">\n            \n            <div class=\"etheme-timeline-connector\">\n                <div class=\"etheme-timeline-connector-inner\"><\/div>\n            <\/div>\n\n            <div class=\"etheme-timeline-items\">\n                                    \n                    <div class=\"etheme-timeline-item elementor-repeater-item-60b5edf\">\n                        \n                        <span class=\"etheme-timeline-step etheme-timeline-dot\"><\/span>\t\n\t                        \n                        <div class=\"etheme-timeline-content\">\n                            \n                                                        \n                            <div class=\"etheme-timeline-content-inner\">\n\t\n\t                                                                <h3 class=\"etheme-timeline-title\">\n                                        Network Segmentation and Microzonation                                    <\/h3>\n                                                                    <div class=\"etheme-timeline-description\">\n                                        Traditional network structures create a wide range of motion for cyber attackers. With network segmentation and micro zoning techniques, we minimize the attack surface by isolating OT environments. We provide secure communication and controlled access with DMZ structures, VLAN security policies and industrial firewalls.                                      <\/div>\n                                                        \n                            <\/div>\n                        \n                        <\/div>\n                        \n                    <\/div>\n                    \n                                    \n                    <div class=\"etheme-timeline-item elementor-repeater-item-2ba60b4\">\n                        \n                        <span class=\"etheme-timeline-step etheme-timeline-dot\"><\/span>\t\n\t                        \n                        <div class=\"etheme-timeline-content\">\n                            \n                                                        \n                            <div class=\"etheme-timeline-content-inner\">\n\t\n\t                                                                <h3 class=\"etheme-timeline-title\">\n                                        SCADA, PLC and Industrial Device Security                                    <\/h3>\n                                                                    <div class=\"etheme-timeline-description\">\n                                        Systems such as SCADA, PLC, RTU and HMI, which are the heart of industrial processes, are vulnerable targets for cyber attacks. We develop special security policies and protection mechanisms to protect these systems from unauthorized access, malware and anomalous behavior.                                     <\/div>\n                                                        \n                            <\/div>\n                        \n                        <\/div>\n                        \n                    <\/div>\n                    \n                                    \n                    <div class=\"etheme-timeline-item elementor-repeater-item-c34b747\">\n                        \n                        <span class=\"etheme-timeline-step etheme-timeline-dot\"><\/span>\t\n\t                        \n                        <div class=\"etheme-timeline-content\">\n                            \n                                                        \n                            <div class=\"etheme-timeline-content-inner\">\n\t\n\t                                                                <h3 class=\"etheme-timeline-title\">\n                                        Anomaly Detection and Real-Time Monitoring                                    <\/h3>\n                                                                    <div class=\"etheme-timeline-description\">\n                                        Attacks often go unnoticed in the first place. With advanced threat detection systems, we detect anomalous traffic movements and suspicious activities in your OT environments and block threats before they can harm your systems.                                     <\/div>\n                                                        \n                            <\/div>\n                        \n                        <\/div>\n                        \n                    <\/div>\n                    \n                                    \n                    <div class=\"etheme-timeline-item elementor-repeater-item-be9debb\">\n                        \n                        <span class=\"etheme-timeline-step etheme-timeline-dot\"><\/span>\t\n\t                        \n                        <div class=\"etheme-timeline-content\">\n                            \n                                                        \n                            <div class=\"etheme-timeline-content-inner\">\n\t\n\t                                                                <h3 class=\"etheme-timeline-title\">\n                                        Identity and Access Management (IAM &amp; PAM)                                    <\/h3>\n                                                                    <div class=\"etheme-timeline-description\">\n                                        Unauthorized access to EKS systems can cause major operational losses. With multi-factor authentication (MFA), privileged access management (PAM) and access control mechanisms, we ensure that only authorized personnel can access the relevant systems.                                     <\/div>\n                                                        \n                            <\/div>\n                        \n                        <\/div>\n                        \n                    <\/div>\n                    \n                                    \n                    <div class=\"etheme-timeline-item elementor-repeater-item-494335b\">\n                        \n                        <span class=\"etheme-timeline-step etheme-timeline-dot\"><\/span>\t\n\t                        \n                        <div class=\"etheme-timeline-content\">\n                            \n                                                        \n                            <div class=\"etheme-timeline-content-inner\">\n\t\n\t                                                                <h3 class=\"etheme-timeline-title\">\n                                        Regulatory and Standard Compliance                                    <\/h3>\n                                                                    <div class=\"etheme-timeline-description\">\n                                        In energy, production and other critical sectors, full compliance with international and national regulations is a critical requirement. We create security architecture in accordance with IEC 62443, NIST 800-82, ISO 27001 and EMRA regulations and support organizations in audit processes.                                     <\/div>\n                                                        \n                            <\/div>\n                        \n                        <\/div>\n                        \n                    <\/div>\n                    \n                                \n            <\/div>\n\n                        \n        <\/div>\n        \n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-462986c e-con-full e-flex e-con e-child\" data-id=\"462986c\" data-element_type=\"container\" data-settings=\"{&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_parent&quot;:&quot;yes&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;sticky_offset&quot;:0,&quot;sticky_effects_offset&quot;:0,&quot;sticky_anchor_link_offset&quot;:0}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-84524a9 elementor-widget elementor-widget-image\" data-id=\"84524a9\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1000\" height=\"700\" src=\"https:\/\/cbernet.com\/wp-content\/uploads\/xstore\/xstore-placeholder-1024x1024.png\" class=\"attachment-large size-large wp-image-1585 lazyload lazyload-simple et-lazyload-fadeIn\" alt=\"\" sizes=\"(max-width: 1000px) 100vw, 1000px\" data-src=\"https:\/\/cbernet.com\/wp-content\/uploads\/2025\/03\/cozumler-eks-scada-02.jpg\" data-srcset=\"https:\/\/cbernet.com\/wp-content\/uploads\/2025\/03\/cozumler-eks-scada-02.jpg 1000w, https:\/\/cbernet.com\/wp-content\/uploads\/2025\/03\/cozumler-eks-scada-02-300x210.jpg 300w, https:\/\/cbernet.com\/wp-content\/uploads\/2025\/03\/cozumler-eks-scada-02-768x538.jpg 768w, https:\/\/cbernet.com\/wp-content\/uploads\/2025\/03\/cozumler-eks-scada-02-1x1.jpg 1w, https:\/\/cbernet.com\/wp-content\/uploads\/2025\/03\/cozumler-eks-scada-02-10x7.jpg 10w\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab157a6 elementor-widget elementor-widget-heading\" data-id=\"ab157a6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Our Solutions<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d21b54 elementor-widget elementor-widget-etheme_static_block\" data-id=\"5d21b54\" data-element_type=\"widget\" data-widget_type=\"etheme_static_block.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t    <div class=\"etheme-static_block-wrapper\">\n\t            <div class=\"et-no-preview\"><h3>8theme - Static Block<\/h3><p>No preview available.<\/p><\/div><style>\n                .et-no-preview{\n                    font-size: 13px;\n                    background: #f0f0f0;\n                    padding: 8px 12px;\n                    color: #000;\n                    font-family: -apple-system,BlinkMacSystemFont,Segoe UI,Roboto,Oxygen-Sans,Ubuntu,Cantarell,Helvetica Neue,sans-serif;\n                }\n                .et-no-preview h3 {\n                    font-size: 14px;\n                    font-family: inherit;\n                    font-weight: 600;\n                    margin: 4px 0;\n                }\n                .et-no-preview p {\n                    margin: 4px 0;\n                    font-size: 13px;\n                }\n            <\/style>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1d3ac07 e-con-full e-flex e-con e-parent\" data-id=\"1d3ac07\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-23fa350 e-con-full e-flex e-con e-child\" data-id=\"23fa350\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f7dda79 e-con-full e-flex e-con e-child\" data-id=\"f7dda79\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4659912 elementor-widget elementor-widget-heading\" data-id=\"4659912\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Sustainable<br>For your safety<br><strong>Contact<\/strong> us<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-36f0e10 e-con-full e-flex e-con e-child\" data-id=\"36f0e10\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-44f2ee6 etheme-contact-form-7-button-custom elementor-widget elementor-widget-et-contact-form-7\" data-id=\"44f2ee6\" data-element_type=\"widget\" data-widget_type=\"et-contact-form-7.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t                <div class=\"pp-contact-form etheme-contact-form-7 placeholder-show\">\n                                        \n<div class=\"wpcf7 no-js\" id=\"wpcf7-f1676-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"1676\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/pages\/1707#wpcf7-f1676-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"1676\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.4\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f1676-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/fieldset>\n<p><label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" autocomplete=\"name\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Your Name &amp; Surname\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span> <\/label>\n<\/p>\n<p><label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" autocomplete=\"email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Your Email Address\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span> <\/label>\n<\/p>\n<p><label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"phone-number\"><input size=\"40\" maxlength=\"400\" minlength=\"3\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Your Phone Number\" value=\"\" type=\"tel\" name=\"phone-number\" \/><\/span><\/label>\n<\/p>\n<p><label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-message\"><textarea cols=\"40\" rows=\"10\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea\" aria-invalid=\"false\" placeholder=\"Your message\" name=\"your-message\"><\/textarea><\/span> <\/label>\n<\/p>\n<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Send\" \/>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n                <\/div>\n                \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d8959f5 e-con-full e-flex e-con e-child\" data-id=\"d8959f5\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6d0e0de e-con-full e-flex e-con e-child\" data-id=\"6d0e0de\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8c980a7 elementor-icon-list--layout-inline elementor-align-left elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"8c980a7\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"tel:+90%20312%20285%2026%2076%20\" target=\"_blank\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-phone\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M493.4 24.6l-104-24c-11.3-2.6-22.9 3.3-27.5 13.9l-48 112c-4.2 9.8-1.4 21.3 6.9 28l60.6 49.6c-36 76.7-98.9 140.5-177.2 177.2l-49.6-60.6c-6.8-8.3-18.2-11.1-28-6.9l-112 48C3.9 366.5-2 378.1.6 389.4l24 104C27.1 504.2 36.7 512 48 512c256.1 0 464-207.5 464-464 0-11.2-7.7-20.9-18.6-23.4z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">+90 312 285 26 76  <\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-870f18c e-con-full e-flex e-con e-child\" data-id=\"870f18c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-510f8cb elementor-icon-list--layout-inline elementor-align-left elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"510f8cb\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"mailto:info@cbernet.com\" target=\"_blank\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-envelope\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M464 64H48C21.49 64 0 85.49 0 112v288c0 26.51 21.49 48 48 48h416c26.51 0 48-21.49 48-48V112c0-26.51-21.49-48-48-48zm0 48v40.805c-22.422 18.259-58.168 46.651-134.587 106.49-16.841 13.247-50.201 45.072-73.413 44.701-23.208.375-56.579-31.459-73.413-44.701C106.18 199.465 70.425 171.067 48 152.805V112h416zM48 400V214.398c22.914 18.251 55.409 43.862 104.938 82.646 21.857 17.205 60.134 55.186 103.062 54.955 42.717.231 80.509-37.199 103.053-54.947 49.528-38.783 82.032-64.401 104.947-82.653V400H48z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">info@cbernet.com<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0660e1a e-con-full e-flex e-con e-child\" data-id=\"0660e1a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f393f74 elementor-icon-list--layout-inline elementor-align-right elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"f393f74\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-map-pin\" viewBox=\"0 0 288 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M112 316.94v156.69l22.02 33.02c4.75 7.12 15.22 7.12 19.97 0L176 473.63V316.94c-10.39 1.92-21.06 3.06-32 3.06s-21.61-1.14-32-3.06zM144 0C64.47 0 0 64.47 0 144s64.47 144 144 144 144-64.47 144-144S223.53 0 144 0zm0 76c-37.5 0-68 30.5-68 68 0 6.62-5.38 12-12 12s-12-5.38-12-12c0-50.73 41.28-92 92-92 6.62 0 12 5.38 12 12s-5.38 12-12 12z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">K\u0131z\u0131l\u0131rmak Mahallesi 1443.Cadde No:9 Ulusoy Plaza Kat:2 Daire:6 \u00c7ankaya \/ Ankara TURKEY<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>EKS\/SCADA Security Solutions In a digitalized industrial world, Industrial Control Systems (ICS) and SCADA infrastructures form the backbone of critical systems from manufacturing to energy,<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-1707","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/pages\/1707","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/comments?post=1707"}],"version-history":[{"count":1,"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/pages\/1707\/revisions"}],"predecessor-version":[{"id":1708,"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/pages\/1707\/revisions\/1708"}],"wp:attachment":[{"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/media?parent=1707"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}