{"id":806,"date":"2021-04-14T12:50:04","date_gmt":"2021-04-14T09:50:04","guid":{"rendered":"https:\/\/ebrarteknoloji.com\/?page_id=806"},"modified":"2021-12-05T15:44:40","modified_gmt":"2021-12-05T12:44:40","slug":"firewall","status":"publish","type":"page","link":"https:\/\/ebrarteknoloji.com\/index.php\/firewall\/","title":{"rendered":"G\u00fcvenlik Duvar\u0131 &#8211; Firewall"},"content":{"rendered":"<div data-colibri-id=\"806-c1\" class=\"style-979 style-local-806-c1 position-relative\">\n  <!---->\n  <div data-colibri-component=\"section\" data-colibri-id=\"806-c2\" id=\"content\" class=\"h-section h-section-global-spacing d-flex align-items-lg-center align-items-md-center align-items-center style-980 style-local-806-c2 position-relative\">\n    <!---->\n    <!---->\n    <div class=\"h-section-grid-container h-section-boxed-container\">\n      <div data-colibri-id=\"806-c9\" class=\"h-row-container gutters-row-lg-2 gutters-row-md-2 gutters-row-2 gutters-row-v-lg-2 gutters-row-v-md-2 gutters-row-v-2 style-984 style-local-806-c9 position-relative\">\n        <!---->\n        <div class=\"h-row justify-content-lg-center justify-content-md-center justify-content-center align-items-lg-stretch align-items-md-stretch align-items-stretch gutters-col-lg-2 gutters-col-md-2 gutters-col-2 gutters-col-v-lg-2 gutters-col-v-md-2 gutters-col-v-2\">\n          <!---->\n          <div class=\"h-column h-column-container d-flex h-col-lg-auto h-col-md-auto h-col-auto style-985-outer style-local-806-c10-outer\">\n            <div data-colibri-id=\"806-c10\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-2 h-px-md-2 h-px-0 v-inner-lg-2 v-inner-md-2 v-inner-0 style-985 style-local-806-c10 position-relative\">\n              <!---->\n              <!---->\n              <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n                <!---->\n                <div data-colibri-id=\"806-c11\" class=\"h-global-transition-all h-heading style-996 style-local-806-c11 position-relative h-element\">\n                  <!---->\n                  <div class=\"h-heading__outer style-996 style-local-806-c11\">\n                    <!---->\n                    <!---->\n                    <h2 class=\"\"><em style=\"font-family: &quot;Playfair Display&quot;; color: rgb(3, 169, 244);\">Poniva y\u00fcksek performansl\u0131 tehdit korumas\u0131<\/em><\/h2>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"806-c12\" class=\"h-global-transition-all h-heading style-986 style-local-806-c12 position-relative h-element\">\n                  <!---->\n                  <div class=\"h-heading__outer style-986 style-local-806-c12\">\n                    <!---->\n                    <!---->\n                    <h3 class=\"\">yeni nesil firewall UTM cihaz\u0131<\/h3>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"806-c13\" class=\"h-lead h-text h-text-component style-987 style-local-806-c13 position-relative h-element\">\n                  <!---->\n                  <!---->\n                  <div class=\"\">\n                    <p>Poniva G\u00fcvenlik Duvar\u0131&nbsp;\n                      <a href=\"https:\/\/www.pona.com.tr\/firewall-poniva-250-5651-yasal-loglama\" rel=\"noopener\" target=\"_blank\" style=\"color: inherit;\" class=\"customize-unpreviewable\">yeni nesil firewall<\/a><span style=\"color: inherit;\">&nbsp;UTM cihaz\u0131d\u0131r<\/span>. Daha kolay y\u00f6netmenizi sa\u011flamakla kalmaz, g\u00fc\u00e7l\u00fc performans\u0131 ile t\u00fcm i\u015flemler \u00e7ok h\u0131zl\u0131 ger\u00e7ekle\u015fir.\n                      <br>\n                      <br>H\u0131zl\u0131 ve otomatik koruma sa\u011flamak i\u00e7in tehditleri payla\u015f\u0131r.<\/p>\n                    <p>\u200bPONIVA Firewall, giri\u015f seviyesi donan\u0131m cihazlar\u0131ndan \u00fcst seviye cihazlara kadar en zorlu tehdit koruma performans gereksinimlerini kar\u015f\u0131lamak i\u00e7in bir\u00e7ok farkl\u0131 modeli olan&nbsp;\n                      <a href=\"https:\/\/www.pona.com.tr\/siber-guvenlik\" rel=\"noopener\" target=\"_blank\" style=\"color: inherit;\" class=\"customize-unpreviewable\">siber g\u00fcvenlik<\/a>&nbsp;\u00fcr\u00fcn\u00fcd\u00fcr. B\u00f6ylece ortam\u0131n\u0131za kolayca uyum sa\u011flar.<\/p>\n                    <p>\n                      <br>\n                    <\/p>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n      <div data-colibri-id=\"806-c3\" class=\"h-row-container gutters-row-lg-2 gutters-row-md-2 gutters-row-2 gutters-row-v-lg-2 gutters-row-v-md-2 gutters-row-v-2 style-981 style-local-806-c3 position-relative\">\n        <!---->\n        <div class=\"h-row justify-content-lg-center justify-content-md-center justify-content-center align-items-lg-stretch align-items-md-stretch align-items-stretch gutters-col-lg-2 gutters-col-md-2 gutters-col-2 gutters-col-v-lg-2 gutters-col-v-md-2 gutters-col-v-2\">\n          <!---->\n          <div class=\"h-column h-column-container d-flex h-col-lg-auto h-col-md-auto h-col-auto style-982-outer style-local-806-c4-outer\">\n            <div data-colibri-id=\"806-c4\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-0 h-px-md-0 h-px-0 v-inner-lg-0 v-inner-md-0 v-inner-0 style-982 style-local-806-c4 position-relative\">\n              <!---->\n              <!---->\n              <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n                <!---->\n                <div data-colibri-id=\"806-c5\" class=\"d-block style-983 style-local-806-c5 position-relative h-element\">\n                  <!---->\n                  <div class=\"h-image__frame-container-outer\">\n                    <a href=\"https:\/\/stm.pona.com.tr\/\" h-use-smooth-scroll=\"true\" class=\"image-link\">\n                      <div class=\"h-image__frame-container\">\n                        <!---->\n                        <!---->\n                        <img decoding=\"async\" width=\"800\" height=\"389\" src=\"https:\/\/ebrarteknoloji.com\/wp-content\/uploads\/2021\/04\/sibersaldiri-cyberthreat-800x389-1.png\" class=\"wp-image-301 style-983-image style-local-806-c5-image\" alt=\"\" srcset=\"https:\/\/ebrarteknoloji.com\/wp-content\/uploads\/2021\/04\/sibersaldiri-cyberthreat-800x389-1.png 800w, https:\/\/ebrarteknoloji.com\/wp-content\/uploads\/2021\/04\/sibersaldiri-cyberthreat-800x389-1-300x146.png 300w, https:\/\/ebrarteknoloji.com\/wp-content\/uploads\/2021\/04\/sibersaldiri-cyberthreat-800x389-1-768x373.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\n                        <div class=\"h-image__frame style-983-frameImage style-local-806-c5-frameImage\"><\/div>\n                      <\/div>\n                      <div class=\"style-983-caption style-local-806-c5-caption\">\n                        Canl\u0131 Siber Sald\u0131r\u0131 Haritas\u0131na Eri\u015fmek \u0130\u00e7in T\u0131klay\u0131n\u0131z &#8230;\n                      <\/div>\n                    <\/a>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n      <div data-colibri-id=\"806-c6\" class=\"h-row-container gutters-row-lg-2 gutters-row-md-2 gutters-row-0 gutters-row-v-lg-2 gutters-row-v-md-2 gutters-row-v-2 style-1000 style-local-806-c6 position-relative\">\n        <!---->\n        <div class=\"h-row justify-content-lg-center justify-content-md-center justify-content-center align-items-lg-stretch align-items-md-stretch align-items-stretch gutters-col-lg-2 gutters-col-md-2 gutters-col-0 gutters-col-v-lg-2 gutters-col-v-md-2 gutters-col-v-2\">\n          <!---->\n          <div class=\"h-column h-column-container d-flex h-col-lg-auto h-col-md-auto h-col-auto style-1001-outer style-local-806-c7-outer\">\n            <div data-colibri-id=\"806-c7\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-2 h-px-md-2 h-px-2 v-inner-lg-2 v-inner-md-2 v-inner-2 style-1001 style-local-806-c7 position-relative\">\n              <!---->\n              <!---->\n              <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n                <!---->\n                <div data-colibri-id=\"806-c8\" class=\"h-lead h-text h-text-component style-997 style-local-806-c8 position-relative h-element\">\n                  <!---->\n                  <!---->\n                  <div class=\"\">\n                    <p>\n                      <a href=\"https:\/\/www.pona.com.tr\/siber-guvenlik-urunlerimiz\" target=\"_blank\" rel=\"noopener\" class=\"customize-unpreviewable\" style=\"color: inherit;\">G\u00fcvenlik duvar\u0131&nbsp;\/ Firewall<\/a>\n                    <\/p>\n                    <p>Gelen ve giden a\u011f trafi\u011fini izleyen ve belirli bir g\u00fcvenlik kurallar\u0131 k\u00fcmesine g\u00f6re belirli trafi\u011fe izin verilip verilmeyece\u011fine karar veren a\u011f g\u00fcvenlik cihaz\u0131d\u0131r.\n                      <br>G\u00fcvenlik duvar\u0131 donan\u0131m, yaz\u0131l\u0131m veya her ikisi olabilir.\n                      <a href=\"https:\/\/support.ponivanetworks.com\" target=\"_blank\" rel=\"noopener\" style=\"color: inherit;\" class=\"customize-unpreviewable\">\n                        <br>Poniva Firewall<\/a>&nbsp;donan\u0131m tabanl\u0131 yeni nesil&nbsp;\n                      <a href=\"https:\/\/www.pona.com.tr\/donanimsal-firewall-ve-avantajlari\" target=\"_blank\" rel=\"noopener\" style=\"color: inherit;\" class=\"customize-unpreviewable\">firewall<\/a>&nbsp;cihaz\u0131d\u0131r.<\/p>\n                    <p>&nbsp;FIREWALL NED\u0130R?\n                      <br>G\u00fcvenlik duvarlar\u0131 di\u011fer ad\u0131yla firewalllar&nbsp;\n                      <a href=\"https:\/\/www.pona.com.tr\/siber-guvenlik\" target=\"_blank\" rel=\"noopener\" style=\"color: inherit;\" class=\"customize-unpreviewable\">a\u011f g\u00fcvenli\u011fi<\/a>nde ilk savunma hatt\u0131d\u0131r. G\u00fcvenli i\u00e7 a\u011flar ile \u0130nternet gibi g\u00fcvenilir ve g\u00fcvenilmeyen d\u0131\u015f a\u011flar aras\u0131nda bir kalkand\u0131r.\n                      <br>\u00dczerinden ge\u00e7en trafi\u011fi analiz eder g\u00fcvensiz ise trafi\u011fi bloklar ve g\u00fcvenli bir ortam olu\u015ftururlar.\n                      <br>Belirlenen tehditleri filtreler, tan\u0131mlanmayan a\u011flar\u0131 engeller. Hangi ba\u011flant\u0131lar\u0131n engellenece\u011fine dair durumlar da y\u00f6netici taraf\u0131ndan belirlenebilir. PONIVA Firewall gibi g\u00fcvenlik duvarlar\u0131 deneyimlere g\u00f6re kendi kararlar\u0131n\u0131 da\n                      verir.<\/p>\n                    <p>&nbsp;PONIVA FIREWALL AVANTAJLARI:\n                      <br>G\u00fcvenlik duvar\u0131nda \u00f6nemli olan \u00f6zellik performanst\u0131r. Veri ak\u0131\u015f\u0131n\u0131 a\u015f\u0131r\u0131 engelleyen ve yava\u015flatan g\u00fcvenlik duvarlar\u0131 \u00e7al\u0131\u015fma performans\u0131n\u0131 olumsuz \u015fekilde etkiler.\n                      <br>Bu nedenle, h\u0131zl\u0131 veri i\u015fleyen ve istenilmeyen verileri filtreleyen bir g\u00fcvenlik duvar\u0131 teknolojisine sahip olunmas\u0131 gerekir.\n                      <br>Unutmamak gerekir ki, g\u00fcvenlik kadar \u00e7al\u0131\u015fma performans\u0131 da \u00f6nemlidir. Ayr\u0131ca tasar\u0131m ve dayan\u0131kl\u0131l\u0131k da firewalllar i\u00e7in \u00f6n plandad\u0131r.\n                      <br>\u00d6zellikle kurumsal firmalarda birden fazla a\u011f\u0131n denetimi yapan g\u00fcvenlik duvar\u0131, a\u015f\u0131r\u0131 y\u00fcke maruz kalabilir. PONIVA Firewall min 4 core CPU 4GB Bellek ve 120 GB SSD diske sahip g\u00fc\u00e7l\u00fc bir firewall cihaz\u0131d\u0131r.\n                      <br>PONIVA Firewall bulut tabanl\u0131 merkezi siber g\u00fcvenlik \u00f6zelli\u011fi ile cihazlardan herhangi birisine sald\u0131r\u0131 oldu\u011funda bu sald\u0131r\u0131 merkeze bildirilir ve t\u00fcm firewall cihazlar\u0131 sald\u0131rgan ip ile ileti\u015fimi keser.\n                      <br>Ayl\u0131k ortalama 100.000 tekil ip adresi bulut tabanl\u0131 g\u00fcvenlik duvar\u0131 sunucular\u0131m\u0131z taraf\u0131ndan engellenmektedir.\n                      <br>13.000.000 ip i\u00e7eren kara listemiz mevcuttur.<\/p>\n                    <p>S\u0130BER G\u00dcVENL\u0130K:\n                      <br>Siber g\u00fcvenlik, donan\u0131m, yaz\u0131l\u0131m ve veriler dahil olmak \u00fczere internete ba\u011fl\u0131 sistemlerin siber sald\u0131r\u0131lara kar\u015f\u0131 korunmas\u0131d\u0131r.<\/p>\n                    <p>\u200bBilgi i\u015flem ba\u011flam\u0131nda g\u00fcvenlik, siber g\u00fcvenlik ve fiziksel g\u00fcvenli\u011fi i\u00e7erir. Her ikisi de i\u015fletmeler taraf\u0131ndan veri merkezlerine ve di\u011fer bilgisayarl\u0131 sistemlere yetkisiz eri\u015fime kar\u015f\u0131 koruma sa\u011flamak i\u00e7in kullan\u0131l\u0131r.<\/p>\n                    <p>\u200bVerilerin gizlili\u011fini, b\u00fct\u00fcnl\u00fc\u011f\u00fcn\u00fc ve kullan\u0131labilirli\u011fini korumak i\u00e7in tasarlanm\u0131\u015f olan bilgi g\u00fcvenli\u011fi, bir siber g\u00fcvenli\u011fin alt k\u00fcmesidir.<\/p>\n                    <p>&nbsp;S\u0130BER G\u00dcVENL\u0130K YAPI TA\u015eLARI:\n                      <br>Siber G\u00fcvenli\u011fin en \u00f6nemli 3 yap\u0131 ta\u015f\u0131 vard\u0131r.<\/p>\n                    <p>\u0130nsanlar\n                      <br>S\u00fcre\u00e7\n                      <br>Teknoloji<\/p>\n                    <p>&nbsp;\u0130nsanlar:\n                      <br>Her \u00e7al\u0131\u015fan\u0131n, siber tehditleri \u00f6nleme ve azaltmadaki rol\u00fcn\u00fcn fark\u0131nda olmas\u0131 gerekir ve uzman teknik siber g\u00fcvenlik personeli, siber sald\u0131r\u0131lar\u0131n azalt\u0131lmas\u0131 ve bunlara yan\u0131t verilmesi i\u00e7in en son beceriler ve niteliklerle tam olarak\n                      haberdar olmal\u0131d\u0131r.<\/p>\n                    <p>\u200b\u0130nternet \u00fczerinden yapt\u0131\u011f\u0131 t\u00fcm i\u015flemlerde dikkatli olunmal\u0131d\u0131r. \u201cOltalama\u201d diye tabir edilen mail vs gibi ataklara insanlar\u0131n dikkatsizli\u011finden faydalan\u0131larak ba\u015far\u0131l\u0131 olmaya \u00e7al\u0131\u015fmaktad\u0131rlar.<\/p>\n                    <p>\u200bS\u00fcre\u00e7:\n                      <br>Siber tehditler h\u0131zla de\u011fi\u015fmektedir, bu y\u00fczden s\u00fcre\u00e7lerin kendilerine uyum sa\u011flayabilmek i\u00e7in s\u00fcrekli olarak g\u00f6zden ge\u00e7irilmeleri gerekir.<\/p>\n                    <p>\u200bTeknoloji:\n                      <br>Kurulu\u015funuzun kar\u015f\u0131 kar\u015f\u0131ya oldu\u011fu siber riskleri tan\u0131mlayarak, hangi kontrolleri uygulayaca\u011f\u0131n\u0131za ve hangi teknolojileri yapman\u0131z gerekti\u011fine bakmaya ba\u015flayabilirsiniz. Risk de\u011ferlendirmenize ve kabul edilebilir bir risk seviyesi\n                      olarak kabul etti\u011finize ba\u011fl\u0131 olarak siber risklerin etkisini \u00f6nlemek veya azaltmak i\u00e7in \u00e7e\u015fitli teknolojiler kullan\u0131labilir.<\/p>\n                    <p>\u200bS\u0130BER G\u00dcVENL\u0130K TEHD\u0130T T\u00dcRLER\u0130:\n                      <br>Yeni teknolojilere, g\u00fcvenlik e\u011filimlerine ve tehdit istihbarat\u0131na ayak uydurma s\u00fcreci zor bir i\u015ftir. Bununla birlikte, bilgiyi ve di\u011fer varl\u0131klar\u0131 siber tehditlerden korumak i\u00e7in gerekli olan \u00e7e\u015fitli bi\u00e7imlerde gereklidir.\n                      <br>\n                      <br>Ransomware :\n                      <br>Bir sald\u0131rgan\u0131n bilgisayar sistem dosyalar\u0131n\u0131 (genellikle \u015fifreleme yoluyla) kilitlemesini ve \u015fifresini \u00e7\u00f6z\u00fcp kilidini a\u00e7mak i\u00e7in bir \u00f6deme talep etmesini i\u00e7eren bir t\u00fcr zararl\u0131 yaz\u0131l\u0131md\u0131r.<\/p>\n                    <p>Sosyal M\u00fchendislik:\n                      <br>Sosyal m\u00fchendislik, kullan\u0131c\u0131lar\u0131n korunan hassas bilgilerini elde etmek i\u00e7in insan etkile\u015fimi (kand\u0131rma vb) \u00fczerine kurulu bir sald\u0131r\u0131d\u0131r.<\/p>\n                    <p>Malware:\n                      <br>K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, solucanlar, bilgisayar vir\u00fcsleri, Truva atlar\u0131 ve casus yaz\u0131l\u0131mlar gibi bir bilgisayar kullan\u0131c\u0131s\u0131na zarar vermek i\u00e7in kullan\u0131lan herhangi bir dosya veya programd\u0131r.<\/p>\n                    <p>Kimlik Av\u0131 (Phishing):\n                      <br>G\u00fcvenilir kaynaklardan gelen e-postalara benzeyen sahte e-postalar\u0131n g\u00f6nderildi\u011fi bir doland\u0131r\u0131c\u0131l\u0131k bi\u00e7imidir; ancak, bu e-postalar\u0131n amac\u0131, kredi kart\u0131 veya giri\u015f bilgileri gibi hassas verileri \u00e7almakt\u0131r. Ayr\u0131ca bu maillerin i\u00e7indeki\n                      tehlikeli linkler yolu ile bilgisayar\u0131n\u0131za program y\u00fckletilerek verilerinizi ele ge\u00e7irebilirler.<\/p>\n                    <p>&nbsp;PONIVA FIREWALL ile S\u0130BER SALDIRILARDAN KORUNUN:\n                      <br>Bir kurulu\u015f g\u00fc\u00e7l\u00fc bir a\u011f g\u00fcvenli\u011fi bilincine ve etkili bir olay m\u00fcdahale plan\u0131na sahip oldu\u011funda, bu sald\u0131r\u0131lar\u0131n \u00f6nlenmesi ve azalt\u0131lmas\u0131 daha kolayd\u0131r.<\/p>\n                    <p>\u200bPONIVA&nbsp;\n                      <a href=\"https:\/\/www.pona.com.tr\/donanimsal-firewall-ve-avantajlari\" target=\"_blank\" rel=\"noopener\" style=\"color: inherit;\" class=\"customize-unpreviewable\">Firewall<\/a>&nbsp;ile bu tarz sald\u0131r\u0131lara kar\u015f\u0131 bir ad\u0131m \u00f6nde olursunuz.\n                      <br>\n                      <br>\n                    <\/p>\n                    <p>5651 \u2013 YASAL LOGLAMA:5651 say\u0131l\u0131 kanun internet \u00fczerinden i\u015flenilen su\u00e7lar\u0131n engellenmesine y\u00f6nelik bir kanundur. 2007\u2019de \u00e7\u0131kar\u0131lan kanunla beraber internet sa\u011flay\u0131c\u0131lar\u0131 ve da\u011f\u0131t\u0131c\u0131lar\u0131na baz\u0131 y\u00fck\u00fcml\u00fcl\u00fckler getirildi.\n                      <br>\u0130nterneti kullanan bilgisayar\u0131n IP adresleri, girilen siteler ve giri\u015f \u00e7\u0131k\u0131\u015f zamanlar\u0131 gibi bilgilerin saklanmas\u0131na y\u00f6nelik uygulamalar zorunlu tutuldu. Buradaki ama\u00e7, internet sa\u011flay\u0131c\u0131n\u0131n a\u011f\u0131ndan ger\u00e7ekle\u015fen su\u00e7lar\u0131 tespit etmek\n                      ve internet sa\u011flay\u0131c\u0131s\u0131n\u0131n i\u015flenen su\u00e7la do\u011frudan bir ilgisinin olmad\u0131\u011f\u0131n\u0131 saptamakt\u0131r. Bu bak\u0131mdan ilgili kanun internet sa\u011flay\u0131c\u0131 kurumlar\u0131 da koruma alt\u0131na al\u0131r.<\/p>\n                    <p>\u200b5651 LOGLAMA \u2013 YASAL LOGLAMA NEDEN GEREKL\u0130D\u0130R?\n                      <br>Yasa ile beraber m\u00fc\u015fterilerine internet sa\u011flayan kurumun internet trafi\u011fini kaydetmesine loglama denir. M\u00fc\u015fterinin bilgisayar veya telefon IP ve Mac bilgilerinin kay\u0131t edilmesi, internette yap\u0131lanlar\u0131n kay\u0131t alt\u0131na al\u0131nmas\u0131 loglama\n                      tan\u0131m\u0131 alt\u0131na girer.\n                      <br>Bir firma veya i\u015fletmenin loglama yapmamas\u0131 halinde ilgili a\u011fdan ger\u00e7ekle\u015fen her t\u00fcrl\u00fc su\u00e7un sorumlulu\u011funu ta\u015f\u0131mak zorundad\u0131r.\n                      <br>Dolay\u0131s\u0131yla, toplu internet hizmeti veren firma, kurum veya \u015fah\u0131slar\u0131n loglama teknolojisinden yararlanmas\u0131 yasal olarak gerekliliktir.\n                      <br>M\u00fc\u015fterilerine veya \u00e7al\u0131\u015fanlar\u0131na internet sa\u011flayan her kurumun loglama sisteminden faydalanmas\u0131 gerekir.\n                      <br>Kafe, restoran, otel, AVM veya a\u00e7\u0131k alanlarda internet sa\u011flayan kurumlar \u00f6rnek g\u00f6sterilebilir.<\/p>\n                    <p>\u200bPONIVA FIREWALL AVANTAJLARI:\n                      <br>PONIVA G\u00fcvenlik Duvar\u0131 LOGLAMA \u00f6zelli\u011fini kullan\u0131rken bir\u00e7ok avantajada sahip olursunuz\n                      <br>Kurumunuz i\u00e7in uygun loglama hizmetleri ilgili kanun kapsam\u0131na giren i\u015fletmelerin i\u015flerini kolayla\u015ft\u0131r\u0131r.\n                      <a href=\"https:\/\/www.pona.com.tr\/5651-yasal-loglama\" target=\"_blank\" rel=\"noopener\" style=\"color: inherit;\" class=\"customize-unpreviewable\">\n                        <br>5651 say\u0131l\u0131 kanun<\/a>a uygun Loglama sistemleri ile internet a\u011f\u0131na ba\u011fl\u0131 bilgisayarlar\u0131n bilgileri kay\u0131t edilir ve kanunda belirlenen s\u00fcre zarf\u0131na kadar saklan\u0131r.\n                      <br>PONIVA Firewall ile istenirse ba\u011flanan cihaz\u0131n&nbsp;MAC adresi&nbsp;de loglara eklenebilir.\n                      <br>Herhangi bir loglama kesintisi halinde kurumun zarar g\u00f6rmesi m\u00fcmk\u00fcnd\u00fcr. PONIVA&nbsp;\n                      <a href=\"https:\/\/www.pona.com.tr\/guvenlik-duvari-nedir\" target=\"_blank\" rel=\"noopener\" style=\"color: inherit;\" class=\"customize-unpreviewable\">G\u00fcvenlik duvar\u0131<\/a>&nbsp;ile loglar&nbsp;cihaz i\u00e7ine kaydedilir.\n                      <br>Loglama i\u015flemi i\u00e7in&nbsp;ayr\u0131 bir PC , donan\u0131m veya yaz\u0131l\u0131ma ihtiyac\u0131n\u0131z yoktur.\n                      <br>Kay\u0131tlar&nbsp;\n                      <a href=\"https:\/\/www.pona.com.tr\/donanimsal-firewall-ve-avantajlari\" target=\"_blank\" rel=\"noopener\" style=\"color: inherit;\" class=\"customize-unpreviewable\">firewall cihaz\u0131<\/a>&nbsp;i\u00e7inde tutuldu\u011fundan&nbsp;istedi\u011finiz tarih aral\u0131\u011f\u0131nda&nbsp;raporlar alabilirsiniz.\n                      <br>PONIVA&nbsp;\n                      <a href=\"https:\/\/www.pona.com.tr\/donanimsal-firewall-ve-avantajlari\" target=\"_blank\" rel=\"noopener\" style=\"color: inherit;\" class=\"customize-unpreviewable\">Firewall<\/a>&nbsp;ile y\u00fcksek performans sunan ancak maliyet a\u00e7\u0131s\u0131ndan y\u00f6netilebilir loglama sistemleri sa\u011flamaktay\u0131z.<\/p>\n                    <p>\u200bHOTSPOT \u2013 CAPTIVE PORTAL:\n                      <br>Muhtemelen ne oldu\u011fundan habersiz pek \u00e7ok kez hotspot ile kar\u015f\u0131la\u015fm\u0131\u015fs\u0131n\u0131zd\u0131r. i\u015fletmelerin kullan\u0131c\u0131lar\u0131n Wi-Fi a\u011f\u0131na ba\u011flanmadan \u00f6nce ge\u00e7melerini gerektiren \u00f6zelle\u015ftirilmi\u015f giri\u015f sayfas\u0131d\u0131r.\n                      <br>Havaalanlar\u0131, kafeler ve oteller bu i\u015flemler i\u00e7in en pop\u00fcler yerlerdir, Kurumunuz i\u00e7inde Captive portal (HOTSPOT) kullanmak network\u00fcn\u00fcz\u00fcn y\u00fcksek g\u00fcvenli\u011fi i\u00e7in gerekli bir i\u015flemdir.<\/p>\n                    <p>&nbsp;HOTSPOT \u2013 CAPTIVE PORTAL AVANTAJLARI:\n                      <br>Varsay\u0131lan olarak, bu giri\u015f portal\u0131, kullan\u0131c\u0131ya i\u015fletmenizin Wi-Fi etkin alan\u0131na eri\u015fmeden \u00f6nce kabul etmesi gereken hizmet ko\u015fullar\u0131n\u0131 sunar. Baz\u0131 durumlarda, giri\u015f i\u00e7in bir parola gerektirebilir (\u00f6rne\u011fin do\u011frulanm\u0131\u015f m\u00fc\u015fterilere,\n                      \u00f6rne\u011fin kahve giri\u015flerinde verebilece\u011finiz veya TC Kimlik no \/ SMS gibi).\n                      <br>Bunun gibi \u00f6nlemler, yasad\u0131\u015f\u0131 veya ba\u015fka \u015fekilde tahrip edici \u00e7evrimi\u00e7i davran\u0131\u015f hallerinde sizi sorumluluktan kurtarmaya yard\u0131mc\u0131 olurken, benzer g\u00fcvenlik \u00f6zellikleri \u015firket varl\u0131klar\u0131n\u0131 g\u00fcvende tutar. WI-FI a\u011f\u0131ndan misafirlerinize\n                      e\u015fsiz bir internet deneyimi sunarken onlar\u0131n sizin sunucular\u0131n\u0131z\u0131n oldu\u011fu networke ge\u00e7i\u015fleri s\u0131n\u0131rland\u0131r\u0131r.\n                      <br>Sabit bir portal kullanmak, bant geni\u015fli\u011finiz \u00fczerinde kontrol\u00fcn artmas\u0131n\u0131 sa\u011flayarak, her kullan\u0131c\u0131n\u0131n a\u011f\u0131n\u0131za ba\u011fl\u0131 kalabilece\u011fi s\u00fcre boyunca \u00f6zelle\u015ftirilebilir zaman s\u0131n\u0131rlar\u0131 sunar.\n                      <br>Ayr\u0131ca yasal olarak tutulmas\u0131 gereken&nbsp;\n                      <a href=\"https:\/\/www.pona.com.tr\/5651-yasal-loglama\" target=\"_blank\" rel=\"noopener\" style=\"color: inherit;\" class=\"customize-unpreviewable\">5651 loglama<\/a>&nbsp;i\u015fleminizi de kolay bir \u015fekilde ger\u00e7ekle\u015ftirmi\u015f olursunuz.<\/p>\n                    <p>\u200bOTEL Entegrayonu\n                      <br>Otel yaz\u0131l\u0131m\u0131z ile entegrasyon sayesinde HOTSPOT \u00e7ok kolay.<\/p>\n                    <p>\u200bMERNIS Entegrasyonu\n                      <br>WIFI network\u00fcn\u00fcz i\u00e7in MERN\u0130S entegrasyonunu aktif edin, kullan\u0131c\u0131lar internete girmek istediklerinde AD, SOYAD, TC K\u0130ML\u0130K, DO\u011eUM YILI kontrol\u00fcn\u00fc PONIVA MERN\u0130S\u2019ten kontrol etsin. Bilgileri do\u011fru giren internete \u00e7\u0131ks\u0131n.<\/p>\n                    <p>&nbsp;PONIVA FIREWALL AVANTAJLARI:\n                      <br>PONIVA G\u00fcvenlik Duvar\u0131 HOTSPOT \u00f6zelli\u011fini kullan\u0131rken bir\u00e7ok avantajada sahip olursunuz\n                      <br>\u0130sterseniz loglarda kullan\u0131c\u0131 ad\u0131 ve PC MAC adresini ekleyebilirsiniz, b\u00f6ylece 5651&nbsp;\n                      <a href=\"https:\/\/www.pona.com.tr\/5651-yasal-loglama\" target=\"_blank\" rel=\"noopener\" style=\"color: inherit;\" class=\"customize-unpreviewable\">yasal loglama<\/a>&nbsp;i\u015flemi daha ayr\u0131nt\u0131l\u0131 olur.\n                      <br>MERN\u0130S entegrasyonu ile siz kullan\u0131c\u0131 a\u00e7madan kullan\u0131c\u0131lar TC Kimlik No, Ad Soyad, Do\u011fum Y\u0131l\u0131 Bilgilerini girerek e\u011fer girdi\u011fi bilgiler do\u011fru ise (do\u011frulu\u011fu MERN\u0130S\u2019ten kontrol edilir.) kullan\u0131c\u0131 \u015fifresi olu\u015fur\n                      <br>SMS Entegrasyonu ile de giri\u015f i\u015flemi yapt\u0131rabilirsiniz.\n                      <br>Kullan\u0131c\u0131 eklendi\u011finde kendi onay\u0131n\u0131za d\u00fc\u015f\u00fcrebilir, uygun g\u00f6rmedi\u011finiz giri\u015f isteklerine internet hizmeti vermeyebilirsiniz.<\/p>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Poniva y\u00fcksek performansl\u0131 tehdit korumas\u0131 yeni nesil firewall UTM cihaz\u0131 Poniva G\u00fcvenlik Duvar\u0131&nbsp; yeni nesil firewall&nbsp;UTM cihaz\u0131d\u0131r. Daha kolay y\u00f6netmenizi sa\u011flamakla kalmaz, g\u00fc\u00e7l\u00fc performans\u0131 ile t\u00fcm i\u015flemler \u00e7ok h\u0131zl\u0131 ger\u00e7ekle\u015fir. H\u0131zl\u0131 ve otomatik koruma sa\u011flamak i\u00e7in tehditleri payla\u015f\u0131r. \u200bPONIVA Firewall, giri\u015f seviyesi donan\u0131m cihazlar\u0131ndan \u00fcst seviye cihazlara kadar en zorlu tehdit koruma performans gereksinimlerini kar\u015f\u0131lamak [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/full-width-page.php","meta":{"footnotes":""},"class_list":["post-806","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>G\u00fcvenlik Duvar\u0131 - Firewall - Ebrar Bilgi Teknolojileri Ltd.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ebrarteknoloji.com\/index.php\/firewall\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"G\u00fcvenlik Duvar\u0131 - Firewall - Ebrar Bilgi Teknolojileri Ltd.\" \/>\n<meta property=\"og:description\" content=\"Poniva y\u00fcksek performansl\u0131 tehdit korumas\u0131 yeni nesil firewall UTM cihaz\u0131 Poniva G\u00fcvenlik Duvar\u0131&nbsp; yeni nesil firewall&nbsp;UTM cihaz\u0131d\u0131r. Daha kolay y\u00f6netmenizi sa\u011flamakla kalmaz, g\u00fc\u00e7l\u00fc performans\u0131 ile t\u00fcm i\u015flemler \u00e7ok h\u0131zl\u0131 ger\u00e7ekle\u015fir. H\u0131zl\u0131 ve otomatik koruma sa\u011flamak i\u00e7in tehditleri payla\u015f\u0131r. \u200bPONIVA Firewall, giri\u015f seviyesi donan\u0131m cihazlar\u0131ndan \u00fcst seviye cihazlara kadar en zorlu tehdit koruma performans gereksinimlerini kar\u015f\u0131lamak [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ebrarteknoloji.com\/index.php\/firewall\/\" \/>\n<meta property=\"og:site_name\" content=\"Ebrar Bilgi Teknolojileri Ltd.\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-05T12:44:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ebrarteknoloji.com\/wp-content\/uploads\/2021\/04\/sibersaldiri-cyberthreat-800x389-1.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ebrarteknoloji.com\/index.php\/firewall\/\",\"url\":\"https:\/\/ebrarteknoloji.com\/index.php\/firewall\/\",\"name\":\"G\u00fcvenlik Duvar\u0131 - Firewall - Ebrar Bilgi Teknolojileri Ltd.\",\"isPartOf\":{\"@id\":\"https:\/\/ebrarteknoloji.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ebrarteknoloji.com\/index.php\/firewall\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ebrarteknoloji.com\/index.php\/firewall\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ebrarteknoloji.com\/wp-content\/uploads\/2021\/04\/sibersaldiri-cyberthreat-800x389-1.png\",\"datePublished\":\"2021-04-14T09:50:04+00:00\",\"dateModified\":\"2021-12-05T12:44:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ebrarteknoloji.com\/index.php\/firewall\/#breadcrumb\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ebrarteknoloji.com\/index.php\/firewall\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/ebrarteknoloji.com\/index.php\/firewall\/#primaryimage\",\"url\":\"https:\/\/ebrarteknoloji.com\/wp-content\/uploads\/2021\/04\/sibersaldiri-cyberthreat-800x389-1.png\",\"contentUrl\":\"https:\/\/ebrarteknoloji.com\/wp-content\/uploads\/2021\/04\/sibersaldiri-cyberthreat-800x389-1.png\",\"width\":800,\"height\":389},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ebrarteknoloji.com\/index.php\/firewall\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Anasayfa\",\"item\":\"https:\/\/ebrarteknoloji.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"G\u00fcvenlik Duvar\u0131 &#8211; Firewall\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ebrarteknoloji.com\/#website\",\"url\":\"https:\/\/ebrarteknoloji.com\/\",\"name\":\"Ebrar Bilgi Teknolojileri Ltd.\",\"description\":\"Siber, Penetrasyon, Bili\u015fim, Yaz\u0131l\u0131m, G\u00fcvenlik, S\u0131zma, Sibel Kesti\",\"publisher\":{\"@id\":\"https:\/\/ebrarteknoloji.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ebrarteknoloji.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"tr\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ebrarteknoloji.com\/#organization\",\"name\":\"Ebrar Bilgi Teknolojileri Ltd.\",\"url\":\"https:\/\/ebrarteknoloji.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/ebrarteknoloji.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ebrarteknoloji.com\/wp-content\/uploads\/2021\/04\/ebrar_inApp_fwpng.fw_.png\",\"contentUrl\":\"https:\/\/ebrarteknoloji.com\/wp-content\/uploads\/2021\/04\/ebrar_inApp_fwpng.fw_.png\",\"width\":474,\"height\":52,\"caption\":\"Ebrar Bilgi Teknolojileri Ltd.\"},\"image\":{\"@id\":\"https:\/\/ebrarteknoloji.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"G\u00fcvenlik Duvar\u0131 - Firewall - Ebrar Bilgi Teknolojileri Ltd.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ebrarteknoloji.com\/index.php\/firewall\/","og_locale":"tr_TR","og_type":"article","og_title":"G\u00fcvenlik Duvar\u0131 - Firewall - Ebrar Bilgi Teknolojileri Ltd.","og_description":"Poniva y\u00fcksek performansl\u0131 tehdit korumas\u0131 yeni nesil firewall UTM cihaz\u0131 Poniva G\u00fcvenlik Duvar\u0131&nbsp; yeni nesil firewall&nbsp;UTM cihaz\u0131d\u0131r. Daha kolay y\u00f6netmenizi sa\u011flamakla kalmaz, g\u00fc\u00e7l\u00fc performans\u0131 ile t\u00fcm i\u015flemler \u00e7ok h\u0131zl\u0131 ger\u00e7ekle\u015fir. H\u0131zl\u0131 ve otomatik koruma sa\u011flamak i\u00e7in tehditleri payla\u015f\u0131r. \u200bPONIVA Firewall, giri\u015f seviyesi donan\u0131m cihazlar\u0131ndan \u00fcst seviye cihazlara kadar en zorlu tehdit koruma performans gereksinimlerini kar\u015f\u0131lamak [&hellip;]","og_url":"https:\/\/ebrarteknoloji.com\/index.php\/firewall\/","og_site_name":"Ebrar Bilgi Teknolojileri Ltd.","article_modified_time":"2021-12-05T12:44:40+00:00","og_image":[{"url":"https:\/\/ebrarteknoloji.com\/wp-content\/uploads\/2021\/04\/sibersaldiri-cyberthreat-800x389-1.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Tahmini okuma s\u00fcresi":"9 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ebrarteknoloji.com\/index.php\/firewall\/","url":"https:\/\/ebrarteknoloji.com\/index.php\/firewall\/","name":"G\u00fcvenlik Duvar\u0131 - Firewall - Ebrar Bilgi Teknolojileri Ltd.","isPartOf":{"@id":"https:\/\/ebrarteknoloji.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ebrarteknoloji.com\/index.php\/firewall\/#primaryimage"},"image":{"@id":"https:\/\/ebrarteknoloji.com\/index.php\/firewall\/#primaryimage"},"thumbnailUrl":"https:\/\/ebrarteknoloji.com\/wp-content\/uploads\/2021\/04\/sibersaldiri-cyberthreat-800x389-1.png","datePublished":"2021-04-14T09:50:04+00:00","dateModified":"2021-12-05T12:44:40+00:00","breadcrumb":{"@id":"https:\/\/ebrarteknoloji.com\/index.php\/firewall\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ebrarteknoloji.com\/index.php\/firewall\/"]}]},{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/ebrarteknoloji.com\/index.php\/firewall\/#primaryimage","url":"https:\/\/ebrarteknoloji.com\/wp-content\/uploads\/2021\/04\/sibersaldiri-cyberthreat-800x389-1.png","contentUrl":"https:\/\/ebrarteknoloji.com\/wp-content\/uploads\/2021\/04\/sibersaldiri-cyberthreat-800x389-1.png","width":800,"height":389},{"@type":"BreadcrumbList","@id":"https:\/\/ebrarteknoloji.com\/index.php\/firewall\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Anasayfa","item":"https:\/\/ebrarteknoloji.com\/"},{"@type":"ListItem","position":2,"name":"G\u00fcvenlik Duvar\u0131 &#8211; Firewall"}]},{"@type":"WebSite","@id":"https:\/\/ebrarteknoloji.com\/#website","url":"https:\/\/ebrarteknoloji.com\/","name":"Ebrar Bilgi Teknolojileri Ltd.","description":"Siber, Penetrasyon, Bili\u015fim, Yaz\u0131l\u0131m, G\u00fcvenlik, S\u0131zma, Sibel Kesti","publisher":{"@id":"https:\/\/ebrarteknoloji.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ebrarteknoloji.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/ebrarteknoloji.com\/#organization","name":"Ebrar Bilgi Teknolojileri Ltd.","url":"https:\/\/ebrarteknoloji.com\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/ebrarteknoloji.com\/#\/schema\/logo\/image\/","url":"https:\/\/ebrarteknoloji.com\/wp-content\/uploads\/2021\/04\/ebrar_inApp_fwpng.fw_.png","contentUrl":"https:\/\/ebrarteknoloji.com\/wp-content\/uploads\/2021\/04\/ebrar_inApp_fwpng.fw_.png","width":474,"height":52,"caption":"Ebrar Bilgi Teknolojileri Ltd."},"image":{"@id":"https:\/\/ebrarteknoloji.com\/#\/schema\/logo\/image\/"}}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ebrarteknoloji.com\/index.php\/wp-json\/wp\/v2\/pages\/806","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ebrarteknoloji.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ebrarteknoloji.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ebrarteknoloji.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ebrarteknoloji.com\/index.php\/wp-json\/wp\/v2\/comments?post=806"}],"version-history":[{"count":11,"href":"https:\/\/ebrarteknoloji.com\/index.php\/wp-json\/wp\/v2\/pages\/806\/revisions"}],"predecessor-version":[{"id":2411,"href":"https:\/\/ebrarteknoloji.com\/index.php\/wp-json\/wp\/v2\/pages\/806\/revisions\/2411"}],"wp:attachment":[{"href":"https:\/\/ebrarteknoloji.com\/index.php\/wp-json\/wp\/v2\/media?parent=806"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}