BG-TEK Cybersecurity Technologies



BG-Tek Cybersecurity Technologies is aiming to become a customer-oriented, reliable international brand since 2011. In this direction; Our mission is to offer products and solutions in the field of information security without any compromise from quality, not to compromise from honesty and reliability in our relations with our employees,

COSLAT Firewall

Coslat Firewall

COSLAT Firewall

Coslat Hotspot

COSLAT Firewall

Coslat 2FA

COSLAT Firewall


Our Information Security Policy

BG-TEK is aware of the fact that confidentiality, integrity, and accessibility of all kinds of information have a critical role in the sustainable success and good governance applications of the company, and not being able to ensure information security at a sufficient level will increase financial losses as well as the risk of loss of reputation.

This information security policy summarizes BG-TEK’s approach to Information Security management as well as setting forth guidelines and liabilities necessary for the protection of the security of information systems.

BG-TEK undertakes to install, conduct, operate, monitor, review, maintain, and continuously improve the Information Security Management System in accordance with TS ISO/IEC 27001 standards for the purpose of ensuring, as required, the confidentiality, integrity, and accessibility of the information it is obliged to protect.

As BG-TEK, which offers Information Security services and conducts R&D activities, we hereby warrant to all our stakeholders that;

We will follow current cyber threats related to our activities with a “zero-day” approach, comply with the conditions, and legal requirements arising from the contracts.

We will ensure effective, accurate, fast, and secure implementation of the activities conducted and carry out security test service activities that we fulfilled, in accordance with the standards required by the sector.

We will carry out our activities being aware of the risks on confidentiality, integrity, and accessibility of all kinds of information assets belonging to our company, customers, employers, suppliers, and business partners.

We will ensure making the information security management system and information security awareness a part of the corporate culture.

We will ensure to prepare, apply, and test the necessary plans to provide business and service continuity.

We will ensure the assessment and processing of risks directed at our information assets and processes in accordance with the accepted risk management methodologies.

We will be in communication with the communities of interest in order to utilize developing technologies and the accumulation of knowledge in our industry in which we offer knowledge-based services.