{"id":8514,"date":"2024-03-02T18:17:11","date_gmt":"2024-03-02T15:17:11","guid":{"rendered":"https:\/\/www.inforte.com\/?p=8514"},"modified":"2024-03-02T18:17:11","modified_gmt":"2024-03-02T15:17:11","slug":"network-security-policy-management-nspm-nedir-ve-neden-kullanilmalidir","status":"publish","type":"post","link":"https:\/\/www.inforte.com\/en\/network-security-policy-management-nspm-nedir-ve-neden-kullanilmalidir\/","title":{"rendered":"Network Security Policy Management (NSPM ) Nedir ve Neden kullan\u0131lmal\u0131d\u0131r ?"},"content":{"rendered":"<p id=\"ember1697\" class=\"ember-view reader-content-blocks__paragraph\">NSPM, Network Security Policy Management&#8217;\u0131n k\u0131saltmas\u0131d\u0131r. T\u00fcrk\u00e7e&#8217;de &#8220;A\u011f G\u00fcvenlik Politikas\u0131 Y\u00f6netimi&#8221; anlam\u0131na gelir. NSPM, bir kurulu\u015fun a\u011f g\u00fcvenlik politikalar\u0131n\u0131 olu\u015fturma, uygulama ve izleme s\u00fcrecini otomatikle\u015ftirmeye yard\u0131mc\u0131 olan bir yaz\u0131l\u0131m \u00e7\u00f6z\u00fcm\u00fcd\u00fcr.<\/p>\n<p id=\"ember1698\" class=\"ember-view reader-content-blocks__paragraph\">NSPM \u00e7\u00f6z\u00fcmleri, genellikle a\u015fa\u011f\u0131daki \u00f6zellikleri i\u00e7erir:<\/p>\n<ul>\n<li><strong>Politika olu\u015fturma ve d\u00fczenleme:<\/strong> NSPM \u00e7\u00f6z\u00fcmleri, kurulu\u015flar\u0131n a\u011f g\u00fcvenlik politikalar\u0131n\u0131 h\u0131zl\u0131 ve kolay bir \u015fekilde olu\u015fturmalar\u0131na ve d\u00fczenlemelerine olanak tan\u0131r. Bu, politikalar\u0131n kurulu\u015fun ihtiya\u00e7lar\u0131na ve de\u011fi\u015fen tehdit ortam\u0131na uyumlu olmas\u0131n\u0131 sa\u011flar.<\/li>\n<li><strong>Politika uygulamas\u0131:<\/strong> NSPM \u00e7\u00f6z\u00fcmleri, kurulu\u015flar\u0131n a\u011f g\u00fcvenlik politikalar\u0131n\u0131 a\u011f cihazlar\u0131na ve sistemlerine uygulamalar\u0131n\u0131 sa\u011flar. Bu, politikalar\u0131n etkili bir \u015fekilde uygulanmas\u0131n\u0131 ve ihlallerin \u00f6nlenmesini sa\u011flar.<\/li>\n<li><strong>Politika izleme: <\/strong>NSPM \u00e7\u00f6z\u00fcmleri, kurulu\u015flar\u0131n a\u011f g\u00fcvenlik politikalar\u0131n\u0131n uygulanmas\u0131n\u0131 ve ihlalleri izlemelerini sa\u011flar. Bu, kurulu\u015flar\u0131n a\u011flar\u0131n\u0131 korumak i\u00e7in gerekli ad\u0131mlar\u0131 atmalar\u0131na yard\u0131mc\u0131 olur.<\/li>\n<\/ul>\n<p id=\"ember1700\" class=\"ember-view reader-content-blocks__paragraph\">NSPM \u00e7\u00f6z\u00fcmleri, kurulu\u015flara a\u015fa\u011f\u0131daki faydalar\u0131 sa\u011flayabilir:<\/p>\n<ul>\n<li>G\u00fcvenlik politikalar\u0131n\u0131n daha h\u0131zl\u0131 ve kolay bir \u015fekilde olu\u015fturulmas\u0131n\u0131 ve uygulanmas\u0131n\u0131 sa\u011flar.<\/li>\n<li>Politikalar\u0131n etkinli\u011fini art\u0131rmaya yard\u0131mc\u0131 olur.<\/li>\n<li>G\u00fcvenlik ihlallerinin \u00f6nlenmesine yard\u0131mc\u0131 olur.<\/li>\n<li>G\u00fcvenlik ekiplerinin daha stratejik g\u00f6revlere odaklanmas\u0131na olanak tan\u0131r.<\/li>\n<\/ul>\n<p id=\"ember1702\" class=\"ember-view reader-content-blocks__paragraph\">NSPM \u00e7\u00f6z\u00fcmleri, \u00e7e\u015fitli kurulu\u015flar taraf\u0131ndan kullan\u0131labilir. Ancak, \u00f6zellikle a\u015fa\u011f\u0131daki kurulu\u015flar i\u00e7in faydal\u0131 olabilir:<\/p>\n<ul>\n<li><strong>B\u00fcy\u00fck kurulu\u015flar: <\/strong>B\u00fcy\u00fck kurulu\u015flar, karma\u015f\u0131k a\u011flara ve \u00e7ok say\u0131da cihaza sahip olma e\u011filimindedir. NSPM \u00e7\u00f6z\u00fcmleri, bu kurulu\u015flar\u0131n g\u00fcvenlik politikalar\u0131n\u0131 y\u00f6netmelerini kolayla\u015ft\u0131rabilir.<\/li>\n<li><strong>Karma\u015f\u0131k a\u011flara sahip kurulu\u015flar:<\/strong> Karma\u015f\u0131k a\u011flara sahip kurulu\u015flar, a\u011f g\u00fcvenlik politikalar\u0131n\u0131n etkin bir \u015fekilde uygulanmas\u0131n\u0131 zor bulabilir. NSPM \u00e7\u00f6z\u00fcmleri, bu kurulu\u015flara a\u011flar\u0131n\u0131 daha iyi korumalar\u0131na yard\u0131mc\u0131 olabilir.<\/li>\n<li><strong>S\u00fcrekli olarak de\u011fi\u015fen tehdit ortam\u0131na sahip kurulu\u015flar: <\/strong>S\u00fcrekli olarak de\u011fi\u015fen tehdit ortam\u0131na sahip kurulu\u015flar, g\u00fcvenlik politikalar\u0131n\u0131 d\u00fczenli olarak g\u00fcncellemeleri gerekir. NSPM \u00e7\u00f6z\u00fcmleri, bu kurulu\u015flar\u0131n politikalar\u0131n\u0131 g\u00fcncellemesini kolayla\u015ft\u0131rabilir.<\/li>\n<\/ul>\n<p id=\"ember1704\" class=\"ember-view reader-content-blocks__paragraph\">NSPM \u00e7\u00f6z\u00fcmleri, kurulu\u015flara a\u011f g\u00fcvenliklerini iyile\u015ftirmek i\u00e7in g\u00fc\u00e7l\u00fc bir ara\u00e7 sa\u011flayabilir.<\/p>\n<p id=\"ember1705\" class=\"ember-view reader-content-blocks__paragraph\"><a class=\"app-aware-link\" href=\"https:\/\/www.linkedin.com\/company\/infortebilisim\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Inforte Bilisim<\/a> olarak tek distrib\u00fct\u00f6rl\u00fc\u011f\u00fcn\u00fc yapt\u0131\u011f\u0131m\u0131z <a class=\"app-aware-link\" href=\"https:\/\/www.linkedin.com\/company\/opinnate\/\" data-test-app-aware-link=\"\">Opinnate<\/a> ile birlikte Network Security Policy Management ihtiya\u00e7lar\u0131n\u0131zda yan\u0131n\u0131zday\u0131z.<\/p>","protected":false},"excerpt":{"rendered":"<p>NSPM, Network Security Policy Management&#8217;\u0131n k\u0131saltmas\u0131d\u0131r. T\u00fcrk\u00e7e&#8217;de &#8220;A\u011f G\u00fcvenlik Politikas\u0131 Y\u00f6netimi&#8221; anlam\u0131na gelir. NSPM, bir kurulu\u015fun a\u011f g\u00fcvenlik politikalar\u0131n\u0131 olu\u015fturma, uygulama ve izleme s\u00fcrecini otomatikle\u015ftirmeye yard\u0131mc\u0131 olan bir yaz\u0131l\u0131m \u00e7\u00f6z\u00fcm\u00fcd\u00fcr. NSPM \u00e7\u00f6z\u00fcmleri, genellikle a\u015fa\u011f\u0131daki \u00f6zellikleri i\u00e7erir: Politika olu\u015fturma ve d\u00fczenleme: NSPM \u00e7\u00f6z\u00fcmleri, kurulu\u015flar\u0131n a\u011f g\u00fcvenlik&#8230;<\/p>","protected":false},"author":2,"featured_media":8515,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[257],"tags":[],"class_list":["post-8514","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Network Security Policy Management (NSPM ) Nedir ve Neden kullan\u0131lmal\u0131d\u0131r ? - Inforte Bili\u015fim A.\u015e.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inforte.com\/en\/network-security-policy-management-nspm-nedir-ve-neden-kullanilmalidir\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Network Security Policy Management (NSPM ) Nedir ve Neden kullan\u0131lmal\u0131d\u0131r ? - Inforte Bili\u015fim A.\u015e.\" \/>\n<meta property=\"og:description\" content=\"NSPM, Network Security Policy Management&#8217;\u0131n k\u0131saltmas\u0131d\u0131r. T\u00fcrk\u00e7e&#8217;de &#8220;A\u011f G\u00fcvenlik Politikas\u0131 Y\u00f6netimi&#8221; anlam\u0131na gelir. NSPM, bir kurulu\u015fun a\u011f g\u00fcvenlik politikalar\u0131n\u0131 olu\u015fturma, uygulama ve izleme s\u00fcrecini otomatikle\u015ftirmeye yard\u0131mc\u0131 olan bir yaz\u0131l\u0131m \u00e7\u00f6z\u00fcm\u00fcd\u00fcr. NSPM \u00e7\u00f6z\u00fcmleri, genellikle a\u015fa\u011f\u0131daki \u00f6zellikleri i\u00e7erir: Politika olu\u015fturma ve d\u00fczenleme: NSPM \u00e7\u00f6z\u00fcmleri, kurulu\u015flar\u0131n a\u011f g\u00fcvenlik...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inforte.com\/en\/network-security-policy-management-nspm-nedir-ve-neden-kullanilmalidir\/\" \/>\n<meta property=\"og:site_name\" content=\"Inforte Bili\u015fim A.\u015e.\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-02T15:17:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inforte.com\/wp-content\/uploads\/2024\/03\/NSPM.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"288\" \/>\n\t<meta property=\"og:image:height\" content=\"175\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Inforte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Inforte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.inforte.com\/network-security-policy-management-nspm-nedir-ve-neden-kullanilmalidir\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.inforte.com\/network-security-policy-management-nspm-nedir-ve-neden-kullanilmalidir\/\"},\"author\":{\"name\":\"Inforte\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6\"},\"headline\":\"Network Security Policy Management (NSPM ) Nedir ve Neden kullan\u0131lmal\u0131d\u0131r ?\",\"datePublished\":\"2024-03-02T15:17:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.inforte.com\/network-security-policy-management-nspm-nedir-ve-neden-kullanilmalidir\/\"},\"wordCount\":454,\"publisher\":{\"@id\":\"https:\/\/www.inforte.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.inforte.com\/network-security-policy-management-nspm-nedir-ve-neden-kullanilmalidir\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2024\/03\/NSPM.jpeg\",\"articleSection\":[\"Inforte Blog\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.inforte.com\/network-security-policy-management-nspm-nedir-ve-neden-kullanilmalidir\/\",\"url\":\"https:\/\/www.inforte.com\/network-security-policy-management-nspm-nedir-ve-neden-kullanilmalidir\/\",\"name\":\"Network Security Policy Management (NSPM ) Nedir ve Neden kullan\u0131lmal\u0131d\u0131r ? - Inforte Bili\u015fim A.\u015e.\",\"isPartOf\":{\"@id\":\"https:\/\/www.inforte.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.inforte.com\/network-security-policy-management-nspm-nedir-ve-neden-kullanilmalidir\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.inforte.com\/network-security-policy-management-nspm-nedir-ve-neden-kullanilmalidir\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2024\/03\/NSPM.jpeg\",\"datePublished\":\"2024-03-02T15:17:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.inforte.com\/network-security-policy-management-nspm-nedir-ve-neden-kullanilmalidir\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.inforte.com\/network-security-policy-management-nspm-nedir-ve-neden-kullanilmalidir\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.inforte.com\/network-security-policy-management-nspm-nedir-ve-neden-kullanilmalidir\/#primaryimage\",\"url\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2024\/03\/NSPM.jpeg\",\"contentUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2024\/03\/NSPM.jpeg\",\"width\":288,\"height\":175},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.inforte.com\/network-security-policy-management-nspm-nedir-ve-neden-kullanilmalidir\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Ana sayfa\",\"item\":\"https:\/\/www.inforte.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Network Security Policy Management (NSPM ) Nedir ve Neden kullan\u0131lmal\u0131d\u0131r ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.inforte.com\/#website\",\"url\":\"https:\/\/www.inforte.com\/\",\"name\":\"Inforte Bili\u015fim A.\u015e.\",\"description\":\"arbor, DDOS, spectrum, visibility, availability, forescout, nac, orchestration, network control, iot security, netscout, performans monitor, packet broker, tap, services assurance, centrify, privilage, access management, password vault, idendity access management, session recording\",\"publisher\":{\"@id\":\"https:\/\/www.inforte.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.inforte.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.inforte.com\/#organization\",\"name\":\"Inforte Bili\u015fim A.\u015e.\",\"url\":\"https:\/\/www.inforte.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png\",\"contentUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png\",\"width\":286,\"height\":180,\"caption\":\"Inforte Bili\u015fim A.\u015e.\"},\"image\":{\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6\",\"name\":\"Inforte\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g\",\"caption\":\"Inforte\"},\"url\":\"https:\/\/www.inforte.com\/en\/author\/content\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Network Security Policy Management (NSPM ) Nedir ve Neden kullan\u0131lmal\u0131d\u0131r ? - Inforte Bili\u015fim A.\u015e.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inforte.com\/en\/network-security-policy-management-nspm-nedir-ve-neden-kullanilmalidir\/","og_locale":"en_GB","og_type":"article","og_title":"Network Security Policy Management (NSPM ) Nedir ve Neden kullan\u0131lmal\u0131d\u0131r ? - Inforte Bili\u015fim A.\u015e.","og_description":"NSPM, Network Security Policy Management&#8217;\u0131n k\u0131saltmas\u0131d\u0131r. T\u00fcrk\u00e7e&#8217;de &#8220;A\u011f G\u00fcvenlik Politikas\u0131 Y\u00f6netimi&#8221; anlam\u0131na gelir. NSPM, bir kurulu\u015fun a\u011f g\u00fcvenlik politikalar\u0131n\u0131 olu\u015fturma, uygulama ve izleme s\u00fcrecini otomatikle\u015ftirmeye yard\u0131mc\u0131 olan bir yaz\u0131l\u0131m \u00e7\u00f6z\u00fcm\u00fcd\u00fcr. NSPM \u00e7\u00f6z\u00fcmleri, genellikle a\u015fa\u011f\u0131daki \u00f6zellikleri i\u00e7erir: Politika olu\u015fturma ve d\u00fczenleme: NSPM \u00e7\u00f6z\u00fcmleri, kurulu\u015flar\u0131n a\u011f g\u00fcvenlik...","og_url":"https:\/\/www.inforte.com\/en\/network-security-policy-management-nspm-nedir-ve-neden-kullanilmalidir\/","og_site_name":"Inforte Bili\u015fim A.\u015e.","article_published_time":"2024-03-02T15:17:11+00:00","og_image":[{"width":288,"height":175,"url":"https:\/\/www.inforte.com\/wp-content\/uploads\/2024\/03\/NSPM.jpeg","type":"image\/jpeg"}],"author":"Inforte","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Inforte","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inforte.com\/network-security-policy-management-nspm-nedir-ve-neden-kullanilmalidir\/#article","isPartOf":{"@id":"https:\/\/www.inforte.com\/network-security-policy-management-nspm-nedir-ve-neden-kullanilmalidir\/"},"author":{"name":"Inforte","@id":"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6"},"headline":"Network Security Policy Management (NSPM ) Nedir ve Neden kullan\u0131lmal\u0131d\u0131r ?","datePublished":"2024-03-02T15:17:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inforte.com\/network-security-policy-management-nspm-nedir-ve-neden-kullanilmalidir\/"},"wordCount":454,"publisher":{"@id":"https:\/\/www.inforte.com\/#organization"},"image":{"@id":"https:\/\/www.inforte.com\/network-security-policy-management-nspm-nedir-ve-neden-kullanilmalidir\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2024\/03\/NSPM.jpeg","articleSection":["Inforte Blog"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.inforte.com\/network-security-policy-management-nspm-nedir-ve-neden-kullanilmalidir\/","url":"https:\/\/www.inforte.com\/network-security-policy-management-nspm-nedir-ve-neden-kullanilmalidir\/","name":"Network Security Policy Management (NSPM ) Nedir ve Neden kullan\u0131lmal\u0131d\u0131r ? - Inforte Bili\u015fim A.\u015e.","isPartOf":{"@id":"https:\/\/www.inforte.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inforte.com\/network-security-policy-management-nspm-nedir-ve-neden-kullanilmalidir\/#primaryimage"},"image":{"@id":"https:\/\/www.inforte.com\/network-security-policy-management-nspm-nedir-ve-neden-kullanilmalidir\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2024\/03\/NSPM.jpeg","datePublished":"2024-03-02T15:17:11+00:00","breadcrumb":{"@id":"https:\/\/www.inforte.com\/network-security-policy-management-nspm-nedir-ve-neden-kullanilmalidir\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inforte.com\/network-security-policy-management-nspm-nedir-ve-neden-kullanilmalidir\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.inforte.com\/network-security-policy-management-nspm-nedir-ve-neden-kullanilmalidir\/#primaryimage","url":"https:\/\/www.inforte.com\/wp-content\/uploads\/2024\/03\/NSPM.jpeg","contentUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2024\/03\/NSPM.jpeg","width":288,"height":175},{"@type":"BreadcrumbList","@id":"https:\/\/www.inforte.com\/network-security-policy-management-nspm-nedir-ve-neden-kullanilmalidir\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Ana sayfa","item":"https:\/\/www.inforte.com\/"},{"@type":"ListItem","position":2,"name":"Network Security Policy Management (NSPM ) Nedir ve Neden kullan\u0131lmal\u0131d\u0131r ?"}]},{"@type":"WebSite","@id":"https:\/\/www.inforte.com\/#website","url":"https:\/\/www.inforte.com\/","name":"Inforte Bili\u015fim A.\u015e.","description":"arbor, DDOS, spectrum, visibility, availability, forescout, nac, orchestration, network control, iot security, netscout, performans monitor, packet broker, tap, services assurance, centrify, privilage, access management, password vault, idendity access management, session recording","publisher":{"@id":"https:\/\/www.inforte.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inforte.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.inforte.com\/#organization","name":"Inforte Bili\u015fim A.\u015e.","url":"https:\/\/www.inforte.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png","contentUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png","width":286,"height":180,"caption":"Inforte Bili\u015fim A.\u015e."},"image":{"@id":"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6","name":"Inforte","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.inforte.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g","caption":"Inforte"},"url":"https:\/\/www.inforte.com\/en\/author\/content\/"}]}},"_links":{"self":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts\/8514"}],"collection":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/comments?post=8514"}],"version-history":[{"count":1,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts\/8514\/revisions"}],"predecessor-version":[{"id":8516,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts\/8514\/revisions\/8516"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/media\/8515"}],"wp:attachment":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/media?parent=8514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/categories?post=8514"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/tags?post=8514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}