suresec siem and network performance management
DESCRIPTION
Suresec SIEM and Network Performance ManagementTRANSCRIPT
AN
ET
20
13
Su
rese
c
1. SURESEC .................................................................................................................................................................... 3
2. SIEM .......................................................................................................................................................................... 4
Correlation Engine ........................................................................................................................................................ 4
Sample Correlation Rules .......................................................................................................................................... 5
What problems does it solve? ...................................................................................................................................... 6
What features does it offer? ......................................................................................................................................... 6
What platforms and devices does it support? .............................................................................................................. 7
3. LOG MANAGEMENT .................................................................................................................................................. 7
Comprehensive Log Data Collection and Log Management ......................................................................................... 8
Cross-platform Log Collection ....................................................................................................................................... 8
Windows Event Logs: Agent-less or Agent-based ........................................................................................................ 9
Syslog ............................................................................................................................................................................ 9
Flat File Logs .................................................................................................................................................................. 9
Universal Database Log Collection and Log Management ......................................................................................... 10
Scalable Log Centralization ......................................................................................................................................... 10
Log Archiving and Retrieval ......................................................................................................................................... 10
4. Performance & Availability Monitoring Features ................................................................................................... 11
Cross-domain Visibility ................................................................................................................................................ 12
Business Service Management ................................................................................................................................... 12
Root-cause Analysis .................................................................................................................................................... 12
SLA Monitoring & Powerful Reporting........................................................................................................................ 12
SLA Dashboard & Business Views ........................................................................................................................... 12
Trend Monitoring&Capacity Planning ........................................................................................................................ 13
Fault Management ...................................................................................................................................................... 13
5. ABOUT ANET ........................................................................................................................................................... 14
1. SURESEC: INTEGRATED SECURITY PERFORMANCE AND AVAILABILITY
MONITORING
Suresec delivers enterprise security and network management capabilities including SIEM capabilities, NOC level
visibility, management of multiple and geographically distributed networks and automatic failover and
redundancy for continuous operations. This enables organizations to include RF, microwave and IP communications
systems, as well as cyber security, physical security, and even infrastructure, such as HVAC, UPS and power systems
in a unified dashboard with centralized alarming and integrated event management.
Security Information and Event Management Log Management Security Reporting
Network Management High Availability & Redundancy Performance Management
Event Correlation & Analysis Low 5651 Support Fault Management
Network Operations & Security Management Proactive Application Monitoring Bandwidth Management
Data Center Server Management
Multi-Functional Management Platform
Integrated Security and Network Management Platform
SIEM, Network Monitoring and Log Management Solution
Real-time availability management across thousands of devices, including applications as diverse as satellite,
cryptography and security devices.
Granular control over any type of event definition, with the ability to collect, normalizes and integrates data from any
device, application or service.
2. All-in-One IT Monitoring
Suresec is a monitoring application to integrate security (SIEM), performance, and availability monitoring in a single
application. We monitor devices, users and applications across the entire IT infrastructure - on premise, in the cloud,
or a hybrid of both - from a single pane of glass.
3. SIEM
Suresec is a web based, agent-less, SIEM, log analysis, network monitoring and reporting software. The software
application monitors, collects, analyzes, and archives logs and monitoring parameters from enterprise-wide network
perimeter security devices, Routers, Switches, SNMP Devices, VM, DHCP servers, Linux or Windows Systems then
generate reports. The devices are, Firewalls, Proxy servers, Intrusion Detection System (IDS)/Intrusion Prevention
System (IPS), and Virtual Private Networks (VPN), Mail Servers like MS Exchange Servers, Zimbra Mail Servers, Postfix
Mail Servers etc.. , distributed Windows hosts, distributed Unix hosts, Routers, Switches, and other SysLog devices,
Application like IIS web server, IIS FTP server, MS SQL server, Oracle database server, DHCP Windows and Linux
servers. The Suresec application generates graphs and reports that help in analyzing system problems with minimal
impact on network performance. Two prominent features of the application are network monitoring and security
reports.
Correlation Engine
The Correlation Engine leverages predefined rules to identify attack patterns and malicious behavior. When trying to
penetrate a system, attackers often take advantage of the fact that security controls are rarely working together and
are rarely monitored. Correlation Engine helps to automate that analysis so that attacks can be quickly identified and
breaches can be quickly contained.
Sample Correlation Rules
User Authentication
Alert on 5 or more failed logins in 1 minute on a single user ID
Attacks on the Network
Alert on 15 or more Firewall Drop/Reject/Deny Events from a single IP Address in one minute
Alert on 3 or more IPS Alerts from a single IP Address in five minutes.
Virus Detection/Removal
Alert when a single host sees an identifiable piece of malware
Alert when a single host fails to clean malware within 1 hour of detection.
Alert when a single host connects to 50 or more unique targets in 1 minute
Alert when 5 or more hosts on the same subnet trigger the same Malware Signature (AV or IPS)
within a 1 hour interval.
Web Server
Files with executable extensions (cgi, asp, aspx, jar, php, exe, com, cmd, sh, bat), are posted to a
web server, from an external source
Black-listed applications
Alert when an unauthorized application (e.g. Teamviewer, LogmeIn, Nmap, Nessus, etc.) is run on
any host
Monitored Log Sources
Alert when a monitored log source has not sent an event in 1 Hour
User Activity Reports
All Active User Accounts (any successful login grouped by account name in the past XX days)
Active User List by Authentication type
a) VPN Users
b) Active Directory Users
c) Infrastructure Device Access (Firewalls, Routers, Switches, IPS)
User Creation, Deletion and Modification (A list of all user accounts created, deleted or modified)
Access by any Default Account – (Guest, Root, Administrator, or other default account usage)
Password resets by admin accounts in the past 7 days.
Access Reports
Access to any protected/monitored device by an untrusted network
a) VPN Access to Server Zone
b) Access by a Foreign Network to Server Zone
Malware
A list of host addresses for any identified malware or attack - grouped by malware name
A count of any given malware (grouped by Anti-Virus Signature), over the past XX days
Email activity
Top 10 E-mail subjects
Top 10 addresses to send email
Top 10 addresses to receive email
Top 10 addresses to send email with largest total size (MB)
Top 10 addresses to receive email with largest total size (MB)
Web Content
Top 10 Destinations by Domain Name
Top 10 Blocked Destinations by Domain Name
Top 10 Blocked Sources by IP Address
Top 10 Blocked categories
Total sent and received bytes grouped by IP addresses
User Account activity
Top 10 Failed Logins
What problems does it solve?
Suresec helps network security administrators & IT Managers for bandwidth monitoring, Firewall internet
security events monitoring efficiently. Also the Suresec software generates reports to comply with various
regulations such as Health Insurance Portability and Accountability Act (HIPAA), Gramm-Leach-Bliley Act
(GLBA), Sarbanes-Oxley Act (SOX), and Payment Card Industry Data Security Standards (PCI) and
archives logs for the purpose of network auditing and forensic analysis. The Suresec software also reduces
system downtime, and increases network performance in the enterprise. It helps system administrators to
troubleshoot problems on hosts, select applications, and the network. The logs event manager software helps
organizations meet host-based Security Information Event Management (SIEM) objectives.
What features does it offer?
Multiple Device/ Vendor Support, Flexible Log Archiving, Capability to view traffic trends and usage
patterns, Multi-level drill down into top hosts, protocols, web sites and more, VPN/ Squid Proxy Reports,
Multi-varied Reporting Capabilities, Centralized event log management, Compliance reporting, Automatic
alerting, Historical trending, Security analysis, Host grouping, Pre-built event reports, Customizable report
profiles, Report scheduling, Multiple report formats. Compliant with Turkish Law 5651 which guaranties
that logs cannot be changed and digitally signed.
What platforms and devices does it support?
Platforms: Windows and Linux
Devices:
Firewalls:
Fortinate,Juniper/NetScreen,Cisco,Checkpoint,Watchguard,Drytek,Zyxel,3Com,Anchiva,Applied
Identity, ARKOON Network Security, Astaro, Aventail, AWStats, BlueCoat, CheckPoint, Cimcor,
Cisco Systems, Clavister, CyberGuard, D-Link, DP Firewalls, Electronic Consultants ,FreeBSD,
Global Technologies, IPCop, Ingate, Inktomi, Kerio, Lenovo Security Technologies, Lucent,
McAfee, Microsoft ISA,NetApp,NetASQ,NetFilter,Netopia,Network-1, Snort, SonicWALL, Squid
,St. Bernard Software, Sun Microsystems
Proxy-servers: Microsoft ISA, NetCache, Squid, MS TMG 2010,Trend Micro, Mcafee
IDS/IPS: Checkpoint, Juniper IDP, Cisco, UTM devices and others
VPN: Cisco ASA VPN Concentrator , Juniper SSL VPN, Microsoft PPTP/L2TP SonicWALL
Aventail
Servers: Windows NT/2000/XP/Vista/2003 & 2008 Servers, Linux - RedHat, Debian, UNIX -
Solaris, HP-UX, IBM AS/400,
Network Devices: Switches and Routers - Alcatel-Lucent TiMOS, AOS,Brocade Foundry
IronWare,Cisco CatOS, IOS,Cisco MDS,Cisco NX-OS,Extreme ExtremeWare XOS,H3C
Comware,HP ProCurve,Huawei VPR,Juniper Junos,Nortel ERS, Passport
Applications: SNARE for Windows, Apache (Syslog) ,IIS - Web server, FTP server and MS SQL
server, DHCP - Windows and Linux and Oracle.
Text-Based Log: Csv/Tsv/W3C/Txt/Custom
Mail Servers: Lotus Notes, MS IIS SMTP, MS Exchange, Qmail, Postfix
Web Filter: Barracuda Spam Firewall, McAfee Web Gateway, Microsoft ISA Server, Squid,
WebSense MailFilter, WebSense WebFilter
Virtualization: VMWare ESX, ESXi, vSphere, vCenter
Web Server: Apache Webserver, Microsoft IIS for Windows 2000, 2003, 2008
Hardware Monitoring: Dell servers, HP servers, IBM servers, Network devices ,Storage devices ,
4. LOG MANAGEMENT
Suresec unique log management feature being able to collect log data from across an enterprise regardless of
their source, present the logs in a uniform and consistent manner and manage the state, location and efficient
access to those logs is an essential element to any comprehensive Log Management and Log Analysis
solution. The Suresec solution was designed to address core log management needs including:
The ability to collect any type of log data regardless of source
The ability to collect log data with or without installing an agent on the log source device, system or
application.
The ability to "normalize" any type of log data for more effective reporting and analysis
The ability to "scale-down" for small deployments and "scale-up" for extremely large environments
An open architecture allowing direct and secure access to log data via third-party analysis and
reporting tools
A role based security model providing user accountability and access control
Automated archiving for secure long term retention
Wizard-based retrieval of any archived logs in seconds
Comprehensive Log Data Collection and Log Management
Being able to collect log data from across an enterprise regardless of their source, present the logs in a
uniform and consistent manner and manage the state, location and efficient access to those logs is an
essential element to any comprehensive Log Management and Log Analysis solution. The Suresec solution
was designed to address core log management needs including:
The ability to collect any type of log data regardless of source
The ability to collect log data with or without installing an agent on the log source device, system or
application.
The ability to "normalize" any type of log data for more effective reporting and analysis
The ability to "scale-down" for small deployments and "scale-up" for extremely large environments
An open architecture allowing direct and secure access to log data via third-party analysis and
reporting tools
A role based security model providing user accountability and access control
Automated archiving for secure long term retention
Wizard-based retrieval of any archived logs in seconds
Cross-platform Log Collection
Today's IT operations require many technologies; routers, firewalls, switches, file servers, and applications
to name a few. Suresec has been designed to collect from them all through intelligent use of agent-less and
agent-based techniques.
Windows Event Logs: Agent-less or Agent-based
Suresec can collect all types of Windows Event Logs with or without the use of an agent. Many Windows-
based applications write their logs to the Application Event Log or a custom Event Log.
Examples of supported log sources that can be collected by Suresec in real time include:
Windows System Event Log
Windows Security Event Log
Windows Application Event Log
Microsoft Exchange Server application logs
Microsoft SQL Server application logs
Windows based ERP and CRM systems application logs
Syslog
Many log sources, including most network devices (e.g. routers, switches, firewalls) transmit logs via
Syslog. Suresec includes an integrated Syslog server for receiving and processing these messages. Simply
point any syslog generating device to Suresec and it will automatically begin collecting and processing those
logs.
Flat File Logs
Suresec can collect logs written to any ASCII-based text file. Whether it is a commercial system or
homegrown application, Suresec can collect and manage them.
Examples of supported log sources using this method include:
Web servers logs (e.g. Apache, IIS)
Linux system logs
Windows ISA server logs
DNS and DHCP server logs
Host based intrusion detection/prevention systems
Homegrown application logs
Exchange message tracking logs
Universal Database Log Collection and Log Management
Since so much sensitive information resides in databases, it is important to monitor and track access and
activity surrounding important databases. The actual and reputational cost of a theft of customer records can
be very large. Suresec can help. Suresec collects, analyzes, alerts, and reports on logs from Oracle,
Microsoft SQL Server. It also captures data from custom audit logs and applications that run on the
database. This capability enables customer to use Suresec for real-time database monitoring to guard against
insider and outsider threats.
Scalable Log Centralization
Suresec is architected to scale easily and incrementally as your needs grow. Whether you need to collect 10
million or more than 1 billion logs per day, Suresec can handle it. With Suresec you simply deploy the
capacity you need when you need it, preserving your initial investment along the way. Deployments can
start with a single, turnkey appliance and grow easily by adding incremental log manager appliances as
needs expand. With Suresec’s “building blocks” distributed architecture, you can access and analyze logs
throughout your deployment with ease.
Log Archiving and Retrieval
Many businesses have compliance requirements to preserve historic log data and be able to provide it in its
original form for legal or investigative purposes. Collecting, maintaining and recovering historic log data
can be expensive and difficult. Imagine trying to recover logs from a specific server two years ago. Were
the logs archived or saved anywhere. If so, where have the logs been stored? What format are they in?
Can the correct archived log files be identified among the tens of thousands (or millions) of other archive
files…in a reasonable period of time? With Suresec, the answers to these questions are easy.
Activity Auditing
For compliance verification, users’ and administrators’ actions within Suresec are logged. Suresec user
activity reports provide powerful proof that Suresec is actively used to analyze log data for compliance
purposes.
5. Performance & Availability Monitoring Features
Suresec network monitoring capability besides security management is unique feature of Suresec platform.
Suresec Performance and Availability Management gives you an integrated view into the health of your
network, systems, applications and virtualization environments. We monitor performance and availability
metrics, application health, infrastructure resource usage, track and correlate network and application
behavior, baseline metrics and detect anomalous activity.
Types of Monitors:
Based on the parameters they measure, we have categorized Suresec monitors broadly into four types. They
are:
Operating Systems: Microsoft® Windows Server™,2000/2003/2008/2012,Microsoft Windows®,
XP, Vista, 7, 8,RedHat® Linux, SuSE® Linux, IBM AIX®, Hewlett-Packard HP-UX®,
SunSolaris™, VMware®.
Application Monitors : WebLogic, IBM WebSphere, Microsoft Exchange, Microsoft IIS, Microsoft
SQL Server, MySQL, Oracle, Tomcat, FTP, HTTP, URL, Port.
Network Monitors: Cisco® & Other Network Devices, DHCP, SNMP Devices, SNMP Trap, HP,
Avaya, Dell.
Advanced Monitors : Virtual Machine, Novell, Vsphere
Infrastructure: Active Directory, Dell OpenManage™,HP Systems Insight Manager ,(HP SIM) ,IBM
Director ,Protocol Availability, Syslog, Windows Event Log
Cross-domain Visibility
Our cross-domain monitoring approach spans server, storage, network, virtualization and applications to
automatically cross-correlate metrics in real-time, freeing you from the task of gathering this information
from multiple sources.
Business Service Management
We monitor the performance health of your business services in addition to individual devices and
applications.
Root-cause Analysis
We automatically connect the dots, in real-time, to rapidly isolate the root cause of security and network
issues. This is valuable in virtualized environments where problem root causes vary with time due to
vMotion and other changes.
SLA Monitoring & Powerful Reporting
Service level trends and tracking is now on your fingertips. A powerful tool to manage predict and prevent
problems before they affect to users and business.
SLA Dashboard & Business Views
Get full visibility into your organization through real - time SLA monitoring and Business Views.
Trend Monitoring&Capacity Planning
You can use system statistics to monitor the bandwidth of all the volumes, interfaces, and CPUs,Disks that
are being used on your system.
You can also monitor the overall CPU utilization for the system. These statistics summarize the overall
performance health of the system and can be used to monitor trends in bandwidth and CPU utilization.
You can monitor changes to stable values or differences between related statistics. These differences then
can be further used for capacity planning
Fault Management
Suresec Fault Management unique capability is the set of functions that detect, isolate, and correct malfunctions in
your network. When a fault or event occurs, a network component will often send a notification to the network
operator. An alarm is a persistent indication of a fault that clears only when the triggering condition has been
resolved.
6. SURESEC ADVANTAGES
Decision speed: Integrated analysis technology processes highly complex decision logic in real-time
– similar to how humans reason.
Continuous learning: We continuously learn the behavior of your environment by cross-correlating
log information, device availability and performance statistics.
Real-time alerting and historical forensics: Many ready to use rules detect anomalous behavior and
events. Comprehensive search and reporting capabilities simplify compliance reporting.
Business service visibility: Monitoring data center resources, users and applications in the context of
business services – not devices, speeds and feeds – to accelerate problem detection and resolution.
Customers who have used SURESEC have experienced:
Improved productivity.
Higher business operations uptime.
Lower IT costs.
Improved business performance.
Ability to meet Service Level Agreements.
By correlating customer service level commitments you will have better visibility to required
response times.
Monitor applications.
Monitor ecosystem business services, not just devices.
Reduce Mean Time to Repair through automated root cause investigation.
Avoid costly outages with proactive monitoring.
7. ABOUT ANET
ANET Software is an R&D and Engineering company which is founded in 2003.we are developing SIEM,
network management, application monitoring, network inventory management, network security and
internet filtering solutions.
Also we have solutions about
Log Management
Fault Management
Compliancy & Windows Events Manager
Network Monitoring
Asset Management
Network Security
UPS Management
Netflow Monitoring
Distributed Backup
Mail Archieve
Ticket Management System-Helpdesk
Network Diagnostic & Trend Analysis
Computer Security as a project based customized solutions.
We have been working on network management&internet safety for a long time. we have done R&D
projects With TurkTelekom and TTNET.
Turk Telekom group provides integrated telecommunication services from PSTN, GSM to wide band
internet.
Turk Telekom group companies have 17.1 millions of PSTN customers, 6 millions of ADSL customers and
12.4 million GSM customers as of June 30, 2009
TTNET offers the latest Internet access technology to its customers across 81 cities of Turkey.
The TTNET product portfolio features ADSL fast Internet access, Dial-up Internet access, WiFi wireless
Internet access,
G.SHDSL, Metro Ethernet, ATM and Frame Relay Internet access services.
Also our team and projects awareded by the Scientific and Technical Research Council of Turkey.
(TUBİTAK ) and
REPUBLIC OF TURKEY MINISTRY OF INDUSTRY AND TRADE: Small and Medium Industry
Development Organization. (KOSGEB)
We have also R&D department. Some of our R&D papers are:
POPULAR SCIENCE JOURNALS
Ertuğrul Akbaş, KORELASYON MOTORU, İLERİ ANALİTİK YÖNTEMLER, BİLGİ
GÜVENLİĞİ VE LOG YÖNETİMİ, http://www.olympos.net/belgeler/log-yonetimi/korelasyon-
motoru-ileri-analitik-yontemler-bilgi-guvenligi-ve-log-yonetimi-29121324#axzz2AGe4adnG
Ertuğrul Akbaş ,LOG YÖNETİMİ ve SIEM, http://www.olympos.net/belgeler/siem/log-yonetimi-
ve-siem.html#axzz2AGe4adnG
Ertuğrul Akbaş, http://www.linkedin.com/groups/Log-Y%C3%B6netimi-ve-SIEM-
4230485.S.94663393
Ertuğrul Akbaş, Yerli Yazılım Sanayi, Operatörler ve İçerik Filtreleme, Telekom Dünyası Dergisi,
http://www.telekomdunyasi.com/
Ertuğrul Akbaş, Merkezi veya ISP Seviyesinde İçerik Filtreleme Çocuk Pornosu ve Zararlı Siteleri
Engellemede Başarılı Olabilir mi?, http://www.olympos.org/belgeler/icerik-filtrelemede-hukumet-
politikalari/merkezi-veya-isp-seviyesinde-icerik-filtreleme-coc
Ertuğrul Akbaş, Topolojik Bağımlı Otomatik Sistem Güvenliği Tarama Yöntemi,
http://www.olympos.org
Ertuğrul Akbaş , Bilgi Güvenliği, http://www.olympos.org
Ertuğrul Akbaş, Yerel Alan Ağlarında Paket Analizi ile Güvenlik Taraması, http://www.olympos.org
Ertuğrul Akbaş, WEB İÇERİK TARAMA VE EBEVEYN KONTROLU ,
http://www.olympos.org/belgeler/icerik-yerellestirme/web-icerik-tarama-ve-ebeveyn-kontrolu-
2912666.html
Ertuğrul Akbaş, Çocuk Pornosu ve Zararli Içerik Engellemede Önemli Yöntemlerden Biri : URL
Kategorizasyonu. http://www.olympos.org/belgeler/internet-guvenligi/cocuk-pornosu-ve-zararli-
icerik-engellemede-onemli-yontemlerden-biri-url
JOURNALS
E. Akbas, E. Murat Esin, "SEAMLESS INTEGRATION OF NETWORK MANAGEMEN
PROTOCOL WITH DISTRIBUTED CONTROL", The IJISIP Proceedings (ISSN: 1304-2386),
Volume: 1, Number :1, July 2003, International XII. Turkish Symposium of Artificial Intelligence
and Neural Networks (TAINN' 2003).
INTERNATIONAL CONFERANCE PAPERS
E.Akbas, Enhancing SIEM Correlation Rules Through Baselining, 5th International Conference on
Information Security and Cryptology,May 17-19, 2012,Ankara,Turkey
http://www.iscturkey.org/index.php?option=com_content&view=article&id=46&Itemid=63&lang=tr
E. Akbas ,NEXT GENERATION FILTERING: OFFLINE FILTERING ENHANCED PROXY
ARCHITECTURE FOR WEB CONTENT FILTERING”, 23rd of the International Symposium on
Computer and Information Sciences ( ISCIS 2008 ), İstanbul, Turkey, 2008
http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?isnumber=4717848&arnumber=4717892&count=124&
index=43
Ertuğrul Akbaş, Yerel Alan Ağlarında Paket Analizi ile Güvenlik Taraması, ", Ağ ve Bilgi Güvenliği
Ulusal Sempozyumu, Mayıs,2008, Girne, KKTC.
http://www.emo.org.tr/ekler/578fe27c90622d7_ek.pdf
Ertuğrul Akbaş, Web İçerik Tarama ve Ebeveyn Kontrolü, Ağ ve Bilgi Güvenliği Ulusal
Sempozyumu, Mayıs,2008, 2008, Girne, KKTC.
http://www.emo.org.tr/ekler/b91892416e732f1_ek.pdf
Ertuğrul Akbaş "Topolojik Bağımlı Otomatik Sistem Güvenliği Tarama Yöntemi", ISC'07 Bilgi
Güvenliği ve Kriptoloji Konferansı, 13-14 Aralık,2007, Ankara, Turkiye.
www.iscturkey.org/iscold/ISCTURKEY2007/papers/54.pdf
Ertuğrul Akbaş , "Hata Yönetimi için Zeki Keşif ve Topoloji Oluşturma Yöntemi ", Ağ ve Bilgi
Güvenliği Ulusal Sempozyumu, pp 157-163, 9-11 Haziran,2005, Istanbul, Turkiye.
www.emo.org.tr/resimler/ekler/b3fff6463464959_ek.pdf
E. Akbas, E. Murat Esin, "Seamless Integration of Network Management Protocol with Distributed
Control " The twelfth Turkish Symposium on Artificial Intelligence and Neural Networks,02-04
July 2003, Çanakkale, Turkey.
E. Akbas, "System Independent And Distributed Fault Management System", The Eighth IEEE
Symposium on Computers and Communications,30 June-3 July 2003, Antalya, Turkey.
http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=1214302
E. Akbas, "Web Based Management: A Novel Architecture ", The Sixteenth International
Symposium on Computer and Information Sciences (ISCIS XVI), October, 29-31, 2001, Antalya,
Turkey
Some of our references:
Contact
Doğu Mah. Bilge sok. No=2
Kat= 5 Daire= 4
Pendik/İstanbul
Tel : 0216 3540580
0216 3540581
Fax : 0216 3540580
www.anetyazilim.com
www.anetyazilim.com.tr