Kron | Company Profile - Revenue, Headcount, Tech Stack, Contacts
Contact Information
Industry & Market
Company Metrics
Funding Information
Headcount Distribution
By Department
Department Breakdown
Technology Stack
Analytics & Tracking
Social & Marketing
Development
Email & Communication
Keywords & Focus Areas
Kron
Overview
Kron is a software company based in Istanbul, Turkey, specializing in cybersecurity and ICT access control solutions for medium and large enterprises. Founded in 2007, it has expanded to a global presence with offices in Istanbul, Ankara, Izmir, and New Jersey. With over 18 years of experience, Kron delivers mission-critical solutions across various sectors, including telecommunications, finance, and enterprise security.
The company offers a range of products to enhance security and operational efficiency. Its Privileged Access Management (PAM) solution safeguards privileged accounts with real-time detection and prevention. The Authentication, Authorization, and Accounting (AAA) platform manages access subscriptions, while Data Activity Monitoring ensures database security and compliance. Additional offerings include Dynamic Data Masking for data protection, IPDR Logging for network traffic activities, and Telecom Processing for efficient data management.
Basic Information
| Industry | information technology & services |
|---|---|
| Founded | 2007 |
| Revenue | 10M |
| Headquarters | İ.T.Ü. Ayazağa Yerleşkesi, Koru Yolu, Arı 3 Binası, Teknokent, No: B401, İstanbul, Maslak 34469, Turkey |
| Alexa Ranking | 426619 |
Contact Details
- Phone: +90 212 286 5122
- Website: krontech.com
- LinkedIn: linkedin.com/company/kront
Key Focus Areas & Initiatives
- Session management
- Identity management
- TACACS
- E2E solution integration
- Cyber security
- Privileged access management
- Dynamic data masking
- Access management solutions
- Password vault
- OSS software
- CG NAT solution
- Cgn logging
- IPDR
- Full FCAPS SW development
- PAM
- Network management system
- Carrier grade logging
- Secrets manager
- Telemetry pipeline
- Central password management
- Siber guvenlik
- Radius
- Network quality measurement
- E2E OSSBSS integration
- IT system custom software development
- Telecommunications
- Privileged account security
- Cybersecurity for critical infrastructure
- Multi-factor authentication
- Telemetry data
- Security policy enforcement
- Data protection
- Automated routine tasks
- Password management
- Zero trust
- User behavior analytics
- Automation
- IT services
- Vendor lock-in mitigation
- Financial services
- Operational efficiency
- Network security
- PAM as a service
- Network monitoring
- Innovation
- Insider threat detection
- Quality assurance
- Regulatory compliance tools
- Data leak prevention in telecom
- Regulatory compliance
- Cyber threat protection
- Security analytics
- OT security
- Unified access manager
- Privileged task automation
- Risk management
- Cloud PAM
- Access control
- Network access control
- GPON provisioning
- Cyberpulse podcast
- OT security with Kron PAM
- Database monitoring
- Privileged task automation scalability
- Operational security
- Energy
- Data masking in motion
- Consulting
- Zero-trust access for telecom
- Data rehydration
- Cyber threat detection
- Privileged session recording
- Security monitoring
- Data volume reduction
- Real-time database monitoring
- Data silos
- Insider threat protection
- GPON provisioning & service activation
- Privileged session manager
- Customer experience
- SLA monitoring
- Cyber pulse podcast
- Network traffic zero-loss logging
- B2B
- Zero trust architecture
- Data integrity
- Network traffic logging
- Service activation
- Data security & management
- Access control systems
- Telco solutions
- Petabyte-scale data retention
- Compliance
- Petabyte-scale telco data retention
- Replace Cisco CPAR with Kron AAA
- AAA server
- Cybersecurity for telco
- Security use cases
- Data security & data management
- Government
- Telco security
- AI-powered user behavior analytics
- Security automation
- Data security
- Data security in cloud environments
- Data management
- Infrastructure management
- Secure remote access
- Data masking
- Data rehydration security
- Data leak prevention
- Cybersecurity solutions
- Database activity monitoring
- Identity & access management
- Security solutions
- Cloud security
- Data silo breakdowns
- Network performance monitoring
- Digital transformation
- Privileged session management
- Database access manager
- Computer systems design and related services
- Kron PAM
- Endpoint privileged management
- Network configuration management
- Least privilege
- Audit compliance
- IoT security
- Session recording
- Credential vaulting
- Telecom solutions
- Compliance solutions
- Security provisioning
- Risk mitigation
- SLA management
- Network visibility
- Authentication solutions
- Privileged user monitoring
- Telecom data management
- Healthcare
- Finance
- Energy & utilities
- Privacy
- Health care
- Health, wellness & fitness
- Hospital & health care
Technologies Used
- AI
- Amazon AWS
- Android
- Apache
- Bootstrap Framework
- CloudFlare Hosting
- Cloudflare DNS
- Disqus
- Docker
- DoubleClick
- DoubleClick Conversion
- Facebook Custom Audiences
- Facebook Login (Connect)
- Facebook Widget
- Google Analytics
- Google Dynamic Remarketing
- Google Tag Manager
- Kronos FMSI
- Kubernetes
- Leadfeeder
- Linkedin Login
- Linkedin Widget
- Microsoft Office 365
- Mobile Friendly
- OneTrust
- Outlook
- Remote
- Slack
- reCAPTCHA