logo

About Us

Established in 2017, Ella Bilişim develops solutions and offers services in many areas with a strong team. The solutions realized by Ella Bilişim, which aims to provide innovative, applicable and effective solutions to our customers, whom we consider as our strategic partners, in line with their demands, to ensure trust and stability, and to solve their needs by having the most efficient experience, are listed below.

  • Labsis Pro: Laboratory Information Management System
  • NoiseView: Noise Measurement System
  • PowerVision: Oblique Image Processing and Data Generation System

In addition to these solutions, it has reached many customers with the services it provides. Some of these services are listed below.

  • Geographic Information Systems Application Development Services
  • Remote Sensing Systems Application Development Services
  • Geographical Data Production Services with Unmanned Aerial Vehicles
  • Mobile Application Development Services

Ella Bilişim, which has ISO 9001 Quality Management System Certificate and ISO 27001 Information Security Management System certificates, is progressing successfully by strengthening its place among the leading companies in its sector day by day. With the innovations we have brought to the informatics and service sector and the strategic collaborations we will gain, we continue to successfully progress towards becoming a national brand, which is among the world's leading companies in the sector.

Our company; It aims to provide service by constantly raising our service standards, to provide unconditional customer satisfaction, to ensure that every employee works in the safest possible condition. Conscious of this purpose;

- To ensure the satisfaction of our customers by perceiving the needs and expectations of the customers fully and accurately,
- To increase the quality of our services without compromising our understanding of quality,
- Adopting the concept of continuous improvement in order to compete,
- To continue training activities in order to increase the quality knowledge and awareness of our employees in order to maintain our principle of doing things right the first time and every time,
- To provide a healthy and safe working environment for our employees,
- Fulfilling legal obligations,

It is our Quality Policy.

Our company, as its management, performs the establishment of information technology infrastructure based on local and wide area networks in all kinds of businesses and institutions, depending on the mission, vision and policies expressed in the Quality Management System, and provides operatorship and consultancy services with its operation and support, It meets the IT needs of enterprises and institutions that require high technical knowledge and experience with the outsource method.

Information security is the activities of protecting the confidentiality, integrity and usability of the information produced, prepared by the company and to which the parties are responsible. These activities should ensure that information is protected, including other characteristics such as accuracy, explainability, non-repudiation and reliability.

Services that our company is responsible for performing information security activities:

- Continuity of IT services will be provided under an institutional roof independent of individuals, within the scope and limits of ISMS.
- Configuration of network installations that require high knowledge and experience will be provided within the scope and limits of ISMS.
- The necessary operating and technical support services will be provided within the scope and limits of the ISMS, in order for the existing networks in the institutions / organizations to work continuously.
- Providing operator services and ensuring data security in routine works based on IT infrastructure / hardware / software system will be within the scope and boundaries of ISMS.
- Meeting the expectations of our customers at a high level of the institutions / organizations we serve under the contract, increasing their information processing capabilities, helping them reach their activity / process / performance targets by keeping them informed of technological developments will be continued within the scope and limits of ISMS.
- Recognizing that any confidential/commercial/private information processed in all information technology systems we serve within the scope and boundaries of ISMS is the privacy of the customer of the institution/organization we serve, and that this information is confidential in any place/person/institution/organization without the knowledge/approval of the customer. / Integrity / Availability will be ensured by adhering to the conditions.
- ISMS policy will comply with legal and regulatory requirements, take into account obligations or dependencies arising from contracts or third parties, provided that it remains within the scope and limits of ISMS.
Our company establishes the necessary control mechanisms for the fulfillment of information security activities. A draft study has been initiated in order to determine the control targets, to carry out the controls and to ensure their continuity. In this study, the risk management and risk control structure to which the controls will depend has been established.

Our company, which works especially for organizations that request services based on outsourcing, has to guarantee that the most important capital and asset of the institutions / organizations that receive service from it is used by 3rd parties without seeking good or bad intentions. It is a basic requirement to carry out activities in compliance with the laws and relevant legislation rules stipulated by the specifications and included in the provisions of the contract and deemed mandatory by the highest executive structure in the fields in which the institution / organization operates.

In order to fulfill these requirements, arrangements will be made on the basis of hardware and software, and awareness - awareness - application - development training and exercises will be carried out for all our personnel.

Another dimension of information security is providing business continuity management. For this reason, by providing the necessary backup structures, breakage and rupture situations in the areas that fall under the responsibility of our company in any business continuity structure will be eliminated.

In the ISMS documentation established to support our information security policy

- Rules to be followed
- Processes
- Procedures
- Controls

It is located.