About our company
Turan Security (TuranSec) is an independent cybersecurity team from Uzbekistan that covers the full range of tasks: from vulnerability detection and attack modeling to building defenses and strengthening SOCs.
We work to make security measurable: you receive a clear report for management, proof of concept (PoC) for engineers, a mitigation plan, and retesting. Our expertise is proven: we are in the Hall of Fame of NASA, Google, Alibaba, and Amazon.
We rely on the "gold standard" of industry certifications (CISSP, OSCP, PNPT, CISM, CEH, and others) and apply proven methodologies to ensure recommendations are implemented effectively. We are trusted by over 30 of the country's largest companies and organizations—from banks and fintech to telecom and infrastructure players.
We are in the Hall of Fame



Our services
Provide a general description of the items below and introduce the services you offer. Click on the text box to edit the content.

Penetration Testing
Deep vulnerability scanning of your infrastructure by experts recognized by global giants.

AppSec Program
Secure code development and auditing. Application security that matches NASA and Google methodologies.

Incident Response
Emergency hack response. Minimize damage and restore your business as quickly as possible.

Red Team
Simulate real attacks to test your defenses against advanced hacker groups.

Cloud Security
Comprehensive audit of cloud environments (AWS, Azure, Google Cloud) for configuration errors and leaks

Cyber Security Training
Обучение персонала и технические мастер-классы от действующих чемпионов Cyber Ordo 2025.

Blue Team
1st place at Cyberkent 3.0. Building a layered defense and threat detection systems.

SOC Implementation
Design and launch of 24/7 security monitoring centers for banks and financial institutions

Digital Forensics
Digital investigation of incidents and collection of legally significant evidence of hacking.
They trust us















Какие проблемы мы решаем
We confirm everything with artifacts: PoC, logs, ATT&CK mapping (if you use it), retest.
Ransomware-ready
reducing the likelihood of ransomware
Account takeover
we eliminate critical vulnerabilities
Phishing / BEC
We reduce account compromises and financial losses
Weak detection
We increase MTTD/MTTR through detections and playbooks
Data leak
We close the “holes” in the perimeter and cloud
Risks in development
We're implementing AppSec processes to prevent bugs from making it into production.





















