About our company
Turan Security (TuranSec) is an independent cybersecurity team from Uzbekistan that covers the full range of tasks: from vulnerability detection and attack modeling to building defenses and strengthening SOCs.
We work to make security measurable: you receive a clear report for management, proof of concept (PoC) for engineers, a mitigation plan, and retesting. Our expertise is proven: we are in the Hall of Fame of NASA, Google, Alibaba, and Amazon.
We rely on the "gold standard" of industry certifications (CISSP, OSCP, PNPT, CISM, CEH, and others) and apply proven methodologies to ensure recommendations are implemented effectively. We are trusted by over 30 of the country's largest companies and organizations—from banks and fintech to telecom and infrastructure players.
We are in the Hall of Fame



Our services

Penetration Testing
Deep vulnerability scanning of your infrastructure by experts recognized by global giants.

AppSec Program
Secure code development and auditing. Application security that matches NASA and Google methodologies.

Incident Response
Emergency hack response. Minimize damage and restore your business as quickly as possible.

Red Team
Simulate real attacks to test your defenses against advanced hacker groups.

Cloud Security
Comprehensive audit of cloud environments (AWS, Azure, Google Cloud) for configuration errors and leaks

Cyber Security Training
Staff training and technical workshops from the current Cyber Ordo 2025 champions.

Blue Team
1st place at Cyberkent 3.0. Building a layered defense and threat detection systems.

SOC Implementation
Design and launch of 24/7 security monitoring centers for banks and financial institutions

Digital Forensics
Digital investigation of incidents and collection of legally significant evidence of hacking.
They trust us















What problems do we solve?
We confirm everything with artifacts: PoC, logs, ATT&CK mapping (if you use it), retest.
Ransomware-ready
reducing the likelihood of ransomware
Account takeover
we eliminate critical vulnerabilities
Phishing / BEC
We reduce account compromises and financial losses
Weak detection
We increase MTTD/MTTR through detections and playbooks
Data leak
We close the “holes” in the perimeter and cloud
Risks in development
We're implementing AppSec processes to prevent bugs from making it into production.

















