+90 0212 288 53 73

Yıldız Teknik Üniversitesi Davutpaşa Kampüsü,Teknoloji Geliştirme Bölgesi, A2 Blok,No:Z02,Esenler/İSTANBUL

Yıldız Teknik Üniversitesi Davutpaşa Kampüsü,Teknoloji Geliştirme Bölgesi, A2 Blok,No:Z02,Esenler/İSTANBUL

+90 0212 288 53 70

Who Are We?

Established in 1992 as Mardata, our company was renamed Baysis in 1994 and later became Yaz Information System in 2002, coinciding with changes in the shareholding structure. Yaz initiated its expertise in the finance sector with Core Banking software and expanded its services to other sectors by developing turnkey projects in business process management, outsourcing, organizational efficiency, and business intelligence.

Biz Kimiz?

Yaz’s Uniqueness in The Industry

Yaz is an information technology company that expertly manages crucial business transitions and stands out in the sector due to its experienced, extensive staff, and robust R&D activities. Our clients include medium and large companies, banks, holding companies, consumer finance companies, private financial institutions, and telecommunications companies.



To expand its expertise and experience, which began in the finance sector with Core Banking software, the company now produces turnkey projects in business process management, outsourcing, organizational efficiency, and business intelligence for various sectors.


To provide software development and value-added solution services to our domestic and international customers, to expand our customer network with projects developed using Java, Oracle, and .NET technologies.
To integrate technological developments into our products via R&D investment and to generate new products and markets through innovative Technologies, to establish a dependable, solution-oriented organization that consistently enhances itself, guided by a philosophy of delivering superior service, ensuring customer satisfaction, and fostering employee contentment,
To provide opportunities for the development of the knowledge and skills of employees through effective training, to ensure our clients meet their project objectives in terms of time, content, quality, and budget…

Quality Policy

Quality Policy

To attain global brand status through reliability, superior service quality, successful projects, distinctions in products and services both domestically and internationally; to continually enhance the value we offer to our customers and employees; To provide software services to domestic and foreign banks and to expand the customer network,

To Provide customised solutions and outsourcing services to domestic banks and other institutions.

To meet the demands and expectations of our customers with high-quality service,

To take large-scale projects undertaken with Java, Oracle, and related technologies used in its products to other areas of the financial sector and outside the financial sector,

To build an organization that is reliable, a solution provider, constantly improving itself, adopting a better service, happier customer, happier employee approach.

To enable technological developments in products through investment in R&D and to create new products and new markets through new Technologies.

To carry out the required work within the company for the realization of COBIT implementation and to ensure that the experience obtained is turned into a saleable service

To offer opportunities for the enhancement of employees' knowledge and skills through effective training,

To offer competitive, reliable, and high-quality solutions to our customers by combining quality and technological developments with our working experience of more than 25 years by striving for business excellence with our excellent employees,

To constantly improve the quality management system by keeping the ways of communication open.

Information Security Policy

Our company, in accordance with its mission, vision, and policies expressed in the Quality Management System, carries out the installation, operation, and support of information technology infrastructure based on local and wide area networks in all types of companies and institutions, provides operator and consultancy services, and meets the information processing needs of companies and institutions that require high technical knowledge and experience through outsourcing.

Information security involves safeguarding the confidentiality, integrity, and availability of the information generated, prepared, and managed by an organization or company for its stakeholders. These efforts aim to protect information while also upholding additional qualities such as accuracy, explainability, non-repudiation, and reliability.

  • The continuity of data processing services will be ensured within the scope and limits of the information security management system in an area of the company that will be independent of individuals.
  • Configuration of network installations requiring extensive knowledge and experience will be provided in compliance with the information security management system's scope and limitations.
  • Operational and technical support services essential for the continuous operation of existing networks in institutions and organizations will be provided, ensuring adherence to the scope and limits of the Information Security Management System.
  • The provision of operator services in routine tasks, based on information processing infrastructure, hardware, and software systems, and ensuring data security, will be within the scope and limits of the Information Security Management System.
  • Meeting the expectations of the institutions and organizations we serve within the scope of the contract, enhancing their information processing capabilities, keeping them informed of technological developments, and assisting them in achieving their activity, process, and performance targets will continue to be upheld within the framework of the Information Security Management System.
  • By acknowledging that all types of confidential, commercial, and private information processed in the information technology systems under our purview fall under the customer's privacy within the bounds of the Information Security Management System, we guarantee that this information remains inaccessible to anyone, be it an individual, institution, or organization, without the customer's explicit knowledge and consent. This commitment is upheld while strictly adhering to the principles of Confidentiality, Integrity, and Availability
  • The ISMS policy will align with legal and regulatory requirements and consider contractual or third-party obligations and dependencies, as long as they fall within the established scope and limits of the information security management system.

back to top

Let Us Call


Get in Touch

Bu web sitesi çerezleri kullanır. Web sitesinde gezinmeye devam ederek, çerez kullanımını kabul etmiş olursunuz.