Security Procedures
Readiness to defend against security incidents, risk analysis, IT security management rules and procedures concerning technical security measures, mapping of information resources and business processes.
Compliance
Compliance with standards and laws such as PCI-DSS, ISO 27001, ISO 22301, TISAX, KRI, KSC, KNF recommendations, and GDPR.
IT Infrastructure
Operating systems, virtualization, wired and wireless networks, UTM/NG Firewall configuration and security devices, mobile client management, and others.
IT Applications
IT applications based on the Inter/Intra/Extranet, Active Directory, Microsoft SQL, PostgreSQL, MariaDB, MySQL, Oracle, and Redis databases.
Security Systems
Dedicated security systems such as Data Leak/Loss Protection/Prevention, System Information and Event Management, and Privilege Access Management.