FORGOT YOUR DETAILS?

Digital Transformation

Modern Infrastructure

Unified IT Operations and Security Management

Let go the legacy and past practices to cope with modern IT Complexity challenges with modern IT infrastructure, application and management solutions.

Development

DevOps

Future proof and market demanding industrial best practice DevOps, Microservices, Container Application Development, Testing, Security Ready Solution in one solution roof. From Modern Application Lifecycle Management (ALM), Software Analysis, Performance, Quality and Security Testing, Rollout.

Operations

IT Operations

Unified, scalability, flexible modern infrastructure (include virtualized, cloud, wireless, VoIP, bandwidth), system, storage, application, configuration, performance and fault monitoring to IT services desk, network operation management.

Security

Cyber Security

From modern infrastructure, system, application security threat, vulnerability, audit, compliance, patch and protection in single hassle free solution. Scalability for enterprise, government to global corporation IT/cyber security operations management.

Change

Project and Change Management

End to end and value added services, from requirement consultancy, solution architecture, digital transformation blueprint, turnkey project change and implementation engagement, technology transfer to post maintenance outsourcing support.

Software & Application Lifecycle Management (ALM)

Design

Design & Engineering

Requirement Management from define - collected, analyzed and rationalized User requirements to ensure the business needs are optimally met. Prototyping, use-cases and detailed requirements established.

Software Architect from Design - converted Requirements into software architect, including Graphical User Interface (GUI) "look-and-feel" and required integration between subsystems and with other system components.

Dev

Development

Computer Programming from Develop - Developers code and debug the logic for the software and integrate their code modules with other subsystems, as well as modules developed by other project members.

Test

Software Testing

Software Testing - from Tested and debugged  the software in operation with the related systems and subsystems. Application performance and security testing to predicted performance and security of the software in the live environment.

Delivery

Maintenance

Software Release,  Deployment and Maintenance - from packaged software and roll-out preparation, from physical installation and deployment, training, documentation, help procedures, etc. — to prepare and support the intended users end to end.

IT Operations Management (ITOM)

NOC

Datacenter, Infrasturcture & Network Operations

  • Data Center Facility, Infrastructure, Network Operation Center (NOC)
  • Network Management System (NMS), Network Element Management
  • Link Traffic Visibility, Bandwidth Analysis and Monitoring
  • Physical, Virtualized, Cloud and Wireless Network Availability and Performance Monitoring
  • Voice/Video over IP (VoIP) /IP SLA Quality of Service (QoS) Monitoring
  • Network Device Configuration Monitoring and Change Management
  • Network Asset Inventory and Management
SMS

System and Service Management

  • Mission-critical Server System and Service Availability and Performance Monitoring
  • Virtual infrastructure and Virtual Machine (VM) monitoring
  • Software Asset Management (SAM)
  • Storage Resource Monitoring (SRM)
  • Desktop Management System (DMS)
APM

Application Performance Management

  • Enterprise mission-critical application performance monitoring (APM)
  • End to end user experience monitoring
  • E-commerce / web application website load and performance analytics
  • Database performance analysis
  • ERP, SAP, PeopleSoft, Microsoft Dynamic CRM, Microsoft Exchange and Custom in house application performance monitoring
SvsDesk

Service Management

  • IT Service Helpdesk
  • Service Request and Service Support Automation
  • Hardware and software asset management (SAM)
  • Configuration Management System

Cyber Security Operations and Management

App Sec

Application Security

Secure development, security testing, and continuous monitoring and protection.

  • Identifies security vulnerabilities in source code, 3rd party module/libraries early in software development (SAST, SCA)
  • Provides comprehensive dynamic and interactive analysis of complex web, mobile applications and services (DAST, IAST)
  • Gain visibility into application abuse while protecting software from exploits - runtime application self protection (RASP), web application firewall (WAF)
  • Manual application security testing and penetration testing (MAST, PT), malware analysis and binary reverse engineering (MARE)
Sec Ops

Security Operations

Detect known and unknown threats through correlation, data ingestion and analytics into security insight and defend.

  • Security Intelligence & Analytics, Security Information and Event Management (SIEM), Log Management
  • Network Traffic Analysis (NTA), Flow Network Traffic Visibility Security Monitoring
  • Vulnerability Assessment and Management, Exploit Analysis, Unified Security Monitoring (USM)
  • Computer Emergency Incident Response (CERT), Digital and Network Forensics, e-Discovery
Net Sec

Network Security

  • Datacenter, Infrastructure, Network Device Security
  • Virtualization and Cloud Security
  • Unified Threat Management (UTM) and Next Generation Firewall (NGFW)
  • Advanced Threat Defense, Intrusion Detection and Prevention (IDS/IPS), Honeypot and Early Warning System
  • Gateway Email Messaging Security, Internet Content and Website Security
Info Sec

Information Security

  • IT Security & Risk Governance Risk and Compliance (GRC)
  • Digital Signature and Electronic Signing, Secure Email, PKI/Key Management
  • Secure System Administration, Secure and Managed File Transfer (SFTP/MFT)
  • Secure Tuneling, Data-in-Transit and Data-at-Rest Encryption

 

Data Sec

Server, Database, Data Security & Encryption

  • Server Security
  • Data Security, Tokenization, Data masking
  • File and Full Disk Encryption, Stenography, Secure Data Erase
  • Big Data and Database Security, Database Activity Monitoring (DAM), Database Virtual Patching, Database Firewalling, Database Vulnerability Assessment and User Right Review
Id. Mgt

Identity & Access Management

  • Identity Governance & Administration
  • Access Management
  • Privilege Management
  • Change & Configuration Management
EPP

Endpoint Protection Platform

Endpoint Protection Platform (EPP) converges endpoint device security functionality into a single product for proactive protection.

  • antivirus, anti-spyware, anti-malware
  • personal firewall, application control, host intrusion prevention (behavioral blocking)
  • vulnerability, patch and configuration management
  • disk and file encryption, data loss prevention (DLP), and port & device control
  • mobile device management (MDM).

Solution simplified and value added services (VAS)

CX

Consulting

Technology Solutions Consulting. From Requirement & Solution Consultancy to Solutions Architect & Blueprint.

TX

Trading

Distribution & Trading, Network System Integration. From Product Distribution & Trading to Turnkey Project & System Delivery.

CX

Customization

Independent Software Vendor (ISV) service, from System Customization, Integration, Migration to Modernization.

MX

Maintenance

Project Shared Service Outsourcing (SSO). From Project implementation, training, maintenance outsourcing to managed services.

Latest Post

The Era of Free Education

The Era of Free Education

The era of free education is eye catching title. Under the past 15 years, we are transit from elearning to free education through massive open online course (MOSS) model, just need to paid for the certification if you really need one. Human society had transit from knowledge is power to knowledge is commodity. Thru digital
Since new products like composable infrastructure and on-premises cloud platforms could offer a way to achieve software-defined infrastructure (SDI) and software-defined data center (SDDC), you can see as new opportunity and path to do it, but you also need to aware for the pitfalls. Virtualization changed the data center when hypervisors and virtual machines abstracted

Malaysia Islamic Banks Merge for Change

Under the latest news, Malaysia Islamic banking is undergoing change with the government propose merge of Bank Islam, Bank Simpanan and Bank Muamalat. Since this three bank is mainly in serving civil servant, and the impact for after merge for “right sizing” (to eliminate branch and job duplication) , it most likely to take place after
Paper and Forest products industry in the digital age
Digitalization and Digital Economy has not spelled the end of paper and forest products, but it do require the future mind leaders think out-of-the-box differently and adapt digital transformation for their business model. Paper and forest products such as physical printed book are not going away in the digital economy, fuel by smartphone, tablet and
Retina CS Technical Overview by E-SPIN

Software Tool For Handling Big Data

There are many software tool for handling big data to help in achieving these goals and help data scientists to process data for analyzing them. Many new languages, frameworks and data storage technologies have emerged that supports handling of big data. R : is an open-source statistical computing language that provides a wide variety of
AI take over IT job

AI take over IT job

AI take over massive of IT job that in the past manual and brain work intensive work such as data entry, manipulate data, compile report and reactive, passive job that waiting for service request and then react, and off course majority of repeated work. From the news headline this year along, we saw Microsoft, Oracle,
What are the main application security challenges for organisations and how are they best addressed? In particular for the modern web application, mobile application and client/server application? For web application attacks on an organisation’s website can be used to steal information, to attack users of the site or damage the company through defacement, data destruction
How Artificial Intelligence (AI) deliver real value for companies
Artificial Intelligence (AI) application into business is nothing new, but we reach the age no more interest on early adoption and research & development (R&D). We as companies interest on how it deliver true value by invest in it, whether in the form of automation (industrial, internet, online, application) or accelerate the business workflow to
TOP