FORGOT YOUR DETAILS?

Digital Transformation

Modern Infrastructure

Unified IT Operations and Security Management

Let go the legacy and past practices to cope with modern IT Complexity challenges with modern IT infrastructure, application and management solutions.

Development

DevOps

Future proof and market demanding industrial best practice DevOps, Microservices, Container Application Development, Testing, Security Ready Solution in one solution roof. From Modern Application Lifecycle Management (ALM), Software Analysis, Performance, Quality and Security Testing, Rollout.

Operations

IT Operations

Unified, scalability, flexible modern infrastructure (include virtualized, cloud, wireless, VoIP, bandwidth), system, storage, application, configuration, performance and fault monitoring to IT services desk, network operation management.

Security

Cyber Security

From modern infrastructure, system, application security threat, vulnerability, audit, compliance, patch and protection in single hassle free solution. Scalability for enterprise, government to global corporation IT/cyber security operations management.

Change

Project and Change Management

End to end and value added services, from requirement consultancy, solution architecture, digital transformation blueprint, turnkey project change and implementation engagement, technology transfer to post maintenance outsourcing support.

Software & Application Lifecycle Management (ALM)

Design

Design & Engineering

Requirement Management from define - collected, analyzed and rationalized User requirements to ensure the business needs are optimally met. Prototyping, use-cases and detailed requirements established.

Software Architect from Design - converted Requirements into software architect, including Graphical User Interface (GUI) "look-and-feel" and required integration between subsystems and with other system components.

Dev

Development

Computer Programming from Develop - Developers code and debug the logic for the software and integrate their code modules with other subsystems, as well as modules developed by other project members.

Test

Software Testing

Software Testing - from Tested and debugged  the software in operation with the related systems and subsystems. Application performance and security testing to predicted performance and security of the software in the live environment.

Delivery

Maintenance

Software Release,  Deployment and Maintenance - from packaged software and roll-out preparation, from physical installation and deployment, training, documentation, help procedures, etc. — to prepare and support the intended users end to end.

IT Operations Management (ITOM)

NOC

Datacenter, Infrasturcture & Network Operations

  • Data Center Facility, Infrastructure, Network Operation Center (NOC)
  • Network Management System (NMS), Network Element Management
  • Link Traffic Visibility, Bandwidth Analysis and Monitoring
  • Physical, Virtualized, Cloud and Wireless Network Availability and Performance Monitoring
  • Voice/Video over IP (VoIP) /IP SLA Quality of Service (QoS) Monitoring
  • Network Device Configuration Monitoring and Change Management
  • Network Asset Inventory and Management
SMS

System and Service Management

  • Mission-critical Server System and Service Availability and Performance Monitoring
  • Virtual infrastructure and Virtual Machine (VM) monitoring
  • Software Asset Management (SAM)
  • Storage Resource Monitoring (SRM)
  • Desktop Management System (DMS)
APM

Application Performance Management

  • Enterprise mission-critical application performance monitoring (APM)
  • End to end user experience monitoring
  • E-commerce / web application website load and performance analytics
  • Database performance analysis
  • ERP, SAP, PeopleSoft, Microsoft Dynamic CRM, Microsoft Exchange and Custom in house application performance monitoring
SvsDesk

Service Management

  • IT Service Helpdesk
  • Service Request and Service Support Automation
  • Hardware and software asset management (SAM)
  • Configuration Management System

Cyber Security Operations and Management

App Sec

Application Security

Secure development, security testing, and continuous monitoring and protection.

  • Identifies security vulnerabilities in source code, 3rd party module/libraries early in software development (SAST, SCA)
  • Provides comprehensive dynamic and interactive analysis of complex web, mobile applications and services (DAST, IAST)
  • Gain visibility into application abuse while protecting software from exploits - runtime application self protection (RASP), web application firewall (WAF)
  • Manual application security testing and penetration testing (MAST, PT), malware analysis and binary reverse engineering (MARE)
Sec Ops

Security Operations

Detect known and unknown threats through correlation, data ingestion and analytics into security insight and defend.

  • Security Intelligence & Analytics, Security Information and Event Management (SIEM), Log Management
  • Network Traffic Analysis (NTA), Flow Network Traffic Visibility Security Monitoring
  • Vulnerability Assessment and Management, Exploit Analysis, Unified Security Monitoring (USM)
  • Computer Emergency Incident Response (CERT), Digital and Network Forensics, e-Discovery
Net Sec

Network Security

  • Datacenter, Infrastructure, Network Device Security
  • Virtualization and Cloud Security
  • Unified Threat Management (UTM) and Next Generation Firewall (NGFW)
  • Advanced Threat Defense, Intrusion Detection and Prevention (IDS/IPS), Honeypot and Early Warning System
  • Gateway Email Messaging Security, Internet Content and Website Security
Info Sec

Information Security

  • IT Security & Risk Governance Risk and Compliance (GRC)
  • Digital Signature and Electronic Signing, Secure Email, PKI/Key Management
  • Secure System Administration, Secure and Managed File Transfer (SFTP/MFT)
  • Secure Tuneling, Data-in-Transit and Data-at-Rest Encryption

 

Data Sec

Server, Database, Data Security & Encryption

  • Server Security
  • Data Security, Tokenization, Data masking
  • File and Full Disk Encryption, Stenography, Secure Data Erase
  • Big Data and Database Security, Database Activity Monitoring (DAM), Database Virtual Patching, Database Firewalling, Database Vulnerability Assessment and User Right Review
Id. Mgt

Identity & Access Management

  • Identity Governance & Administration
  • Access Management
  • Privilege Management
  • Change & Configuration Management
EPP

Endpoint Protection Platform

Endpoint Protection Platform (EPP) converges endpoint device security functionality into a single product for proactive protection.

  • antivirus, anti-spyware, anti-malware
  • personal firewall, application control, host intrusion prevention (behavioral blocking)
  • vulnerability, patch and configuration management
  • disk and file encryption, data loss prevention (DLP), and port & device control
  • mobile device management (MDM).

Solution simplified and value added services (VAS)

CX

Consulting

Technology Solutions Consulting. From Requirement & Solution Consultancy to Solutions Architect & Blueprint.

TX

Trading

Distribution & Trading, Network System Integration. From Product Distribution & Trading to Turnkey Project & System Delivery.

CX

Customization

Independent Software Vendor (ISV) service, from System Customization, Integration, Migration to Modernization.

MX

Maintenance

Project Shared Service Outsourcing (SSO). From Project implementation, training, maintenance outsourcing to managed services.

Latest Post

5 huge benefit of digital transformation
The fact is, the world is going digital, yet many businesses are unprepared. The technologies, skills, and processes they have in place do not translate to a digital world. The modern company must transform itself to adapt to the technology and processes needed in today’s digital world. Now, as explained in this article, this process
Implementing Security with Digital Transformation
What is Digital Transformation? Digital transformation is a trend affecting organizations across all vertical markets. Its aim is to optimize business operations and enhance customer engagement through the adoption and use of digital technology. This digital transformation effort is what is driving consumer-focused innovations such as mobile banking and telehealth. This transition has become necessary
The security struggle of Digital Transformation
There is one way in which every business, from large enterprise to one-person operations, across all industry verticals, are similar. To survive against the competition, you must have a digital presence. How the digital transformation affects your business is unique to specific needs, but the online existence and the use of devices and technologies to
A framework for Digital Business Transformation
For companies that use the newest digital solutions, namely social, mobile, analytics and cloud (SMAC StackTM), major benefits can quickly accrue. Today’s organizations have a variety of information technology solutions at their disposal to simultaneously increase operational efficiency and generate unprecedented business capabilities. Unfortunately, many do not use these tools to their full potential, often
Digital transformation and why it important
Because digital transformation will look different for every company, it can be hard to pinpoint a definition that applies to all. However, in general terms, we define digital transformation as the integration of digital technology into all areas of a business resulting in fundamental changes to how businesses operate and how they deliver value to
The Era of Free Education

The Era of Free Education

The era of free education is eye catching title. Under the past 15 years, we are transit from elearning to free education through massive open online course (MOSS) model, just need to paid for the certification if you really need one. Human society had transit from knowledge is power to knowledge is commodity. Thru digital
Since new products like composable infrastructure and on-premises cloud platforms could offer a way to achieve software-defined infrastructure (SDI) and software-defined data center (SDDC), you can see as new opportunity and path to do it, but you also need to aware for the pitfalls. Virtualization changed the data center when hypervisors and virtual machines abstracted

Malaysia Islamic Banks Merge for Change

Under the latest news, Malaysia Islamic banking is undergoing change with the government propose merge of Bank Islam, Bank Simpanan and Bank Muamalat. Since this three bank is mainly in serving civil servant, and the impact for after merge for “right sizing” (to eliminate branch and job duplication) , it most likely to take place after
TOP