Whatever we do, be interacting within the organization, interacting with our customers, or with societies we live in, we must do so with uncompromising integrity | By Integrity we mean trustworthy, with strong moral principles
We value innovation | Work SMART (apply knowledge and skills) | We encourage entrepreneurship with responsibility
We act and perform with speed and agility | We must adjust to new situation constantly with no time out
We are adopting established framework (NIST, ISO 27001, PMP, ITIL, COBIT & TOGAF) and work closely with client, able to deliver integrated strategic solution which suitable for organization as it designed with reducing risk, cost and removing the gaps. Strong Engineer, Ontime Project Delivery and Competitive Price.
Control the network, technology, and data. It is the outer edge of to control and have a responsibility to safeguard. As such, it is also the first point of contact for many external threats to the network.
Protection of the access to files and directories in a computer network against hacking, misuse and unauthorized changes to the system.
Protection of computer networks that are remotely bridged to client devices. Attempts to ensure that such devices follow a definite level of compliance to standards.
Encompasses measures taken to improve the security of an application by finding, fixing and preventing security vulnerabilities.
Protecting digital data, such as those in a database, from destructive forces and from the unwanted actions of unauthorized users, such as a cyberattack or a data breach.
- Prevention (Policy Management)
- Monitoring and Response (Operations)