Data Center is our focus

We help to build, access and manage your datacenter and server rooms

Structure Cabling

We help structure your cabling, Fiber Optic, UTP, STP and Electrical.

Get ready to the #Cloud

Start your Hyper Converged Infrastructure.

Monitor your infrastructures

Monitor your hardware, software, network (ITOM), maintain your ITSM service .

Our Great People

Great team to support happy customers.

Thursday, June 28, 2012

Melakukan test Webserver (Webserver Stress Tool)

By simulating the HTTP requests generated by up to 10.000 simultaneous users, you can test your web server performance under normal and under excessive loads to ensure that critical information and services are available at speeds your end-users expect.

The Easy-to-Use HTTP Load Generator for Windows

This software is quick to set up, it is easy to use and can create enormous loads for web servers.
Download&installation in under 5 minutes!
Trial DownloadBuy Now
It's free!Starting at US$249.95

How much load can Webserver Stress Tool generate?

We have successfully tested Webserver Stress Tool 7 with
  • more than ~500 MBit/s network load
  • more than 1,000.000 pageviews per hour and
  • up to 10,000 simultaneous users
See our Sample Performance Tests section for detailed test reports.

Supported Test Types

Webserver Stress Tool supports a number of different testing types. For example
  • Performance Tests—this test queries single URLs of a webserver or web application to identify and discover elements that may be responsible for slower than expected performance. This test provides a unique opportunity to optimize server settings or application configurations by testing various implementations of single web pages/script to identify the fastest code or settings.
  • Load Tests—this tests your entire website at the normal (expected) load. For load testing you simply enter the URLs, the number of users, and the time between clicks of your website traffic. This is a “real world” test.
  • Stress Tests—these are simulations of “brute force” attacks that apply excessive load to your webserver. This type of “brute force” situation can be caused by a massive spike in user activity (i.e., a new advertising campaign). This is a great test to find the traffic threshold for your webserver.
  • Ramp Tests—this test uses escalating numbers of users over a given time frame to determine the maximum number of users the webserver can accommodate before producing error messages.
  • Various other tests—working with Webserver Stress Tool simply gives you more insight about your website, e.g. to determine that web pages can be requested simultaneously without problems like database deadlocks, semaphores, etc.

Why should you use Webserver Stress Tool?

Using Webserver Stress Tool when developing and running Websites is important for your web infrastructure:
  • Maximize Uptime: Resolve performance critical issues in your webserver before they bring down your website
  • Maximize Performance: Make sure that your websites and applications are given the server resources they need when they need it to guarantee a high quality user experience
  • Maximize ROI: Get everything out of the investment in your webserver technology through consistent and in-depth testing and analysis
  • Maximize Value: Webserver Stress Tool is the most cost-effective solution in the market for simulating performance, load, and stress tests for your web server
  • Minimize Efforts: The software installs in 5 minutes and works with all web servers
  • Read more about the features or see more screenshots of Webserver Stress Tool.

More Information

Webserver Stress Tool is available in several editions and prices start at $249.95. When bought online delivery usually takes only a few minutes.
Please select a link on the left to read more details about Webserver Stress Tool or to download the free trial edition.

SIEM 101: What is a SIEM and how does it relate to file integrity monitoring?

SIEM 101: What is a SIEM and how does it relate to file integrity monitoring?

SIEM stands for Security Information and Event Managers.  SIEM solutions can be software or hardware, and may be virtualized.  SIEM’s aggregate logs and data from numerous sources including servers, databases, network and security devices, applications, and more.  What makes SIEM solutions truly valuable is what they can do with this data.  Because they receive it from many sources, SIEM’s can correlate data to detect potential issues and issue an alert.  Whereas data viewed separately from each source might not seem to indicate anything abnormal, combined with other data, a clear anomaly may present itself.

Many SIEM solutions can graphically present data in a dashboard format with charts and graphs.  This allows users a quick and easy way to “see” what is happening in their IT environment at any point in time.  Another benefit of SIEM solutions is simplified compliance with regulations as data is in one single location and can be reported on centrally.  For these reasons, many organizations have adopted SIEM solutions.  Currently, these organizations tend to be large to medium sized, but as SIEM solutions become more popular and the prices fall, expect even small companies to adopt a SIEM.

How does file integrity monitoring (FIM) work with SIEM?
File integrity monitoring is a complementary technology to SIEM’s.  Because the value of a SIEM is dependent on the information sent to it, getting high quality change data to it is of critical importance.  File Integrity Monitoring products such as CimTrak, get detailed change data from a wide variety of IT systems and send it to a SIEM.  CimTrak sends change information from the CimTrak Master Repository to a SIEM solution via syslog, SNMP traps, or the SIEM vendor’s proprietary protocol.


RSA/Cimcor Announce Partnership

RSA and Cimcor recently announced a partnership agreement to integrate CimTrak with RSA’s enVision security information and event manager (SIEM).  The integration will allow change data, collected from numerous endpoints by CimTrak, to be exported and categorized by enVision.

According to RSA, “(t)he RSA enVision platform provides a centralized log-management service that enables organizations to simplify their compliance programs and optimize their security-incident management. The RSA enVision solution facilitates the automated collection, analysis, alerting, auditing, reporting, and secure storage of all logs.” With the ability to monitor a wide range of IT systems including servers, network devices, databases, VMware hosts and more, CimTrak provides detailed change information to enVision that allows users to get an in-depth view of what is happening in their environment at any given point in time.

Integration of the two products is expected to be complete in July of 2012.


CimTrak now features tighter integration with Q1 Labs QRadar SIEM


At Cimcor, we consistently integrate with cutting-edge technologies that our customers are using.  One of those products is Q1L Labs QRadar security information and event manager, recognized as a visionary SIEM solution by Gartner.  While CimTrak has integrated with QRadar for some time now, the latest release of CimTrak will feature enhanced mapping of data sent to QRadar.  This enhanced data mapping allows QRadar users to glean even more value from IT change data gathered by CimTrak.

Wednesday, June 27, 2012

Hasil Penetration Test dari Password Manager Pro

Produk Password Manager Pro adalah software yang digunakan untuk menyimpan, manajemen informasi yang sensitif, seperti password, dokumen dan digital identitas perusahaan.

Oleh karena itu, sangatllah penting software ini dapat menjawab tantangan keamanan sistem yang ada. Sehingga perlu dilakukan tes penetrasi. Berikut adalah hasilnya.

Penetration Test of ManageEngine Password Manager Pro

Skip to end of metadata Go to start of metadata

The application ManageEngine Password Manager Pro was subjected to a penetration test by //SEIBERT/MEDIA to test the security of this software. After the problems noted in version 6.3 (build 6303) Windows have been corrected, this application will receive a Pentest Certificate "Silver" from //SEIBERT/MEDIA. We confirm that ManageEngine Password Manager Pro is a secure software.

Management Summary

Download this video (MP4, 15 MB)
You are interested in the security of ManageEngine Password Manager Pro. So are we! //SEIBERT/MEDIA is responsible for testing the security of ManageEngine Password Manager Pro regularly. This is an ongoing process, as the software is developed heavily by the vendor. From all that we know, ManageEngine Password Manager Pro is secure. We have found security issues in the past. And they have been fixed by the vendor instantly. No software is without bugs or holes.
Security comes from a process, that is consistent, profound and continous and a software vendor, that takes care of acting on issues fast. We try to achieve all this for you as a user of ManageEngine Password Manager Pro.

Overview of issues and needed actions

This is an overview of all security checks for which a defect or issue was found. All checks are divided into six categories of risk:
Category Title Description Issues found Fixed in newer version Verified by //SEIBERT/MEDIA
0 Information No risk, informative 0    
1 Hint A hint for a defect 0    
2 Recommendation Recommendation for optimization 2 2 verification due
3 Issue Issue which needs to be corrected 5 5 verification due
4 Critical High risk 5 5 verification due
5 Severe Very high risk 1 1 verification due
The penetration test included the following components of the web application and the system configuration in version 6.3 (build 6303) Windows.

Module: System

Verification of SSL-TLS security

SSL/TLS is a protocol which resides in 6th level of the OSI stack. It is used for trusted and encrypted communication over unsecure networks.
This test was intended to verify the overall SSL/TLS configuration as well as the offered encryption methods and lengths.

Notes on system-side application configuration

This test describes the findings during the assessment on the system side which can't be assigned to a specific issue.

Old software versions

Old or non-patched software often is a serious security issue. Through a vulnerability, even an inexperienced attacker ('script kiddie') could gain root privileges or could harm the system in many any other ways, e.g. by executing a denial of service (DoS) attack, manipulate files and other.
This test checked for old software versions and its known vulnerabilities.

World-writable and world-readable critical files and folders

World-writable and world-readable files and folders can be a serious security issue. An attacker could add or modify files and by this compromise the security of the service and system or could acccess sensitive data with normal user privileges. It could also be possible that an attacker can access these files through another vulnerable service or system component.
In this test, the installation of PMP was checked for such files and folders.

Database configuration and files

A database management system (DBMS) often is the most crucial part of an application, because it holds most or all data. Customer- and useraccounts, bank accounts or product- and payment information must be stored securely so that only privileged user can access the data.
This test checked for incorrect database configuration and public or open database accounts.

Logging

It is common to enable logging for trouble- and performance analysis as well as access statistics. Especially debug log files often contain sensitive information like usernames, passwords and other information.
For this, all logfiles of the application installation are checked for such data.

Client plugins and addons

Client plugins can enhance and extend the functionality of a web application and often allow stronger interaction between the client's computer and the web application.
This test checked for security issues in the plugins implementation.

Module: Web Application

File upload checks

File uploads are common in today's web applications. These are often used to provide users with an option to attach various files in the application. Insufficent server-side checks can be a serious security issue, as an attacker could upload malicious files like HTML or Javascript or could place other files outside the application root.
This test checked for various common security issues like
  • Upload of HTML, Javascript and other potential malicious files
  • Handling of wrong MIME-Type
  • Handling of null byte chars
  • Header manipulation
  • Path traversal

Forgot-Password function

Most web applications allow users to reset their password if they have forgotten it, usually by sending them a password reset email and/or by asking them to answer one or more "security questions".
In this test, we checked that this function is properly implemented and that it does not introduce any flaw in the authentication scheme. We also checked whether the application allows the user to store the password in the browser ("remember password" function) or if the application allows autocomplete of Password fields.

Cookie attributes

The use of Session Cookies is the most common method for storing authentication information for a defined period a session after successful authentication. It is therefor crucial that these are protected with correct HTTP flags.
This test checked, which flags and values are set. These are:
  • Secure-Flag: Only permit the transmission over an encrypted connection. Otherwise it may be possible to read the Cookie values in cleartext.
  • httpOnly-Flag: Disable client side access to Cookies. This prevents, amongst other, the most common XSS attacks.
  • Domain-Flag: Scope of application.

Cross site request forgery (CSRF)

Cross site request forgery (CSRF) is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated. With a little help of social engineering (like sending a link via email/chat), an attacker may force the users of a web application to execute actions of the attacker's choosing. A successful CSRF exploit can compromise end user data and operation in case of normal user. If the targeted end user is the administrator account, it can compromise the entire web application.
This test checked for such CSRF flaws in the application.

Reflected Cross-Site Scripting (Type 1 XSS)

Cross-Site Scripting attacks are a type of injection problem, in which malicious scripts are injected into the otherwise benign and trusted pages. Cross-site scripting (XSS) attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.
Reflected attacks are those where the injected code is reflected off the web server, such as in an error message, search result, or any other response that includes some or all of the input sent to the server as part of the request. Reflected attacks are delivered to victims via another route, such as in an email message, or on some other web server. When a user is tricked into clicking on a malicious link or submitting a specially crafted form, the injected code travels to the vulnerable web server, which reflects the attack back to the user’s browser. The browser then executes the code because it came from a "trusted" server.
In this test the application was thoroughly checked for such reflected script vulnerabilities to disclose erroneous or incomplete protection measurements.

Persistent Cross-Site Scripting (Type 2 XSS)

Cross-Site Scripting attacks are a type of injection problem, in which malicious scripts are injected into the otherwise benign and trusted pages. Cross-site scripting (XSS) attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.
Stored attacks are those where the injected code is permanently stored on the target servers, such as in a database, in a message forum, visitor log, comment field, etc. The victim then retrieves the malicious script from the server when it requests the stored information.
In this test the application was thoroughly checked for such stored script vulnerabilities to disclose erroneous or incomplete protection measurements.
Labels:
None

Unlock the Real Value of your Machine Generated Logs

Unlock the Real Value of your Machine Generated Logs

Unlock the Real Value of your Machine Generated Logs
Your IT infrastructure generates huge amount of logs every day and these machine generated logs contain vital information of all network activities such as user logons/logoffs, policy changes, object deletion and more. This information helps organizations to audit their network for internal threats and meet regulatory compliance requirements.
With organizations generating terabytes of log, analyzing these logs manually is painful and time consuming. That’s where log management solutions like EventLog Analyzer come in. This Log Management tool helps organizations to collect, analyze, report, and archive logs without any hassle. EventLog Analyzer supports a wide variety of IT Security and Regulatory Compliance reports such as SOX, HIPAA, FISMA, GLBA, ISO 27001/2, etc. Its powerful and intelligent alerting engine helps network administrators to quickly troubleshoot and identify the root cause of IT problems.
Now you can stop sifting through voluminous logs manually and get it all done with EventLog Analyzer.

Tuesday, June 26, 2012

Apakah bisnis Anda telah menggunakan CRM? Mulailah sekarang

10 things SMBs should look for in a CRM

By Michel Ozzello | June 25, 2012, 6:51 AM PDT

Small and medium-size businesses are often at a competitive disadvantage next to the big guys, but never more so than in this hyper-connected age. While big businesses have the budgets to create or tailor CRM systems that track and manage customer interactions, SMBs typically struggle to find efficient, cost-effective ways to acquire and retain customers.

That's starting to change, though, with the rise of cloud computing and a number of CRMs designed specifically with SMBs in mind. Here are 10 things SMBs should look for in a CRM to get the greatest ROI.

1: On the cloud

When it comes to big businesses, we could argue all day about whether the cloud is beneficial. With big IT departments at their fingertips, they can maintain maximum security by continuing to store and manage data on their own servers. They can also develop customized CRMs without radically increasing their costs.

But SMBs don't have that luxury. Cloud-based CRMs are particularly useful for small businesses because they enable the outsourcing of development and management costs to the CRM provider (in a software as a service — SaaS — model), which takes responsibility for developing, managing, updating and maintaining the CRM externally.

2: Better email campaigns

It is not uncommon in SMBs to find employees answering individual emails one at a time. This creates an inbox bottleneck and increases response time. Any good CRM will enable more email efficiency, allowing for marketers, salespeople, and customer service representatives to better launch and track campaigns. In addition, all those email interactions will be stored and tracked inside the CRM (and not on each the mailbox of each individual), which increases control on the whole communication process with your prospects.

3: Connecting via social media

Social media presents great opportunities for small businesses to connect with their customers. It also presents a whole lot of headaches. A good CRM will help monitor the social media universe so that when customers start tweeting negative feedback about a product, their complaint can be quickly routed to the person in the business who can do something about it. Likewise, social media tools will also help companies identify and amplify praise, as well as any rich content they might be providing via articles and blog posts. Finding a CRM that aids a company in improving its content and conversations is essential.

4: Tracking and integrating customer data

Greater access to customer feedback means more information to track. Any good CRM will not just track and store customer data but it will also package information into easy-to-use, meaningful reports that illuminate how, when, and why customers are making purchasing decisions.

5: Enabling the sales pipeline

One of the most difficult things to track for small businesses is the progress of potential sales. Who's doing what, how far along they are, expenses, travel details, and so forth. Good CRMs track this data in real time, enabling the sales department to act quickly and accurately.

6: Evaluation tools

Data is just as valuable during the sale as it is afterward. Evaluation tools are an essential feature of a CRM system, enabling departments to run analyses and package information into easy-to-understand reports that can help them get out ahead of the pack the next time around.

7: Mobility

With more salespeople working on the go or remotely, it's important to be able to access CRMs from afar. This enables real-time tracking of tasks and sales and increased agility. A CRM that doesn't have good mobile features is out of synch with the way companies operate today and you shouldn't waste your money on it!

8: User interface

With a number of CRMs available on the market, SMBs should search for one with a user interface their employees can navigate intuitively. This will lessen the amount of time and money spent on training, and it will motivate employees to actually use the system. Look specifically for CRMs that centralize most tasks into user-friendly dashboards.

9: Customization

Different businesses have different demands. This means some SMBs will need to customize their CRM, which is often easier said than done. If you know your business is going to need to make a lot of tweaks, look for one that makes this process simple.

10: Vendor services

How much support does the CRM provider deliver? They will probably be there for technical errors and provide materials to train your employees on the new system — but what about customization? Will they help you as part of the onboarding process or will you have to hire their services separately? Are there local service companies that can help you deploy the system and evolve it when your needs change? One thing is for sure: You always end up needing help deploying a CRM system. So find out who can help and how much will it cost before you make your decision
build-access-manage at dayaciptamandiri.com

Monday, June 25, 2012

Five ways social media can help you get a promotion

By Mamta Saha | June 21, 2012, 5:07 AM PDT

There are a number of sound reasons why social networkers are more likely to progress in their career.

A waste of time, a distraction and a drain on resources - those are all accusations that managers have levelled at the use of social media at work. But research suggests that far from being a barrier to productivity, using social media actually helps employees advance their careers.

Working recently on a Google project on the use of social tools in business, I thought one finding really stood out: those using social tools at work are more likely to get promoted than those who do not.

The research showed that 86 per cent of frequent users say they have recently been promoted and 72 per cent say they are likely to be promoted, compared with 61 per cent and 39 per cent of non-users. The report hails these workers as the new social climbers, because they know how to employ the tools in the right way to get ahead.

In reality, there are a number of reasons why social networkers are more likely to progress in their career, and it appears that the most successful, visionary companies are already acknowledging the benefits of these tools to make it easy to connect and work together online.

According to the Google research, high-growth companies are most likely to use social tools, so it is important not to ignore their potential for the workplace.

So what are high-fliers doing differently when it comes to social networking? There are a number of ways in which social tools can help with career progression:

1. Showcasing depth of knowledge

When social media first appeared on the radar it was the more introverted individuals who started to use it, creating blogs, answering questions on forums and generally understanding the technology's potential as an outlet for sharing knowledge and exchanging views. This experience put them one step ahead, helping them to get noticed for their expertise.

In a professional situation, in-depth authority on a relevant topic is extremely attractive to employers and helps get introverts noticed without the need for active self-promotion because others are drawn to them to tap into their knowledge.

2. Making connections

Those using social networking in the workplace have recognised its potential to broaden their circle of contacts, which can lead to all sorts of useful business connections.

Building a network of contacts also offers an effective means of solving problems, giving access to a wider panel of individuals with different areas of expertise, whose knowledge can be tapped into to help solve problems and give advice on unfamiliar situations.

3. Building a personal brand

The most successful social networkers are not the ones who give away vast quantities of information about themselves online. Such behaviour can look unprofessional and even damage your reputation.

It tends to be those who have distilled personal information to build their own brand, including their skillset, experience and connections, who are most likely to be successful in using social networking to progress their careers.

That said, individual touches such as occasional updates on hobbies and interests can also lead to more meaningful connections with all kinds of influential people. In Google +, for instance, these contacts with similar interests can be grouped together, making it easier to ensure your updates and requests are relevant to those receiving them.

4. Tapping into knowledge

Another great opportunity for using social tools to excel comes in using them to learn about your organisation. Many companies have already established a network or blog and are using these channels to provide information about staff skills, company news and initiatives. So taking an interest in these forums and communities can be very informative.

Using social media to track company references is also a good idea. For instance, if a story about your company breaks on Twitter, and you are the first to spot it, this shows senior staff you are taking an interest in the organisation, which can impress them.

5. Time management and productivity benefits

Today's social climbers are also using these tools to help them work smarter. Most of us are familiar with being bombarded with emails that we don't have time to read and being pulled into meetings that seem to last longer than necessary.

Through thinking creatively about what social tool could do the job more effectively, you can change these time-draining practices in your company. Instant messaging, for instance, can be a time-saver when you want an answer to a question quickly.

Collaborative documents edited online by multiple people at the same time could replace some meetings. It is only through trying out different tools that you will learn these shortcuts for yourself and be seen as a more efficient member of the team.

It is important to remember that opportunistic, driven individuals are likely to grasp any opportunities that come their way to make themselves more successful. That's why they are getting ahead through using social tools.

They know that these services can help make them better informed, better connected and more productive. So if you're reading this and wondering what all the fuss is about, it could be time to open your mind to what social media can do for your own career
build-access-manage at dayaciptamandiri.com

Sunday, June 24, 2012

Selamat kepada PATRA NUSA yang telah memilih ManageEngine

Selamat kepada PATRA NUSA yang telah memilih solusi helpdesk dan network monitoring system dari MANAGEENGINE.

Kami senang melayani Anda.

Integrasi Opmanager dan ServiceDesk Plus

Configuring OpManager to automatically log Tickets in ServiceDesk Plus

If you are using both OpManager and ServiceDesk Plus in your network, you can automatically log trouble tickets from OpManager for specific network faults. OpManager can log a ticket in ServiceDesk Plus with the appropriate technician, category and priority fields of the issue filled in. The following are the steps to configure OpManager - ServiceDesk Plus integration

ServiceDesk Plus Configuration Tasks

Since OpManager uses email as the mechanism to log a new ticket, you need to enable the “Email - to - Request” conversion feature in ServiceDesk Plus.

Configure Help Desk Email address

To configure the incoming e-mail settings:

  1. Under the Admin tab, Click the Mail Server Settings icon. The Mail Server Settings page is displayed with the Incoming e-mail settings tab selected by default.
  2. Enter the mail server name, user name, password, e-mail address, port, and the time interval in which the mail needs to be fetched periodically. The time period is in minutes.
  3. The e-mail address is the address to which you want all helpdesk emails to be sent.
  4. Click Save. On successful connection to the server, the success message is displayed.

OpManager Configuration Tasks

1. Configure Mail Server Settings


Since ServiceDesk Plus can convert emails to the helpdesk into new requests, OpManager uses email as the mechanism to log a new ticket. To enable this you need to ensure that Mail Server settings are configured properly in OpManager.
To configure the SMTP server settings globally and to provide the secondary mail server settings, follow the steps given below:
  1. Under the Admin tab, click Mail Server Settings.
  2. Enter the SMTP Server name and Port number.
  3. Select Requires Authentication and enter the User name and Password details, if the server requires authentication to send e-mail.
  4. Click OK to update the changes
If you have a secondary mail server in your network, select Add a secondary mail server and provide the details. In case of failure of primary mail server, OpManager uses secondary mail server to send e-mail and SMS.

2. Configure ServiceDesk Plus Server settings


OpManager must 'know' where ServiceDesk Plus resides to log the ticket. To configure the ServiceDesk Plus settings details, follow the steps given below:
  1. Click Admin tab
  2. From Global Settings column, click Add-On/Products Settings
  3. Click ServiceDesk Plus Settings icon in this screen.
  4. Give the following ServiceDesk Plus server details.
    • Server where ServiceDesk Plus is running: Name or the IP address of the machine where ServiceDesk Plus is installed and running.
    • ServiceDesk Plus server port number : The port number in which the ServiceDesk Plus application is running. Default port is 8080.
    • ServiceDesk Plus login: The user name with which you will log in into ServiceDesk Plus. Default is admin.
    • ServiceDesk Plus password : The password to log in into ServiceDesk Plus. Default password for admin user is admin.
    • HelpDesk Email Address : The email address in the mail server to which the email must be sent. This should be the same as configured in the mail-server settings in ServiceDesk Plus. Example: help@servicedeskplus.com
    • From Email Address : The initiator's email address. Example: requestor@company.com

3. Creating a Ticket Profile

Following are the steps to create a ticket profile

  1. Under Admin tab, click Notification Profiles.
  2. On the right, click Log a Ticket under Add New
  3. Configure the following notification profile details
    • Profile Name
    • Choose the appropriate device category from the Category combo-box
    • Choose the priority of the issue from the Priority combo-box
    • Choose a technician to whom the issue is to be assigned from the Technician combo-box
    • Select the alarm variables such as the alarm severity, device display name etc, from the corresponding combo-box under Ticket Contents. These details are displayed on the issue title
    • Select the required alarm variables to be included for the alarm description. This will provide accurate fault information to the assigned technician
    • Select the criteria for the trouble ticket to be logged into ServiceDesk Plus.
    • Click Submit

4. Associate Notification Profile to Devices


You need to associate the notification profiles with devices to trigger the corresponding action whenever these devices are under trouble.

To associate a profile with devices or a category of devices, you can use the Quick Configuration wizard. For doing so, follow the steps given below:

  1. In the Admin tab, under Tools, click Quick Configuration Wizard.
  2. Select Assign a Notification Profile and click Next.
  3. Choose the profile (the Ticket profile that you created) to be associated with devices and click Next.
  4. Choose an option to associate the profile and click Next.
    • If you select a category, then the profile will be associated with all the devices in the category automatically.
    • If you choose Select devices manually, the next page will list all the managed devices. Move the devices from the list in the left to the one in the right and click Finish.
    • If you choose a business view, the profile will be associated with all the devices in the view. This option will be available only if you have created at least one business view.

To associate a notification profile with a single device, follow the steps given below:

  1. Open the snapshot page of the device.
  2. Under Configure, select Notifications.
  3. Select the profiles for this device and click Submit.

Selamat kepada TOSHIBA atas implementasi Draytek Vigor


Vigor2920

Selamat kepada TOSHIBA yang memilih solusi implementasi DRAYTEK VIGOR untuk online sistemnya. Kami senang melayani Anda.

Solusi dengan menggunakan Draytek Vigor 2920:
  • Gigabit 2nd WAN complied with FTTx trend (up to 150 Mbps) escalating business essential data exchange
  • 4-port Gigabit LAN switch facilitating the execution of unified communication applications in business CO/remote site
  • 32 VPN tunnels with up to 40 Mpbs IPSec VPN throughput
  • Object-based firewall preventing external attacks/easing policy settings
  • Dual-WAN with load balance and redundancy
  • Support 3.5G USB modem for initiating business anytime and fail-over backup
  • CSM (Content Security Management) for web content access control
  • Bandwidth management for optimizing corporate bandwidth allocation
  • TR-069 and 2-level management are for Telcos/ISPs
  • Multi-subnets
  • Smart Monitor Traffic Analyzer (Up to 30 nodes) 
     
     
  





 





 

Selamat kepada SAMUDRA INDONESIA

Selamat kepada SAMUDRA INDONESIA yang telah memilih kami sebagai mitra maintenance FM200 di lingkungan data centernya.

FM200 merupakan sistem pemadaman kebakaran yang memerlukan perawatan berkesinambungan. Oleh karena itu diperlukan adanya perawatan dan tes simulasi keberhasilan sensor dan sistem secara berkala.

Kami juga menyediakan solusi maintenance untuk FM200, FIKE Ecaro. Silahkan hubungi kami untuk keperluan detail maintenance Anda.

Selamat kepada MAYAPADA HOSPITAL

Selamat kepada MAYAPADA HOSPITAL yang memilih solusi FINOSHR - Human Resource Information System. Dengan senang hati, kami berusaha memberikan layanan dan produk terbaik kami.

FinosHR, solusi manajemen sumber daya manusia. Mendukung multi company, multi branch, multi currency. Terdiri dari modul Employee Management dan Payroll Management dengan pilihan modul lain, seperti Employee Self Service.

Hubungi kami untuk keperluan implementasi HRIS Anda.