Data Center is our focus

We help to build, access and manage your datacenter and server rooms

Structure Cabling

We help structure your cabling, Fiber Optic, UTP, STP and Electrical.

Get ready to the #Cloud

Start your Hyper Converged Infrastructure.

Monitor your infrastructures

Monitor your hardware, software, network (ITOM), maintain your ITSM service .

Our Great People

Great team to support happy customers.

Friday, May 31, 2013

FTTH, pendorong broadband




FTTH, Pendorong Broadband

Ditulis pada 28 February 13
 KATA broadband telah banyak dikenal, baik di kalangan masyarakat umum terlebih di komunitas teknologi informasi dan komunikasi (TIK). Hal tersebut dikarenakan banyaknya iklan produk yang menawarkan layanan broadband, baik dari sisi operatorwireless (GSM, CDMA, WiMAX, LTE maupun WiFi) dan juga operator wireline (HFC, xDSL maupun FTTH). Selain itu, kepopulerannya juga banyak didukung dengan adanya kesiapan terminal atau device yang mendukung layanan mobile broadband seperti smartphone Samsung, iPad dan Blackberry.
Broadband merupakan istilah yang merepresentasikan kemampuan dari suatu jaringan untuk memberikan layanan triple play (voice, data dan video) sekaligus, dalam satu jaringan tertentu.  Di dalam acara seminar Broadband World Forum 2012 dan seminar Fiber To The Home (FTTH) Council 2012 disebutkan bahwa broadband merupakan kunci keunggulan sebuah bangsa saat ini dan mendatang. Oleh karenanya sangat ditentukan oleh sejauh mana penetrasi adopsi broadband terjadi. Sejauh ini, kesejahteraan sebuah bangsa selalu berbanding lurus dengan tingkat penetrasi broadband-nya. Beralasan tersebut walaupun dalam kondisi krisis, Barack Obama,  Presiden Amerika Serikat, tetap fokus untuk mengembangkan broadband di Amerika Serikat.
Dari beberapa sumber disebutkan bahwa ekonomi sebuah negara akan tumbuh berkembang sebesar 1,38%, jika tingkat penetrasi broadband naik 10%. Dan bila penetrasi internet 10% akan mengakibatkan pertumbuhan ekonomi sebesar 1,12%. Sedangkan penetrasi seluler naik 10% akan meningkatkan pertumbuhan ekonomi sebesar 0,81%. Dengan demikian kekuatan dan kemampuan negara atau operator dalam menggelar layanan broadband akan menjadi indikator kunci untuk tumbuhnya ekonomi di suatu negara.
Pertumbuhan broadband dunia saat ini sangat pesat dimana pada tahun 2012 kemarin secara total jumlah pelanggan broadbandmencapai 430,2 juta. Pertumbuhan di atas 10% terjadi di 20 negara dengan dominasi negara-negara Asia termasuk India, Sri Langka, dan Singapura. Tahun 2012 tingkat penetrasi diperkirakan mencapai 20% dari total populasi.
Berdasarkan data yang diolah oleh Nighspade, permintaan smartphone untuk pasar global sebesar 450 juta pada tahun 2011 dan mencapai 690 juta pada 2012 lalu. Khusus di Indonesia, jumlah pelangggan Telco diperkirakan sudah mencapai 270 juta (110% penetrasi) sehingga tantangan operator telah mulai bergeser. Kalau yang lalu fokus pada penambahan jumlah pelanggan, namun sekarang ke arah penggunaan data yang semakin besar. Intinya pada tahun 2013 ini bagaimana memberikan layanan data yang sebaik mungkin kepada  pelanggan baik dari sisi kualitas, kapabilitas, kecepatan maupun harganya. Tidak heran jika semua operator berlomba memberikan layanan broadband, baik yang bersifat mobile maupun fixed.
Lebih jauh mengenai broadband, maka hal tersebut tidak akan lepas dengan teknologi FTTH atau Fiber To The Home. FTTH sudah diyakini sebagai teknologi yang cocok untuk masa kini dan masa depan (future proof). Saat ini, tidak kurang dari 600 Telco di dunia tengah memikirkan, merancang dan mengeksekusi hal yang sama: FTTH.
Mengapa FTTH?
FTTH merupakan infrastruktur akses yang menggunakan teknologi fiber optik, dimana saat ini merupakan satu-satunya infrastruktur terbaik yang mampu men-deliver layanan diatas 2 Gbps. Dengan demikian banyak operator telekomunikasi sekarang baik domestik dan internasional yang menggunakan teknologi tersebut.
Ada beberapa alasan mengapa harus menggelar atau memilih FTTH. Alasan berikut dapat menjadi pertimbangan:
•    Layanan Broadband sebagai nilai competitiveness dari suatu perusahaan dan negara. Operator mau tidak mau harus menggelar broadband kalau tidak mau ketinggalan dari pesaingnya. Begitu juga dengan negara, tidak boleh memandang hanya fokus ke infrastruktur jalan raya namun juga harus memperhatikan infrastruktur telekomunikasi.
•    Penerapan jaringan FTTH dapat melalui: Fiber to the Curb (FTTC), Fiber to The Zone (FTTZ), Fiber to the Building (FTTB), Fiber to The Office (FTTO), Fiber to The Home (FTTH), Fiber to The Tower (FTTT) dan Fiber to the Area atau Akses Point (FTTA).
•    Layanan yang semakin berkembang  di tingkat over the top (OTT), baik dari google, Facebook, Amazon, Twitter, Youtube dan lainnya yang sangat membutuhkan dan bersifat hungry bandwidth.
•    Fitur semakin banyak yang ditanam di dalam smartphone atau mobile device.
•    Kebutuhan bandwidth yang besar untuk backhaul dari operator mobile broadband (Backhaul node B maupun WiFi).
•    Regulasi yang mendukung untuk disegerakannya layanan mobile broadband.
•    Penerapan cloud computing yang notabene membutuhkan storage dan kekuatan broadband access.
•    Harga Fiber Optic (Capex) yang semakin murah karena tercapainya skala ekonomi, perkembangan di pabrikasi fiber optic (baik dari cara memproduksi yang lebih murah maupun value chain yang semakin baik untuk terjadi murahnya jaringan fiber optic.
•    Menurunnya biaya Opex, dengan ditemukannya moda operasi yang bersifat efisien dan semakin praktis.
•    Perkembangan teknologi baik di jaringan Wireless maupun Wireline yang semuanya mengarah ke broadband sehingga infrastruktur copper sudah tidak mencukupi.
•    Berkembangnya aplikasi smart office, smart home, smart building yang bersifat hungry bandwidth.
Namun demikian, karena FTTH tergolong teknologi baru khususnya di Indonesia, maka terdapat beberapa tantangan yang harus dicermati oleh para operator. Tantangan dari implementasi FTTH dapat dirinci sebagai berikut:
•    Migrasi jaringan eksisting. Bagaimana memaksimalkan atau me-reuse dari infrastruktur broadband eksisting yang berbasis tembaga dan hybrid fiber coaxial (HFC).
•    Converged Platform, bagaimana mengintegrasikan dua platform teknologi (copper dan fiber optic) supaya tidak dirasakan oleh pelanggan bila terjadi gangguan.
•    Planning, bagaimana melakukan planning dan design FTTH secara massif diiringi dengan model dan tipe/segmen pasar yang variatif.
•    Standarisasi, baik mulai design sampai ke Operation and Maintenance baik melingkupi kegiatan, tools yang digunakan maupun kompetensi sumber daya manusia (SDM)-nya.
•    Dengan kemampuan meng-handle trafik yang besar pada FTTH, maka tantangan lebih lanjut adalah bagaimana menarik pasar agar trafik cepat tumbuh sesuai dengan bandwidth yang tersedia.
Dengan demikian dapat disimpulkan bahwa FTTH adalah suatu keharusan baik dilihat dari sisi regulator (pemerintah dalam hal ini), operator dan pelanggan. Bravo FTTH. •

Penulis: GUNADI DWI HANTORO (Pengamat dan Praktisi Telekomunikasi, Manager Access Technology Deployment Plan PT Telkom Indonesia).
Artikel Terkait

    FTTH + WiFi: Dua Kekuatan Untuk Solusi Mobile Broadband



    FTTH + WiFi: Dua Kekuatan Untuk Solusi Mobile Broadband

    Ditulis pada 31 May 13
     MUNCULNYA berbagai macam smartphone diyakini oleh semuastakeholder atau ekosistem yang terlibat baik itu user, operator, regulator, vendor dan konten provider akan mempengaruhi terhadap kebutuhan akan bandwidth yang sangat besar (hungry bandwidth). Hal tersebut ditambah dengan semakin banyaknya user dan inovasi yang ditawarkan oleh pabrikan ponsel yang  semakin cepat dan menarik. Namun dampaknya,  umur teknologi juga akan semakin pendek.
    Semakin murahnya smartphone dari berbagai vendor seperti Ipad, Iphone dari Apple, Samsung Galaxy (Samsung) dan Blackberry, membuat  penetrasi mobile broadband semakin cepat.  Dengan dukungan dari operator yang menyediakan layanan 3G atau 4G (LTE) dan layanan WiFi, pemanfaatan smartphone pun menjadi sangat menarik dan fantastis.
    Radio Interface pada Smartphone
    Nikmatnya menggunakan smartphone adalah karena aplikasi yang ditanam  semakin beragam, baik itu untuk game, Facebook, Line dan aplikasi yang atraktif lainnya. Selain itu, umumnya smartphonedilengkapi dengan radio interface teknologi mutakhir seperti 4G (LTE) dan 802.11 a/b/g/n/ac atau biasa disebut WiFi. Kedua teknologi di atas mampu untuk mendelver data di atas 100 MBps hingga 1 Gbps.
    Dengan adanya Radio Interface diatas, pengguna semakin dimanjakan untuk berinternet dengan kecepatan tinggi. Bila di CPE pengguna sudah tidak terdapat isu, maka sekarang yang menjadi isu adalah terkait dengan backhaul  di sisi operator sehingga menjamin kecepatan di pelanggan sangat cepat.
    Keuntungan WiFi
    Seperti uraian di atas bahwa di terminal pelanggan (smarphone) telah disediakan WiFi dan LTE. Namun demikian WiFi dirasakan mempunyai kelebihan bila dibanding dengan LTE. Beberapa faktor yang mempengaruhi adalah:
    -    Frekuensi
    Seperti diketahui bahwa WiFi menggunakan frekuensi Unlicense atau ISM (Industrial Scientific and Medical) sehingga tidak dibutuhkan biaya  dari operator untuk membeli atau membayar frekuensi kepada regulator dalam hal ini pemerintah. Setiap institusi atau perorangan dapat memasang AP (Access Point) di rumahnya.
    -    Bandwitdh Lebar
    Keunggulan lain dari WiFi walaupun free frekuensinya adalah channel atau bandwidth yang tersedia cukup besar bahkan dapat dikatakan sangat besar. Terdapat 20 MHz atau 40 MHz per channel sehingga mampu untuk mendeliver layanan 100-300 MBps. Bahkan untuk standar yang baru 802.11ac dapat memanfaatkan channel 80 dan 160 MHz. Bandingkan dengan operator seluler saat ini yang hanya memiliki 10 MHz.
    -    Kecepatan Data (data rate)
    Dengan tersedianya pilihan channel bandwidth seperti uraian di atas (20, 40, 80 atau 160 MHz) dan dengan pilihan standar yang semakin berkembang 802.11 a/b/g/n/ac maka kecepatan datanya bisa mencapai 54 Mbps, 100 Mbps, 300 Mbps atau 1,7 Gbps.  Bayangkan bila dibandingkan dengan teknologi 3G yang berbasis seluler saat ini, hanya mampu mengirim data hingga 2 Mbps atau LTE yang sekitar 100 MBps tergantung dari channelnya. Khusus di Indonesia LTE ini belum diatur dan untuk mendapatkan channel sampai 20 MHz sangat sulit dan kompensasi biaya yang sangat mahal.
    -    Perangkat Murah
    Saat ini telah banyak kalangan perumahan, kafe, sekolah, kampus, kos, apartemen dan hotel kecil meggunakan WiFi. Hal tersebut dikarenakan harga AP yang murah (di bawah 1 juta rupiah).
    Simpel dan mudah dikonfigurasi
    Karena mudah dan simpel atau sederhana maka WiFi sangat cepat untuk dipasang. Hanya butuh beberapa menit saja untuk melakukan instalasi AP. Selain itu barangnya juga ringan (handheld) sehingga mudah dibawa ke  mana-mana. Bandingkan dengan perangkat radio lain seperti BTS CDMA, GSM atau radio IP yang perlu instalatur khusus yang memiliki keahlian khusus.
    -    Sudah Tersedia di Handheld 
    Dapat dikatakan handheld atau CPE yang ada di pelanggan seperti smartphone, notebook atau ipad telah menyediakan interfaceWiFi di dalamnya. Dengan demikian user tidak perlu menyediakan modem lagi untuk memanfaatkan jaringan WiFi. Bandingkan dengan teknologi lain seperti 3G atau WiMax, pengguna harus membeli atau menambahkan modem 3G atau WiMax sehingga perlu effort baru untuk menikmati keduanya.
    Kekuatan Fiber Optik
    Dengan terjadinya fenomena di atas (tren yang mengarah ke mobile broadband), maka dibutuhkan media akses atau backhaul yang handal dan cepat. Meskipun di akhir CPE pengguna menggunakan media wireless, namun tetap untuk solusi backhaulnya harus menggunakan media wireline. Bila dibandingkan dengan teknologi tembaga atau coax, maka FTTH (Fiber to the Home) atau media fiber optik memiliki beberapa keunggulan.
    Beberapa keunggulan fiber optik adalah sebagai berikut:
    -    Harga Fiber Optic (CAPEX) yang semakin murah karena tercapainya skala ekonomi, perkembangan di pabrikasi fiber optic(baik dari cara memproduksi yang lebih murah maupun value chain yang semakin baik untuk terjadi murahnya jaringan fiber optic.
    -    Menurunnya biaya OPEX, dengan ditemukannya moda operasi yang bersifat efisien dan semakin praktis.
    -    Kemampuan fiber optik yang mampu mengirim data yang sangat cepat (sekarang sampai 2,5 Gbps) dan terus berkembang hingga 10 Gbps.
    -    Kabelnya yang kecil sehingga tidak memerlukan tray kabel yang besar. Cocok untuk aplikasi HRB (High Rise Building).
    FTTH + WiFi
    Dengan kekuatan yang dimiliki oleh masing-masing teknologi di atas, maka bila digabungkan akan menjadi infrastruktur yang sangat menguntungkan baik dilihat dari sisi usercontent provider maupun operator. User akan dimanjakan dengan semakin cepatnya layanan, sedangkan operator diuntungkan dengan semakin rendahnya biaya yang harus dikeluarkan baik untuk CAPEX maupun OPEXnya. Content provider semakin dahsyat karena pengguna puas dan cepat menikmati konten tersebut.  GUNADI DWI HANTORO (Pemerhati teknologi informasi dan Manager War Room PT Telkom Indonesia)

    Thursday, May 30, 2013

    M5, kontrol Pusat , dengan kepercayaan terdistribusi




    Central Control — Distributed Trust

    Trying to limit which devices an end-user can use actually undermines corporate security. Too often, those sneaky folks will find stealth workarounds that include accessing corporate information from their unsecure iPhones or Android phones, using cloud-based files sharing with little or no security, or simply downloading information onto their personal laptops. Given these habits, it’s no surprise that IT isn’t the most trusting of organizations in the enterprise — as they say: “no end-users, no problems.” Given that’s an impossibility, there’s a solution that enables end-users to use the devices they prefer when and where they want, while giving IT the level of security and control it needs.
    With over 30 control policy options, M5 enables IT to configure data security the way that best meets their unique requirements. Using a single console, IT can configure access and security policies for all devices that touch critical enterprise data, from laptops to tablets to smartphones. Corporate data is encrypted for maximum security, leaving all transmissions secure and free of sensitive information.
    Essential Technology for Mobile Workforce Security
    MokaFive Suite has seven layers of security, each of which increases the overall protection of the corporate environment. Find out how we do it.

    Secure data storage, anywhere, any time, on any device

    M5 is architected to provide secure data storage from anywhere, at any time, on any device. Because M5 encrypts data at the device level, enterprises can choose to use public cloud storage or their own datacenter. Either way, because only encrypted information is transmitted, all communication remains secure.
    To meet enterprise compliance policies, move from cloud-based shared files with minimal security to M5 platform, which meets full SSL and https compliance standards while providing the flexibility needed for a distributed mobile workforce.

    M5, MokaFive untuk mobile




    M5 — Making Mobility Meaningful

    All Enterprise computing is mobile computing. Devices are smaller and more capable; services are now accessed via the cloud. In short, powerful business computing can be delivered to the point where business actually happens — wherever and whenever that may be. While enterprise mobility has been a reality for years, it’s only now seeing the widespread adoption first forecast back in the late 90s (anyone remember Palm?). Why?
    1. Popular devices can do a lot more than email.
    2. Ubiquitous hi-speed WiFi and cloud-based services deliver powerful solutions on-demand without needing a “heavy” mobile client.
    3. There’s a widespread acceptance of the “app” model – breaking enterprise applications into smaller, autonomous app-lets, enabling productivity on smaller form-factors.
    4. Changing business climate demands distributed, outsourced, and/or contract-based workers, while still achieving increasing degrees of agility, autonomy, and security without crippling device utility and worker productivity.
    5. IT is under internal pressure to transform from a cost center to a profit generator.

    The Higher Performance Mobile WorkForce

    Let’s face it. Mobility today is a soup of acronyms that ultimately does very little to enable your workforce. This is because mobility enablement solutions are too focused on managing and securing devices and not on ensuring real user productivity and capability. Today’s mobile management tools treat your smartphone like a computer, requiring agents to understand operating state and adjust configurations, while limiting access and functionality. Meanwhile, other solutions actually try to cram a whole Windows desktop onto a phone. It’s not surprising that many road warriors still carry two laptops, personal and corporate, as well as two smartphones, personal and a Blackberry/Windows phone. Too often the people who should be the most agile workers are literally and figuratively weighed down with device choices dictated to them.

    Only MokaFive delivers:

    • Agile Management —
      • Centralized updates, deployment, and image removal; enterprise-wide, for a group or single user
      • Single console management for all devices
      • Both in- and out-of-band management
    • Secure Access —
      • Policy-based enforcement
      • Public and private asset segregation
      • Compliance policies ideal for contractors and offshore workers
    • Device Aware Data —
      • Data follows user across all devices
      • Localized processing (unwired)
      • Intelligent edit capabilities based on data types and devices
    MokaFive is the first enterprise mobility solution that puts the focus where it needs to be: on managing and securing the data and applications you need to be productive, not a commodity device. The M5 platform creates a highly-elastic enterprise perimeter where data and applications follow the end-user and are delivered as simply-managed, highly-secure workspaces for popular end-user devices from notebooks to tablets to smartphones. The M5 containerized workspace effectively isolates corporate assets from personal ones, as well as from the underlying host. This unique architecture ensures host-level malware, vulnerabilities and configuration errors of unsecure, unmanaged devices won’t affect critical data and applications.
    Because you manage the workspace and not the device, secure, customized and up-to-date images can be deployed to the entire enterprise, specific groups, or even individual users when they activate their M5 app. Endpoint management and configuration tasks that used to take weeks can now be done in minutes regardless of where the device is located. Security is defined and enforced within the workspace by your enterprise policies including network access, secure data sharing, image wiping, email, and public cloud access via fully-encrypted browser sessions. Most importantly, full end-user productivity is ensured as all M5 workspaces are device-aware and work both online and offline.

    Solusi baremetal dengan MokaFive



    Complete control. High security. Blazing performance.Try it now!

    BareMetal

    BareMetal is client-virtualization software that installs directly onto the hardware of almost any computer. Its layered architecture gives IT the ability to use a single golden image on all machines, while providing users with a secure, personalized, consistent experience.

    “After looking at the options, MokaFive’s BareMetal solution for desktop management came out heads and shoulders above the competition.”
    —Mike Chase, CIO, dinCloud

    Why BareMetal?

    The days of painstakingly configuring, managing, and upgrading individual computers are over. IT installs BareMetal on every corporate-owned machine, replacing the host OS with a consistent client-virtualization layer.
    BareMetal gives you…
    • Single desktop image for all machines. BareMetal’s client-side desktop virtualization allows IT to deploy the same image across all machines, regardless of make, model, or configuration.
    • Tight security. IT has complete control of the entire desktop stack — from the hardware up — through a central-management console… all without compromising security or performance
    • User self-recovery. Users can recover from viruses or incompatible applications, with no helpdesk assistance.
    Broadest hardware support: Dell, Lenovo, hp, acer, Toshiba, Samsung, Asus, Sony

    Broad Hardware Support

    • Installs on thousands of PC makes and models
    • Dynamic driver installation enables support of Intel, ATI and Nvidia GPUs

    Centralized Management

    Easy management
    • Single desktop image for all machines
    • Zero-touch update across entire stack
    • Automated domain-join process
    • Built-in remote desktop for support


    Seamless user experience

    Self-recovery
    • User customizable images, including user- and department-installed applications
    • Easy user self-recovery of corrupted desktop images
    • Performance optimized (TRIM) support for the latest SSD harddrives. Rapid Start allows user login in seconds
    • Built-in compression conserves disk space

    Enterprise-Class Security

    Enterprise-class security
    • Built in AES-256 encryption and automatic lock on suspend
    • Ability to remotely wipe lost or stolen laptops
    • Thin, locked-down base with minimal attack surface
    • Automatic security lock of images for laptops

    How BareMetal Stacks Up:

    Unlike Citrix’s XenClient, which supports only a few computer makes and models, BareMetal is compatible with almost any hardware on the market. It also provides deep, policy-based management capability and centralized control over the entire desktop stack — including the hypervisor and the VM.
    In contrast to traditional software distribution, MokaFive allows you provision a single image across all user machines. This golden image is always pristine (avoiding performance degradation due to Windows “rot.”). Updates can be applied in seconds and synced to every machine through a central management console.

    MokaFive, inovasi VDI yang simpel

    Inovasi MokaFive, simpel dan proven.



    Innovation That Delivers

    Play button

    Simply Powerful & Secure.

    • Rejuvenation allows users to fix their own desktop problems, without losing data, or even a call to the help-desk.
    • Automatic domain join enables instant provisioning without a reboot or a network connection.
    • Single-sign-on allows quick, convenient access to the corporate desktop and VPN.
    • Web-based deployment allows you to deliver images and updates through a simple URL — zero-touch.
    • Customizable interface lets you tailor the user experience for your company’s needs.
    • Bulk duplication easily creates installation disks or USBs.
    • BareMetal Player installs directly onto hardware; avoids the maintenance and licensing of a host OS.
    • Quick access to corporate data from an iPad or iPhone.

    Adapts to users needs.

    Adapts to users needs
    • Virtual Layers allow users to install their own applications, settings, preferences, and data, while IT retains control over security.
    • Adjustable disk size and memory allows users to adjust resources allocated to the virtual desktop.
    • Support for host-connected printers, without requiring drivers in the image.
    • 3D graphics acceleration lets users enjoy Aero and other graphics enhancements.
    • iPad access to Google Apps, MS SharePoint, and sanctioned personal file shares.


    Padlock

    Seven layers of security.

    • Built-in AVG® anti-virus scanning constantly monitors for key loggers and screen scrapers. It also scans the host computer at startup.
    • Virtual desktop encapsulation keeps corporate data separate from personal files on BYO devices.
    • AES 256 encryption of the virtual disk ensures compliance with government regulations and prevents data leaks.
    • Tamper resistance and copy protection keeps the virtual desktop from being moved or edited.
    • AD and two-factor RSA SecurID authentication allows access only to authorized users.
    • Granular security policies give IT full control.
    • Remote revoke or kill allows you to wipe the encrypted data container from lost or stolen devices.

    Enterprise-ready management.

    AVG logo
    • One console to administer every computer and device in the enterprise, regardless of platform.
    • Image versioning and rollback allows you to target users with a specific image version or revert to a last-known-good version.
    • AD integration allows you to leverage user passwords, group membership, and GPO control.
    • Granular, role-based access control allows you to safely enable image engineers, desktop administrators, report viewers, and helpdesk staff.
    • Image-store replicas allow you to reduce WAN congestion by bringing image updates to replica servers on local LANs.
    • Assignable image distribution points through AD groups or IP address.
    • Full APIs allow you to access all data and all controls through scripts or third-party applications.
    • JMS-compliant message bus allows other applications to be notified of activities such as provisioning or deletion of virtual desktops.
    • Application Gateway allows users to receive image updates over any Internet connection — no VPN required.
    • Network monitoring support allows you to easily monitor MokaFive infrastructure components with standard monitoring tools.
    • Amazon S3 support allows you to efficiently distribute image updates to global locations without installing dedicated infrastructure.

    Service provider ready.

    AVG logo
    • True multi-tenant architecture creates fully-isolated, logically separate environments for new customers in seconds. Each tenant receives his own console view.
    • Tenant control allows you to create, disable, enable, or delete tenants.
    • Image sharing allows you to share a managed image to selected tenants, or let them upload their own private images.
    • Cross-tenant reporting lets you monitor activity.
    • Full APIs allow you to feed license information to your billing system, and access any other information.

    Mokafive, solusi manajemen desktop terdistribusi

    Desktop management tidak harus melulu online ..



    Desktop management. Simplified.

    Install in minutes and start deploying workspaces within a few hours.

    “After looking at the options, MokaFive’s BareMetal solution for desktop management came out heads and shoulders above the competition.”
    —Mike Chase, CIO, dinCloud
    Encapsulate your desktop into a LivePC virtual machine

    Create a golden LivePC

    Using MokaFive, an IT administrator creates or imports the enterprise desktop into a LivePC. The LivePC is uploaded to the MokaFive server as the corporate golden image.

    Deploy the LivePC to each user, which they run directly on their machines

    Deploy a workspace to each user

    Users download the workspace which runs directly on their computers. MokaFive includes a client hypervisor, which encapsulates the corporate LivePC from the host machine, keeping corporate data secure and maintaining privacy. LivePC runs locally, delivering great desktop performance and allowing users to work offline.

    Layering: Let users personalize their LivePCs

    Users personalize their LivePCs

    LivePCs are automatically split into separate layers:
    • User data and settings
    • User-installed applications
    • Base golden image with the corporate OS and applications
    With layers, users and departments can customize their images locally while IT maintains the base golden image. This way, a single golden image can be used for all users, saving time and effort.


    Users can self-recover

    Users can self-recover

    When users run into malware, BSODs, or other problems, they can instantly recover their LivePCs to the original, pristine state while maintaining their personal data and settings.

    Update the golden image and MokaFive automatically distributes differentials to each user

    Centrally update LivePCs

    With MokaFive, IT simply updates the golden image and MokaFive distributes the differential update to each user. The updated image is a bit-for-bit copy of the golden image, so installation success is guaranteed. If an issue arises, users can be rolled back to the last good version.

    Control all LivePCs centrally through policies

    Control LivePCs through policies

    View all LivePCs on the MokaFive console, and control them with over 70 security policies. If a computer is lost or stolen, IT can kill images remotely.

    Sailpoint , solusi provisi dan governansi terintegrasi




    SailPoint IndentityIQ - integrates Provisioning & Identity Governance into a single solution


    Who had access to that?

    SailPoint IdentityIQ is a market-leading identity governance solution that alleviates the cost and complexity of solvingsecurity challenges, effectively managing user lifecycles, and meeting compliance requirements. IdentityIQ is a complete solution that quickly delivers tangible results offering risk-aware compliance management, closed-loop user lifecycle management, automated user provisioning, an integrated governance model, and identity intelligence.
    IdentityIQ offers a centralized, holistic approach to managing user access across the entire IT environment – from on-premise, enterprise applications to SaaS applications and applications hosted in the private or public cloud.
     

     

    Top 5 Reports requested by IT Auditors:
    • User logon attempts
    • Privileged Activity
    • Critrical Firewall Changes
    • Critical Server Changes 
    • File Accesses

    A Fresh Approach to Identity Management

     

    IdentityIQ integrates provisioning and governance into a single solution leveraging a common identity governance framework.
    Because of this approach, IdentityIQ consistently applies business andsecurity policy and role and risk models across all identity and access-related activities.
    By providing on-demand visibility into "who has access to what," IdentityIQ enables organizations to:
    • Successfully address compliance mandates and regulatory requirements.
    • Efficiently deliver, change and terminate user access as needed, across even the most complex IT environments.
    • Provide transparency & strengthen preventive and detective controls enterprise-wide.

     

    Key Capabilities

    SailPoint's award-winning IdentityIQ solution is comprised of the following components:
    • Sailpoint

      Governance Platform centralizes identity data, roles, business policy and risk modeling to support both complianceinitiatives and user lifecycle management.
    • Compliance Manager streamlinescompliance controls and improves audit performance through automated access certifications and policy enforcement.
    • Lifecycle Manager provides self-service access request and lifecycle event management to simplify and automate the creation, modification and revocation of user access privileges.
    • User Provisioning provides flexible options for responding to changes requested by the business duringcompliance and lifecycle management processes.
    • Identity Intelligence transforms technical identity data scattered across multiple enterprise systems into centralized, easily understood and business-relevant information including dashboards, reports and advanced analytics.