Data Center is our focus

We help to build, access and manage your datacenter and server rooms

Structure Cabling

We help structure your cabling, Fiber Optic, UTP, STP and Electrical.

Get ready to the #Cloud

Start your Hyper Converged Infrastructure.

Monitor your infrastructures

Monitor your hardware, software, network (ITOM), maintain your ITSM service .

Our Great People

Great team to support happy customers.

Wednesday, January 15, 2014

Produk baru, Draytek Vigor 2912

Produk baru Draytek Vigor 2912, solusi simple untuk kantor dan cafe / restoran yang memerlukan hotspot.

Cari solusi monitoring log AS/400 Jurnal Audit ?

Salah satu hal yang manarik dari EventLog Analyzer adalah kemampuan untuk menganalisa AS/400 Journal Audit logs.

EventLog Analyzer 8.6 - What's New?
  • Cloud infrastructure log monitoringEventLog Analyzer supports Amazon Web Services (AWS) EC2 Windows instance logs. You can collect,analyze,search,archive AWS EC2 instance logs in a centralized location with EventLog Analyzer
  • Support to MS SQL Audit logsYou can collect MS SQL audit logs at real time. You can get a dozen exclusive canned reports for MS SQL audit logs. You can schedule the reports at regular intervals, export them in PDF format and even redistribute the reports via email.
  • Supports IBM AS/400/ iSeries Journal Audit logsYou can now generate and schedule User based reports for IBM AS/400/iSeries journal logs. The default host report provides you with the important events that includes all the audited logs of IBM AS/400/iSeries machine.
    You can also generate reports, trigger alerts and filter journal logs based on audited fields.
  • Supports Tagging the logsMake the Log Search easier and efficient by allowing to search the logs with simple tags
  • Advanced Alert OptionsAllows you to set up the alert criteria with custom extracted fields for Oracle, MS SQL, Print Server, IIS and other application logs.
    FIM Alerts - You can now trigger alerts and get real time notification for any changes occurring the files and folders.
  • On the fly extraction and creation of new fields to index custom logs while importing

Mengetahui dan memblock user yang terkoneksi ke jaringan Anda

Ingin tahu user siapa saja yang konek ke jaringan Anda, baik via switch atau wireless ?
Ingin memblock IP / MAC address tertentu ?

Solarwinds User Device Tracker

Automated Device Tracking & Switch Port Management

  • Automatically discovers, maps and monitors switches, ports, and network devices
  • Quickly finds devices and retrieves user name, port details, connection history and more
  • Enables searching on IP address, user name, Hostname or MAC address to track endpoints
  • Allows whitelisting and watch lists with automatic alerts and click-of-a-button port shutdown
  • Provides detailed switch port usage data, capacity analysis, and built-in reporting

Automated Switch Port Discovery

Tuesday, January 14, 2014

Prediksi ManageEngine 2014 - Security & Accessibility

Executive Viewpoint 2014 Prediction: Manage Engine - Balancing Demands for Security and Accessibility
Looking ahead to 2014, two dominant, often-competing IT demands promise to dominate the new year — the demand for security and the demand for accessibility. Now more than ever, users want their data and their apps on their terms, i.e., anytime, anywhere, on any device, without compromising security or privacy. And companies will spend a good chunk of 2014 working to give users exactly what they want. To that end, you’ll see several trends emerge or accelerate in next 12 months, including:
Renewed Interest in Identity Access Management – Access management was once confined to applications and devices residing inside a company’s firewall, and many companies utilized directory services databases such as Active Directory to manage authentication and authorization to IT assets. As more of computing happens outside the firewall and beyond the control of Active Directory, companies will craft identity access management strategies for applications residing in the cloud and mobile device access.
Safeguarding Against Snooping – Internet service providers and cloud application vendors will provide more assurances that they have strategies for protecting businesses and consumers from government snooping. Yahoo and Twitter have already announced enhanced security to protect their users’ data and privacy.
Social Reigns Supreme – Social communication technology will usurp email as the primary mode of internal communications. Private social networks will become pervasive as businesses discover the benefits of collaborating in real time, organizing posts and comments as threaded discussions, and subjecting content to the peer review and vote.
Ongoing Displacement of the Desktop OS – Desktop operating systems will continue to give way to mobile operating systems such as iOS and Android. Desktop operating systems — especially Microsoft Windows — will feel the pressure from browser-based systems like Google’s Chrome OS as users find most of their applications and computing are online.
SDNs Emerge as a Viable Option for Computer Networking – Software-defined networks (SDNs) will see a growing number of deployments as increased processing power overcomes the last major obstacle to making SDNs viable. The flexibility and simplified management and administration of SDNs have already been recognized as superior to that of hardware-centric networks.
Security Pros Fortify Mobile Passwords – A growing number of organizations will implement mobile password self-service, enabling users to resolve their password-related issues from their smartphones and tablets without having to call the IT help desk. If nothing else, the move is critical to encouraging mobile users to adopt strong, unique passwords for all of the applications and services they use while on the go. If a user forgets her password, she can reset it immediately, without intervention – and delay – from a help desk technician.