IT Solution Service
A
VULNERABILITY ASSESSMENT
Vulnerability Assessment is a technical assessment designed to yield
as many vulnerabilities as possible in an environment, along with
severity and remediation priority information.
STAGE
Determination of Scope
Cataloguing Assets and Resources in a System
Identifying the Vulnerabilities or Potential Threats to Each Resource
Assigning Quantifiable Value and Importance to the Resources
Mitigating or Eliminating the most Serious Vulnerabilities for the most Valuable Resource
B
PENETRATION TESTING
Penetration Testing is guide to securing an Organization’s
IT Network by simulating severe hacking attempts.
STAGE
Determination of Scope
Targeted Information Gathering or Reconnaissance
Threat Modeling and Vulnerability Analysis
Exploit Attempts for Access and Escalation
Clean up and Final Reporting
Types of Penetration Testing
Mobile Application Penetration Testing
Evaluate the Security of Your Mobile Application with the TOP 10 Mobile Vulnerabilities by OWASP.
Penetration Testing as a Service
Maintain and Test Periodically Your Company’s Information Security System so that it Continues to be Protected.
Website Application Penetration Testing
Evaluate the Security of Your Website According to OWASP Standards.
C
DIGITAL FORENSIC
Helping client companies to find out the root cause or digital evidence through digital forensic
investigation of incidents that occur on company service servers, be it Servers, Active Directory,
Virtual Machines (VMs) affected by Cyber Attacks, Ransomware, Data Breach or other Incidents.
SERVICE
Helping client companies to carry out digital forensic investigations of CCTV.
Helping client companies to find out the root cause or digital evidence through digital forensic investigation of client company internal fraud. both electronic evidence in the form of computers, laptops, hard disks and cellphones/mobile phones.
Helping client companies Increase digital forensic maturity through consultation and guidance to achieve ISO 17025 forensic lab accreditation.
Helping client companies to recover or recover data for lost or deleted data both on computers, hard drives and other storage.
D
SPBE ASSESSMENT INDEX
SPBE is a government administration that utilizes
information and communication technology to provide
services to SPBE users.
40 hours of learning training to prepare internal assessors, internal auditors and the SPBE implementing team to understand the latest domains, aspects and indicators. As a fundamental reference framework used to define and develop SPBE IPPD implementation planning. NQA Indonesia will provide assistance, which includes several SPBE Architecture.
- SPBE Architecture
- Business Architecture
- Data Architecture
- Service Architecture
- Infrastructure Architecture
- Application Architecture
- Security Architecture
D
CURRICULUM DEVELOPMENT
Plans surveys to monitor response to programs, and makes
assessments of program effectiveness. Prepares curriculum
guidelines and program materials
STAGE
Assessing the Training Needs
Formulating Objectives and Training Goals
Careful Selection of Training Experiences to Accomplish these Objectives
Careful Selection of Training Experiences to Accomplish these Objectives
Organizing and Integrating Learning Experiences with Relevant Content Keeping in Mind the Teaching-Learning Process
Timely and Accurate Evaluation of All the Above Phases
F
NQA APPLICATIONS DEVELOPMENT
We can provide integrated website-based application development services using Open Source CMS or Framework according to the needs of the client. By using the SDLC method we will maximize it to meet all the needs of the client.
HRIS
Provide corporate Human Resource Information System Application for a Web Based
INVENTORY CONTROL
Provide services to build an Inventory Control Application to manage stock in the warehouse as needed
CUSTOM
We also provide consulting services for custom application development according to client needs