IT Solution Service

A

VULNERABILITY ASSESSMENT

Vulnerability Assessment is a technical assessment designed to yield
as many vulnerabilities as possible in an environment, along with
severity and remediation priority information.

STAGE

Determination of Scope

1

Cataloguing Assets and Resources in a System

2

Identifying the Vulnerabilities or Potential Threats to Each Resource

3

Assigning Quantifiable Value and Importance to the Resources

4

Mitigating or Eliminating the most Serious Vulnerabilities for the most Valuable Resource

5

B

PENETRATION TESTING

Penetration Testing is guide to securing an Organization’s
IT Network by simulating severe hacking attempts.

STAGE

Determination of Scope

Targeted Information Gathering or Reconnaissance

Threat Modeling and Vulnerability Analysis

Exploit Attempts for Access and Escalation

Clean up and Final Reporting

Types of Penetration Testing

Mobile Application Penetration Testing

Evaluate the Security of Your Mobile Application with the TOP 10 Mobile Vulnerabilities by OWASP.

Penetration Testing as a Service

Maintain and Test Periodically Your Company’s Information Security System so that it Continues to be Protected.

Website Application Penetration Testing

Evaluate the Security of Your Website According to OWASP Standards.


C

DIGITAL FORENSIC

Helping client companies to find out the root cause or digital evidence through digital forensic
investigation of incidents that occur on company service servers, be it Servers, Active Directory,
Virtual Machines (VMs) affected by Cyber Attacks, Ransomware, Data Breach or other Incidents.

SERVICE

Helping client companies to carry out digital forensic investigations of CCTV.



Helping client companies to find out the root cause or digital evidence through digital forensic investigation of client company internal fraud. both electronic evidence in the form of computers, laptops, hard disks and cellphones/mobile phones.

Helping client companies Increase digital forensic maturity through consultation and guidance to achieve ISO 17025 forensic lab accreditation.

Helping client companies to recover or recover data for lost or deleted data both on computers, hard drives and other storage.

D

SPBE ASSESSMENT INDEX

SPBE is a government administration that utilizes
information and communication technology to provide
services to SPBE users.

40 hours of learning training to prepare internal assessors, internal auditors and the SPBE implementing team to understand the latest domains, aspects and indicators. As a fundamental reference framework used to define and develop SPBE IPPD implementation planning. NQA Indonesia will provide assistance, which includes several SPBE Architecture.

D

CURRICULUM DEVELOPMENT

Plans surveys to monitor response to programs, and makes 
assessments of program effectiveness. Prepares curriculum
guidelines and program materials

STAGE

Stage 1

Assessing the Training Needs

Stage 2

Formulating Objectives and Training Goals

Stage 3

Careful Selection of Training Experiences to Accomplish these Objectives

Stage 4

Careful Selection of Training Experiences to Accomplish these Objectives

Stage 5

Organizing and Integrating Learning Experiences with Relevant Content Keeping in Mind the Teaching-Learning Process

Stage 6

Timely and Accurate Evaluation of All the Above Phases

F

NQA APPLICATIONS DEVELOPMENT

We can provide integrated website-based application development services using Open Source CMS or Framework according to the needs of the client. By using the SDLC method we will maximize it to meet all the needs of the client.

HRIS

Provide corporate Human Resource Information System Application for a Web Based

INVENTORY CONTROL

Provide services to build an Inventory Control Application to manage stock in the warehouse as needed

CUSTOM

We also provide consulting services for custom application development according to client needs