SlideShare a Scribd company logo
1 of 24
1
Company Profile
2023
PT VIKTORINDO TEKNOLOGI PRIMA
(OFFICE)
Roxy Square
Jl. Kyai Tapa 1
Lantai LG Blok B9 No. 16
Jakarta
PT VIKTORINDO TEKNOLOGI PRIMA
We Provide The Best Technology to Support Your Business
(WORKSHOP)
Jl. Raya Kelapa Hibrida
Blok RB1 no. 19,
Pegangsaan Dua, Jakarta
2
Welcome To The Future
We Provide The Best Technology to Support Your Business
Vision &
Mission
Authorize Product
of Peris.ai
Our Featured
Product
Our Service
Our Partners
Our Customers
Our Advantages
About Us
01
02
03
04
05 06
07 08
3
About Us
We are an IT Solutions Company that is expert and experienced in providing complete information technology
solutions. This can help customers in various forms, from creating consulting, creating enterprise architecture to
delivering excellence for customer service. We can assist in migration planning, change management and client
business development.
Our company is supported by competent, experienced and professional human resources as well as world-class
partnerships with principals. We provide integrated strategic solutions that are suitable for every business
organization by creating better business processes.
.
Website: https://viktorindo.co.id
We Provide The Best Technology to Support Your Business
01
4
Vision & Mission
We Provide The Best Technology to Support Your Business
02
Our Vision
“To be one of the Best Information Technology
Provider with the Most Excellent Service”
Our Mission
• Provide our Customer with the best and most
efficient IT Solution from our world class Principles
• Develop the best strategy from planning to
implementation of your future IT Solution
• Create excellent business process
• Give the best professional services with the right
resources to support our Customer
• Maintaining the highest level of customer
satisfaction
5
Authorize Distributor of Peris.ai
We Provide The Best Technology to Support Your Business
03
• In today's digital world, security threats are everywhere.. But with
BIMA, you can rest easy knowing that your business is
from even the most advanced attacks. BIMA offers a wide range
of cybersecurity tools and monitoring, all tailored to fit the
unique needs of your business.
• Our flagship cybersecurity suite, Brahma EDR/NDR/XDR, is a
testament to our commiment to excellence. This all-in-one solution
offers unmatched visibility and control across all aspects of an
organization’s digital environment, providing robust defense across
endpoint, network, and cloud services.
6
Our Featured Products
(1)
We Provide The Best Technology to Support Your Business
04
• Sandhiguna builds a Key Management System to manage
cryptographic keys throughout their life cycles and to protect
keys from breaches due to improper key management.
• We deploy state-of-the-arts cryptographic tools that run on
Hardware-based Secure Enclave technology (Intel SGX) to
both key management system and cryptographic services at
the enterprise level.
• Sandhiguna Key Management System (SG-KMS) has been
developed by Indonesian experts with 100% TKDN (Tingkat
Kandungan Dalam Negeri) with international standards (Common
Criteria Certified –expected by end of 2022).
• SG-KMS continues to be developed following technological
developments and the need for information data protection in
the future by having a Roadmap Post Quantum Q2 2023
• IBM integrates technology and expertise, providing infrastructure,
software (including market-leading Red Hat) and consulting services
for clients as they pursue the digital transformation of the world’s
mission-critical businesses.
• IBM Security® QRadar® SOAR, formerly Resilient®, is designed to
help your security team respond to cyberthreats with confidence,
automate with intelligence and collaborate with consistency. It guides
your team in resolving incidents by codifying established incident
response processes into dynamic playbooks.
• IBM Security® QRadar® Security Information and Event
Management (SIEM) makes it easy to remediate threats faster while
maintaining your bottom line.
• IBM Security Guardium is a modern, scalable data security platform
that is ready to meet the demands of today’s progressing
environments. It protects sensitive and regulated data across
multiple cloud environments while managing compliance obligations,
discovering where sensitive data lives, encrypting and monitoring
what’s important and reducing your risk while responding to threats.
7
Our Featured Products
(2)
We Provide The Best Technology to Support Your Business
04
The Hewlett Packard Enterprise Company (HPE) is a business-focused organization
which works in servers, storage, networking, containerization software and
consulting and support. with HPE Move from owning and maintaining data
infrastructure to simply accessing and utilizing it on demand and as a service.
Power your data from edge to cloud so you can maximize your agility, run any
application, and free your data everywhere.
Technological breakthroughs and industrial development are creating better lives
for everyone. H3C is contributing to digitalization’s unfolding new chapter. H3C
offers a full portfolio of Digital Infrastructure products, spanning across compute,
storage, networking, security and related domains, and provide a comprehensive
one-stop digital platform that includes cloud computing, big data, artificial
intelligence (AI), intelligent connectivity, 5G, information security, new safety,
Internet of Things (IoT) and edge computing, as well as end-to-end technical
services.
Gigamon is the first company to deliver complete network visibility and analytics
on all information-in-motion, from raw packets to apps, across physical, virtual and
cloud infrastructure. We aggregate, transform and analyze network traffic to solve
for critical performance and security needs, including rapid threat detection and
response, freeing your organization to drive digital innovation. Gigamon has been
awarded over 75 technology patents and enjoys industry-leading customer
satisfaction with more than 3,000 organizations, including over 80 percent of the
Fortune 100.
Red Hat has become associated to a large extent with its enterprise operating
system Red Hat Enterprise Linux. With the acquisition of open-source enterprise
middleware vendor JBoss, Red Hat also offers Red Hat Virtualization (RHV), an
enterprise virtualization product. Red Hat provides storage, operating system
platforms, middleware, applications, management products, and support, training,
and consulting services. Red Hat creates, maintains, and contributes to many free
software projects. It has acquired several proprietary software product codebases
through corporate mergers and acquisitions and has released such software under
open-source licenses.
8
We Provide The Best Technology to Support Your Business
04 Our Featured Products
(3)
Synopsys is an American electronic design automation company that focuses on
silicon design and verification, silicon intellectual property and software security
and quality. Products include logic synthesis, behavioral synthesis, place and route,
static timing analysis, formal verification, hardware description language (SystemC,
SystemVerilog/Verilog, VHDL) simulators, and transistor-level circuit simulation. In
recent years, Synopsys has expanded its products and services to include
application security testing. Their technology is present in self-driving cars,
artificial intelligence, and internet of things consumer products.
CyberArk is the global leader in Identity Security. Centered on privileged access
management, CyberArk provides the most comprehensive security offering for any
identity – human or machine – across business applications, distributed
workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The
world’s leading organizations trust CyberArk to help secure their most critical
assets.
Quantum delivers end-to-end software solutions to store, manage, enrich, and
archive unstructured data across the entire lifecycle. From hyperscale archives to
video surveillance to content enrichment to data protection, organizations around
the world rely on Quantum for their data needs because we know the difference is
in your data.
Fortinet is once again leading the way with its Security Fabric, the first open
architectural approach to security that dynamically adapts to and secures the
evolving IT infrastructure. Broad visibility of the entire digital attack surface to
better manage risk Integrated solution that reduces the complexity of supporting
multiple point products Automated workflows to increase speed of operations and
response.
Nutanix, Inc. is an American cloud computing company that sells software, cloud
services (such as desktops as a service, disaster recovery as a service, and cloud
monitoring), and software-defined storage.
9
We Provide The Best Technology to Support Your Business
04
Netcraft is an internet services company based in the United Kingdom which
provides internet security services, including cybercrime disruption, application
security testing and automated vulnerability scanning. Netcraft have explored the
internet for a quarter of a century and are an authority on many aspects of the
internet.
EfficientIP is a network security and automation company, specializing in DNS-
DHCP-IPAM (DDI). We promote business continuity by making your IP
infrastructure foundation reliable, agile and secure.
Our Featured Products
(4)
Aruba Networks, formerly known as Aruba Wireless Networks, is a Santa Clara,
California-based wireless networking subsidiary of Hewlett Packard Enterprise
company.
Zoom Video Communications, Inc. (zoom) is an American communications
technology company headquartered in San Jose, California. It provides
videotelephony and online chat services through a cloud-based peer-to-peer
software platform used for video communications (Meetings), messaging (Chat),
voice calls (Phone), conference rooms for video meetings (Rooms), virtual events
(Events) and contact centers (Contact Center), and offers an open platform
allowing third-party developers to build custom applications on its unified
communications platform (Developer Platform).
ETS is a company engaged in the field of Information Technology and a Provider of
Goods/Services for Solutions to Electrical Problems.
ETS strive to position as a capable, reliable and trusted company in providing
solutions to today's electricity problems.
Enterprise System for Technology and Information Management (ESTIM) is the
best solution for your Service Management Automation.
10
We Provide The Best Technology to Support Your Business
04
And More!
Our Featured Products
(5)
11
Our Services
(1)
We Provide The Best Technology to Support Your Business
05
Cabling is a critical foundation
which is affected the effectivity
quality in your network that runs
on your company to decide the
operation on business. We will
provide you a service in cabling
and wiring that will help your
network infrastructure working
properly and effectively.
Cabling & Maintenance
12
Our Services
(2)
We Provide The Best Technology to Support Your Business
05
DDI has become a key
networking technology for
every IT organization. It is now
more prominent than ever due
to multi-cloud and multi-device
proliferation, and also
because of ever- evolving
security threats that
conventional network security
offerings find hard to combat.
An integrated DDI solution
helps simplify and automate
management of the
interactions between DNS,
DHCP, and IPAM.
.
DDI Solutions
Information technology (IT)
consulting services help
improve the performance,
scalability and
competitiveness of your
company through right
technology enablement and
usage.
Our IT Consultation
includes:
• IT Strategy
• Planning
• Operation Efficiency
• Performance
Improvement
• etc.
IT Consulting
Change your traditional
IT Environment to a more
effective and efficient
forms. Support any
workload, any
environment, and any
application type.
Virtualization &
Cloud Solution
Our technology is redefining
connectivity around the globe.
We innovate across wireless
and wired technology to meet
industry-specific needs and
the most demanding use
cases. Our high-performance
network infrastructure provides
secure, reliable access to
applications and services no
matter how tough the
environment.
LAN/WAN
Management
Provide innovative system
applications by meeting
client expectations, in
helping to plan, develop,
test and deliver innovative
software more quickly.
Providing services in the 􀃶
eld of IT Systems such as
applications used to
support all activities in your
company/business
App System & IT
Implementation
13
Our Services
(3)
We Provide The Best Technology to Support Your Business
05
Systematic review of security
weaknesses in an information
system. It evaluates if the
system is susceptible to any
known vulnerabilities, assigns
severity levels to those
vulnerabilities, and
recommends remediation or
mitigation, if and whenever
needed
Vulnerability Assessment
Manage IT services and the
supporting IT infrastructure.
IT operations management
includes IT operations
control and facilities
management.
IT Operations
Management
Provide integration services of
various systems that exist in
the company / organization to
ensure that these systems can
interact and communicate well
to support the activities of your
company / organization
Hardware &
IT Integration Our Firewalls solutions secure
your business with
a prevention-focused
architecture and integrated
innovations that are easy to
deploy and use. Accelerate
growth and eliminate risks at
the same time.
Our endpoints solutions have
advanced endpoints protection
to stop threats on the endpoint
and coordinates enforcement
with cloud and network security
to prevent successful
cyberattacks.
IT Security
14
Our Partners
We Provide The Best Technology to Support Your Business
06 Most Trusted and Value Added Distributors in Indonesia
15
Our Customers
We Provide The Best Technology to Support Your Business
07 Most Treasured Clients
16
Our Advantages
We Provide The Best Technology to Support Your Business
08 Why you should choose us
Quick Solution
IT Consultant Team that provides and
supports you in deliver quick
solutions to your problems
Professional Team
Having Team of Professionals with
excellent expertise in getting the job
well done
Innovative
Provide the ability and expertise to
produce most efficient solution
Flexibility
We can produce flexible solutions
and better solutions
Reliable
We have professionals which an
expert and experienced in IT fields to
meet your goals
Consistency
Have the ability to strive consistently
to achieve an accomplishment
17
Mobile Apps
Order - Survey
P R E S E N T A T I O N
J a n u a r y 2 0 2 4
18
Software Application web-based
and accessed through web
browser anywhere, anytime
W e b A p p l i c a t i o n
Software Application that runs on
a mobile device (Android based)
M o b i l e A p p l i c a t i o n
W
h
a
t
w
e
d
o
!
19
Background
& Objectives
The needs of Multifinance for
Mobile Order & Survey
application
 Speed up order Process
 Improve cost efficiency for
surveyor in managing order
data
 Providing better services to
customers & partners
 Support operational teams
20
T h i s i s o u r a p p l i c a t i o n
Mobile Apps to get & input order
 GPS Location (Geotagging)
 Choice of products
 Multi collateral
 Tracking Order
 Order History
 Dashboard Monitoring Order
 Upload Photos & Docs
 Support Online & Offline Mode
M o b i l e O r d e r
Mobile Apps to survey &
capture documents & photos
 GPS Location (Geotagging)
 Lock Serial Number devices
 Version checking
 Root check for security
 History & Tracking Order
 Upload Photos & Docs
 Support Online & Offline
Mode
M o b i l e S u r v e y
21
S u p p o r t A p p l i c a t i o n
Web Monitoring
Monitoring & Tracking Order
 Verify Order & Survey Results
 Credit Checking (SLIK, Pefindo, etc)
Process
 Assignment & Re-assignment Orders
 User managements & Controls
 Access & Security Controls
22
Security
Features
 SQL Injection protection
 Encryption of sensitive data
 Session management
 Root detection
 Password management
 Login Audit Trail
23
Flow Process
I n t e r f a c e t o C o r e
I n p u t O r d e r &
V e r i f y O r d e r
C r e d i t R e v i e w
( S L I K , P e f i n d o , e t c )
p r o c e s s
S u r v e y P r o c e s s
A s s i g n m e n t &
R e a s s i g n m e n t
24
Thank You
We Provide The Best Technology to Support Your Business

More Related Content

Similar to Company Profile Managemenyt company.pptx

JUGITER BUSINESS PROFILE
JUGITER BUSINESS PROFILEJUGITER BUSINESS PROFILE
JUGITER BUSINESS PROFILEAshish Tyagi
 
Company Profile 2016_1
Company Profile 2016_1Company Profile 2016_1
Company Profile 2016_1Tarek Mekkawy
 
Lowered uncertainty of an anti-theft product to secure mobile end points, for...
Lowered uncertainty of an anti-theft product to secure mobile end points, for...Lowered uncertainty of an anti-theft product to secure mobile end points, for...
Lowered uncertainty of an anti-theft product to secure mobile end points, for...Mindtree Ltd.
 
Lowered uncertainty of an anti-theft product to secure mobile end points, for...
Lowered uncertainty of an anti-theft product to secure mobile end points, for...Lowered uncertainty of an anti-theft product to secure mobile end points, for...
Lowered uncertainty of an anti-theft product to secure mobile end points, for...Mindtree Ltd.
 
Top 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptxTop 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptxSonaliG6
 
Managed services web
Managed services webManaged services web
Managed services webDean North
 
Managed services web
Managed services webManaged services web
Managed services webMark Howie
 
imtechspherebrochure
imtechspherebrochureimtechspherebrochure
imtechspherebrochureSteve Tester
 
Pulsant corporate presentation 2020
Pulsant corporate presentation 2020Pulsant corporate presentation 2020
Pulsant corporate presentation 2020Karl Fontanari
 
Softwide Security Company Introduction 2024
Softwide Security Company Introduction 2024Softwide Security Company Introduction 2024
Softwide Security Company Introduction 2024Softwide Security
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperMohd Anwar Jamal Faiz
 
Tekpros Solutions and Services
Tekpros Solutions and ServicesTekpros Solutions and Services
Tekpros Solutions and ServicesVamsiKrishna815
 

Similar to Company Profile Managemenyt company.pptx (20)

Company Profile
Company ProfileCompany Profile
Company Profile
 
SSBS_Brochure_2017
SSBS_Brochure_2017SSBS_Brochure_2017
SSBS_Brochure_2017
 
JUGITER BUSINESS PROFILE
JUGITER BUSINESS PROFILEJUGITER BUSINESS PROFILE
JUGITER BUSINESS PROFILE
 
Company Profile 2016_1
Company Profile 2016_1Company Profile 2016_1
Company Profile 2016_1
 
Extelligence sro
Extelligence sroExtelligence sro
Extelligence sro
 
Integra presentation
Integra presentationIntegra presentation
Integra presentation
 
Value Stories - 7th Issue
Value Stories - 7th Issue Value Stories - 7th Issue
Value Stories - 7th Issue
 
Lowered uncertainty of an anti-theft product to secure mobile end points, for...
Lowered uncertainty of an anti-theft product to secure mobile end points, for...Lowered uncertainty of an anti-theft product to secure mobile end points, for...
Lowered uncertainty of an anti-theft product to secure mobile end points, for...
 
Lowered uncertainty of an anti-theft product to secure mobile end points, for...
Lowered uncertainty of an anti-theft product to secure mobile end points, for...Lowered uncertainty of an anti-theft product to secure mobile end points, for...
Lowered uncertainty of an anti-theft product to secure mobile end points, for...
 
Top 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptxTop 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptx
 
Managed services web
Managed services webManaged services web
Managed services web
 
Managed servoes 2mb
Managed servoes 2mbManaged servoes 2mb
Managed servoes 2mb
 
Managed services web
Managed services webManaged services web
Managed services web
 
imtechspherebrochure
imtechspherebrochureimtechspherebrochure
imtechspherebrochure
 
Pulsant corporate presentation 2020
Pulsant corporate presentation 2020Pulsant corporate presentation 2020
Pulsant corporate presentation 2020
 
Softwide Security Company Introduction 2024
Softwide Security Company Introduction 2024Softwide Security Company Introduction 2024
Softwide Security Company Introduction 2024
 
Best IT Services Provider in Hong Kong
Best IT Services Provider in Hong KongBest IT Services Provider in Hong Kong
Best IT Services Provider in Hong Kong
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
 
Munawwar Khan
Munawwar KhanMunawwar Khan
Munawwar Khan
 
Tekpros Solutions and Services
Tekpros Solutions and ServicesTekpros Solutions and Services
Tekpros Solutions and Services
 

Recently uploaded

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 

Company Profile Managemenyt company.pptx

  • 1. 1 Company Profile 2023 PT VIKTORINDO TEKNOLOGI PRIMA (OFFICE) Roxy Square Jl. Kyai Tapa 1 Lantai LG Blok B9 No. 16 Jakarta PT VIKTORINDO TEKNOLOGI PRIMA We Provide The Best Technology to Support Your Business (WORKSHOP) Jl. Raya Kelapa Hibrida Blok RB1 no. 19, Pegangsaan Dua, Jakarta
  • 2. 2 Welcome To The Future We Provide The Best Technology to Support Your Business Vision & Mission Authorize Product of Peris.ai Our Featured Product Our Service Our Partners Our Customers Our Advantages About Us 01 02 03 04 05 06 07 08
  • 3. 3 About Us We are an IT Solutions Company that is expert and experienced in providing complete information technology solutions. This can help customers in various forms, from creating consulting, creating enterprise architecture to delivering excellence for customer service. We can assist in migration planning, change management and client business development. Our company is supported by competent, experienced and professional human resources as well as world-class partnerships with principals. We provide integrated strategic solutions that are suitable for every business organization by creating better business processes. . Website: https://viktorindo.co.id We Provide The Best Technology to Support Your Business 01
  • 4. 4 Vision & Mission We Provide The Best Technology to Support Your Business 02 Our Vision “To be one of the Best Information Technology Provider with the Most Excellent Service” Our Mission • Provide our Customer with the best and most efficient IT Solution from our world class Principles • Develop the best strategy from planning to implementation of your future IT Solution • Create excellent business process • Give the best professional services with the right resources to support our Customer • Maintaining the highest level of customer satisfaction
  • 5. 5 Authorize Distributor of Peris.ai We Provide The Best Technology to Support Your Business 03 • In today's digital world, security threats are everywhere.. But with BIMA, you can rest easy knowing that your business is from even the most advanced attacks. BIMA offers a wide range of cybersecurity tools and monitoring, all tailored to fit the unique needs of your business. • Our flagship cybersecurity suite, Brahma EDR/NDR/XDR, is a testament to our commiment to excellence. This all-in-one solution offers unmatched visibility and control across all aspects of an organization’s digital environment, providing robust defense across endpoint, network, and cloud services.
  • 6. 6 Our Featured Products (1) We Provide The Best Technology to Support Your Business 04 • Sandhiguna builds a Key Management System to manage cryptographic keys throughout their life cycles and to protect keys from breaches due to improper key management. • We deploy state-of-the-arts cryptographic tools that run on Hardware-based Secure Enclave technology (Intel SGX) to both key management system and cryptographic services at the enterprise level. • Sandhiguna Key Management System (SG-KMS) has been developed by Indonesian experts with 100% TKDN (Tingkat Kandungan Dalam Negeri) with international standards (Common Criteria Certified –expected by end of 2022). • SG-KMS continues to be developed following technological developments and the need for information data protection in the future by having a Roadmap Post Quantum Q2 2023 • IBM integrates technology and expertise, providing infrastructure, software (including market-leading Red Hat) and consulting services for clients as they pursue the digital transformation of the world’s mission-critical businesses. • IBM Security® QRadar® SOAR, formerly Resilient®, is designed to help your security team respond to cyberthreats with confidence, automate with intelligence and collaborate with consistency. It guides your team in resolving incidents by codifying established incident response processes into dynamic playbooks. • IBM Security® QRadar® Security Information and Event Management (SIEM) makes it easy to remediate threats faster while maintaining your bottom line. • IBM Security Guardium is a modern, scalable data security platform that is ready to meet the demands of today’s progressing environments. It protects sensitive and regulated data across multiple cloud environments while managing compliance obligations, discovering where sensitive data lives, encrypting and monitoring what’s important and reducing your risk while responding to threats.
  • 7. 7 Our Featured Products (2) We Provide The Best Technology to Support Your Business 04 The Hewlett Packard Enterprise Company (HPE) is a business-focused organization which works in servers, storage, networking, containerization software and consulting and support. with HPE Move from owning and maintaining data infrastructure to simply accessing and utilizing it on demand and as a service. Power your data from edge to cloud so you can maximize your agility, run any application, and free your data everywhere. Technological breakthroughs and industrial development are creating better lives for everyone. H3C is contributing to digitalization’s unfolding new chapter. H3C offers a full portfolio of Digital Infrastructure products, spanning across compute, storage, networking, security and related domains, and provide a comprehensive one-stop digital platform that includes cloud computing, big data, artificial intelligence (AI), intelligent connectivity, 5G, information security, new safety, Internet of Things (IoT) and edge computing, as well as end-to-end technical services. Gigamon is the first company to deliver complete network visibility and analytics on all information-in-motion, from raw packets to apps, across physical, virtual and cloud infrastructure. We aggregate, transform and analyze network traffic to solve for critical performance and security needs, including rapid threat detection and response, freeing your organization to drive digital innovation. Gigamon has been awarded over 75 technology patents and enjoys industry-leading customer satisfaction with more than 3,000 organizations, including over 80 percent of the Fortune 100. Red Hat has become associated to a large extent with its enterprise operating system Red Hat Enterprise Linux. With the acquisition of open-source enterprise middleware vendor JBoss, Red Hat also offers Red Hat Virtualization (RHV), an enterprise virtualization product. Red Hat provides storage, operating system platforms, middleware, applications, management products, and support, training, and consulting services. Red Hat creates, maintains, and contributes to many free software projects. It has acquired several proprietary software product codebases through corporate mergers and acquisitions and has released such software under open-source licenses.
  • 8. 8 We Provide The Best Technology to Support Your Business 04 Our Featured Products (3) Synopsys is an American electronic design automation company that focuses on silicon design and verification, silicon intellectual property and software security and quality. Products include logic synthesis, behavioral synthesis, place and route, static timing analysis, formal verification, hardware description language (SystemC, SystemVerilog/Verilog, VHDL) simulators, and transistor-level circuit simulation. In recent years, Synopsys has expanded its products and services to include application security testing. Their technology is present in self-driving cars, artificial intelligence, and internet of things consumer products. CyberArk is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets. Quantum delivers end-to-end software solutions to store, manage, enrich, and archive unstructured data across the entire lifecycle. From hyperscale archives to video surveillance to content enrichment to data protection, organizations around the world rely on Quantum for their data needs because we know the difference is in your data. Fortinet is once again leading the way with its Security Fabric, the first open architectural approach to security that dynamically adapts to and secures the evolving IT infrastructure. Broad visibility of the entire digital attack surface to better manage risk Integrated solution that reduces the complexity of supporting multiple point products Automated workflows to increase speed of operations and response. Nutanix, Inc. is an American cloud computing company that sells software, cloud services (such as desktops as a service, disaster recovery as a service, and cloud monitoring), and software-defined storage.
  • 9. 9 We Provide The Best Technology to Support Your Business 04 Netcraft is an internet services company based in the United Kingdom which provides internet security services, including cybercrime disruption, application security testing and automated vulnerability scanning. Netcraft have explored the internet for a quarter of a century and are an authority on many aspects of the internet. EfficientIP is a network security and automation company, specializing in DNS- DHCP-IPAM (DDI). We promote business continuity by making your IP infrastructure foundation reliable, agile and secure. Our Featured Products (4) Aruba Networks, formerly known as Aruba Wireless Networks, is a Santa Clara, California-based wireless networking subsidiary of Hewlett Packard Enterprise company. Zoom Video Communications, Inc. (zoom) is an American communications technology company headquartered in San Jose, California. It provides videotelephony and online chat services through a cloud-based peer-to-peer software platform used for video communications (Meetings), messaging (Chat), voice calls (Phone), conference rooms for video meetings (Rooms), virtual events (Events) and contact centers (Contact Center), and offers an open platform allowing third-party developers to build custom applications on its unified communications platform (Developer Platform). ETS is a company engaged in the field of Information Technology and a Provider of Goods/Services for Solutions to Electrical Problems. ETS strive to position as a capable, reliable and trusted company in providing solutions to today's electricity problems. Enterprise System for Technology and Information Management (ESTIM) is the best solution for your Service Management Automation.
  • 10. 10 We Provide The Best Technology to Support Your Business 04 And More! Our Featured Products (5)
  • 11. 11 Our Services (1) We Provide The Best Technology to Support Your Business 05 Cabling is a critical foundation which is affected the effectivity quality in your network that runs on your company to decide the operation on business. We will provide you a service in cabling and wiring that will help your network infrastructure working properly and effectively. Cabling & Maintenance
  • 12. 12 Our Services (2) We Provide The Best Technology to Support Your Business 05 DDI has become a key networking technology for every IT organization. It is now more prominent than ever due to multi-cloud and multi-device proliferation, and also because of ever- evolving security threats that conventional network security offerings find hard to combat. An integrated DDI solution helps simplify and automate management of the interactions between DNS, DHCP, and IPAM. . DDI Solutions Information technology (IT) consulting services help improve the performance, scalability and competitiveness of your company through right technology enablement and usage. Our IT Consultation includes: • IT Strategy • Planning • Operation Efficiency • Performance Improvement • etc. IT Consulting Change your traditional IT Environment to a more effective and efficient forms. Support any workload, any environment, and any application type. Virtualization & Cloud Solution Our technology is redefining connectivity around the globe. We innovate across wireless and wired technology to meet industry-specific needs and the most demanding use cases. Our high-performance network infrastructure provides secure, reliable access to applications and services no matter how tough the environment. LAN/WAN Management Provide innovative system applications by meeting client expectations, in helping to plan, develop, test and deliver innovative software more quickly. Providing services in the 􀃶 eld of IT Systems such as applications used to support all activities in your company/business App System & IT Implementation
  • 13. 13 Our Services (3) We Provide The Best Technology to Support Your Business 05 Systematic review of security weaknesses in an information system. It evaluates if the system is susceptible to any known vulnerabilities, assigns severity levels to those vulnerabilities, and recommends remediation or mitigation, if and whenever needed Vulnerability Assessment Manage IT services and the supporting IT infrastructure. IT operations management includes IT operations control and facilities management. IT Operations Management Provide integration services of various systems that exist in the company / organization to ensure that these systems can interact and communicate well to support the activities of your company / organization Hardware & IT Integration Our Firewalls solutions secure your business with a prevention-focused architecture and integrated innovations that are easy to deploy and use. Accelerate growth and eliminate risks at the same time. Our endpoints solutions have advanced endpoints protection to stop threats on the endpoint and coordinates enforcement with cloud and network security to prevent successful cyberattacks. IT Security
  • 14. 14 Our Partners We Provide The Best Technology to Support Your Business 06 Most Trusted and Value Added Distributors in Indonesia
  • 15. 15 Our Customers We Provide The Best Technology to Support Your Business 07 Most Treasured Clients
  • 16. 16 Our Advantages We Provide The Best Technology to Support Your Business 08 Why you should choose us Quick Solution IT Consultant Team that provides and supports you in deliver quick solutions to your problems Professional Team Having Team of Professionals with excellent expertise in getting the job well done Innovative Provide the ability and expertise to produce most efficient solution Flexibility We can produce flexible solutions and better solutions Reliable We have professionals which an expert and experienced in IT fields to meet your goals Consistency Have the ability to strive consistently to achieve an accomplishment
  • 17. 17 Mobile Apps Order - Survey P R E S E N T A T I O N J a n u a r y 2 0 2 4
  • 18. 18 Software Application web-based and accessed through web browser anywhere, anytime W e b A p p l i c a t i o n Software Application that runs on a mobile device (Android based) M o b i l e A p p l i c a t i o n W h a t w e d o !
  • 19. 19 Background & Objectives The needs of Multifinance for Mobile Order & Survey application  Speed up order Process  Improve cost efficiency for surveyor in managing order data  Providing better services to customers & partners  Support operational teams
  • 20. 20 T h i s i s o u r a p p l i c a t i o n Mobile Apps to get & input order  GPS Location (Geotagging)  Choice of products  Multi collateral  Tracking Order  Order History  Dashboard Monitoring Order  Upload Photos & Docs  Support Online & Offline Mode M o b i l e O r d e r Mobile Apps to survey & capture documents & photos  GPS Location (Geotagging)  Lock Serial Number devices  Version checking  Root check for security  History & Tracking Order  Upload Photos & Docs  Support Online & Offline Mode M o b i l e S u r v e y
  • 21. 21 S u p p o r t A p p l i c a t i o n Web Monitoring Monitoring & Tracking Order  Verify Order & Survey Results  Credit Checking (SLIK, Pefindo, etc) Process  Assignment & Re-assignment Orders  User managements & Controls  Access & Security Controls
  • 22. 22 Security Features  SQL Injection protection  Encryption of sensitive data  Session management  Root detection  Password management  Login Audit Trail
  • 23. 23 Flow Process I n t e r f a c e t o C o r e I n p u t O r d e r & V e r i f y O r d e r C r e d i t R e v i e w ( S L I K , P e f i n d o , e t c ) p r o c e s s S u r v e y P r o c e s s A s s i g n m e n t & R e a s s i g n m e n t
  • 24. 24 Thank You We Provide The Best Technology to Support Your Business