Datacomm, Acumatica & Partners Community gathered to discuss how to foster the adoption of Acumatica ERP Cloud applications in Indonesia Market. The market primary concern is security & datacenter location. Datacomm Cloud Business - (cloud.datacomm.co.id) Enterprise - Secure - Local philosophy was shared to address the issue.
2. Indonesia Cloud Opportunity
IaaS Accounts for 40% of the Cloud
Services Market in 2015
Overall Indonesia Cloud Market
Odin SMB Cloud InsightTM – Indonesia – 2015
2
3. Indonesia Cloud Opportunity
IaaS Opportunity through 2018Type of Cloud Server Applications
Odin SMB Cloud InsightTM – Indonesia – 2015
3
4. Datacomm Cloud Business
Driver
• Increase Productivity
• Improve Competitiveness
both in online and
physical
• Leveraging Mobile &
Social Media
• Low IT Investment
Benefit
Cloud Market Opportunity
4
Agility
Cost model: OPEX
Device & location
independence
Mobility
Reliability
Security
Monitored performance
Elasticity & Scalability
Indonesia SME is Huge Cloud Computing Market Opportunity
6. Datacomm Cloud Business
Company Overview
6
ABOUT
PT. Datacomm Diangraha business division focusing on Cloud
opportunity in Indonesia. Our philosophy are Enterprise, Secure
and Local.
PRODUCTS
Sentriciti – Security as a Service (SecaaS)
Cloudciti – Cloud Services (XaaS)
WHY US?
We are backed up by 25 years experiences and 350 people.
We have strong financial commitment, invested in it owns local
Datacenter. We also certified by international standard: ISO
9000, ISO 27001 & ISO 20000.
8. Datacomm Cloud Business
Proposition to Indonesia SMEs
8
Improving your company agility.
Deploying your IT projects faster
and easier.
Enabling you to Leverage IT
technology as your competitive
advantage. Lowering barrier to
enter. Move from Capex to Opex
model.
Improve Availability, Accessibility
and Scalability to next level.
Security is always top priority.
We take care your IT needs.
Allowing you to focus on your
business.
Extensive technical support. Our
team resides in more than 15 cities
throughout Indonesia.
11. Datacomm Cloud Business
• 24x7 Help Desk Support
Center
• 24x7 Network Operation
Center
• 24x7 Security Operation
Center
• Tier 3 Data Center
Design
• ISO 9001:2008
• ISO 27001:2013
• ISO 20000:2011
Infrastructure & Facility
11
17. DCB IaaS
Enterprise-Grade Virtual Servers in the Public Cloud
17
Virtual private cloud servers for scale and flexibility, along with the
unique security, performance, and management companies require in
their own data centers.
• On-demand provisioning of high-performing virtual machines
• Self-service, elastic
• Up to 16 vCPUs & 128 GB RAM
• Choose Windows or Linux - Managed or Unmanaged
• Partnership to deploy in 13 data centers
18. Scalability
18
Autoscale your infrastructure
Horizontal Autoscale
Ensure the number of servers
increases automatically during
demand spikes to maintain
performance, and decreases
automatically during demand lulls
to minimize costs.
Efficiently Respond to Peak Usage with Autoscale
Vertical Autoscale
Automatically rightsize the
compute capacity of your
servers during demand spikes
and lulls.
19. DCB Autoscale Features
19
Horizontal autoscale
Automatically add new
server if CPU and/or
Memory usage exceed
threshold (Scale Out)
Automatically remove
server in group if CPU
and/or Memory usage
below threshold (Scale In)
20. DCB Autoscale Features
Vertical autoscale
20
Upgrade server’s CPU core
when CPU usage meets
threshold policy (Scale Up)
Downgrade server’s CPU core
when CPU usage meets
threshold policy (Scale Down)
22. Automation
Cloud Management API
22
Comprehensive REST based web services to enable amazing ideas
Provision and Administer
Servers
Read network details and
manage public IP addresses
Manage your Account(s)
and Users
Manage Server Groups
Deploy Complex
Environments
Review Detailed Billing
Information
25. Overview
25
Sentriciti adalah layanan keamanan informasi full
lifecycle dari Datacomm yang secara garis besar terdiri
dari:
• Managed Security Services
• Security Remote Monitoring (SRM)
• Security Device Management (SDM)
• Professional Security Services
• Security Professional Services (SPS)
Security Device ManagementSecurity Professional Services
Security Remote Monitoring
27. Security Remote Monitoring (SRM)
27
Pelanggan cukup mengirimkan log dari
perangkat keamanannya ke Event Manager
Sentriciti yang diletakkan di lokasi pelanggan.
Log yang kemudian diteruskan ke SOC
Datacomm akan dipantau terus menerus dan
dianalisa oleh tenaga ahli.
Bila ditemui adanya indikasi terjadinya insiden
keamanan informasi, penjelasan kejadian serta
rekomendasi penanganannya akan disampaikan
dengan segera ke pelanggan.
28. Security Remote Monitoring (SRM)
28
SERVICE OVERVIEW
SRM is a zero – near real-time detection services.
24/7 around-the-clock proactive security monitoring from Datacomm SOC. Security incident alert
includes threat vector and landscape analysis, impact analysis and incident handling recommendation.
BENEFIT TO CUSTOMERS
Faster monitoring service enablement.
Fast and accurate security incident detection and effective
recommendation.
Reduced security incident risk and impact.
Reduce human resources management hassles.
Proven process to complement customer’s existing
process.
KEY FEATURES
24/7 around the clock monitoring.
24/7 helpdesk.
ISO27001, ISO20001.
Global threat intelligence.
Staged and guaranteed SLA for alert.
Experienced and certified security professional (GIAC, ISACA, ISC^2).
Web-based user dashboard.
Ad-hoc and periodic reporting.
30. Security Device Management (SDM)
30
Melalui layanan Sentriciti SDM, organisasi
akan mendapat bantuan dalam
mengembangkan dan menjalankan
sistem keamanan informasi secara
holistik dan berkesinambungan.
Sentriciti menyediakan layanan end-to-
end dari penyediaan perangkat sampai
dengan layanan pengelolaan sistem
keamanan informasi.
Perancangan - Design
Kami akan duduk bersama dengan Anda untuk merancang infrastruktur keamanan
informasi yang sesuai keadaan dan kebutuhan perusahaan Anda.
Pembangunan - Build
Kami akan melakukan instalasi, konfigurasi, integrasi dan migrasi serta
memastikan infrastruktur keamanan informasi berjalan sesuai dengan
rancangan.
Operasional - Operate
Kami akan memantau availabilitas infrastruktur keamanan informasi Anda
sepanjang 7x24 jam, melakukan perubahan konfigurasi, pemutakhiran sistem
dan hal operasional lainnya untuk Anda.
Pemeliharaan - Maintain
Dalam hal terjadi gangguan pada infrastruktur keamanan informasi Anda, tim ahli
kami akan segera melakukan investigasi dan analisa serta melakukan perbaikan
yang cepat dan tepat.
31. Security Device Management (SDM)
31
SERVICE OVERVIEW
SDM is a T-1 prevention & T+1 response services.
Security technology full lifecycle services from design, deployment, operations and maintenance. OPEX
business model. 24/7 support.
BENEFIT TO CUSTOMERS
State-of-the-art security architecture design.
Hassle-free full lifecycle security technology management.
OPEX, lower investment.
Reduce human resources management hassles.
Proven process to complement customer’s existing process.
KEY FEATURES
Tailor-made security architecture design.
24/7 helpdesk and support.
ISO27001, ISO20001.
Up to 99,9% availability SLA.
Experienced and certified security professional (Juniper JNCIP and
Palo Alto CNSE).
33. Security Professional Services (SPS)
33
Memperoleh gambaran utuh mengenai kondisi sistem keamanan informasi dapat membantu
dalam perbaikan dan perencanaan pengembangan sistem terkait. Untuk mendukung pencapaian
penilaian sistem keamanan informasi Anda secara menyeluruh dan objektif, melalui layanan
Sentriciti SPS, organisasi akan dibantu dalam melakukan kegiatan vulnerability assessment dan
penetration testing
34. Security Professional Services (SPS)
SERVICE OVERVIEW
SPS is a T-1 prevention services.
Full suite of red team security testing covering from vulnerability scanning and analysis, methodical
blackbox and whitebox penetration testing, to reporting and remediation support.
BENEFIT TO CUSTOMERS
Be ahead of hackers to know and fix/patch found
vulnerabilities.
Maintain acceptable security exposure risks level.
Reduce human resources management hassles.
KEY FEATURES
Tailor-made scope.
International security testing framework
(NIST, OSSTMM, PTES, OWASP).
Experienced and certified security professional (GIAC, ISACA, ISC^2).
Comprehensive reporting and actionable recommendation.
34
35. Keunggulan Sentriciti
• Kolaborasi People, Process and Technology dalam memberikan layanan yang terbaik dan
menyeluruh untuk keamanan informasi organisasi Anda.
People Process Technology
Strategy
Confidentiality
Integrity
Availability
Information
Security
Objectives
Administration and Operation
Maintenance
Deployment
Planning and Design
35
36. Keunggulan Sentriciti
• Kolaborasi People, Process and Technology dalam memberikan layanan yang terbaik dan
menyeluruh untuk keamanan informasi organisasi Anda.
• Global Threat Intelligence yang didapatkan dari partner.
36
37. Keunggulan Sentriciti
• Kolaborasi People, Process and Technology dalam memberikan layanan yang terbaik dan
menyeluruh untuk keamanan informasi organisasi Anda.
• Global Threat Intelligence yang didapatkan dari partner.
• Didukung oleh engineer bersertifikasi GIAC GSEC, GCIH dan konsultan bersertifikasi JNCIP-SEC,
CNSE, CISSP, CISA, CISM.
37
38. Keunggulan Sentriciti
• Kolaborasi People, Process and Technology dalam memberikan layanan yang terbaik dan
menyeluruh untuk keamanan informasi organisasi Anda.
• Global Threat Intelligence yang didapatkan dari partner.
• Didukung oleh engineer bersertifikasi GIAC GSEC, GCIH dan konsultan bersertifikasi JNCIP-SEC,
CNSE, CISSP, CISA, CISM.
• Proses Tersertifikasi ISO27001 dan tata kelola layanan berbasis framework ITIL.
38
42. Why Datacomm Cloud Business?
42
Retaining Your Customers
Relationship
Retaining Your Brand
Expand Your Solution Offering.
No investment Require. Capex
to Opex. Recurring Business.
Security is always top priority.
Improve Your Profitability.
Extensive technical and
local support. Our team
resides in 15+ cities
Value Proposition to Resellers Partner
43. Customer Journey – Service Lifecycle
43
Planning
•Sales Identification
•Sales Visit
•Product Presentation
•Needs Analysis
•Service RFI Proposal
•Demo/POC
Procurement
•Survey/Assessment
•Technical Proposal
•Commercial
Proposal
•Beauty Contest
•Purchase Order
Deployment
•Design Review
•PMO
•Hardware Acquisition
and Installation*
•Integration
•Service Provisioning
•User Roll-Out
•UAT
Management
(optional)
•Day to day user
management and
policy
administration
•Service Request
(Configuration, User
Account, Policies)
Support
•24/7 Service Desk
•24/7 Monitoring
•Incident Support
•Technical Escalation
•Faulty Hardware
Replacement
•Monthly Reporting
Termination
•Hardware Retrieval
•Service
Decommissioning
44. Sales Motion Plan
44
Customer Visit
Consultative Meetings
Introductory
Presentation
Budget, Timeline and
Needs Analysis
Services Proposal
Discussion
Demo/Trial/POC
Project Award and
Service Activation/
Provisioning
Joint effort in “Sell through” partnership
model
Editor's Notes
Selamat Siang Bapak2
Terima Kasih anda melunagkan waktu dengan kami pada siang hari ini
Nama Saya Sutedjo Tjahjadi, Saya adalah Managing Director dari Datacomm Cloud Business
Datacomm Cloud Business men-target kan pangsa pasar yang akan dibidik adalah SME - Kenapa Perusahaan Kecil dan Menengah?
Mari kita lihat pangsa pasarnya
- ada sekitar 700 ribu perusahaan di Indonesia dan mempunyai total pegawai hampir 10 juta orang
- bertumbuh 10-20% pertahuan
- total size of business hampir Rp. 30 trillion
SME adalah tulang pungung perekonomian bangsa Indonesia. Kalau kita bisa memberikan solusi yang tepat untuk 10 juta orang yang bekerja di segment ini, kita sudah memajukan taraf kesejahteraan bangsa ini!
Pada saat ini SME tidak bisa dan belum bisa untuk memanfaat kan teknology IT untuk advante mereka.
Yang sangat penting untuk dicatat adalah CARA SME mengkonsumsi dari IT adalah sangat berbeda dengan perusahaan yang besar lainnya.
This is the first page. You can change the text into anything that suit your need.
Cloud Computing :Advantages Advantages of Using Public Cloud Computing
Pay as you Pay only for the resource you use and for the duration you use. E.g. use You will pay only for the time you used a compute instance(server)
Scalability Instantly provision additional resources as required
Elasticity Provision or Release resources as per requirement which results in reduced costs Cloud providers are expected to have higher redundancies and
Availability resilient systems compared a typical self managed setup You are able to focus on your core business instead of wasting your
Maintenance time and energies in running IT You pay on usage basis and are not burdened with making large one
Opex Model time Capex investments.
Cloud Computing : Disadvantages Disadvantages of Using Public Cloud Computing You have reduced control of your IT systems and are completely
Control dependent on the service provider
Data Since the resources are shared among different entities in a public
security cloud , there are higher risks of breaches You may find it very tough and not cost effective to move from one
Lock in cloud provider to another if you are not satisfied with the services. Costs incurred over longer periods of time (say 3 or more years) may
Costs not be any less when compared to having IT systems in-house
This is the first page. You can change the text into anything that suit your need.
Slide ini diganti kenapa datacomm untuk citrix reseller