Tuesday, September 27, 2011

Four Steps in Securing Assets Indonet Information Technology Company


For companies, the security of information technology assets that become the backbone of the company's operations such as computers, the Internet, and email infrastructure, should become a very important thing. Unfortunately, many companies still neglect in securing those assets. For example, does not protect the computer with the most updated antivirus, allowing employees to install any program on your office computer, or let the office network open without protection from hackers (hackers).

In fact, not careful this could potentially bring huge losses to the company, because of threats against the company may come from outside or from within the company itself. External threats such as emails containing malware or hackers who damage systems or steal data. From within, for example the threat can come from viruses that do not accidentally clicked on the flash and then spread on the office network. Or worse, there are unscrupulous people who deliberately leaked confidential company data.

If something bad had happened, the loss will most experienced companies, such as loss of inhibition of office operations, financial loss directly or indirectly, even the loss of good name of the company. Clearly, better performing measures comprehensive security protection before an attack.

PT IndoInternet (Indonet), the first Internet service provider in Indonesia that has been transformed into a business enabler in the information technology, has a solution for companies to deal with this problem. There are four steps in the form of products and services owned by Indonet to help companies protect information technology assets from threats from outside or from within.


The first product is a Desktop Management (DM), which protects users directly via a computer that is used everyday. DM protects enterprise computers from viruses, hackers or malware attacks with a firewall, and restrict what applications can be run by employees. Moreover, the DM can limit any storage media that can be used in the computer, thereby reducing the risk of corporate data loss via coffee flash or via CD. One company that has used this service at 36 get 20 thousand computer files have been quarantined because it contains a virus!

The second product is the Network Access Management (NAM), which provides broader protection on the company's computer network. NAM can prevent hackers or malicious applications (spyware, malware) in action. NAM can also be used to regulate Internet activities in the enterprise network, for example, set up websites anything that can be accessed during office hours. In addition, the NAM can also set any device that can connect to corporate networks.

The third product is the Email Management Service (EMS), which protects the company's day-to-day communication is email. EMS is a service that manages all company email Indonet's Data Center. In EMS, the emails received are free of viruses and spam, because it is handled on the server first. Companies that use EMS do not need to invest too expensive to own their own mail server or hiring IT staff to address corporate email, because Indonet provide technical support 24 / 7.

The fourth product is the Network Video Monitoring (NVM) which provides physical protection by monitoring through CCTV cameras. The recorded video will be uploaded to the server periodically, so it can be viewed via the Internet, do not necessarily have to come to a certain place. In addition, the video will be split into a shorter duration to facilitate the search for the video when something happens. Using the NVM, the company does not need to invest costly to purchase a variety of devices, because the device is provided by Indonet NVM.

All four settings such services be centralized in Indonet, but can be customized with company policy. This makes the companies do not bother to spend precious resources to secure corporate assets. In the presence Indonet as a business enabler of your company, your company masihkah ignore security backbone of the company, namely information technology assets?

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.