IBM BP Solution Submmit 2018

Tahun ini untuk kesekian kalinya PT. Perkom Indah Murni kembali berpartisipasi dalam event tahunan para business partner IBM yang berlangsung pada kamis 14 November 2018 di The Ritz Carlton Hotel Mega Kuningan, Jakarta. Bentuk partisipasi perkom dengan membuka booth dengan membawakan dua solusi IT yaitu IBM Spectrum Scale & Optimax Enterprise Security

WhatsApp Image 2018-11-14 at 09.35.01

WhatsApp Image 2018-11-14 at 09.35.16

WhatsApp Image 2018-11-14 at 09.35.32

WhatsApp Image 2018-11-27 at 14.11.13 (1)

OPTIMAX Enterprise Security

null

o
OptiMax Enterprise Security

We provide practical IT security services for your demand.

The security landscape changes constantly. IT infrastructure and security specialists struggle to access current information on network systems, operating systems, software versions, application usage and compliance drift on every PC, server, or anothers system across the enterprise. Without effective discovery, deployment and enforcement, the likelihood of a successful system attack grows exponentially. If you can’t see it, you can’t fix it.

PERKOM provides 1 (one) bundling solutions and services to help secure your entire environment, with the ability to start anywhere depending on business priorities. In addition, our key managed services include equipment, integrated, dashboards, reporting and functionality to secure any type of endpoint, network or environment, whether a smartphone, tablet, a PC, a Laptop or a server. Helps protect again malware and other threats, providing the knowledge, technology and services to make Your environment more safer, reliable and available.

Key Benefits
• Protect company assets, brand reputation and business continuity with 24×7 reliable monitoring and management
• Reduces in-house security costs
• Achieves security compliance with industry and government regulations
• Maximizes existing security investments and consultations
• Improve productivity by freeing IT resource to focus on strategic initiatives
• Reassures client, partners and Shareholder that critical data is protected by trusted resources
• 24/7 helpdesk support
• Operating Expenditure costs

Which option is right for you?

BlueShield
Endpoint Management & Security

• Provide PCs, Laptops and cloud apps
• OS Patching
• Third-party application patching
• Offline patching
• Comprehensive monthly reporting

RedShield
Mobile devices & Security

• Provide smartphone, tablets and cloud apps, enabled by cognitive insights with analytics
• Patch and update management
• Container app
• Identity management
• Expense management
• Policy recommendation engine
• Comprehensive monthly reporting

GreenShield
Secure B2B communication

• Cloud application based containers
• Web browser-based interface to upload/download files
• Advanced proxy security features
• Notifications
• Comprehensive monthly reporting

System Hardware Clinic 2018 – PERKOM & IBM

Jakarta, 14 September 2018 – IBM Office – The Plaza Tower- Jakarta

Perkom Indah Murni bekerjasama dengan IBM sebagai salah satu partner resminya, baru-baru ini pada tanggal 14 September 2018 Jam 09.00 – 12.00 WIB mengadakan Product Update bertemakan System Hardware Clinic yang bertempat di Demo Room, IBM Office Lt. 16 , The Plaza , Jalan MH. Thamrin no. 20 – 30 Jakarta. Seperti temanya dalam product update kali ini membahas terkait hardware dengan topik yang angkat yaitu IBM Power AI dan IBM Storage Flash System 9100. Pada product update kali ini para pemeterinya adalah team presales IBM yaitu Bapak Heru Suderajat yang membawakan tentang IBM Storage flash System 9100 dan Bapak Yudi Priyadi membawakan materi untuk IBM Power AI. Hadir dalam product update kali ini beberapa customer PT. Perkom yang sudah sejak lama telah menjalin kerjasama dalam bidang IT and Solution.
Setelah materi disampaikan oleh kedua pembicara tersebut, acara dilanjutkan dengan Focus Group Discussion (FGD), dimana para customer dipersilahknan untuk bertanya maupun sharing terkait issue-issue seputar IT baik yang sedang dialami dalam lingkungan perusahaannya maupun yang sedang menjadi tranding saat ini. Para Team Sales dan Presales IBM – Perkom yang juga turut hadir pada saat itu juga ikut serta dalam FGD tersebut sebagai bentuk dari salah satu pelayanan terbaik yang diberikan kepada para customer dalam menjawab setiap persoalan dalam bidang IT guna menemukan jawaban dam solusi yang tepat. Pembahasan kali ini menekankan dimana IBM Storage Flash System 9100 dan IBM Power AI bisa hadir sebagai bagian dari System Hardware yang mampu memberiakan solusi bagi perusahaan-perusahann diantaranya yang bergerak dibidang healthcare dan manufacturing
Mengapa memilih lokasi pelaksanaan di IBM Office? Alasannya yaitu selain karena membawakan product dari IBM, tujuan adalah peserta juga bisa diajak untuk secara langsung untuk melihat bentuk dan jenis dari IBM Power AI dan IBM Storage Flashsystem 9100 yang berada di Demo Room IBM tersebut. Acara ini ditutup dgn makan siang bersama antara para Customer dan Team Sales serta Presales Perkom – IBM yang hadir. Harapannya product update semacam ini kedepan bisa sering diadakan sehingga PT. Perkom dan juga IBM sebagai salah satu partnernya bisa lebih mengatahui dan memahami kebutuhan dari para customernya sehingga dapat memberikan solusi-solusi yang tepat dalam bidang IT.

Reach Your Best Performance with RAS Solution

Surabaya, 18 Mei 2017. Semua perusahaan membutuhkan sistem RAS yang dapat mengintegrasikan manufaktur, produksi, supply chain, dan bagian keuangan perusahaan. Sistem ini diperlukan untuk mencapai produktivitas, efisiensi, dan efektivitas dalam berbisnis, sehingga performa terbaik dapat tercapai. Melihat pentingnya sistem ini, PT Perkom Indah Murni menyelengarakan seminar setengah hari dengan tema “Reach Your Best Performance with RAS Solution”.

Sesi pertama membahas bagaimana perusahaan dapat memenangkan kompetisi dengan solusi yang terintegrasi. Perusahaan perlu memiliki sebuah sistem yang baik dan saling terintegrasi supaya informasi antar divisi dapat segera diakses saat dibutuhkan.

Dalam acara ini Perkom juga membicarakan mengenai inovasi dalam menyimpan data dan bagaimana mengakomodasi storage dalam perusahaan supaya berjalan dengan lebih cepat. Dengan solusi yang diberikan Perkom serta inovasi-inovasi yang ada, Perkom berharap perusahaan dapat memanfaatkan solusi ini untuk kemajuan sistem dalam perusahaan.

Improve Your Mobile Productivity with Business Apps

Jakarta, 30 Maret 2017. Mobilitas saat ini merupakan kesempatan yang sangat strategis bagi perusahan, dimana mobilitas berpotensi untuk membuat perusahaan lebih kompetitif, dengan membuat karyawan lebih produktif dalam bekerja atau saat berinteraksi dengan pelanggan melalui cara yang inovatif. Dengan perkembangan teknologi yang pesat saat ini, PT Perkom Indah Murni menyelenggarakan seminar setengah hari dengan tema “Improve Your Mobile Productivity with Business Apps”.

Acara dimulai dengan kata sambutan dari Bapak Hendry Pontoh selaku Solution and Marketing Director PT Perkom Indah Murni, dan dilanjutkan dengan sesi pertama yaitu Single Access Across All Devices yang dibawakan oleh Iptahul Palah selaku presales VMWare dari AVNET. Dalam sesi ini, VMWare Horizon dilihat dapat menjadi jawaban bagi perusahaan yang ingin bergerak kearah mobilitas. Perusahaan mendapatkan platform yang berorientasi pada pengguna dengan menggunakan berbagai aplikasi melalui berbagai perangkat pula.

Melihat kebutuhan lainnya yaitu mengenai solusi enterprise mobility, PT Perkom Indah Murni menyediakan pula layanan VMWare Airwatch yang juga dibawakan dalam seminar ini. Solusi VMWare Airwatch mencakup seluruh pengelolaan perangkat, sistem operasi dan keamanan, serta penggelaran perangkat mobile, seperti smartphone, tablet, notebook.

Dengan kelebihan serta manfaat yang dapat diperoleh dari VMWare Horizon dan AirWatch, Perkom berharap perusahaan dapat mendapat berbagai keuntungan dengan berbagai perangkat yang tersedia sehingga perusahaan dapat bekerja secara digitalll dan mobile namun tetap aman. Tak hanya itu, Perkom berharap perusahaan dapat membangun platform sehingga dapat bekerja secara mobile dan lebih efektif.

“Year End Dinner”

Jakarta, 20 Desember 2016. “Year End Dinner” merupakan acara tahunan yang diadakan PT Perkom Indah Murni. Acara ini diikuti oleh seluruh karyawan Perkom dari seluruh divisi.

Dibuka dengan kata sambutan oleh President Director PT Perkom Indah Murni yaitu Bapak Armin Tanuarto, diikuti dengan kata sambutan dari jajaran direktur lainnya, acara Year End Dinner ini pun dimulai. Acara ini dibuat sebagai bentuk apresiasi atas kerja keras setiap karyawan ditahun 2016.

Selain itu, lewat acara ini diharapkan dapat menambah kedekatan antar karyawan dari berbagai divisi. Tidak hanya karyawan merasa antusias, para pimpinan PT Perkom Indah Murni juga menikmati acara yang berlangsung.

Acara ini diselingi dengan nyanyian dari para pimpinan dan juga para karyawan juga mengisi acara dengan nyanyiannya. Tak hanya itu, Perkom juga memberikan berbagai doorprize menarik yang menambah kemeriahan acara ini.

bawah 2 bawah 1bawah 3

 

 

 

 

CTAP Threat Landscape Report: 1Q16 Global Update and Manufacturing Sector Spotlight

Introduction
Cyber criminals and other threat actors continue to move forward with new tricks and tools designed to gain access to networks and the valuable assets within. The threat landscape moves very quickly— making it difficult for security teams to keep up, let alone respond. In the period from January 1 to April 30, 2016, participants in the Fortinet Cyber Threat Assessment Program (CTAP) recorded over 41 million threat events and incidents, many of which managed to pass established perimeter security devices to reach our assessment units deployed behind them. In this version of Fortinet’s CTAP Threat Intelligence Report, we call out select developments within the global threat environment – across all industries – that we view as noteworthy compared to the annual report published last quarter. More importantly, we give special focus to threats facing companies in the manufacturing sector (an industry not specifically reported on previously), as well as the continued threat that ransomware poses to the manufacturing sector and beyond.

fortinet-perkomKey Findings

  • The majority of malware threats we see in live customer environments continue to depend on two key areas for delivery:
    malicious content delivered through web browsing, and through email attachments or links leading to malicious content. The
    largest portion of malware being seen at the moment is cryptomalware and ransomware.
  • Advertising content continues to be both a source of a significant amount of traffic passing across enterprise networks today,
    and has been shown to be a potential source of malware as third-party advertising networks are subverted or tricked into
    delivering malicious ads.
  • Fundamental Domain Name Server (DNS) infrastructure is increasingly under attack, primarily from Denial of Service (DoS)
    strategies.

Global, All Industry Update for 1Q16

As before, threats on networks come from many different sources, however Botnet activity continues to be a significant cause for concern for every vertical, as well as companies of every size. Botnet owners that use multiple methods to build their armies and campaigns in order to expand their footprint are seen on a regular basis. They typically communicate with malware which continues to be spread via two key vectors: email and web traffic. In many cases, affiliate networks among cybercriminal
organizations amplifies the impact of attacks.
That said, the bots and malware topping the chart often change as shown below.

Malware/Botnet Incidents

malware

It is important to note both the resurgence of ZeroAccess (which despite the best efforts of authorities to shut it down continues to pop up on top threat charts) and the newer H-Worm (or Houdini Worm) which is a newer delivery vehicle for Remote Access Trojans (RATs).

It’s presumed that masters of these large zombie networks continue to make substantial income. Perhaps more importantly is the inclusion of the CryptoWall botnet among the top 2 bots, reflecting the more recent rise in the past 12-18 months of ransomware. This newer business model continues to make headlines and spark debate about whether or not to pay the ransom. The prevalence of this and other delivery vehicles suggests that enough victims indeed pay, making this a lucrative (and thus likely to accelerate) business venture for cybercriminals (we take a closer look at ransomware in a dedicated section later
in the report).

Application Vulnerabilities

d

In regard to application vulnerabilities and exploit activity, whereas our previous report noted a continued targeting of established vulnerabilities like Shellshock and Heartbleed, in this quarter we see attempts to exploit newer vulnerabilities – namely the vulnerability announced late last year that exploits the way some Microsoft Server products use DNS. If you use a Microsoft Domain Name Server (or hosted service based on it), be on the lookout for denial of service attacks on this key piece of Internet infrastructure and consider alternate service providers for business continuity.

Application, Media and Social Media Categories

While there were definitely notable changes across the threat landscape as explored above, user behavior remained largely the same.

e

f

Industry Focus: Manufacturing

g

The #1 discrete attack we saw was the Necurs botnet. As discussed earlier, bots generate a lot of traffic and often top the list. However, it is still noteworthy to see just one top the chart. And it’s especially troubling given that this particular bot is known for rootkit and other more sophisticated and evasive behavior. It is not a great surprise, however, to see that attacks targeting manufacturing (and not seen on the global
list) seem to be designed for greater persistence within such intellectual property-rich environments. Ensuring a deeper level of inspection than the norm is particularly important in any information-rich sector. That said, looking at the remainder of the list in aggregate, we see an even greater incidence of downloaders (primarily new variants of the Nemucod malware)- that have been used for many months as vehicles to deliver cryptomalware and ransomware. Unfortunately, awareness and good security habits among end users in industrial networks are often poor: users continue to click on links and attachments in emails that lead to compromise. An errant click or install can bring a machine to a crippling halt, and perhaps interrupt the day-today operations of a company. This may be a harbinger of an expansion of ransomware beyond its initial healthcare-oriented targets. As such, we will discuss ransomware in more detail and this should be of particular concern to manufacturing organizations given the uptick in such attacks we have seen in this sector.

Manufacturing: Application Vulnerability Exploit Attempts

h

As we discussed in the global section, the top application exploit (at 45%) was aimed at the Microsoft DNS infrastructure, targeting a newer vulnerability. Looking closer at manufacturing we see that this sector in particular was hard hit by these types of attacks, well above the global average at 85%. Manufacturing organizations are encouraged to ensure appropriate countermeasures are in place, including basic DoS protection
and ideally an additional source for domain name resolution. And of course, exploits of older vulnerabilities continue. The Shellshock vulnerability appeared in late September, 2014. Bash is used by many systems. Attackers almost 18 months later continue to scan the Internet looking for unpatched machines to infect, all the more reason to ensure that all the machines in your infrastructure are quickly and rapidly patched. We also detected a large number of attempts to attack
Adobe ColdFusion servers in these environments. In many manufacturing environments where tools and technologies use web-based front ends to manage systems, it is not uncommon to see systems woefully out-of-date and unpatched.

Manufacturing: Application Usage

As you should expect in a manufacturing environment, we saw a significant amount of data being consumed for services and management-related functions. Compared to other verticals, where categories like Video/Audio and Social Media are significant consumers of bandwidth, usage of these categories in manufacturing is well below the average.

i

Lenovo Storage V3700 V2

Did you know?

Lenovo Storage V3700 V2 provides small and midsized organizations with the ability to consolidate and share data at an affordable price, while utilizing advanced software capabilities that often are found in more expensive systems.

Lenovo Storage V3700 V2 can be scaled up to 960 TB of raw storage capacity.

Features and benefits:

  • Modular storage with dual-active intelligent array node canisters with 8 GB or up to 16 GB (model dependent) cache per canister.
  • Scalable up to 120 LFF drives per system with the attachment of LFF expansion enclosures (12x LFF drives each) or
  • up to 240 SFF drives per system with the attachment of SFF expansion enclosures (24x SFF drives each) to satisfy growing needs for storage capacity and performance.
  • Flexibility in storing data on high-performance SAS SSDs, performance-optimized enterprise SAS HDDs, or capacity-optimized enterprise NL SAS HDDs
  • Mixing and matching drive types and form factors within a single system to perfectly meet performance and capacity requirements for various workloads.
  • Rich set of standard functions are available at no extra cost, including virtualized internal storage, thin provisioning, one-way data migration, and embedded GUI.
  • Optional licensed functions, including FlashCopy snapshots, Easy Tier, and Remote Mirroring.
  • Intuitive, web-based GUI for easy system set up and management.
  • Extensive interoperability with support for most major server platforms and operating systems.

13ada1

13ada2