Reach Your Best Performance with RAS Solution

Surabaya, 18 Mei 2017. Semua perusahaan membutuhkan sistem RAS yang dapat mengintegrasikan manufaktur, produksi, supply chain, dan bagian keuangan perusahaan. Sistem ini diperlukan untuk mencapai produktivitas, efisiensi, dan efektivitas dalam berbisnis, sehingga performa terbaik dapat tercapai. Melihat pentingnya sistem ini, PT Perkom Indah Murni menyelengarakan seminar setengah hari dengan tema “Reach Your Best Performance with RAS Solution”.

Sesi pertama membahas bagaimana perusahaan dapat memenangkan kompetisi dengan solusi yang terintegrasi. Perusahaan perlu memiliki sebuah sistem yang baik dan saling terintegrasi supaya informasi antar divisi dapat segera diakses saat dibutuhkan.

Dalam acara ini Perkom juga membicarakan mengenai inovasi dalam menyimpan data dan bagaimana mengakomodasi storage dalam perusahaan supaya berjalan dengan lebih cepat. Dengan solusi yang diberikan Perkom serta inovasi-inovasi yang ada, Perkom berharap perusahaan dapat memanfaatkan solusi ini untuk kemajuan sistem dalam perusahaan.

Improve Your Mobile Productivity with Business Apps

Jakarta, 30 Maret 2017. Mobilitas saat ini merupakan kesempatan yang sangat strategis bagi perusahan, dimana mobilitas berpotensi untuk membuat perusahaan lebih kompetitif, dengan membuat karyawan lebih produktif dalam bekerja atau saat berinteraksi dengan pelanggan melalui cara yang inovatif. Dengan perkembangan teknologi yang pesat saat ini, PT Perkom Indah Murni menyelenggarakan seminar setengah hari dengan tema “Improve Your Mobile Productivity with Business Apps”.

Acara dimulai dengan kata sambutan dari Bapak Hendry Pontoh selaku Solution and Marketing Director PT Perkom Indah Murni, dan dilanjutkan dengan sesi pertama yaitu Single Access Across All Devices yang dibawakan oleh Iptahul Palah selaku presales VMWare dari AVNET. Dalam sesi ini, VMWare Horizon dilihat dapat menjadi jawaban bagi perusahaan yang ingin bergerak kearah mobilitas. Perusahaan mendapatkan platform yang berorientasi pada pengguna dengan menggunakan berbagai aplikasi melalui berbagai perangkat pula.

Melihat kebutuhan lainnya yaitu mengenai solusi enterprise mobility, PT Perkom Indah Murni menyediakan pula layanan VMWare Airwatch yang juga dibawakan dalam seminar ini. Solusi VMWare Airwatch mencakup seluruh pengelolaan perangkat, sistem operasi dan keamanan, serta penggelaran perangkat mobile, seperti smartphone, tablet, notebook.

Dengan kelebihan serta manfaat yang dapat diperoleh dari VMWare Horizon dan AirWatch, Perkom berharap perusahaan dapat mendapat berbagai keuntungan dengan berbagai perangkat yang tersedia sehingga perusahaan dapat bekerja secara digitalll dan mobile namun tetap aman. Tak hanya itu, Perkom berharap perusahaan dapat membangun platform sehingga dapat bekerja secara mobile dan lebih efektif.

“Year End Dinner”

Jakarta, 20 Desember 2016. “Year End Dinner” merupakan acara tahunan yang diadakan PT Perkom Indah Murni. Acara ini diikuti oleh seluruh karyawan Perkom dari seluruh divisi.

Dibuka dengan kata sambutan oleh President Director PT Perkom Indah Murni yaitu Bapak Armin Tanuarto, diikuti dengan kata sambutan dari jajaran direktur lainnya, acara Year End Dinner ini pun dimulai. Acara ini dibuat sebagai bentuk apresiasi atas kerja keras setiap karyawan ditahun 2016.

Selain itu, lewat acara ini diharapkan dapat menambah kedekatan antar karyawan dari berbagai divisi. Tidak hanya karyawan merasa antusias, para pimpinan PT Perkom Indah Murni juga menikmati acara yang berlangsung.

Acara ini diselingi dengan nyanyian dari para pimpinan dan juga para karyawan juga mengisi acara dengan nyanyiannya. Tak hanya itu, Perkom juga memberikan berbagai doorprize menarik yang menambah kemeriahan acara ini.

bawah 2 bawah 1bawah 3





CTAP Threat Landscape Report: 1Q16 Global Update and Manufacturing Sector Spotlight

Cyber criminals and other threat actors continue to move forward with new tricks and tools designed to gain access to networks and the valuable assets within. The threat landscape moves very quickly— making it difficult for security teams to keep up, let alone respond. In the period from January 1 to April 30, 2016, participants in the Fortinet Cyber Threat Assessment Program (CTAP) recorded over 41 million threat events and incidents, many of which managed to pass established perimeter security devices to reach our assessment units deployed behind them. In this version of Fortinet’s CTAP Threat Intelligence Report, we call out select developments within the global threat environment – across all industries – that we view as noteworthy compared to the annual report published last quarter. More importantly, we give special focus to threats facing companies in the manufacturing sector (an industry not specifically reported on previously), as well as the continued threat that ransomware poses to the manufacturing sector and beyond.

fortinet-perkomKey Findings

  • The majority of malware threats we see in live customer environments continue to depend on two key areas for delivery:
    malicious content delivered through web browsing, and through email attachments or links leading to malicious content. The
    largest portion of malware being seen at the moment is cryptomalware and ransomware.
  • Advertising content continues to be both a source of a significant amount of traffic passing across enterprise networks today,
    and has been shown to be a potential source of malware as third-party advertising networks are subverted or tricked into
    delivering malicious ads.
  • Fundamental Domain Name Server (DNS) infrastructure is increasingly under attack, primarily from Denial of Service (DoS)

Global, All Industry Update for 1Q16

As before, threats on networks come from many different sources, however Botnet activity continues to be a significant cause for concern for every vertical, as well as companies of every size. Botnet owners that use multiple methods to build their armies and campaigns in order to expand their footprint are seen on a regular basis. They typically communicate with malware which continues to be spread via two key vectors: email and web traffic. In many cases, affiliate networks among cybercriminal
organizations amplifies the impact of attacks.
That said, the bots and malware topping the chart often change as shown below.

Malware/Botnet Incidents


It is important to note both the resurgence of ZeroAccess (which despite the best efforts of authorities to shut it down continues to pop up on top threat charts) and the newer H-Worm (or Houdini Worm) which is a newer delivery vehicle for Remote Access Trojans (RATs).

It’s presumed that masters of these large zombie networks continue to make substantial income. Perhaps more importantly is the inclusion of the CryptoWall botnet among the top 2 bots, reflecting the more recent rise in the past 12-18 months of ransomware. This newer business model continues to make headlines and spark debate about whether or not to pay the ransom. The prevalence of this and other delivery vehicles suggests that enough victims indeed pay, making this a lucrative (and thus likely to accelerate) business venture for cybercriminals (we take a closer look at ransomware in a dedicated section later
in the report).

Application Vulnerabilities


In regard to application vulnerabilities and exploit activity, whereas our previous report noted a continued targeting of established vulnerabilities like Shellshock and Heartbleed, in this quarter we see attempts to exploit newer vulnerabilities – namely the vulnerability announced late last year that exploits the way some Microsoft Server products use DNS. If you use a Microsoft Domain Name Server (or hosted service based on it), be on the lookout for denial of service attacks on this key piece of Internet infrastructure and consider alternate service providers for business continuity.

Application, Media and Social Media Categories

While there were definitely notable changes across the threat landscape as explored above, user behavior remained largely the same.



Industry Focus: Manufacturing


The #1 discrete attack we saw was the Necurs botnet. As discussed earlier, bots generate a lot of traffic and often top the list. However, it is still noteworthy to see just one top the chart. And it’s especially troubling given that this particular bot is known for rootkit and other more sophisticated and evasive behavior. It is not a great surprise, however, to see that attacks targeting manufacturing (and not seen on the global
list) seem to be designed for greater persistence within such intellectual property-rich environments. Ensuring a deeper level of inspection than the norm is particularly important in any information-rich sector. That said, looking at the remainder of the list in aggregate, we see an even greater incidence of downloaders (primarily new variants of the Nemucod malware)- that have been used for many months as vehicles to deliver cryptomalware and ransomware. Unfortunately, awareness and good security habits among end users in industrial networks are often poor: users continue to click on links and attachments in emails that lead to compromise. An errant click or install can bring a machine to a crippling halt, and perhaps interrupt the day-today operations of a company. This may be a harbinger of an expansion of ransomware beyond its initial healthcare-oriented targets. As such, we will discuss ransomware in more detail and this should be of particular concern to manufacturing organizations given the uptick in such attacks we have seen in this sector.

Manufacturing: Application Vulnerability Exploit Attempts


As we discussed in the global section, the top application exploit (at 45%) was aimed at the Microsoft DNS infrastructure, targeting a newer vulnerability. Looking closer at manufacturing we see that this sector in particular was hard hit by these types of attacks, well above the global average at 85%. Manufacturing organizations are encouraged to ensure appropriate countermeasures are in place, including basic DoS protection
and ideally an additional source for domain name resolution. And of course, exploits of older vulnerabilities continue. The Shellshock vulnerability appeared in late September, 2014. Bash is used by many systems. Attackers almost 18 months later continue to scan the Internet looking for unpatched machines to infect, all the more reason to ensure that all the machines in your infrastructure are quickly and rapidly patched. We also detected a large number of attempts to attack
Adobe ColdFusion servers in these environments. In many manufacturing environments where tools and technologies use web-based front ends to manage systems, it is not uncommon to see systems woefully out-of-date and unpatched.

Manufacturing: Application Usage

As you should expect in a manufacturing environment, we saw a significant amount of data being consumed for services and management-related functions. Compared to other verticals, where categories like Video/Audio and Social Media are significant consumers of bandwidth, usage of these categories in manufacturing is well below the average.


Lenovo Storage V3700 V2

Did you know?

Lenovo Storage V3700 V2 provides small and midsized organizations with the ability to consolidate and share data at an affordable price, while utilizing advanced software capabilities that often are found in more expensive systems.

Lenovo Storage V3700 V2 can be scaled up to 960 TB of raw storage capacity.

Features and benefits:

  • Modular storage with dual-active intelligent array node canisters with 8 GB or up to 16 GB (model dependent) cache per canister.
  • Scalable up to 120 LFF drives per system with the attachment of LFF expansion enclosures (12x LFF drives each) or
  • up to 240 SFF drives per system with the attachment of SFF expansion enclosures (24x SFF drives each) to satisfy growing needs for storage capacity and performance.
  • Flexibility in storing data on high-performance SAS SSDs, performance-optimized enterprise SAS HDDs, or capacity-optimized enterprise NL SAS HDDs
  • Mixing and matching drive types and form factors within a single system to perfectly meet performance and capacity requirements for various workloads.
  • Rich set of standard functions are available at no extra cost, including virtualized internal storage, thin provisioning, one-way data migration, and embedded GUI.
  • Optional licensed functions, including FlashCopy snapshots, Easy Tier, and Remote Mirroring.
  • Intuitive, web-based GUI for easy system set up and management.
  • Extensive interoperability with support for most major server platforms and operating systems.



Dynamic AX 2012: Production

Minimize lead times, fulfill customer demand, and manage your
resources to get great efficiency from your discrete, process, and
lean manufacturing operations. Use real-time data to track
production progress, get more accurate delivery dates, and
reduce costs. Execute multiple production strategies, including
configure-to-order, assemble-to-order, make-to-stock, and
make-to-order. Use both push and pull production control



Fortinet Announces Acquisition of AccelOps

SUNNYVALE, Calif. – June 7, 2016 –

Ken Xie, founder, chairman of the board and chief executive officer, Fortinet

“Sixty-percent of all security breaches result in stolen data starting within minutes of the breach and go undetected due to ineffective threat monitoring and security event correlation. In addition, the lack of a holistic view across organizations’ entire distributed, multi-vendor networks and the growing quantity and complexity of threat information create big-data security challenges. With the acquisition of AccelOps, Fortinet extends its Security Fabric to address these challenges by combining security and compliance monitoring with advanced analytics for multi-vendor security solutions, enabling automated and actionable security intelligence from IoT to the cloud.”

Fortinet (NASDAQ: FTNT),the global leader in high-performance cyber security solutions, today announced its acquisition of AccelOps, a leading provider of network security monitoring and analytics solutions. The acquisition further extends Fortinet’s recently announced Security Fabric strategy by enhancing network security visibility, security data analytics and threat intelligence across multi-vendor solutions.

  • AccelOps solutions will become FortiSIEM and become part of the Fortinet Security Fabric.  This will provide customers with greater visibility across both Fortinet and multi-vendor security solutions, thereby enabling more comprehensive end-to-end network segmentation strategies, from IoT to cloud. Security correlation and analytics results will feed directly into the Security Fabric allowing automated threat prevention.
  • Next Generation Security Information and Event Management, or Next Gen SIEM, capabilities from AccelOps coupled with FortiGuard Labs global threat intelligence and third-party threat feeds will be integrated into the Fortinet Security Fabric. Enterprises will benefit from prioritized, coordinated responses and actionable threat intelligence across the distributed network on a subscription basis.
  • AccelOps’s Security Operations Center (SoC) and Network Operations Center (NoC) capabilities will power Managed Security Service Providers (MSSPs) and Fortinet Support Services, including a new subscription service called FortiCare 360° Support. This new service will provide customers with automated security and performance audits of their specific security infrastructure and advisories to help prevent unplanned service disruptions as well as prevent problems before they impact performance and service delivery.
  • AccelOps currently serves hundreds of clients across numerous vertical industries, including a strong presence in the Enterprise, Government, and Managed Service Provider segments. This acquisition builds on Fortinet’s already significant and growing total addressable market, with entry into the $2 billion SIEM market, which Gartner projects to grow to $2.9 billion by 2019.

Partha Bhattacharya, founder and chief technology officer, AccelOps

“Fortinet and AccelOps share a common vision of providing holistic, actionable security intelligence across the entire IT infrastructure. Our mission has always been to help our customers make security and compliance management as effortless and effective as possible. The synergies between AccelOps’s solutions and Fortinet’s Security Fabric vision and thought leadership will ensure that our customers are protected with the most scalable and proven global threat intelligence, security and performance analytics and compliance and control across all types of network environments with multiple security and networking vendor products.”

Additional Resources

The acquisition is complete and effective immediately. Fortinet does not expect the transaction to have a material impact on the Company’s second quarter or full year 2016 financial guidance disclosed on April 26, 2016.  Certain additional financial terms are disclosed in a supplemental Form 8-K filing, which can be accessed at:

About AccelOps

AccelOps is the leading provider of scalable network security monitoring and analytics solutions.  AccelOps has fundamentally changed the way organizations identify, prevent and manage threats, unifying network security monitoring and network performance analytics by providing unprecedented insight into the network. AccelOps’s virtual appliance software monitors security, performance and compliance in local and virtualized infrastructures, resulting in a unified view of the environment. The software seamlessly discovers, analyzes and automates IT issues across multi-tenant or single networks, spanning servers, devices, storage, networks, security, applications and users.

About Fortinet

Fortinet (NASDAQ: FTNT) secures the largest enterprise, service provider, and government organizations around the world. Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface and the power to take on ever-increasing performance requirements of the borderless network – today and into the future. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud or mobile environments. More than 270,000 customers worldwide trust Fortinet to protect their businesses. Learn more at, the Fortinet Blog, or FortiGuard Labs.

Perkom – Managed Services

Perkom IT Managed Services program provides affordable proactive IT management and support to growing businesses. Utilizing our unique framework for providing managed IT services, Perkom IT Managed Services provides a range of proactive services to keep your computer systems up and running and your people and business productive. Our goal is to serve as your technology partner with a focus on providing solutions. We use a consultative approach to evaluate your business and technology needs and then advise on the best solutions for your current and future needs. Perkom  can save your organization time and money through better use of appropriate technologies.

We understand that companies with a dependency on their IT infrastructure need a reliable backup in case of emergencies. We also know that disaster recovery is a bit different from a business continuity plan. We’re here to provide information on both. We have a lot of resources that can help your organization come up with a comprehensive disaster recovery plan. We provide industry insights and opinions that will not only prepare your business and IT infrastructure from disasters, but also keep your operations going.

With traditional DR, the DR site has to be in lock step with the primary site. This means the server on the DR site has exactly the same configuration, BIOS, drivers, etc., as the physical server you are trying to recover at the production site. This is difficult to do unless you buy both servers at exactly the same time. And even if you do, configuration drift is natural, as any change in primary site needs to be a mirror image to the other. Failure to keep this perfect lock-step greatly increases the chance of an outage. With DRaaS, the differences between the primary and secondary site can be abstracted (via technologies like converged infrastructure) and so you can be freed from the synchronization handcuffs.

Disaster Recovery as A Service?

Disaster recovery as a service (DRaaS) is particularly interesting as it helps IT address many of its biggest challenges. When a disaster strikes, it is clear that there are serious repercussions to the business. In addition, there could be temporary or even permanent loss of critical data. Offsite, comprehensive and regular data back-ups are usually the first step in an IT continuity plan, but in today’s 24×7 business world, protecting against data loss is not good enough.

Disaster recovery

Why need DRaaS?


What Benefit of Having a DR

Our DRaaS Managed Services?

Our DRaaS Managed Services

our process