Home About Us Services and Solution The Pillars Partners Clients Contact Us



IT Infrastructure consists of networking infrastructures and itemss supporting components to provide baseline infrastructure for application systems.


1. Network Infrastructure

  • Routers

  • Switches

  • Wireless System

  • Transceivers

  • Network Management Software (NMS)


2. Cabling and Accessories

  • Patch Panels and Patch Cords

  • Cabling (UTP, Fiber Optics, etc)

  • Trunking system


3. Network Security

  • Firewalls

  • Intrusion Detection and Prevention Systems

  • Unified Threat Management



Data Center is a facility used to house your computer systems and associated components such as application systems and storage systems. It generally includes redundant or backup power supplies, redundant data communications connections, environmental controls (e.g., air conditioning, fire suppression) and security devices. It is could be very complex which includes lots of components that we will handle and provide it for you at your satisfaction based on best practices. Our solutions on Data Center are divided into three categories and its components are mentioned below.


1. Data Center Infrastructure

  • Servers Systems (tower, rackmount, and blade systems)

  • Storage Systems (SAN and NAS)

  • Air Conditioning

  • Back Up Power and Power Distribution Systems

  • Raised Floor System

  • Fire Protection Systems

  • Surveillence Systems

  • Access Control System


2. Disaster Recovery Planning

The focus of a Disaster Recovery Plan (DRP) is to restore the operability of systems that support mission-critical and critical business processes. The objective is for the organization to return to normal operations as soon as possible. Since many mission-critical and critical business processes depend on a technology infrastructure consisting of applications, data, and IT hardware, the DRP should be an IT focused plan. Every organization should develop a Disaster Recovery Plan for all applications. The overall IT Disaster Recovery Planning process is common to all IT systems and utilizes the following seven steps:


1. Develop the Business Contingency Planning Policy and Business Process Priorities

2. Conduct a Risk Assessment

3. Conduct the Business Impact Analysis (BIA)

4. Develop Business Continuity and Recovery Strategies

5. Develop Business Continuity Plans

6. Conduct awareness, testing, and training of the DRP

7. Conduct Disaster Recovery Plan maintenance and exercise



3. Disaster Recovery Center

Disaster Recovery Center (DRC) is a facility in an organization that has function to take over the functions of a unit when there is a serious disorder that afflicts one or several units in the company's important work, such as central storage and processing of data and information. A good example can be described is when disaster occured on World Trade Center (WTC) but can still operate (soon recovered its operations in quick time), because they have been preparing a number of DRC to anticipate the disaster that is not desired.

In general, the Disaster Recovery Center (DRC) serve to minimize losses in the face of financial and nonfinancial business turmoil or natural disasters include:

1. Physical: computer, real money

2. Important data such as company information

3. Trust and good name

4. Human

5. Improving the safety of personnel, suppliers, investors and customers

Disaster Recovery Center (DRC) is required by the company to overcome the impact of the disaster that may occur. Required an extensive planning process to implement effective and efficient DRC. Plans are prepared not only covers the activities of data processing, but includes all aspects of operating outside the data processing. The plan should include procedures that have been tested to ensure the success of the recovery process when the disaster actually occurred. Plans are already made and documented in written form.


4. Data Center Security

This solution is related to the handling of data security in data center environments that may be due to:

1. parties who attempt unauthorized access to data, either by penetrating from the outside (Internet) or from inside (intranet)

2. virus attacks, malware, worms, and others.

3. Other factors that could cause data corruption (corrupted data)





1. Data Center Services


Server Monitoring and Management

We help you to monitor and manage your servers on Data Center. Your servers may include any applications such as database, web, mail, DNS or any other servers.

Network Monitoring and Management

We constantly monitor your network for slow or failing components. We also manage the network in case of outages via email, pager, SMS, or any other alerts.


2. Security Services

Our security services include monitoring and managing intrusion detection systems and firewalls, overseeing patch management and upgrades, performing security assessments and security audits, and also responding to emergencies.


3. Application Services

Application Monitoring and Management

We help you to monitor and manage the database and underlying infrastructure to support the application service. Also we improve performance and reduce downtime or critical applications to meet business expectations.




Business Intelligence aims to support better business decision making. In order to achieve that, we can help you to build your Business Intelligence system such as reporting, analytics, data mining. With more than 15 years industry expertise, combined with our deep technical strength across the entire IBM Analytics software portfolio, allows us to deliver best-in-class industry focused product and solutions such as :
a. IBM Cognos TM1 for Budgeting and Planning Solutions
b. IBM Cognos Controller for financial consolidation