2. Company Overview
Datacomm Cloud Business
22
ABOUT
PT. Datacomm Diangraha business division focusing on Cloud
opportunity in Indonesia. Our philosophy are Enterprise, Secure
and Local.
PRODUCTS
Sentriciti – Security as a Service (SecaaS)
Cloudciti – Cloud Services (XaaS)
Datacomm Datacenter Federation
Datacomm Azure Stack
WHY US?
We are backed up by +28 years experiences and +500 people.
We have strong financial commitment, invested in it owns local
Data Center. We also certified by international standard: ISO
9001, ISO 27001 and ISO 20000.
4. Service Quality Standard
International Facility Certification
4
Infrastructure on cloud
o Compute: Virtual machines, Web sites & mobile services
o Data services: Storage, SQL databases
o Network services: Virtual private networks, load balancer
Local Support and Data center location
24x7 Help Desk Support Center
24x7 Network Support Center
24x7 Security Desk Support Center
Rated 3 Constructed
Facilities
by TIA-942
CERTIFIED
DCOS Maturity 4
by TIA-942
CERTIFIED
ISO 9001:2008
CERTIFIED
ISO 27001:2013
CERTIFIED
ISO 20000:2011
CERTIFIED
PCI-DSS
CERTIFIED
6. Software Architecture
Monolithic vs. Microservices
6
User Interface
Business Logic
Data Interface
Database
Source : https://www.sam-solutions.com/blog/microservices-vs-monolithic-real-business-examples/
User Interface
Microservice
MicroserviceMicroserviceMicroservice
Database Database Database Database
7. Software Architecture
In Memory Computing
7Source : https://www.techopedia.com/definition/28539/in-memory-computing
• The ability to cache countless amounts of data constantly.
This ensures extremely fast response times for searches.
• The ability to store session data, allowing for the
customization of live sessions and ensuring optimum
website performance.
• The ability to process events for improved complex event
processin
Some of the advantages of in-memory computing include :
10. Performance
Capacity to handle customers request with auto scale
10
The concept of scalability is desirable in technology as well as business settings. The base concept is
consistent – the ability for a business or technology to accept increased volume without impacting
the contribution margin
Source : https://linksource.com/2018/03/08/how-on-demand-scalability-can-scale-business/
Scale up Scale out
node node
node node
Distributed
Database
This is the first page. You can change the text into anything that suit your need.
Definition
Monolithic architecture is a software development pattern in which an application is created with a single codebase, a single build system, a single executable binary and multiple modules for business or technical features. Its components work together, share the same memory space and resources.
Definition
Microservices architecture is a collection of multiple loosely coupled services. It emerges from this definition that Microservices vs. monolithic architecture represents a single large mobile application divided into a set of small, independent services deployed in personal archives. When brought together, they use standard lightweight communication and work as a cohesive solution.
Definition
In-memory computing is the storage of information in the main random access memory (RAM) of dedicated servers rather than in complicated relational databases operating on comparatively slow disk drives. In-memory computing helps business customers, including retailers, banks and utilities, to quickly detect patterns, analyze massive data volumes on the fly, and perform their operations quickly.
Many technology companies are making use of this technology. For example, the in-memory computing technology developed by SAP, called High-Speed Analytical Appliance (HANA), uses a technique called sophisticated data compression to store data in the random access memory. HANA's performance is 10,000 times faster when compared to standard disks, which allows companies to analyze data in a matter of seconds instead of long hours.
Datacenter
Multiple Geographic Locations
Certification – Rated-3 TIA-942 & PCI-DSS
Operation Data Center – ISO 20000 & DCOS
High Capacity Connectivity to Local Internet
International Cloud Exchange Connectivity
Clean Internet Protection – DDoS Protection Service
Cyber Security Service optional protection
10 Reason why should company consider DR ?
Because you can’t afford downtime
Because your customers and prospects expect it
Because you spent a lot in building your brand, and you need to protect it
Because mother nature does not play favorites
Because machine breaks
Because we live in an always on world that requires always on capabilities
Because compliance and regulations require it
Because you can’t predict what data might be lost and the value it had for your company’s well being
Because it will save your money
Because we’re all human
DDoS
Distributed Denial of Service (DDoS) attacks have evolved into complex and sophisticated security challenge for all of us.
DDoS Protection Service by Datacomm provides organizations with comprehensive protection against the most challenging DDoS attacks, protecting their brand, customers and earning potential. With globally distributed cloud infrastructure prevents downtime on network assets, protects critical applications and ensures availability for domain resolution.
Monitoring
Information security monitoring plays an important role to provides your company’s actual information security condition and to guarantee the implementation of good information security practices
Sentriciti Secure Remote Monitoring (SRM) is a zero – near real-time detection services. 24/7 around-the-clock proactive security monitoring from Datacomm SOC. Security incident alert includes threat vector and landscape analysis, impact analysis and incident handling recommendation.
Benefit
Faster monitoring service enablement.
Fast and accurate security incident detection and effective recommendation.
Reduced security incident risk and impact.
Reduce human resources management hassles.
Proven process to complement customer’s existing process.
Key Feature
24/7 around the clock monitoring.
24/7 helpdesk.
ISO27001, ISO20001.
Global threat intelligence.
Staged and guaranteed SLA for alert.
Experienced and certified security professional (GIAC, ISACA, ISC^2).
Web-based user dashboard.
Ad-hoc and periodic reporting.
Pentest
To get a complete picture of your information security system condition enables you to improve the planning and development of your security posture. To help you conduct a thorough and objective information security assessment, Sentriciti Security Professional Service provides comprehensive vulnerability assessment and penetration testing service.
Base on Department of Defence (DOD) Directives 8570
OSCP (Offensive Security Certified Professional) *
CISSP (Certified Information Systems Security Professional)
CISM (Certified Information Security Manager)
CISA (Certified Information Systems Auditor)
GSEC (GIAC Security Essential Certification)
GCIH (GIAC Certified Incident Handler)
GCIA (GIAC Certified Intrusion Analyst)
GPEN (GIAC Penetration Tester Certification)
CNSE (Palo Alto Certified Network Security Engineer)
JNCIP-SEC (Juniper Networks Certified Internet Professional – Security)
Scalability in cloud computing means flexibility, enabling your business to better respond to needs as they arise. It’s a crucial factor in helping your business grow and succeed. More users, more bandwidth, more storage—what your infrastructure can handle today, may not work tomorrow.
One of the best aspects of the Cloud today is that it’s now affordable for businesses of any size. In fact, a scalable cloud solution can save money over the on-premise alternative because you only pay for what you need at any given moment. If it’s a low traffic day and server requests are minimal, you’re not paying the electrical and hardware costs