ADHOC SERVICE

A. VULNERABILITY ASSESSMENT & PENETRATION TESTING (VAPT)
A vulnerability assessment is the process of
identifying and quantifying known security
vulnerabilities in an environment. It is a
surface-level evaluation of your information
security posture, indicating weaknesses as
well as providing the appropriate mitigation
procedures required to either eliminate those
weaknesses or reduce them to an acceptable
level of risk.
A penetration test simulates the actions of an
external and/or internal cyber attacker that
aims to breach the information security of the
organization. Using many tools and
techniques, the penetration tester attempts
to exploit critical systems and gain access to
sensitive data.

B. AUDIT & COMPLIANCE SERVICE
A comprehensive review of an organization's adherence to regulatory guidelines. Audit reports evaluate the strength and thoroughness of compliance preparations, security policies, user access controls and risk management procedures over the course of a compliance audi
C. RED TEAMING
A red team assessment is a goal-based
adversarial activity that requires a
big-picture, holistic view of the organization
from the perspective of an adversary. This
assessment process is designed to meet the
needs of complex organizations handling a
variety of sensitive assets through technical,
physical, or process-based means.
The purpose of conducting a red teaming
assessment is to demonstrate how real
world attackers can combine seemingly
unrelated exploits to achieve their goal.
D INCIDENT HANDLING & RESPONSE
Incident response. It is a set of technical activities done in order to analyze, detect, defend against, and respond to an incident. It is a part of the incident handling and incident management process. It is often used in synchrony with the term incident handling
E. SOURCE CODE REVIEW
Secure code review is a manual or automated process that examines an applicationʼs source code. The goal of this examination is to identify any existing security flaws or vulnerabilities.
F. ROBOTIC PROCESS AUTOMATIONS
Robotic process automation (RPA) is a software technology that makes it easy to build, deploy, and manage software robots that emulate humans actions interacting with digital systems and software.
G. BUG BOUNTY SERVICES
A bug bounty program, also called a vulnerability rewards program (VRP), is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs. Bug bounty programs are often initiated to supplement internal code audits and penetration tests as part of an organization's vulnerability management strategy.
H. SECURITY H MONITORING TEAM
Tjakrabirawa will provides Layer 1 2 or 3 Analyst to manned the existing client Security Operation Centre.
I. SECURITY CHAMPION DEVELOPMENT
Tjakrabirawa will train pool of security champion to help with the development and implementations of DevSecOps Culture in the client premises
J. TRAINING & SECURITY AWARENESS PROGRAM
Consult, Design, and Implementing Database Security to adhere with GDPR and future PDP regulations to provides a centralized location for documenting and managing the relevant aspects of the meta information pertaining to the personal information your organization collects both internally (e.g., from employees) and externally (e.g., from customers).
L. PASSWORDLESS AUTHENTICATIONS
Tjakrabirawa will provides you with Consultation, Design and Implementation of a multi-factor authentication that's passwordless, meaning you will be able to verify a userʼs identity without usernames, OTPs, SMS or typing of any kind.
M. ZERO TRUST
Tjakrabirawa will provides you with Consultation, Design and Implementation of a security framework requiring all users, whether in or outside the organizationʼs network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data.
FEELING
INSECURE?
CONTACT US
Address
PT. Tjakrabirawa Teknologi Indonesia Manhattan Square
Jalan TB Simatupang Kav 15 125489 Jakarta Selatan
Telephone
021 – 80641090
1StopCyberSolution
0821 – 1247 – 6992
info @tjakrabirawa.id
Web
www.tjakrabirawa.id