logo

NIT is Nusantara Inti Teknologi

Provider of Cyber Security solutions and services with headquarter in Jakarta, Indonesia.

hero img
VR
Sheild
Who We Are

About Our Company

Nusantara Inti Teknologi (NIT) is a provider of Cyber Security solutions and services with headquarter in Jakarta, Indonesia.

NIT provides comprehensive solutions that give customers a clear visibility and context over threats and severity of the threats, from network down to end points.

With advance threat monitoring and detection, NIT solutions will provide customers with a deep understanding of the situation and therefore potential harmful attachments can be isolated, threats can be detected in advance, and quick responses can be given. All within a timely manner.

We offer 3 key services; Security Operation Center (SOC) Platform, Managed Security Service Provider (MSSP), and Cyber Security Consulting.

We Offer 3 Key Services

Help protect your organization with Threat Intelligence Analysis, 24x7 Cyber Security Monitoring, and Incident Response Services

Security Operation Center (SOC) Platform

Platform to detect, analyze, and response to threats. Network traffic will be analyzed to detect threats. Any attachments will be checked and sent to sandbox if threats detected. The information is sent to analysis platform to determine the threats behavior and severity.

  In-depth analysis and investigation

Threat Map of real-time attack

Advance Threat Detection and track APT attack

 Threat Intelligence Feeds

 Integrated with Endpoint Security & EDR

More Details

Managed Security

Services Provider


  • 24X7 Security Monitoring and Alerting
  • We offer comprehensive visibility over threats, based on traffic analysis and end-point protection
  • Incident Reporting and Digital Forensic
  • Post-breached investigation

More Details

Cyber Security Consulting

A systematic review of security weaknesses in an information system. It evaluates if the system is susceptible to any known vulnerabilities, assign severity levels to those vulnerabilities, and recommends remediation or mitigation, if and whenever needed.

  • Vulnerability Assessment and Penetration Testing
  • A systematic review of security weaknesses in an information system. It evaluates if the system is susceptible to any known vulnerabilities, assign severity levels to those vulnerabilities, and recommends remediation or mitigation, if and whenever needed. The vulnerability assessment is often paired with penetration testing method, where simulated cyber attack against computer system is conducted to check for exploitable vulnerabilities. Insights provided by penetration testing can be used to improve the security postures and policies of the computer systems

More Details

Services We Provide

Credibly grow premier ideas rather than bricks-and-clicks strategic theme areas distributed for stand-alone web-readiness.

,
service icon

Apt Detection and Response Platform

Platform to detect, analyze, and response to threats.

service icon

Security Operation Platform

Platform to detect, analyze, and response to threats. Network traffic will be analyzed to detect threats.

service icon

End Point Security

Protect end-points from virus and malwares, and provides control access to resources (shared data, printers, servers, etc)

service icon

Hardware Security

Developed to prevent unauthorized access to protected hardware resources

service icon

24X7 Security Monitoring and Alerting

Offers comprehensive visibility over threats, based on traffic analysis and end-point protection

service icon

Vulnerability Assessment and Penetration Testing

Offers comprehensive visibility over threats, based on traffic analysis and end-point protection