Who We Are
About Our Company
Nusantara Inti Teknologi (NIT) is a provider of Cyber Security solutions and services with headquarter in Jakarta, Indonesia.
NIT provides comprehensive solutions that give customers a clear visibility and context over threats and severity of the threats, from network down to end points.
With advance threat monitoring and detection, NIT solutions will provide customers with a deep understanding of the situation and therefore potential harmful attachments can be isolated, threats can be detected in advance, and quick responses can be given. All within a timely manner.
We offer 3 key services; Security Operation Center (SOC) Platform, Managed Security Service Provider (MSSP), and Cyber Security Consulting.
We Offer 3 Key Services
Help protect your organization with Threat Intelligence Analysis, 24x7 Cyber Security Monitoring, and Incident Response Services
Security Operation Center (SOC) Platform
Platform to detect, analyze, and response to threats. Network traffic will be analyzed to detect threats. Any attachments will be checked and sent to sandbox if threats detected. The information is sent to analysis platform to determine the threats behavior and severity.
In-depth analysis and investigation
Threat Map of real-time attack
Advance Threat Detection and track APT attack
Threat Intelligence Feeds
Integrated with Endpoint Security & EDR
- 24X7 Security Monitoring and Alerting
- We offer comprehensive visibility over threats, based
on traffic analysis and end-point protection
- Incident Reporting and Digital Forensic
- Post-breached investigation
Cyber Security Consulting
A systematic review of security weaknesses in an information system. It evaluates if the system is susceptible to any known vulnerabilities, assign severity levels to those vulnerabilities, and recommends remediation or mitigation, if and whenever needed.
- Vulnerability Assessment and Penetration Testing
- A systematic review of security
weaknesses in an information system.
It evaluates if the system is susceptible to any known vulnerabilities,
assign severity levels to those vulnerabilities, and recommends remediation
or mitigation, if and whenever
The vulnerability assessment is
often paired with penetration testing
method, where simulated cyber
attack against computer system is
conducted to check for exploitable
vulnerabilities. Insights provided by
penetration testing can be used to
improve the security postures and
policies of the computer systems