Lintas Teknologi Solutions Day 2014 – ICT System Security
In a seminar entitled “Secure Your Services, Secure Your Revenue,” PT Lintas Teknologi Indonesia and its technology partners Juniper Networks, Palo Alto Networks, FireEye, ARBOR and Bluecat Networks supported the efforts of the Information and Communications Technology (ICT) industry to address internet crimes (cyber crimes). The seminar was held at Ritz Carlton Hotel in Jakarta, on 18 November 2014.
Management and professionals from Indonesian telecommunication providers such as Telkom Indonesia, Telkomsel, Indosat, XL Axiata, and Hutchinson 3 Indonesia as well as financial institutions received detailed information and also had the opportunity to consult with the experts to get suggestions about how to raise the level of their company’s network security.
Muhamad Paisol, President Director of PT Lintas Teknologi Indonesia, stated “We hope this seminar can be an occasion for companies providing public internet services to share information, insights, and experiences to raise the level of security in addressing cyber crimes”.
In the seminar an expert from PaloAlto Networks also shared information on the threat of malware called WireLurkerin attacking Mac OS and IOS systems used in the Apple desktop and mobile systems (IPhone).
According to security experts, the Seminar took a different approach by not only asking questions like: are the service provider networks and internet access secure enough? Can someone steal credit card or other sensitive information? What do we need to know about firewall, encryption, and authentication systems? Rather, the seminar also explored in depth several potential threats which can result from cyber crimes such as attacks and penetrations of computer and infrastructure networks, especiallyin the telecommunications industry and financial institutions. In order to increase revenue, a company must ensure the trust of its subscribers.
Muhamad Paisol explained “PT Lintas Teknologi Indonesia is a systems integrator with complete solutions and capabilities in infrastructure security systems and can be trusted as a partner to secure the network against cybercrime threats, both internal and external".