IT Audit & Consulting Service
Protect, Comply and Gain Insight
Why IT Audit & Consulting Service?
Providing Audit services according to ISO 27001, ISO 20000-1, PCI-DSS standards, and IT Management Audits in accordance with Financial Services Authority Regulations (POJK) and Bank Indonesia Regulations (PBI)
IT Consulting Service
Providing consulting services on the implementation of IT governance according to ISO standards, PCI-DSS and Information Technology Risk Management based on POJK
Why Jedi Solutions?
PCI DSS Certified
The Payment Card Industry Data Security Standard (PCI DSS) is a set of requirements intended to ensure that all companies that process, store, or transmit credit card information maintain a secure environment.
Hundreds of Certifications & Expertise
Deep technical expertise & knowledgeable professional team, backed by certifications in products & services.
ISO 27001:2022 Information Security Management System
ISO 27001:2022 is the international standard that sets out the specification for an information security management system (ISMS).
Robust Plan, Architecture, and Strategy
Provides wide array of IT Outsourcing and IT Management Services.
ISO 20000-1:2018 IT Service Management
ISO/IEC 20000-1:2018 is a service management system (SMS) standard that specifies requirements for the service provider to plan, establish, implement, operate, monitor, review, maintain and improve the SMS. The requirements include the design, transition, delivery and improvement of services to fulfil agreed service requirements. We are certified by International Standard to give you a peace of mind.
Jedi Care 24/7 Support & Monitoring
Our Jedi Care Team keep an eye on our customer's Network by 24/7 with Network Operations Center (NOC). It was the heartbeat of customer's entire network, running non-stop, and providing visibility of what was happening to keep services running and addressing any issues that arise. Our NOC (Network Operations Center) is always a phone call, or e-mail away to support you with new deployments, policy changes, configurations, and threat mitigation across locations.