ISIDA is your best partner for enterprise risk management to secure future and sustainability by achieving business resilience continuity
ISIDA present because of market demand and our founder background, vision, mission, and dream
ISIDA started the consulting services such as Internal Audit and Fraud Investigation
ISIDA expanded the consulting services in the scope of Cybersecurity and Digital Forensic
ISIDA started the enterprise software products inclusively business intelligence and consolidation financial reporting software to help our clients operate the business effectively
ISIDA is going to be the first choice to lead enterprise risk management
Your security credential is very important so we will not display the names and profiles of client companies in our website especially for cybersecurity and digital forensic projects
The documents and information we get as long as the work with the client will be given back to the client. After the assignment from the client ends, we ensure the client's documents and information are deleted in the work tools used so that no client documents and information are revealed to the public.
We have manpower with some international certification such as Certified Fraud Examiner (CFE), Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), Computer Hacking Forensic Investigator (CHFI), EnCase Certified Examiner (EnCe), Certified Information Systems Auditors (CISA), etc. Our manpower have many experiences in the scope of your needs.
We are involved in some national and international communities in order to develop our knowledge and skill fulfilling the world conditions and needs
We are integrated with a law firm that maintains and is responsible for documents of evidence from work in accordance with applicable legal regulations if needed
ERP is usually referred to as a category of business management software typically a suite of integrated applications that an organization can use to collect, store, manage, and interpret data from many business activities.
Business Intelligence technologies can handle large amounts of structured and sometimes unstructured data to help identify, develop, and otherwise create new strategic business opportunities
the context of financial accounting, consolidation refers to the aggregation of financial statements of a group company as consolidated financial statements
A Human Resources management system or human resources information system or human capital management is a form of human resources software that combines a number of systems and processes to ensure the easy management of human resources, business processes and data.
We perform secure code review to review of an application's source code in an attempt to identify security-related weaknesses (flaws) in the code.
We perform penetration testing to your server (data center and data recovery center) environment to identify vulnerabilities and threat actors
We perform penetration testing to your web application to identify vulnerabilities, threat actors, and control weakness
We perform penetration testing to your mobile application to identify vulnerabilities, threat actors, and control weakness
We perform audit for all configuration implemented in your host (server and network) to identify vulnerabilities, control weakness, and misconfiguration
We perform cybersecurity awareness training for your company to increase the awareness to achieve cybersecurity resilience. Our service is to include phishing simulation program for your employee
We perform storage forensic include cloud to acquire, recover, analyze and triage data from your storage devices. The acquired data to present evidence which needed by your company.
We perform smartphone forensic to acquire, recover, analyze and triage data from your mobile devices such as Android and iOS phone. The acquired data includes communications, contacts, messages, media files, locations, and Apps, etc.
We perform email forensics to analyze the source and content of emails as an evidence related with crimes and/or incidents involving various approaches.
the volatile data in a computer’s memory dump in order to investigate and identify attacks or malicious behaviors that do not leave easily detectable tracks on hard drive data
We perform Operating System (OS) forensic to retrieve useful information from the OS of the computer or mobile device in order to collect information in the empirical evidence acquired with a roadmap to data on the hard disk and how hard drive stores data
We perform network forensic to capture, record, and analyze network events in order to discover the source of security attacks or other problem incidents.
We perform internal audit service to add value and improve your company operations, to accomplish strategic objectives by bringing a systematic, disciplined approach to evaluate and improve the effectiveness of risk management, control, and governance processes, to help better manage enterprise risks.
We perform fraud investigation service by using effective fact-finding strategies in our methods that may include interviews of employees, identification of non-employee witnesses, the location, retrieval and analysis of critical documents and data, and an effective risk mitigation strategy. We help your company strategies for planning, prevention, detection and response, so that fraud management becomes part of your company enterprise-wide risk management.
Email Address
Phone Number