Enterprise Risk Management to Secure Future and Sustainability by Achieving Business Resilience Continuity

ISIDA is your best partner for enterprise risk management to secure future and sustainability by achieving business resilience continuity

Image Image Image Image Image Image
Image
Image Image Image Image Image
Image

Our History

Our History ISIDA
Shape Shape
1

IDEA

ISIDA present because of market demand and our founder background, vision, mission, and dream

ISIDA started the consulting services such as Internal Audit and Fraud Investigation

2

START

3

GROW

ISIDA expanded the consulting services in the scope of Cybersecurity and Digital Forensic

ISIDA started the enterprise software products inclusively business intelligence and consolidation financial reporting software to help our clients operate the business effectively

4

IMPROVE

5

CHAMPIONS

ISIDA is going to be the first choice to lead enterprise risk management

Image

“Become the best partner for enterprise risk management solutions to strive for excellence and to achieve unlimited possibilities ”

Why Choose Us

Your Credential Security

Your security credential is very important so we will not display the names and profiles of client companies in our website especially for cybersecurity and digital forensic projects

Your Information & Data Security

The documents and information we get as long as the work with the client will be given back to the client. After the assignment from the client ends, we ensure the client's documents and information are deleted in the work tools used so that no client documents and information are revealed to the public.

Quality for Your Needs

We have manpower with some international certification such as Certified Fraud Examiner (CFE), Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), Computer Hacking Forensic Investigator (CHFI), EnCase Certified Examiner (EnCe), Certified Information Systems Auditors (CISA), etc. Our manpower have many experiences in the scope of your needs.

Up to Date Knowledge & Skill

We are involved in some national and international communities in order to develop our knowledge and skill fulfilling the world conditions and needs

Governance & Compliance with Law

We are integrated with a law firm that maintains and is responsible for documents of evidence from work in accordance with applicable legal regulations if needed

Why Choose Us
Shape
Shape Shape Shape Shape Shape Shape Shape
Image
Shape

Our Services

Enterprise Software

Enterprise Software

Cybersecurity

Cybersecurity

Digital Forensic

Digital Forensic

Image

Internal Audit & Fraud Investigation

Shape
Shape
Shape
Shape
Enterprise Software
Image

What We Offer For Enterprise Software?

Enterprise Resources Planning (ERP)

ERP is usually referred to as a category of business management software typically a suite of integrated applications that an organization can use to collect, store, manage, and interpret data from many business activities.

Business Intelligence

Business Intelligence technologies can handle large amounts of structured and sometimes unstructured data to help identify, develop, and otherwise create new strategic business opportunities

Consolidation Financial Reporting

the context of financial accounting, consolidation refers to the aggregation of financial statements of a group company as consolidated financial statements

HR Information System

A Human Resources management system or human resources information system or human capital management is a form of human resources software that combines a number of systems and processes to ensure the easy management of human resources, business processes and data.

Image

What We Offer For Cybersecurity?

Secure Code Review

We perform secure code review to review of an application's source code in an attempt to identify security-related weaknesses (flaws) in the code.

Pen-Test Infrastructure

We perform penetration testing to your server (data center and data recovery center) environment to identify vulnerabilities and threat actors

Pen-Test Web App

We perform penetration testing to your web application to identify vulnerabilities, threat actors, and control weakness

Pen-Test Mobile App

We perform penetration testing to your mobile application to identify vulnerabilities, threat actors, and control weakness

Host Configuration Audit

We perform audit for all configuration implemented in your host (server and network) to identify vulnerabilities, control weakness, and misconfiguration

Cybersecurity Awareness Training

We perform cybersecurity awareness training for your company to increase the awareness to achieve cybersecurity resilience. Our service is to include phishing simulation program for your employee

Shape Shape Shape Shape Shape Shape Shape
Shape
Image
Shape

What We Offer For Digital Forensic?

Storage Forensic

We perform storage forensic include cloud to acquire, recover, analyze and triage data from your storage devices. The acquired data to present evidence which needed by your company.

Smartphone Forensic

We perform smartphone forensic to acquire, recover, analyze and triage data from your mobile devices such as Android and iOS phone. The acquired data includes communications, contacts, messages, media files, locations, and Apps, etc.

Email Forensic

We perform email forensics to analyze the source and content of emails as an evidence related with crimes and/or incidents involving various approaches.

Digital Forensic

RAM Forensic

the volatile data in a computer’s memory dump in order to investigate and identify attacks or malicious behaviors that do not leave easily detectable tracks on hard drive data

OS Forensic

We perform Operating System (OS) forensic to retrieve useful information from the OS of the computer or mobile device in order to collect information in the empirical evidence acquired with a roadmap to data on the hard disk and how hard drive stores data

Network Forensic

We perform network forensic to capture, record, and analyze network events in order to discover the source of security attacks or other problem incidents.

Shape Shape Shape Shape Shape Shape Shape
Shape
Image
Shape
Shape

What We Offer For IA & FI?

Internal Audit

We perform internal audit service to add value and improve your company operations, to accomplish strategic objectives by bringing a systematic, disciplined approach to evaluate and improve the effectiveness of risk management, control, and governance processes, to help better manage enterprise risks.

Fraud Investigation
Fraud Investigation

Fraud Investigation

We perform fraud investigation service by using effective fact-finding strategies in our methods that may include interviews of employees, identification of non-employee witnesses, the location, retrieval and analysis of critical documents and data, and an effective risk mitigation strategy. We help your company strategies for planning, prevention, detection and response, so that fraud management becomes part of your company enterprise-wide risk management.

Shape Shape Shape Shape Shape Shape Shape
Image
Image
Shape

Our Other Services

ISO 27001:2013 Advisory

IT Governance (COBIT)

Cybersecurity Governance (NIST)

IT Strategic Planning

Cloud Adoption Assessment

Data Governance

Dedicated / Collocation Hosting

Cloud Hosting (Platform as a Service)

Shape Shape Shape Shape Shape Shape Shape
Shape
Image
Shape
Shape

“You Become our TOP PRIORITY”

Contact Us

Shape Shape Shape Shape Shape Shape Shape
Shape
Image
Shape