COMPANY PROFILE PT. Trinet Prima Solusi www.trinetprimasolusi.net Jl. Tanah Abang II No. 104A - Jakarta Pusat 10150- Indonesia Call +62-21-34831212, fax +62-21-3850285
2010 Customer Quote PT. Trinet Prima Solusi PT. Asuransi Jaya Proteksi We choose Trinet, because they do not just sell products but solutions and give very objective product analysis according to our needs and budget. Besides, Trinet people are very friendly and cooperative. Michael, Asst. Manager IT, Asuransi Jaya Proteksi PT PT. Indika Energy It is very easy for me to find the right solutions for our organizations, because Trinet provides end-to-end solutions and could give consultative information that is very helpful for us. Edie Surachmat, IT Manager, Indika Energy PT PT. Oto Multi Artha We are happy to have IT partner like Trinet, cause they give us good support as well as commitment. We find Trinet as a reliable partner so we can do our job better. Ambri, IT Dept. Head, Oto Multi Artha PT Our Profile PT TRINET PRIMA SOLUSI (TRINET) was founded in 2002 in Jakarta. The core business is containing the theme "End to end solution". TRINET is a system integrator with competence in hardware infrastructure, network security and data center. Our technical team designs, builds and supports your mission-critical systems. We help you to stretch your IT budget by working systematically, efficiently and managing the project costs / TCO. As the needs of every organization are unique, we remain vendor neutral in the selection of technology solutions. We do what's best for you - not for us. Our expertise can lead to significant and continuous improvement of your organization's business and IT processes. We fully understand that every customer is unique, so we always position ourselves as your consultant to give the right solutions with proper investments. Our experiences have enriched us to help our customers in increasing their businesses and support the operational cost effectiveness, which at the end will increase the company s business competitiveness in market. Our Business Objectives Assist clients to apply the right information technology solutions in the organizations to achieve the business goals by providing the proper and costeffective solutions, good services, reliable and continuous support to the IT investment and its development in the future. Our focus competences are Data center infrastructure System Hardware infrastructure Network and Security Virtualization Presentation & Multimedia... To be preferred IT partner by delivering the right solutions with significant contribution thought trust For Sales Enquiry email us to sales@trinetprimasolusi.net
Data Center infrastructure In conjunction with the development of these maturity models, Aperture has developed a Data Center Infrastructure Management (DCIM) maturity model to assist organizations in assessing their maturity in Data Center Service Management (DCSM ). IT organizations must assess all aspects of process maturity, including DCSM maturity, in order to best deliver services to the rest of the enterprise. Leveraging Gartner's model as an overall framework, Aperture's DCIM Maturity Model evaluates the maturity of the overall data center physical infrastructure, a domain that has been severely underdeveloped in many organizations. The offered infrastructures are as follows: Interior and Furniture Raised Floor Precision Air Conditioning Fire Extinguisher Racking System Cabling System Access Control SMS System UPS Remote Management
Interior & Furniture The Data Center (DC) room should be furnished with proper interior and furniture, some DC requires sound and fire-proof wall. Raised Floor A raised floor is a floor that is put higher than the existing one, usually used for Data center room for the purpose of wiring and/or cabling. Fire Extinguisher Precision Air Conditioning is designed from the ground up to protect equipment, not people. Precision Air Conditioning Precision Air Conditioning is designed from the ground up to protect equipment, not people. Racking System In order to keep the servers and other IT devices in the rack remain in a good position and conditions, a secure and strong racking system is highly required, some are design to be sound proof.
Cabling System Cabling structure system consists of 1 set of cable and connectivity product that integrate voices, data, video and various management system in a location. Access Control Access control system is used as an identification to access a room. This system is required to validate, identify as well as to secure. SMS System There are many corporations who are using SMS for simple messaging, communication, CRM, e- commerce and transactional based applications.system in a location. UPS A sudden death of electricity could cause the damage of power supply and even more the loss of data being used and broken system file. Remote Management Remote management system is a system that can manage the IT device remotely, from anywhere and anytime.
Hardware infrastructure There is a revolution underway in the wireless carrier networks. As traditional services of voice transport and simple internet connection become commoditized, Telco s and carriers need to ally themselves with hardware infrastructure providers, software companies, handset makers, chip designers and a variety of service providers. Some software companies must meet new demands of massive scalability if they are to survive inside the carrier network. Carrier networks need to support services and applications that their corporate customers have already invested in, while the software houses with established presence in the business world must work with the carrier to wirelessly enable their applications, or face the consequences of being undermined by pure wireless players. The offered solutions for hardware are as follows: Imaging and Printing Product Desktop PC Precision Air Conditioning Server Storage
Imaging & Printing Products Printer is a peripheral which produces a hard copy of documents stored in electronic form, usually on physical print media such as paper or transparencies. Desktop PC A desktop computer is a personal computer (PC) in a form intended for regular use at a single location, as opposed to a mobile laptop or portable computer. Server Server is a computer designated to run applications, often under heavy workloads, unattended, for an extended period of time. Storage There may be some limited storage on a blade server, and there may be additional storage provided by a chassis.
Network & Security There are two extremes: absolute security and absolute access. The closest we can get to an absolutely secure machine is one unplugged from the network, power supply, locked in a safe, and thrown at the bottom of the ocean. Unfortunately, it isn't terribly useful in this state. We constantly make decisions about what risks we're willing to accept. When we get in a car and drive to work, there's a certain risk that we're taking. When we get on an airplane, we're accepting the level of risk involved as the price of convenience. Yes, it would be more convenient, but the risk of injury outweighs the advantage of convenience. Every organization needs to decide for itself where between the two extremes of total security and total access they need to be. A policy needs to articulate this, and then define how that will be enforced with practices and such. Everything that is done in the name of security, then, must We breakdown network security as follows: Network: Networks may be classified according to a wide variety of characteristics. * Switch * Router * Wireless * Network Analyzer Bandwidth Control: In computer networking, bandwidth management is the process of measuring and controlling the communications on a network link. * Bandwidth Management * WAN Optimization Security: Network security consists of the provisions made in an underlying computer network infrastructure * Firewall * Intrusion Prevention System * Anti Spam Appliances * Content-control software / Web Filtering * Proxy Server * System Management
Network Switch The network switch, packet switch (or just switch) plays an integral part in most Ethernet local area networks or LANs. Mid-to-large sized LANs contain a number of linked managed switches. Small office, home office (SOHO) applications typically use a single switch, or an all-purpose converged device such as gateway access to small office/home office broadband services such as DSL router or cable, WiFi router. Router Routers connect two or more logical subnets, which do not necessarily map one-to-one to the physical interfaces of the router. The term layer 3 switch often is used interchangeably with router, but switch is really a general term without a rigorous technical definition. Network Analyzer A Packet Sniffer (also known as a network sniffer, network analyzer or protocol analyzer or, for particular types of networks, an Ethernet sniffer or wireless sniffer) is computer software or computer hardware that can intercept and log traffic passing over a digital network or part of a network. Wireless Wireless network refers to any type of computer network that is wireless, and is commonly associated with a telecommunications network whose interconnections between nodes is implemented without the use of wires.
Bandwidth Control Bandwidth Management In computer networking, bandwidth management is the process of measuring and controlling the communications (traffic, packets) on a network link, to avoid filling the link to capacity or overfilling the link, which would result in network congestion and poor performance. WAN Management In computer networking, bandwidth management is the process of measuring and controlling the communications (traffic, packets) on a network link, to avoid filling the link to capacity or overfilling the link, which would result in network congestion and poor performance.
Security Firewall A firewall is a device or set of devices configured to permit, deny, encrypt, or proxy all computer traffic between different security domains based upon a set of rules and other criteria. Intrusion Prevention System An intrusion prevention system is a computer security device that monitors network and/or system activities for malicious or unwanted behavior and can react, in real-time, to block or prevent those activities. Anti Spam Appliances Anti-spam appliances are hardware devices integrated with on-board software that implement anti-spam techniques (e-mail) and/or anti-spam for instant messaging and are deployed at the gateway or in front of the mail server. Content-control software / Web Filtering Content-control software, also known as censor ware or web filtering software, is a term for software designed and optimized for controlling what content is permitted to a reader, especially when it is used to restrict material delivered over the Web.
Security Proxy Server In computer networks, a proxy server is a server (a computer system or an application program) which services the requests of its clients by forwarding requests to other servers. Systems Management Systems management refers to enterprise-wide administration of distributed computer systems. Systems management is strongly influenced by network management initiatives in telecommunications.
Virtualizations Today, virtualization can apply to a range of system layers, including hardware-level virtualization, operating system level virtualization, and high-level language virtual machines. Using virtual infrastructure solutions such as those from VMware, enterprise IT managers can address challenges that include: Server Consolidation and Containment Eliminating server sprawl via deployment of systems as virtual machines (VMs) that can run safely and move transparently across shared hardware, and increase server utilization rates from 5-15% to 60-80%. Test and Development Optimization Rapidly provisioning test and development servers by reusing pre-configured systems, enhancing developer collaboration and standardizing development environments. Virtual infrastructure initiatives often spring from data center server consolidation projects, which focus on reducing existing infrastructure box count, retiring older hardware or lifeextending legacy applications. Server consolidation benefits result from a reduction in the overall number of systems and related recurring costs (power, cooling, rack space, etc.) Server containment uses an incremental approach to workload virtualization, whereby new projects are provisioned with virtual machines rather than physical servers, thus deferring hardware purchases. Data center environments are becoming more complex and heterogeneous, with correspondingly higher management costs. Partitioning alone does not deliver server consolidation or containment, and in turn consolidation does not equate to full virtual infrastructure management. Beyond partitioning and basic component-level resource management, a core set of systems management capabilities are required to effectively implement realistic data center solutions (see Figure 6).
Presentation & Multimedia There are three options our Presentation & Multimedia below: Smartboard Lifesize AXIS Every organization needs to decide for itself where multimedia services now very important for they.
Partners Our Partners DELL: Through the integration of economic, social and environmental responsibility into everything we do and by ensuring diversity remains a Dell cornerstone so we have a workforce reflective of our customers, access to the best talent and ideas to innovate for our customers Dell can build the right relationships. Trinet is DELL PARTNER DIRECT REGISTERED. VMWARE: offers customers a superior choice for virtualization solutions. Trinet is VMWARE ENTERPRISE PARTNER. JUNIPER: enable a high-performance network infrastructure that delivers fast, reliable, secure access to services and applications over a single network. Trinet is JUNIPER ELITE PARTNER. RUCKUS: Ruckus Wireless is a pioneer in the wireless infrastructure market, enabling carriers and enterprises to stay ahead of the exploding demand for high-bandwidth applications and services. Trinet is RUCKUS AUTHORIZED PARTNER PKLNS: Our products help students experience a deeper level of engagement and comprehension by adding interactive, visual dimensions to course material. Trinet is PKLNS AUTHORIZED MASTER DEALER. SANGFOR: Sangfor is the leading and largest vendor of Network Security, Management & Optimization solutions in Asia and is committed to provide continuous innovative network solutions. Trinet is SANGFOR GOLD PARTNER CHIERU: Our service includes software and system products, teaching and learning resources and strategic consulting for school ICT environments in both primary and higher education. Trinet is CHIERU MASTER DEALER. Avocent: products include local and remote switching, serial console servers, digital extension, embedded (IPMI), service processor managers, wireless, mobile and video display solutions. Avocent hardware, software and embedded technologies combined provide customers with the power of centralized management. Trinet is AVOCENT AUTHORIZED RESELLER. EMERSON: Emerson is a diversified global manufacturing company that brings technology and engineering together to provide innovative solutions to customers in the industrial, commercial and consumer markets through its Process Management, Industrial Automation, Network Power, Climate Technologies, and Commercial & Residential Solutions businesses. Trinet is EMERSON AUTHORIZED RESELLER. TRENDMICRO: As a global leader in IT security, Trend Micro develops innovative security solutions that make the world safe for businesses and consumers to exchange digital information. Trinet is TRENDMICRO PLATINUM PARTNER. Microsoft: The world's largest vendor of personal computer software Multinational computer technology corporation that develops, manufactures, licenses, and supports a wide range of software products for computing devices. Trinet is MICROSOFT SILVER MIDMARKET SOLUTION PROVIDER DAN AUTHORIZED EDUCATION RESELLER.
Client References
Hardware infrastructure It is not deniable that all companies nowadays use computer either to make documents, spreadsheet, presentation materials and others. In line of the business development and increasing number of employees, a company must have a proper data center and the hardware inside. Below is a glimpse of products we provide from client (endpoint) till server room/data center: PC/NB, printer, servers, storage, racks, desktop management, remote management, virtualizations, back up systems, replications, etc. Network and security Many companies now realize that DATA is the most valuable asset to maintain, so a reliable system security has been a must-have thing rather than nice to have. Security system has also been one of Trinet s solutions. Below are the range of security we provide: For Technical Enquiry email us to support@trinetprimasolusi.net
www.trinetprimasolusi.net Our Vision and Mission Why Trinet Prima Solusi We have total solutions of hardware and software, so our customers could easily rely on us to do the integration. We have a full supports from principal We do a complete services to our customers, from it audit to operation maintenance. We help our customers to design the best solutions according to the needs and budget. Not only consultation and implementation, we also could provide the maintenance, so customers could focus on their main business. We have been established for years and have many success stories in corporate clients. Business approach Help customers to take maximum advantage on information system and technology to develop the business and achieve the company s goals. Help customers through objective points of view in choosing the right solutions. Never Ending Tehnology Automate Manage Consolidate
PT. Trinet Prima Solusi Jl. Tanah Abang II No. 104A Jakarta Pusat 10150 Indonesia Call +62-21-34831212 fax +62-21-3850285 www.trinetprimasolusi.net sales@trinetprimasolusi.net