Difference between revisions of "IT"
Line 2: | Line 2: | ||
This regulation is made as a precaution against malicious attacks (viruses, malware, adware, spyware, etc), which can cause losses to the company like data corruption, data theft, data modification, and system failure. | This regulation is made as a precaution against malicious attacks (viruses, malware, adware, spyware, etc), which can cause losses to the company like data corruption, data theft, data modification, and system failure. | ||
− | == Cyber Security Rules during Work from Home == | + | == Synergy IT Infrastructure capabilities== |
+ | == Synergy Business Application == | ||
+ | == Synergy IT Services == | ||
+ | == Synergy Cyber Security == | ||
+ | === Cyber Security Rules during Work from Home=== | ||
[https://www.synergyengineering.com/ Synergy Engineering] work form home protocol: | [https://www.synergyengineering.com/ Synergy Engineering] work form home protocol: | ||
[[File:Work Form Home Protocol.jpg|550px|none|none|Work Form Home Protocol-1]] <br> | [[File:Work Form Home Protocol.jpg|550px|none|none|Work Form Home Protocol-1]] <br> | ||
[[File:Work Form Home Protocol2.jpg|550px|none|none|Work Form Home Protocol-2]] | [[File:Work Form Home Protocol2.jpg|550px|none|none|Work Form Home Protocol-2]] | ||
+ | == IT Management and Governance == | ||
+ | == IT Policy == | ||
+ | == Synergy Disruptive Technology == | ||
+ | == Our Solution for You == | ||
+ | |||
+ | |||
== Project Highlight == | == Project Highlight == |
Revision as of 22:10, 23 June 2021
When doing a business activity, Synergy has regulations regarding information system security while using the company's hardware, software, and internet network.
This regulation is made as a precaution against malicious attacks (viruses, malware, adware, spyware, etc), which can cause losses to the company like data corruption, data theft, data modification, and system failure.
Synergy IT Infrastructure capabilities
Synergy Business Application
Synergy IT Services
Synergy Cyber Security
Cyber Security Rules during Work from Home
Synergy Engineering work form home protocol:
IT Management and Governance
IT Policy
Synergy Disruptive Technology
Our Solution for You
Project Highlight
Client :PT. Pertamina Hulu Energy Operation of South East Sumatera (PHE OSES)
Location : Indonesia
Project Type : Develop web-based application
Method : Agile
Scope of Work : Engeneering change management system
Year : 2020
Client : Pertamina Hulu Energi ONWJ
Location : Indonesia
Project Type : Develop web-based application
Method : Systems Development Life Cycle
Scope of Work : Process Safety Information Management
Year : 2016
Client : PT Santos Indonesia
Location : Indonesia
Project Type : FID Database
Method : Systems Development Life Cycle
Scope of Work : Seagood FPSO Facility Equipment Database
Year : 2015
Client : PT Santos Indonesiaa
Location : Indonesia
Project Type : Develop desktop application
Method : Systems Development Life Cycle
Scope of Work : As Built Drawing
Year : 2014
Capabilities Highlight
3D Animation & Virtual Reality
Here are some of our creation, we can convert 2D into 3D animation or virtual reality.
Check the video through this link Factory
Check the video through this link Ship