DataOn as an Application Service Provider launches cloud-based Human Resource (HR) Software SunFish Go, yesterday. The concept SunFish Go or SFGo work combines ready-made features that are updated as part of SunFish HR with social media features.
The software also features analysis and approval workflow. "Software will be ready for release in the first quarter of this year," said President Director of PT Indodev Niaga Internet (DataOn) Gordon J Ens.
Features include a SFGo HR in employee management, organization charts, attendance requests related leave, overtime, travel services, and claims. While social media features developed consisting of push notifications, chat, and feeds.
Through this mobile-based application users can take advantage of features simple shape web analytics reports, smart dashboard, intelligent alerts, and so forth. Software thereby takes on this year. Therefore, the world of Information Technology (IT) increasingly has new challenges to meet the needs that will be more frequent and complex than the previous year.
System or network security becomes an important issue that must be prepared properly by service providers and users. Because, increasingly sophisticated technology applied, there is always the possibility of an intruder followed by the virtual world utilizing cutting-edge technology as well. Facing these challenges, cyber security is not solely related to the problem of product innovation, but more on preparedness for technological advancement.
At the time of placement of data or information based on cloud computing (cloud), the service providers and users should be prepared to make protection to ward off a variety of attacks, including intrusion and data theft. There are several methods that can be implemented as software installation (software) Intrusion Detection System (IDS), Intrusion Prevention System (IPS), and hardware (hardware) in the form of network security tools such as Unified Threat Management that can be used to prevent the invasion of security systems and network.
IDS is one method that can be used to detect suspicious activity in a system or network. While Intrusion Prevention System (IPS) is an application that works to monitor network traffic, detect suspicious activity, learn the pattern to do early prevention of intrusions or incidents that can make the network be run not like as it should. "We are required to be prepared to deal with these risks," said Gordon.
The software also features analysis and approval workflow. "Software will be ready for release in the first quarter of this year," said President Director of PT Indodev Niaga Internet (DataOn) Gordon J Ens.
Features include a SFGo HR in employee management, organization charts, attendance requests related leave, overtime, travel services, and claims. While social media features developed consisting of push notifications, chat, and feeds.
Through this mobile-based application users can take advantage of features simple shape web analytics reports, smart dashboard, intelligent alerts, and so forth. Software thereby takes on this year. Therefore, the world of Information Technology (IT) increasingly has new challenges to meet the needs that will be more frequent and complex than the previous year.
System or network security becomes an important issue that must be prepared properly by service providers and users. Because, increasingly sophisticated technology applied, there is always the possibility of an intruder followed by the virtual world utilizing cutting-edge technology as well. Facing these challenges, cyber security is not solely related to the problem of product innovation, but more on preparedness for technological advancement.
At the time of placement of data or information based on cloud computing (cloud), the service providers and users should be prepared to make protection to ward off a variety of attacks, including intrusion and data theft. There are several methods that can be implemented as software installation (software) Intrusion Detection System (IDS), Intrusion Prevention System (IPS), and hardware (hardware) in the form of network security tools such as Unified Threat Management that can be used to prevent the invasion of security systems and network.
IDS is one method that can be used to detect suspicious activity in a system or network. While Intrusion Prevention System (IPS) is an application that works to monitor network traffic, detect suspicious activity, learn the pattern to do early prevention of intrusions or incidents that can make the network be run not like as it should. "We are required to be prepared to deal with these risks," said Gordon.
No comments:
Post a Comment