Serving The Innovative Solutions To The Customers

About Us

PT Aldy Berkah Sejahtera (Alestra), established on October 15, 1986, has been focusing in the business of information security solution. Starting from end user security to infrastructure security, Alestra build human capital in IT and security in order to shift customer's IT infrastructure management to secured and controlled environment. Alestra do the mission by creating security Operation Center (SOC) for our main customers.

  • Data Center
  • UC
  • IT Security
  • System Integration
  • Maintenance
  • Consulting
  • Management and IT Training
  • Assessment

Our Vision and Mission

Vision

To be the leading and the foremost IT Security and Infrastructure Service Provider in Indonesia

Mission

Delivering IT Solutions that meet the Client's needs by utilizing the latest technology.

Our Customers

Government

  • Badan Pengkajian dan Penerapan Teknologi (BPPT)
  • Universitas Pertahanan (UNHAN)
  • Badan Kepegawaian Negara (BKN)
  • Badan Pusat Statistik (BPS)
  • Komisi Pemberantasan Korupsi (KPK)
  • Pusat Pelaporan dan Analisis Transaksi Keuangan (PPATK)
  • Kementrian Perindustrian (Kemenperin)
  • Lembaga Pengelola Dana Bergulir Koperasi dan Usaha Mikro, Kecil dan Menengah (LPDB-KUMM)
  • Departemen Pertahanan (Dephan)
  • Kementrian Koordinator Politik Hukum dan Keamanan (Polhukam)

Military

  • Mabes TNI
  • TNI Angkatan Laut (TNI AL)
  • Komando Armada Barat (Koarmabar) TNI AL
  • Komando Armada Timur (Koarmatim) TNI AL
  • TNI Angkatan Udara (TNI AU)
  • Mabes POLRI

Private Sector

  • PLN Distribusi Jawa Timur
  • PT Jasa Raharja
  • Yappindo STEKPI
  • HAYGROUP

Alestra - Intel Security

We have been partnering with Intel Security (McAfee) for more than 10 years in Indonesia's government and Military sector, thus bringing the mission to deliver IT Solutions that meet the client's need by utilizing the latest technology. With 30 (thirty) years of experience, Alestra commited to deliver the best protection solution for all our customer datacenters.

Whether you are a security professional or simply looking to learn more about online threats, our researchers will guide you through the current threat landscape. Our analysis helps you understand overall threat trends, how malware and Internet threats are evolving.

Safeguard data and stay compliant with Intel Security enterprise data protection solutions. McAfee Complete Data Protection Suites and McAfee Data Loss Prevention (DLP) solutions provide multilayered protection for data regardless of where it resides—on the network, in the cloud, or at the endpoint. Encryption options include enterprise-grade drive encryption or management of native encryption. As a part of our Security Connected framework, enterprise data protection solutions are fully integrated with McAfee ePolicy Orchestrator software, which unifies and simplifies data security management.

McAfee Complete Data Protection—Advanced
Block unauthorized access to your sensitive information and prevent exfiltration—anytime, anywhere. Strong encryption, DLP, policy-driven security, management of Apple FileVault and Microsoft BitLocker native encryption, and data protection for cloud storage combine with a centralized management platform in our most robust data protection suite.

McAfee Complete Data Protection
Enable data protection with drive, file, folder, removable media encryption, and data protection for cloud storage. This suite includes data encryption integrated with centralized management and encryption for Apple FileVault and Microsoft BitLocker to prevent unauthorized access and loss or theft of sensitive data.

McAfee Complete Data Protection—Essential
Get powerful data encryption with management of native encryption for Apple FileVault and Microsoft BitLocker. This data protection software suite also includes file, folder, removable media encryption, data protection for cloud storage, and centralized security management.

McAfee Total Protection for Data Loss Prevention
Safeguard intellectual property and ensure compliance by protecting sensitive data wherever it lives—on the network, in storage systems, or at the endpoint, while saving time and money with centralized deployment, management, and reporting.