Summary Product Central Data Technology
1. CLOUD
1.1 AWS
Overview
Amazon Web Services (AWS) is a comprehensive cloud computing platform that provides a wide range of IT services. AWS enables organizations to run applications, store data, and manage IT infrastructure without the need to build and maintain their own data centers.
AWS is widely adopted by organizations of all sizes—from startups to large enterprises and government institutions—due to its flexibility, scalability, and pay-as-you-go pricing model.
Product AWS
AWS services are categorized based on their primary functions, including compute, storage, database, and networking.
1.1.1 Compute
1.1.1.1 Amazon EC2
Overview
Amazon Elastic Compute Cloud (EC2) is a virtual server service that allows users to run operating systems and applications in the cloud, similar to running physical or virtual servers in an on-premises data center.
Competitor:
- Azure Virtual Machines
- Google Compute Engine
- Oracle Cloud Compute
- Akamai Cloud (Linode) Compute
1.1.1.2 AWS Lambda
Overview
AWS Lambda is a serverless computing service that allows users to run application code without managing servers. AWS handles the infrastructure, enabling developers to focus solely on application logic.
Competitor
- Azure Functions
- Google Cloud Functions
1.1.1.3 Amazon ECS & Amazon EKS
Overview
Amazon ECS and Amazon EKS are container orchestration services. ECS uses AWS-native orchestration, while EKS is based on Kubernetes.
Competitor
- Azure Kubernetes Service (AKS)
- Google Kubernetes Engine (GKE)
1.1.2 Storage
1.1.2.1 AMAZON S3
Overview
Amazon S3 is an object storage service designed to store large volumes of unstructured data such as files, backups, logs, and application data.
Competitor
- Azure Blob Storage
- Google Cloud Storage
- On-prem: Hitachi VSP One Object
1.1.2.2 Amazon EBS
Overview
Amazon Elastic Block Store (EBS) provides block storage directly attached to EC2 instances, similar to SAN or local disks in traditional servers.
Competitor
- Azure Managed Disks
- Google Persistent Disk
1.1.2.3 Amazon EFS
Overview
Amazon Elastic File System (EFS) is a shared file storage service that can be accessed simultaneously by multiple EC2 instances.
Competitor
- Azure Files
- Google Filestore
1.1.3 Database
1.1.3.1 Amazon RDS & Amazon Aurora
Overview
Managed relational database services where AWS handles operations such as backup, patching, and high availability.
Competitor
- Azure SQL Database
- Google Cloud SQL
- Oracle Autonomous Database
1.1.3.2 Amazon DynamoDB
Overview
A fully managed NoSQL database designed for large-scale, high-performance applications.
Competitor
- Azure Cosmos DB
- Google Bigtable
1.1.4 Network
1.1.4.1 Amazon PVC
Overview
Amazon Virtual Private Cloud (VPC) enables organizations to build isolated virtual networks within AWS.
Competitor
- Azure Virtual Network
- Google Cloud VPC
1.1.4.2 Elastic Load Balancer
Overview
Distributes application traffic to maintain availability and performance.
Competitor
- Azure Load Balancer / Application Gateway
- Google Cloud Load Balancing
- On-prem: F5 BIG-IP
1.2 AKAMAI CLOUD (Linode)
Overview
Akamai Cloud, formerly known as Linode, is a cloud infrastructure service focused on providing simple, transparent, and cost-effective cloud computing.
Product Linode
Similar to AWS, Linode provides core cloud services such as compute, storage, and Kubernetes. While its service portfolio is not as extensive as hyperscalers, Linode is an attractive option for customers seeking cost-effective cloud infrastructure with competitive performance.
1.2.1 Compute
Overview
Compute services in Akamai Cloud are delivered through virtual machines known as Linodes. These function like standard virtual servers, used to run operating systems and applications.
Competitor
- AWS EC2
- Azure Virtual Machines
- Google Compute Engine
1.2.2 Kubernetes (LKE – Linode Kubernetes Engine)
Overview
A fully managed Kubernetes service that enables users to run container-based applications without manually managing the Kubernetes control plane.
Competitor
- Amazon EKS
- Azure Kubernetes Service (AKS)
- Google Kubernetes Engine (GKE)
1.2.3 Object Storage
Overview
Object storage for unstructured data such as files, images, backups, and application logs. Functionally similar to Amazon S3, but offered at a significantly more affordable price point.
Competitor
- Amazon S3
- Azure Blob Storage
- Google Cloud Storage
2. INFRASTUCTURE ON-PREMISE
2.1 Hitachi Vantara
Overview
Hitachi Vantara is a leading on-premises infrastructure vendor focused on digital infrastructure and infrastructure services. Its solutions are widely deployed across the Americas, the Middle East, and the Asia-Pacific region, including Japan.
Hitachi Vantara has received numerous industry awards and recognitions from analysts such as Gartner and GigaOm.
Product Hitachi Vantara
2.1.1 Block Storage – Hitachi VSP (Virtual Storage Platform)
Overview
Hitachi’s flagship block storage portfolio, available in multiple series including VSP E Series, VSP One Block, and VSP 5000 Series. All VSP platforms are designed for mission-critical workloads such as databases and virtualized environments.
Product Hitachi VSP
2.1.1.1 VSP E Series
Segmentation: Midrange
Overview
The VSP E Series is an entry-level to midrange enterprise block storage platform with a hybrid architecture, supporting NVMe, SSD, SAS, and NL-SAS drives.
It is ideal for customers who require both high performance and large capacity—using NVMe for critical workloads and SAS/NL-SAS for non-critical workloads.
Competitor
- Dell PowerStore
- HPE Alletra 5000 (Nimble)
- NetApp AFF C-Series
- IBM FlashSystem 5200
2.1.1.2 VSP One Block
Segmentation: Midrange
Overview
VSP One Block is Hitachi’s latest midrange all-flash storage platform, launched at the end of 2024. It includes a No-Question-Asked (NQA) Guarantee and built-in deduplication and compression technologies.
Competitor
- NetApp AFF A-Series
- HPE Alletra 6000
- IBM FlashSystem 7200 / 9200
2.1.1.3 VSP 5000 Series
Segmentation: Enterprise
Overview
The VSP 5000 Series is a high-end enterprise block storage platform designed for environments that require zero downtime tolerance.
Competitor
- Dell PowerMax
- HPE XP8
- IBM DS8900F
- NetApp AFF A900
2.2.2 Object Storage – Hitachi VSP One Object
Overview
VSP One Object is an enterprise-grade object storage solution designed to store massive volumes of unstructured data using a distributed architecture.
Typical use cases include data archiving, data lakes, backup repositories, and digital content storage.
Competitor
- Dell ECS
- NetApp StorageGRID
- IBM Cloud Object Storage
- Scality RING
2.2.3 File Storage Hitachi One File
Overview
VSP One File is an enterprise Network-Attached Storage (NAS) solution that provides file-based access using standard protocols such as NFS and SMB.
Competitor
- NetApp ONTAP (AFF dan FAS)
- Dell PowerScale
- HPE Alletra File / Qumulo
- Pure Storage FlashBlade
2.2.4 Server – Hitachi Advance Server
Overview
Hitachi Advanced Server is an x86 server platform designed to run critical workloads such as databases, virtual machines, and enterprise applications.
Competitor
- HPE ProLiant
- Dell PowerEdge
- Lenovo ThinkSystem
3. OBSERVABILITY
3.1 Dynatrace
Overview
Dynatrace is an enterprise observability and application monitoring platform used to monitor application performance, infrastructure, and digital user experience. It is widely adopted in complex enterprise environments such as microservices-based applications, cloud platforms, and containerized systems.
A key differentiator of Dynatrace is OneAgent, a single agent capable of automatically discovering and monitoring the entire environment.
Product Dynatrace
3.1.1 Dynatrace Application Perfomance Monitoring (APM)
Overview
Dynatrace APM provides end-to-end visibility into application performance—from application code and backend services to the user experience.
It enables real-time detection of performance bottlenecks, errors, and degradations.
Competitor
- New Relic APM
- AppDynamics (Cisco)
- Datadog APM
- Netain APM
3.1.2 Dynatrace Insfratucture Monitoring
Overview
Monitors the infrastructure running applications, including servers, virtual machines, containers, Kubernetes, and cloud services.
This capability ensures infrastructure resources are operating normally and not causing application issues.
Competitor
- Datadog Infrastructure Monitoring
- Zabbix Enterprise
- NetGain Infrastucture Monitoring
3.1.3 Dynatrace Digital Experience Monitoring (DEM)
Overview
Monitors end-user experience for both web and mobile applications using real user monitoring and synthetic monitoring, enabling organizations to understand application performance from the user’s perspective.
Competitor
- New Relic Browser & Synthetics
- AppDynamics End User Monitoring
- Datadog RUM
3.1.4 Dynatrace Log Monitoring & Analytics
Overview
Provides integrated log analytics correlated with application and infrastructure performance, enabling faster troubleshooting and root cause analysis.
Competitor
- Splunk
- Elastic Stack (ELK)
- Datadog Log Management
- NetGain Log Analytic
3.1.5 Dynatrace Cloud & Kubernetes Monitoring
Overview
Designed specifically for cloud-native environments, including Kubernetes, OpenShift, and microservices architectures.
Competitor
- Datadog Kubernetes Monitoring
- New Relic Kubernetes
- Sysdig Monitor
3.1.6 Dynatrace Automation dan AIOps (Davis AI)
Overview
Davis AI automatically analyzes monitoring data, identifies root causes, and provides actionable insights without manual intervention—reducing troubleshooting time and operational complexity.
Competitor
- Datadog Watchdog
- New Relic AI
- Splunk ITSI
- NetGain AI (Astra AI)
3.2 NetGain
Overview
NetGain is a monitoring and observability platform focused on IT operations, helping teams ensure that applications, servers, networks, and security systems are operating properly.
A key advantage of NetGain is its high level of customization, supported by a dedicated principal team that can tailor the solution to integrate with applications not supported by other vendors.
Product NetGain
3.2.1 NetGain Infrastucture Monitoring
Overview
Monitors servers, virtual machines, storage, and network devices by tracking CPU, memory, disk usage, and system availability.
This enables operations teams to proactively detect capacity issues, performance degradation, or system outages.
Competitor
- Zabbix Enterprise
- Datadog Infrastructure Monitoring
- Dynatrace Infrastructure Monitoring
- SolarWinds Server & Application Monitor
3.2.2 NetGain Application Perfomance Monitoring (APM)
Overview
Monitors application response time, errors, and service availability, helping teams identify whether issues originate from the application layer or underlying infrastructure.
Commonly used for internal and web-based enterprise applications.
Competitor
- Dynatrace APM
- New Relic APM
- AppDynamics (Cisco)
- Datadog APM
3.2.3 NetGain Log Management & Log Analytics
Overview
Centralizes logs from servers, applications, and security devices, making them easier to search and analyze for troubleshooting and audit purposes.
Competitor
- Splunk
- Elastic Stack (ELK)
- Datadog Log Management
- Graylog
3.2.4 NetGain Network Traffic Analytic
Overview
Monitors network traffic to analyze access patterns, bandwidth usage, and potential bottlenecks, helping network teams detect anomalies and optimize performance.
Competitor
- Cisco Stealthwatch
- ExtraHop
- SolarWinds NTA
3.2.5 NetGain Security Analytics / SIEM
Overview
Processes security events and logs to detect potential threats and abnormal activities. Typically used by security teams as part of Security Operations Center (SOC) workflows.
Competitor
- Splunk Enterprise Security
- IBM QRadar
- Microsoft Sentinel
- Elastic SIEM
NetGain Network Configuration Management
Overview
Manages and tracks network device configurations, including configuration backups and change history, to reduce the risk of misconfiguration.
Competitor
- SolarWinds NCM
- ManageEngine Network Configuration Manager
- Cisco Prime Infrastructure
3.3 ZSCALER
3.3.1 Zslacer Digital Experience
Overview
ZDX monitors user experience when accessing applications and the internet, focusing on network and connectivity performance.
It helps IT teams determine whether issues originate from the network, ISP, endpoint, or application.
Competitor
- ThousandEyes
- Catchpoint
- AppNeta
4. Content Delivery Network (CDN)
4.1 Akamai CDN
Overview
Akamai CDN is used to deliver website and application content from locations closest to end users. Content such as web pages, images, videos, and static files is cached on Akamai edge servers, resulting in faster access times, improved stability, and better user experience.
Competitor
- Cloudflare CDN
- Fastly
5. SECURITY
5.1 AKAMAI
5.1.1 Akamai Web Application Firewall (WAF)
Overview
Akamai WAF protects web applications and APIs from attacks such as SQL injection, cross-site scripting (XSS), and other application-layer exploits. Protection is enforced at the edge, before traffic reaches the application servers.
Competitor
- Cloudflare WAF
- AWS WAF
- F5 Advanced WAF
5.1.2 Akamai Bot Manager
Overview
Akamai Bot Manager is used to detect and control automated bot activity, including both malicious bots and unwanted automated traffic that can overload applications.
Competitor
- Cloudflare Bot Management
- PerimeterX (Human Security)
- F5 Bot Defense
5.1.3 Akamai Enterprise Application Access (EAA)
Overview
Akamai EAA provides secure access to internal applications without relying on traditional VPNs. It follows a Zero Trust approach, where every access request is continuously verified.
Competitor
- Zscaler ZPA
- Cloudflare Zero Trust
- Palo Alto Prisma Access
5.2 F5
Overview
F5 is a company focused on application delivery and application security. F5 operates between users and applications, ensuring applications remain available, secure, and high-performing—whether deployed in data centers, cloud environments, or hybrid infrastructures.
F5 is particularly strong in enterprise environments, especially for mission-critical business applications, legacy systems, and high-traffic public applications.
Product F5
5.2.1 BIG-IP Advance WAF
Overview
BIG-IP Advanced WAF protects web applications from threats such as SQL injection, cross-site scripting (XSS), and other application-layer attacks.
Competitor
- Imperva WAF
- Fortinet FortiWeb
- Barracuda WAF
5.2.2 BIG-IP Access Policy Manager (APM)
Overview
BIG-IP APM manages user access to applications, including VPN services, authentication, and role-based access control.
Competitor
- Cisco AnyConnect
- Palo Alto GlobalProtect
- Citrix Gateway
5.2.3 F5 BIG-IP Advanced Firewall Manager (AFM)
Overview
BIG-IP AFM is a network firewall solution designed to protect application infrastructure from threats at the network and transport layers (Layer 3 and Layer 4).
AFM runs as a module on the BIG-IP platform, available as both physical and virtual appliances.
Competitor
- Palo Alto Networks
- Fortinet FortiGate
- Cisco Secure Firewall
- Juniper SRX Series
5.2.4 F5 BIG-IP DDOS Protection
Overview
BIG-IP DDoS Protection is a network and application security solution designed to defend systems against Distributed Denial of Service (DDoS) attacks.
It continuously monitors network traffic to identify abnormal patterns and automatically mitigates attacks without disrupting legitimate services.
Competitor
- Radware DefensePro
- Akamai Prolexic
- Cloudflare DDoS Protection
- Arbor Networks (NETSCOUT Arbor)
5.2.5 F5 Distributed Cloud WAF
Overview
A SaaS-based WAF that protects web applications and APIs at the edge, without requiring on-premises appliances.
Competitor
- Cloudflare WAF
- Akamai WAF
- AWS WAF
5.2.6 F5 Distributed Cloud DDoS Protection
Overview
A cloud-based DDoS protection service that absorbs and mitigates attacks before they reach customer applications.
Competitor
- Cloudflare DDoS Protection
- Akamai DDoS Protection
- AWS Shield
5.2.7 F5 Distributed Cloud API Security
Overview
Protects APIs from abuse, automated attacks, and data leakage.
Competitor
- Salt Security
- Noname Security
- Akamai API Security
5.2.8 F5 Distributed Cloud APP Connect
Overview
Securely connects applications running across multiple clouds and data centers.
Competitor
- Aviatrix
- Palo Alto Prisma Cloud
5.2.9 F5 Distributed Cloud Services – Web Apps and API Protection
Overview
F5 Distributed Cloud WAAP is a SaaS-based application security solution designed to protect web applications and APIs against modern cyber threats.
It is built for organizations operating in multi-cloud, hybrid cloud, and edge environments.
Competitor
- Cloudflare WAAP
- Akamai App & API Protector
- Imperva Cloud WAF
- Fastly Next-Gen WAF
5.2.10 F5 Distributed Cloud Services – Advanced Bot Protection
Overview
A SaaS-based security service designed to detect and control sophisticated malicious bots targeting web applications and APIs.
It protects against advanced bot attacks that can mimic human behavior and bypass traditional security mechanisms.
Competitor
- Akamai Bot Manager
- Cloudflare Bot Management
- Imperva Advanced Bot Protection
- PerimeterX (Human Security)
5.2.11 F5 Distributed Cloud Services – Client Side Defense
Overview
A cloud-based security service designed to protect web applications from threats originating on the client side (browser), including third-party JavaScript.
It prevents sensitive data theft that occurs after a page loads but before data is sent back to the server.
Competitor
- Imperva Client-Side Protection
- Akamai Page Integrity Manager
- Cloudflare Page Shield
5.2.12 F5 Nginx – Nginx App Protect
Overview
A software-based application security solution designed to protect modern web and API-based applications.
Part of the F5 NGINX portfolio, it is optimized for dynamic environments such as cloud, containers, and microservices.
Competitor
- Cloudflare WAF
- Akamai App & API Protector
- Imperva Cloud WAF
- Fastly Next-Gen WAF
5.2.13 F5 Nginx – L7 DDOS protection
Overview
Protects applications from Layer 7 (application-layer) DDoS attacks, which resemble legitimate traffic but aim to overwhelm application logic through excessive requests.
These attacks are more difficult to detect than Layer 3 or Layer 4 attacks.
Competitor
- Cloudflare Application DDoS Protection
- Akamai Application Layer DDoS Protection
- Imperva Application DDoS Protection
5.2.14 F5 Hardware Segmentation
- BIG-IP r2600 Series
Segmentation: Entry level
Overview
Designed for organizations requiring basic application delivery and security with relatively low traffic volumes.
Competitor
- Citrix ADC seri entry
- A10 Thunder seri entry
- HAProxy Enterprise
- BIG-IP r2800 Series
Segmentation: Midrange
Overview
Designed for mid-sized enterprise environments with higher performance and SSL processing requirements.
Competitor
- Citrix ADC Midrange
- A10 Thunder Midrange
- Kemp LoadMaster
- BIG-IP r10600 Series
Segmentation: Enterprise
Overview
The r10600 series is intended for large organizations with high-performance requirements and significant application traffic. These devices are widely used in primary enterprise data centers, large-scale digital services, and environments requiring intensive SSL encryption.
Competitor
- Citrix ADC MPX high performance
- Citrix ADC MPX high performance
- A10 Thunder 10000 Series
- BIG-IP r10800 Series
Segmentation: Enterprise besar / high performance
Overview
The r10800 series is one of F5’s flagship devices for enterprise environments with very high application workloads. This series focuses primarily on large-scale Layer 7 processing and SSL offloading, making it ideal for public digital services, e-commerce, and high-traffic application platforms.
Competitor
- Citrix ADC MPX
- A10 Thunder 13000–14000 Series
- BIG-IP r10900 Series
Segmentation: Enterprise besar hingga hyperscale
Overview
The r10900 series offers increased capacity and performance over the r10800, particularly for environments requiring a high number of simultaneous connections. These devices are typically used in large-scale enterprise environments, service providers, or organizations with globally operating systems.
Competitor
- Citrix ADC flagship
- A10 Thunder High-End
- BIG-IP r12900 Series
Segmentation: Hyperscale / service provider / cloud provider
Overview
The r12900-DS series is F5’s highest-capacity device in the rSeries line. It is intended for hyperscale environments, such as cloud service providers, telecommunications operators, and data centers, with high-throughput and application security requirements.
Competitor
- Citrix ADC flagship
- A10 Thunder High-End
5.3 ZSCALER
Overview
Zscaler is a provider of cloud-based access security (Zero Trust) solutions. Unlike traditional security vendors that rely on devices in data centers, Zscaler was designed from the outset as a SaaS service.
Zscaler’s role is at the user’s access point to the internet and applications. Its goal is to secure access without the need for a traditional VPN.
5.3.1 .Zscaler Internet Access
Overview
ZIA is used to secure user access to the internet. All user internet traffic is routed to the Zscaler cloud and then inspected by various security controls such as firewalls, URL filtering, malware protection, and data loss prevention. ZIA replaces traditional secure web gateways and some perimeter firewall functions.
Competitor
- Palo Alto Prisma Access
- Netskope Secure Web Gateway
- Cisco Umbrella
- Fortinet FortiSASE
5.3.2 Zscaler Private Access
Overview
ZPA provides secure access to internal applications without VPNs, using a Zero Trust approach where users connect only to authorized applications.
Competitor
- Palo Alto Prisma Access (ZTNA)
- Netskope Private Access
- Akamai Enterprise Application Access
- Cloudflare Zero Trust
5.3.3 Zscaler Cloud Firewall
Overview
A cloud-based firewall that controls Layer 3 and Layer 4 traffic as part of the Zscaler platform, without physical appliances.
Competitor
- Palo Alto Prisma Access Firewall
- FortiSASE Firewall
- Cisco Secure Access
6. IDENTITY AND ACCESS MANAGER
6.1 OKTA
Overview
Okta is a SaaS-based Identity and Access Management (IAM) provider focused on user identity management and access control.
Okta ensures that the right users access the right applications securely through an identity-centric approach.
Product Okta
6.1.1Okta Single Sign-On
Overview
Allows users to sign in once and access multiple applications, both SaaS and internal, through centralized authentication.
Competitor
- Microsoft Entra ID (Azure AD)
- Ping Identity
- OneLogin
6.1.2 Okta Multi-Factor Authentication
Overview
Adds an additional security layer beyond username and password, such as authenticator apps, push notifications, SMS, or hardware keys.
Competitor
- Microsoft Entra ID MFA
- Duo Security (Cisco)
- RSA SecurID
6.1.3 Okta Lifecycle Management
Overview
Manages the full user account lifecycle, from onboarding and access changes to deprovisioning.
Competitor
- Microsoft Entra ID Governance
- SailPoint
- Saviynt
6.1.4 Okta Adaptive MFA
Penjelesan
Evaluates login risk based on location, device, and user behavior, and enforces additional authentication when higher risk is detected.
Competitor
- Microsoft Conditional Access
- Ping Risk Management
6.1.5 Okta API Access Management
Penjelesan
Secures API access using OAuth and OpenID Connect standards, commonly used in microservices architectures.
Competitor
- PingFederate
- Azure API Management
- Kong
6.1.6 Okta Customer Identity
Overview
Manages external user identities such as customers or portal users, including registration, login, and account management.
Competitor
- Azure AD B2C
- Amazon Cognito
6.2 ENTRUST
Penjelesan
Entrust is a security company focused on digital identity, authentication, cryptography, and transaction security.
It is widely used in highly regulated industries such as banking, finance, government, and organizations handling sensitive data.
Product Entrust
6.2.1 Entrust Identity as a Service
Overview
Provides identity management and authentication services, including single sign-on and identity-based access control.
Competitor
- Okta
- Microsoft Entra ID
- Ping Identity
6.2.2 Entrust Multi-Factor Authentication
Overview
Provides layered authentication using OTPs, mobile apps, smart cards, or hardware tokens.
Competitor
- Duo Security
- RSA SecurID
- Microsoft MFA
6.2.3 Entrust PKI
Overview
Entrust PKI is used to manage digital certificates used for encryption, authentication, and digital signing. Entrust PKI is often used for email security, TLS/SSL, device identity, and enterprise applications.
Competitor
- DigiCert
- GlobalSign
- Microsoft AD CS
6.2.4 Entrust Digital Signing & Transaction Security
Overview
Enables secure digital signing of documents and transactions, ensuring integrity and non-repudiation.
Competitor
- DocuSign
- Adobe Sign
- OneSpan
6.2.5 Entrust nShield HSM
Overview
A hardware security module (HSM) used to securely store and manage cryptographic keys.
Competitor
- Thales Luna HSM
- Utimaco HSM
- AWS CloudHSM
7. ANALYTIC
7.1 PENTAHO
Overview
Pentaho is a Business Intelligence (BI) and Data Integration platform that focuses on data processing, integration, and analysis. Pentaho is widely used to combine data from various sources, clean the data, and then present it in the form of reports, dashboards, or analytical data.
What makes Pentaho attractive is that it is no-code, using only drag-and-drop, so even non-IT users can use it easily. In addition, Pentaho is technology-agnostic, meaning it is not tied to a single technology.
Pentaho Product
7.1.1 Pentaho Data Integration
Overview
Pentaho Data Integration is used to extract, process, and transfer data from one system to another. This process is commonly known as ETL (Extract, Transform, Load).
PDI enables data from databases, files, applications, or other systems to be combined and processed before being used by analytics systems or business applications.
Competitor
- Talend Data Integration
- Informatica PowerCenter
- Microsoft SQL Server Integration Services (SSIS)
- Apache NiFi
7.1.2 Pentaho Business Analytic
Overview
Pentaho Business Analytics (BA) is used to present data in the form of reports, dashboards, and interactive analytics. This product focuses on analyzed data that has already been collected, namely how processed data can be understood by users.
Competitor
- Microsoft Power BI
- Tableau
- Qlik Sense
- SAP BusinessObjects
7.1.3 Pentaho Report Designer
Overview
Pentaho Reporting is used to create reports such as financial reports, operational reports, or periodic reports.
Competitor
- SAP Crystal Reports
- JasperReports
- Microsoft SSRS
7.1.4 Pentaho Data Catalog
Overview
Pentaho Data Catalog is used to manage data metadata, which describes what data an organization has, where the data comes from, and how the data is used. It is commonly used for data governance and data discovery.
Competitor
- Collibra
- Alation
- Informatica Data Catalog
7.2 MICROSTRATEGY
Overview
MicroStrategy is a Business Intelligence (BI) software used to process and present business data in the form of reports and dashboards. MicroStrategy is generally used by large enterprises.
Product Microstrategy
7.2.1 Platform BI Microstrategy
Overview
The main MicroStrategy product is used to create reports and dashboards sourced from data warehouses or enterprise analytics systems. It is usually used by management and analytics teams to view company performance, such as sales, finance, or operations.
Competitor
- SAP BusinessObjects
- IBM Cognos Analytics
- Microsoft Power BI
- Tableau
7.2.2 Semantic Layer Microstrategy
Overview
The semantic layer is a layer that manages data definitions and business calculations. With this approach, a single metric has the same meaning across all reports.
Competitor
- SAP BusinessObjects Universe
- IBM Cognos Framework Manager
7.2.3 Mobile Analytic
Overview
MicroStrategy provides report access through mobile applications. Its function is to allow management to view business data from mobile devices while maintaining security controls.
Competitor
- Power BI Mobile
- Tableau Mobile
7.3 NODEFLUX
Overview
Nodeflux is an Indonesian technology company operating in the field of Artificial Intelligence (AI), specifically computer vision. Nodeflux solutions are used to analyze visual data such as images and videos to support automated decision-making.
Product Nodeflux
7.3.1 Video Analytic
Overview
The main Nodeflux product is an AI-based video analytics platform. This system processes video from cameras to detect objects, count people or vehicles, recognize patterns, and generate analytical data.
Example use cases include traffic monitoring, crowd analysis, and public area surveillance.
Competitor
- Huawei Intelligent Video Analytics
- Hikvision AI Analytics
- SenseTime
- AnyVision
7.3.2 Face Recognition & Identity Analytic
Overview
Nodeflux provides facial recognition modules for identity verification and security monitoring purposes. The system compares faces captured by cameras with available databases.
Competitor
- NEC Face Recognition
- Thales Face Recognition
- SenseTime
7.3.3 Smart City & Traffic Analytics
Overview
This solution focuses on visual data analysis for traffic management and smart city initiatives, such as counting vehicle volume, detecting violations, and monitoring road conditions.
Competitor
- Huawei Smart City Solutions
- Siemens Smart Infrastructure
- Dahua Smart City
7.3.4 Edge AI Platform
Overview
Nodeflux provides an AI platform that can run on edge servers, enabling video processing to be performed close to the cameras. This approach reduces bandwidth requirements and improves real-time responsiveness.
Competitor
- NVIDIA Metropolis
- Intel OpenVINO
- AWS Panorama
8. Managed Services
8.1 Nebula Cloud Console
Overview
Nebula Cloud Console (NCC) is a centralized cloud management platform used to manage, monitor, optimize, and control cloud environments, especially Amazon Web Services (AWS), through a single web interface.
This solution was developed by Central Data Technology (CDT) to help organizations simplify the use and management of cloud services in a centralized and controlled manner.
Product NCC
8.1.1 Centralized Dashboard
Overview
Nebula Cloud Console provides a view that displays an overall picture of the cloud environment, including system performance, service status, resource usage, and health check results.
8.1.2 Integrated Notification & Alarm Center
Overview
This system is equipped with centralized notification and alarm mechanisms, including real-time notifications, capacity- or budget-based alerts, and a single notification center so IT teams can respond to critical events quickly and in a coordinated manner.
8.1.3 Centralized Billing & Cost Management
Overview
Nebula Cloud Console presents billing information from multiple cloud accounts in a centralized view. This feature enables cost usage monitoring, spending analysis, and supports cloud budget control and optimization.
8.1.4 Backup Management
Overview
This platform enables backup scheduling, selection of resources to be backed up, and efficient cross-account backup management through a single console.
8.1.5 Support & Ticketing
Overview
Nebula Cloud Console provides a single dashboard to create, monitor, and follow up on support tickets, connected to 24/7 support services.
8.1.6 Multi Account & Multi Region Support
Overview
This platform supports the management of multiple cloud accounts and multiple regions simultaneously from a single console, without requiring separate logins for each environment.
9. Application Delivery Controller
9.1 F5
9.1.1 BIG-IP Local Traffic Manager (LTM)
Overview
BIG-IP LTM functions as a load balancer and traffic manager. This product distributes traffic across multiple application servers to ensure application availability and stable performance.
Competitor
- Citrix ADC
- HAProxy Enterprise
9.1.2 BIG-IP DNS
Overview
BIG-IP DNS handles DNS traffic and global load balancing, ensuring users are directed to the most optimal application or data center.
Competitor
- Infoblox
- BlueCat
- NS1
9.1.3 NGINX Plus
Overview
NGINX Plus is used as a load balancer, reverse proxy, and API gateway for modern applications.
Compared to BIG-IP, NGINX Plus is more flexible in development support for running in containers, making it suitable for microservices and DevOps environments.
Competitor
- HAProxy Enterprise
- Envoy Proxy
- Traefik Enterprise
