Summary Product Central Data Technology

1. CLOUD

1.1 AWS

Overview
Amazon Web Services (AWS) is a comprehensive cloud computing platform that provides a wide range of IT services. AWS enables organizations to run applications, store data, and manage IT infrastructure without the need to build and maintain their own data centers.
AWS is widely adopted by organizations of all sizes—from startups to large enterprises and government institutions—due to its flexibility, scalability, and pay-as-you-go pricing model.
Product AWS
AWS services are categorized based on their primary functions, including compute, storage, database, and networking.

1.1.1 Compute

1.1.1.1 Amazon EC2

Overview
Amazon Elastic Compute Cloud (EC2) is a virtual server service that allows users to run operating systems and applications in the cloud, similar to running physical or virtual servers in an on-premises data center.
Competitor:

1.1.1.2 AWS Lambda

Overview
AWS Lambda is a serverless computing service that allows users to run application code without managing servers. AWS handles the infrastructure, enabling developers to focus solely on application logic.
Competitor

1.1.1.3 Amazon ECS & Amazon EKS

Overview
Amazon ECS and Amazon EKS are container orchestration services. ECS uses AWS-native orchestration, while EKS is based on Kubernetes.
Competitor

1.1.2 Storage

1.1.2.1 AMAZON S3

Overview
Amazon S3 is an object storage service designed to store large volumes of unstructured data such as files, backups, logs, and application data.
Competitor

1.1.2.2 Amazon EBS

Overview
Amazon Elastic Block Store (EBS) provides block storage directly attached to EC2 instances, similar to SAN or local disks in traditional servers.
Competitor

1.1.2.3 Amazon EFS

Overview
Amazon Elastic File System (EFS) is a shared file storage service that can be accessed simultaneously by multiple EC2 instances.
Competitor

1.1.3 Database

1.1.3.1 Amazon RDS & Amazon Aurora

Overview
Managed relational database services where AWS handles operations such as backup, patching, and high availability.
Competitor

1.1.3.2 Amazon DynamoDB

Overview
A fully managed NoSQL database designed for large-scale, high-performance applications.
Competitor

1.1.4 Network

1.1.4.1 Amazon PVC

Overview
Amazon Virtual Private Cloud (VPC) enables organizations to build isolated virtual networks within AWS.
Competitor

1.1.4.2 Elastic Load Balancer

Overview
Distributes application traffic to maintain availability and performance.
Competitor

1.2 AKAMAI CLOUD (Linode)

Overview
Akamai Cloud, formerly known as Linode, is a cloud infrastructure service focused on providing simple, transparent, and cost-effective cloud computing.
Product Linode
Similar to AWS, Linode provides core cloud services such as compute, storage, and Kubernetes. While its service portfolio is not as extensive as hyperscalers, Linode is an attractive option for customers seeking cost-effective cloud infrastructure with competitive performance.

1.2.1 Compute

Overview
Compute services in Akamai Cloud are delivered through virtual machines known as Linodes. These function like standard virtual servers, used to run operating systems and applications.
Competitor

1.2.2 Kubernetes (LKE – Linode Kubernetes Engine)

Overview
A fully managed Kubernetes service that enables users to run container-based applications without manually managing the Kubernetes control plane.
Competitor

1.2.3 Object Storage

Overview
Object storage for unstructured data such as files, images, backups, and application logs. Functionally similar to Amazon S3, but offered at a significantly more affordable price point.
Competitor

2. INFRASTUCTURE ON-PREMISE

2.1 Hitachi Vantara

Overview
Hitachi Vantara is a leading on-premises infrastructure vendor focused on digital infrastructure and infrastructure services. Its solutions are widely deployed across the Americas, the Middle East, and the Asia-Pacific region, including Japan.
Hitachi Vantara has received numerous industry awards and recognitions from analysts such as Gartner and GigaOm.
Product Hitachi Vantara

2.1.1 Block Storage – Hitachi VSP (Virtual Storage Platform)

Overview
Hitachi’s flagship block storage portfolio, available in multiple series including VSP E Series, VSP One Block, and VSP 5000 Series. All VSP platforms are designed for mission-critical workloads such as databases and virtualized environments.
Product Hitachi VSP

2.1.1.1 VSP E Series

Segmentation: Midrange
Overview
The VSP E Series is an entry-level to midrange enterprise block storage platform with a hybrid architecture, supporting NVMe, SSD, SAS, and NL-SAS drives.
It is ideal for customers who require both high performance and large capacity—using NVMe for critical workloads and SAS/NL-SAS for non-critical workloads.
Competitor

2.1.1.2 VSP One Block

Segmentation: Midrange
Overview
VSP One Block is Hitachi’s latest midrange all-flash storage platform, launched at the end of 2024. It includes a No-Question-Asked (NQA) Guarantee and built-in deduplication and compression technologies.
Competitor

2.1.1.3 VSP 5000 Series

Segmentation: Enterprise
Overview
The VSP 5000 Series is a high-end enterprise block storage platform designed for environments that require zero downtime tolerance.
Competitor

2.2.2 Object Storage – Hitachi VSP One Object

Overview
VSP One Object is an enterprise-grade object storage solution designed to store massive volumes of unstructured data using a distributed architecture.
Typical use cases include data archiving, data lakes, backup repositories, and digital content storage.
Competitor

2.2.3 File Storage Hitachi One File

Overview
VSP One File is an enterprise Network-Attached Storage (NAS) solution that provides file-based access using standard protocols such as NFS and SMB.
Competitor

2.2.4 Server – Hitachi Advance Server

Overview
Hitachi Advanced Server is an x86 server platform designed to run critical workloads such as databases, virtual machines, and enterprise applications.
Competitor

3. OBSERVABILITY

3.1 Dynatrace

Overview
Dynatrace is an enterprise observability and application monitoring platform used to monitor application performance, infrastructure, and digital user experience. It is widely adopted in complex enterprise environments such as microservices-based applications, cloud platforms, and containerized systems.
A key differentiator of Dynatrace is OneAgent, a single agent capable of automatically discovering and monitoring the entire environment.
Product Dynatrace

3.1.1 Dynatrace Application Perfomance Monitoring (APM)

Overview
Dynatrace APM provides end-to-end visibility into application performance—from application code and backend services to the user experience.
It enables real-time detection of performance bottlenecks, errors, and degradations.
Competitor

3.1.2 Dynatrace Insfratucture Monitoring

Overview
Monitors the infrastructure running applications, including servers, virtual machines, containers, Kubernetes, and cloud services.
This capability ensures infrastructure resources are operating normally and not causing application issues.
Competitor

3.1.3 Dynatrace Digital Experience Monitoring (DEM)

Overview
Monitors end-user experience for both web and mobile applications using real user monitoring and synthetic monitoring, enabling organizations to understand application performance from the user’s perspective.
Competitor

3.1.4 Dynatrace Log Monitoring & Analytics

Overview
Provides integrated log analytics correlated with application and infrastructure performance, enabling faster troubleshooting and root cause analysis.
Competitor

3.1.5 Dynatrace Cloud & Kubernetes Monitoring

Overview
Designed specifically for cloud-native environments, including Kubernetes, OpenShift, and microservices architectures.
Competitor

3.1.6 Dynatrace Automation dan AIOps (Davis AI)

Overview
Davis AI automatically analyzes monitoring data, identifies root causes, and provides actionable insights without manual intervention—reducing troubleshooting time and operational complexity.
Competitor

3.2  NetGain

Overview
NetGain is a monitoring and observability platform focused on IT operations, helping teams ensure that applications, servers, networks, and security systems are operating properly.
A key advantage of NetGain is its high level of customization, supported by a dedicated principal team that can tailor the solution to integrate with applications not supported by other vendors.
Product NetGain

3.2.1 NetGain Infrastucture Monitoring

Overview
Monitors servers, virtual machines, storage, and network devices by tracking CPU, memory, disk usage, and system availability.
This enables operations teams to proactively detect capacity issues, performance degradation, or system outages.
Competitor

3.2.2 NetGain Application Perfomance Monitoring (APM)

Overview
Monitors application response time, errors, and service availability, helping teams identify whether issues originate from the application layer or underlying infrastructure.
Commonly used for internal and web-based enterprise applications.
Competitor

3.2.3 NetGain Log Management & Log Analytics

Overview
Centralizes logs from servers, applications, and security devices, making them easier to search and analyze for troubleshooting and audit purposes.
Competitor

3.2.4 NetGain Network Traffic Analytic

Overview
Monitors network traffic to analyze access patterns, bandwidth usage, and potential bottlenecks, helping network teams detect anomalies and optimize performance.
Competitor

3.2.5 NetGain Security Analytics / SIEM

Overview
Processes security events and logs to detect potential threats and abnormal activities. Typically used by security teams as part of Security Operations Center (SOC) workflows.
Competitor

NetGain Network Configuration Management
Overview
Manages and tracks network device configurations, including configuration backups and change history, to reduce the risk of misconfiguration.
Competitor

3.3 ZSCALER

3.3.1 Zslacer Digital Experience

Overview
ZDX monitors user experience when accessing applications and the internet, focusing on network and connectivity performance.
It helps IT teams determine whether issues originate from the network, ISP, endpoint, or application.
Competitor

4. Content Delivery Network (CDN)

4.1 Akamai CDN

Overview
Akamai CDN is used to deliver website and application content from locations closest to end users. Content such as web pages, images, videos, and static files is cached on Akamai edge servers, resulting in faster access times, improved stability, and better user experience.
Competitor

5. SECURITY

5.1 AKAMAI

5.1.1 Akamai Web Application Firewall (WAF)

Overview
Akamai WAF protects web applications and APIs from attacks such as SQL injection, cross-site scripting (XSS), and other application-layer exploits. Protection is enforced at the edge, before traffic reaches the application servers.
Competitor

5.1.2 Akamai Bot Manager

Overview
Akamai Bot Manager is used to detect and control automated bot activity, including both malicious bots and unwanted automated traffic that can overload applications.
Competitor

5.1.3 Akamai Enterprise Application Access (EAA)

Overview
Akamai EAA provides secure access to internal applications without relying on traditional VPNs. It follows a Zero Trust approach, where every access request is continuously verified.
Competitor

5.2 F5

Overview
F5 is a company focused on application delivery and application security. F5 operates between users and applications, ensuring applications remain available, secure, and high-performing—whether deployed in data centers, cloud environments, or hybrid infrastructures.
F5 is particularly strong in enterprise environments, especially for mission-critical business applications, legacy systems, and high-traffic public applications.
Product F5

5.2.1 BIG-IP Advance WAF

Overview
BIG-IP Advanced WAF protects web applications from threats such as SQL injection, cross-site scripting (XSS), and other application-layer attacks.
Competitor

5.2.2 BIG-IP Access Policy Manager (APM)

Overview
BIG-IP APM manages user access to applications, including VPN services, authentication, and role-based access control.
Competitor

5.2.3 F5 BIG-IP Advanced Firewall Manager (AFM)

Overview
BIG-IP AFM is a network firewall solution designed to protect application infrastructure from threats at the network and transport layers (Layer 3 and Layer 4).
AFM runs as a module on the BIG-IP platform, available as both physical and virtual appliances.
Competitor

5.2.4 F5 BIG-IP DDOS Protection

Overview
BIG-IP DDoS Protection is a network and application security solution designed to defend systems against Distributed Denial of Service (DDoS) attacks.
It continuously monitors network traffic to identify abnormal patterns and automatically mitigates attacks without disrupting legitimate services.
Competitor

5.2.5 F5 Distributed Cloud WAF

Overview
A SaaS-based WAF that protects web applications and APIs at the edge, without requiring on-premises appliances.
Competitor

5.2.6 F5 Distributed Cloud DDoS Protection

Overview
A cloud-based DDoS protection service that absorbs and mitigates attacks before they reach customer applications.
Competitor

5.2.7 F5 Distributed Cloud API Security

Overview
Protects APIs from abuse, automated attacks, and data leakage.
Competitor

5.2.8 F5 Distributed Cloud APP Connect

Overview
Securely connects applications running across multiple clouds and data centers.
Competitor

5.2.9 F5 Distributed Cloud Services – Web Apps and API Protection

Overview
F5 Distributed Cloud WAAP is a SaaS-based application security solution designed to protect web applications and APIs against modern cyber threats.
It is built for organizations operating in multi-cloud, hybrid cloud, and edge environments.
Competitor

5.2.10 F5 Distributed Cloud Services – Advanced Bot Protection

Overview
A SaaS-based security service designed to detect and control sophisticated malicious bots targeting web applications and APIs.
It protects against advanced bot attacks that can mimic human behavior and bypass traditional security mechanisms.
Competitor

5.2.11 F5 Distributed Cloud Services – Client Side Defense

Overview
A cloud-based security service designed to protect web applications from threats originating on the client side (browser), including third-party JavaScript.
It prevents sensitive data theft that occurs after a page loads but before data is sent back to the server.
Competitor

5.2.12 F5 Nginx – Nginx App Protect

Overview
A software-based application security solution designed to protect modern web and API-based applications.
Part of the F5 NGINX portfolio, it is optimized for dynamic environments such as cloud, containers, and microservices.
Competitor

5.2.13 F5 Nginx – L7 DDOS protection

Overview
Protects applications from Layer 7 (application-layer) DDoS attacks, which resemble legitimate traffic but aim to overwhelm application logic through excessive requests.
These attacks are more difficult to detect than Layer 3 or Layer 4 attacks.
Competitor

5.2.14 F5 Hardware Segmentation

  1. BIG-IP r2600 Series

Segmentation: Entry level
Overview
Designed for organizations requiring basic application delivery and security with relatively low traffic volumes.
Competitor

  1. BIG-IP r2800 Series

Segmentation: Midrange
Overview
Designed for mid-sized enterprise environments with higher performance and SSL processing requirements.
Competitor

  1. BIG-IP r10600 Series

Segmentation: Enterprise
Overview
The r10600 series is intended for large organizations with high-performance requirements and significant application traffic. These devices are widely used in primary enterprise data centers, large-scale digital services, and environments requiring intensive SSL encryption.
Competitor

  1. BIG-IP r10800 Series

Segmentation: Enterprise besar / high performance
Overview
The r10800 series is one of F5’s flagship devices for enterprise environments with very high application workloads. This series focuses primarily on large-scale Layer 7 processing and SSL offloading, making it ideal for public digital services, e-commerce, and high-traffic application platforms.
Competitor

  1. BIG-IP r10900 Series

Segmentation: Enterprise besar hingga hyperscale
Overview
The r10900 series offers increased capacity and performance over the r10800, particularly for environments requiring a high number of simultaneous connections. These devices are typically used in large-scale enterprise environments, service providers, or organizations with globally operating systems.
Competitor

  1. BIG-IP r12900 Series

Segmentation: Hyperscale / service provider / cloud provider
Overview
The r12900-DS series is F5’s highest-capacity device in the rSeries line. It is intended for hyperscale environments, such as cloud service providers, telecommunications operators, and data centers, with high-throughput and application security requirements.
Competitor

5.3 ZSCALER

Overview

Zscaler is a provider of cloud-based access security (Zero Trust) solutions. Unlike traditional security vendors that rely on devices in data centers, Zscaler was designed from the outset as a SaaS service.

Zscaler’s role is at the user’s access point to the internet and applications. Its goal is to secure access without the need for a traditional VPN.

5.3.1 .Zscaler Internet Access

Overview
ZIA is used to secure user access to the internet. All user internet traffic is routed to the Zscaler cloud and then inspected by various security controls such as firewalls, URL filtering, malware protection, and data loss prevention. ZIA replaces traditional secure web gateways and some perimeter firewall functions.
Competitor

5.3.2 Zscaler Private Access

Overview
ZPA provides secure access to internal applications without VPNs, using a Zero Trust approach where users connect only to authorized applications.
Competitor

5.3.3 Zscaler Cloud Firewall

Overview
A cloud-based firewall that controls Layer 3 and Layer 4 traffic as part of the Zscaler platform, without physical appliances.
Competitor

6. IDENTITY AND ACCESS MANAGER

6.1 OKTA

Overview
Okta is a SaaS-based Identity and Access Management (IAM) provider focused on user identity management and access control.
Okta ensures that the right users access the right applications securely through an identity-centric approach.
Product Okta

6.1.1Okta Single Sign-On

Overview
Allows users to sign in once and access multiple applications, both SaaS and internal, through centralized authentication.
Competitor

6.1.2 Okta Multi-Factor Authentication

Overview
Adds an additional security layer beyond username and password, such as authenticator apps, push notifications, SMS, or hardware keys.
Competitor

6.1.3 Okta Lifecycle Management

Overview
Manages the full user account lifecycle, from onboarding and access changes to deprovisioning.
Competitor

6.1.4 Okta Adaptive MFA

Penjelesan
Evaluates login risk based on location, device, and user behavior, and enforces additional authentication when higher risk is detected.
Competitor

6.1.5 Okta API Access Management

Penjelesan
Secures API access using OAuth and OpenID Connect standards, commonly used in microservices architectures.
Competitor

6.1.6 Okta Customer Identity

Overview
Manages external user identities such as customers or portal users, including registration, login, and account management.
Competitor

6.2 ENTRUST

Penjelesan
Entrust is a security company focused on digital identity, authentication, cryptography, and transaction security.
It is widely used in highly regulated industries such as banking, finance, government, and organizations handling sensitive data.
Product Entrust

6.2.1 Entrust Identity as a Service

Overview
Provides identity management and authentication services, including single sign-on and identity-based access control.
Competitor

6.2.2 Entrust Multi-Factor Authentication

Overview
Provides layered authentication using OTPs, mobile apps, smart cards, or hardware tokens.
Competitor

6.2.3 Entrust PKI

Overview
Entrust PKI is used to manage digital certificates used for encryption, authentication, and digital signing. Entrust PKI is often used for email security, TLS/SSL, device identity, and enterprise applications.
Competitor

6.2.4 Entrust Digital Signing & Transaction Security

Overview
Enables secure digital signing of documents and transactions, ensuring integrity and non-repudiation.
Competitor

6.2.5 Entrust nShield HSM

Overview
A hardware security module (HSM) used to securely store and manage cryptographic keys.
Competitor

7. ANALYTIC

7.1 PENTAHO

Overview
Pentaho is a Business Intelligence (BI) and Data Integration platform that focuses on data processing, integration, and analysis. Pentaho is widely used to combine data from various sources, clean the data, and then present it in the form of reports, dashboards, or analytical data.
What makes Pentaho attractive is that it is no-code, using only drag-and-drop, so even non-IT users can use it easily. In addition, Pentaho is technology-agnostic, meaning it is not tied to a single technology.
Pentaho Product

7.1.1 Pentaho Data Integration

Overview
Pentaho Data Integration is used to extract, process, and transfer data from one system to another. This process is commonly known as ETL (Extract, Transform, Load).
PDI enables data from databases, files, applications, or other systems to be combined and processed before being used by analytics systems or business applications.
Competitor

7.1.2 Pentaho Business Analytic

Overview
Pentaho Business Analytics (BA) is used to present data in the form of reports, dashboards, and interactive analytics. This product focuses on analyzed data that has already been collected, namely how processed data can be understood by users.
Competitor

7.1.3 Pentaho Report Designer

Overview
Pentaho Reporting is used to create reports such as financial reports, operational reports, or periodic reports.
Competitor

7.1.4 Pentaho Data Catalog

Overview
Pentaho Data Catalog is used to manage data metadata, which describes what data an organization has, where the data comes from, and how the data is used. It is commonly used for data governance and data discovery.
Competitor

7.2 MICROSTRATEGY

Overview
MicroStrategy is a Business Intelligence (BI) software used to process and present business data in the form of reports and dashboards. MicroStrategy is generally used by large enterprises.
Product Microstrategy

7.2.1 Platform BI Microstrategy

Overview
The main MicroStrategy product is used to create reports and dashboards sourced from data warehouses or enterprise analytics systems. It is usually used by management and analytics teams to view company performance, such as sales, finance, or operations.
Competitor

7.2.2 Semantic Layer Microstrategy

Overview
The semantic layer is a layer that manages data definitions and business calculations. With this approach, a single metric has the same meaning across all reports.
Competitor

7.2.3 Mobile Analytic

Overview
MicroStrategy provides report access through mobile applications. Its function is to allow management to view business data from mobile devices while maintaining security controls.
Competitor

7.3 NODEFLUX

Overview
Nodeflux is an Indonesian technology company operating in the field of Artificial Intelligence (AI), specifically computer vision. Nodeflux solutions are used to analyze visual data such as images and videos to support automated decision-making.
Product Nodeflux

7.3.1 Video Analytic

Overview
The main Nodeflux product is an AI-based video analytics platform. This system processes video from cameras to detect objects, count people or vehicles, recognize patterns, and generate analytical data.
Example use cases include traffic monitoring, crowd analysis, and public area surveillance.
Competitor

7.3.2 Face Recognition & Identity Analytic

Overview
Nodeflux provides facial recognition modules for identity verification and security monitoring purposes. The system compares faces captured by cameras with available databases.
Competitor

7.3.3 Smart City & Traffic Analytics

Overview
This solution focuses on visual data analysis for traffic management and smart city initiatives, such as counting vehicle volume, detecting violations, and monitoring road conditions.
Competitor

7.3.4 Edge AI Platform

Overview
Nodeflux provides an AI platform that can run on edge servers, enabling video processing to be performed close to the cameras. This approach reduces bandwidth requirements and improves real-time responsiveness.
Competitor

8. Managed Services

8.1 Nebula Cloud Console

Overview
Nebula Cloud Console (NCC) is a centralized cloud management platform used to manage, monitor, optimize, and control cloud environments, especially Amazon Web Services (AWS), through a single web interface.
This solution was developed by Central Data Technology (CDT) to help organizations simplify the use and management of cloud services in a centralized and controlled manner.
Product NCC

8.1.1 Centralized Dashboard

Overview
Nebula Cloud Console provides a view that displays an overall picture of the cloud environment, including system performance, service status, resource usage, and health check results.

8.1.2 Integrated Notification & Alarm Center

Overview
This system is equipped with centralized notification and alarm mechanisms, including real-time notifications, capacity- or budget-based alerts, and a single notification center so IT teams can respond to critical events quickly and in a coordinated manner.

8.1.3 Centralized Billing & Cost Management

Overview
Nebula Cloud Console presents billing information from multiple cloud accounts in a centralized view. This feature enables cost usage monitoring, spending analysis, and supports cloud budget control and optimization.

8.1.4 Backup Management

Overview
This platform enables backup scheduling, selection of resources to be backed up, and efficient cross-account backup management through a single console.

8.1.5 Support & Ticketing

Overview
Nebula Cloud Console provides a single dashboard to create, monitor, and follow up on support tickets, connected to 24/7 support services.

8.1.6 Multi Account & Multi Region Support

Overview
This platform supports the management of multiple cloud accounts and multiple regions simultaneously from a single console, without requiring separate logins for each environment.

9. Application Delivery Controller

9.1 F5

9.1.1 BIG-IP Local Traffic Manager (LTM)

Overview
BIG-IP LTM functions as a load balancer and traffic manager. This product distributes traffic across multiple application servers to ensure application availability and stable performance.
Competitor

9.1.2 BIG-IP DNS

Overview
BIG-IP DNS handles DNS traffic and global load balancing, ensuring users are directed to the most optimal application or data center.
Competitor

9.1.3 NGINX Plus

Overview
NGINX Plus is used as a load balancer, reverse proxy, and API gateway for modern applications.
Compared to BIG-IP, NGINX Plus is more flexible in development support for running in containers, making it suitable for microservices and DevOps environments.
Competitor

Others

Don’t miss out!

Sign up for our newsletter and stay up to date.

Privacy & Policy

PT Central Data Technology (“CDT” atau “kami”) sangat berkomitmen untuk memastikan bahwa privasi Anda dilindungi dengan sebaik-baiknya sebagai hal yang sangat penting bagi kami. Melalui https://blog.centraldatatech.com/, kami akan mengatur penggunaan Anda terhadap situs web ini, termasuk semua halaman dalam situs web ini (secara kolektif disebut di bawah ini sebagai “Situs Web ini”), kami ingin berkontribusi dalam menyediakan lingkungan yang aman dan terjamin bagi pengunjung.

Berikut adalah ketentuan kebijakan privasi (“Kebijakan Privasi”) antara Anda (“Anda” atau “Anda”) dan CDT. Dengan mengakses situs web ini, Anda mengakui bahwa Anda telah membaca, memahami, dan menyetujui untuk terikat oleh Kebijakan Privasi ini.

Penggunaan Layanan Langganan oleh CDT dan Pelanggan Kami

Ketika Anda meminta informasi dari CDT dan memberikan informasi yang secara pribadi mengidentifikasi Anda atau memungkinkan kami untuk menghubungi Anda, Anda setuju untuk mengungkapkan informasi tersebut kepada kami. CDT dapat mengungkap informasi tersebut hanya untuk keperluan pemasaran, promosi, dan aktivitas sebatas untuk CDT dan Situs Web ini.

Pengumpulan Informasi

Anda bebas menjelajahi Situs Web ini tanpa memberikan informasi pribadi tentang diri Anda. Ketika Anda mengunjungi Situs Web atau mendaftar untuk layanan langganan, kami menyediakan beberapa informasi navigasional untuk Anda mengisi informasi pribadi Anda agar dapat mengakses beberapa konten yang kami tawarkan.

CDT dapat mengumpulkan data pribadi Anda seperti nama Anda, alamat email, nama perusahaan, nomor telepon, dan informasi lainnya tentang Anda atau bisnis Anda. Kami mengumpulkan data Anda dengan berbagai cara, secara online dan offline. CDT mengumpulkan data Anda secara online menggunakan fitur media sosial, pemasaran melalui email, situs web, dan teknologi cookies. Kami mungkin mengumpulkan data Anda secara offline dalam acara-acara seperti konferensi, pertemuan, lokakarya, dll. Namun, kami tidak akan menggunakan atau mengungkapkan informasi tersebut kepada pihak ketiga atau mengirimkan email yang tidak diminta ke salah satu alamat yang kami kumpulkan, tanpa izin Anda. Kami memastikan bahwa identitas pribadi Anda hanya akan digunakan sesuai dengan Kebijakan Privasi ini.

Bagaimana CDT Menggunakan Informasi yang Dikumpulkan

CDT hanya menggunakan informasi yang dikumpulkan sesuai dengan kebijakan privasi ini. Pelanggan yang berlangganan layanan langganan kami diwajibkan melalui perjanjian dengan mereka untuk mematuhi Kebijakan Privasi ini.

Selain penggunaan informasi Anda, kami dapat menggunakan informasi pribadi Anda untuk:

  • Meningkatkan pengalaman penjelajahan Anda dengan mempersonalisasi situs web dan meningkatkan layanan langganan.
  • Mengirim informasi tentang CDT.
  • Mempromosikan layanan kami kepada Anda dan berbagi konten promosi dan informatif dengan Anda sesuai dengan preferensi komunikasi Anda.
  • Mengirim informasi kepada Anda mengenai perubahan dalam syarat layanan pelanggan kami, Kebijakan Privasi (termasuk kebijakan cookie), atau perjanjian hukum lainnya.

Teknologi Cookies

Cookies adalah potongan kecil data yang situs web transfer ke hard drive komputer pengguna ketika pengguna mengunjungi situs web. Cookies dapat mencatat preferensi Anda saat mengunjungi situs tertentu dan memberikan keuntungan dalam mengidentifikasi minat pengunjung kami untuk analisis statistik situs kami. Informasi ini dapat memungkinkan kami untuk meningkatkan konten, memodifikasi, dan membuat situs kami lebih ramah pengguna.

Cookies digunakan untuk beberapa alasan, seperti alasan teknis agar situs web kami dapat beroperasi. Cookies juga memungkinkan kami untuk melacak dan mengarahkan minat pengguna kami untuk meningkatkan pengalaman situs web dan layanan langganan kami. Data ini digunakan untuk memberikan konten dan promosi yang disesuaikan dengan pelanggan yang memiliki minat pada subjek tertentu.

Anda memiliki hak untuk memutuskan apakah menerima atau menolak cookies. Anda dapat mengedit preferensi cookies Anda melalui pengaturan browser. Jika Anda memilih untuk menolak cookies, Anda masih dapat menggunakan situs web kami, meskipun akses Anda ke beberapa fungsi dan area situs web kami mungkin terbatas.

Situs Web ini juga dapat menampilkan iklan dari pihak ketiga yang berisi tautan ke situs web lain yang menarik. Setelah Anda menggunakan tautan ini untuk meninggalkan situs kami, harap dicatat bahwa kami tidak memiliki kendali atas situs tersebut. CDT tidak dapat bertanggung jawab atas perlindungan dan privasi informasi yang Anda berikan saat mengunjungi situs web tersebut, dan Kebijakan Privasi ini tidak mengatur situs web tersebut.

Kontrol Data Pribadi Anda

CDT memberikan kendali kepada Anda untuk mengelola data pribadi Anda. Anda dapat meminta akses, koreksi, pembaruan, atau penghapusan informasi pribadi Anda. Anda dapat berhenti berlangganan dari aktivitas pemasaran kami dengan mengklik “berhenti berlangganan” di bagian bawah email kami atau menghubungi kami langsung untuk menghapus Anda dari daftar langganan kami.

Kami akan menjaga informasi pribadi Anda agar tetap akurat, dan kami memungkinkan Anda untuk memperbaiki atau mengubah informasi identifikasi pribadi Anda melalui marketing@centraldatatech.com

Jangan lewatkan!

Daftar untuk newsletter kami dan tetap terkini.

Privacy & Policy

PT Central Data Technology (“CDT” or “us”) is strongly committed to ensuring that your privacy is protected as utmost importance to us. https://www.centraldatatech.com/ , we shall govern your use of this website, including all pages within this website (collectively referred to herein below as this “Website”), we want to contribute to providing a safe and secure environment for visitors.

The following are terms of privacy policy (“Privacy Policy”) between you (“you” or “your”) and CDT. By accessing the website, you acknowledge that you have read, understood and agree to be bound by this Privacy Policy

Use of The Subscription Service by CDT and Our Customers

When you request information from CDT and supply information that personally identifies you or allows us to contact you, you agree to disclose that information with us. CDT may disclose such information for marketing, promotional and activity only for the purpose of CDT and the Website.

Collecting Information

You are free to explore the Website without providing any personal information about yourself. When you visit the Website or register for the subscription service, we provide some navigational information for you to fill out your personal information to access some content we offered.

CDT may collect your personal data such as your name, email address, company name, phone number and other information about yourself or your business. We are collecting your data in some ways, online and offline. CDT collects your data online using features of social media, email marketing, website, and cookies technology. We may collect your data offline in events like conference, gathering, workshop, etc. However, we will not use or disclose those informations with third party or send unsolicited email to any of the addresses we collect, without your express permission. We ensure that your personal identities will only be used in accordance with this Privacy Policy.

How CDT Use the Collected Information

CDT use the information that is collected only in compliance with this privacy policy. Customers who subscribe to our subscription services are obligated through our agreements with them to comply with this Privacy Policy.

In addition to the uses of your information, we may use your personal information to:

  • Improve your browsing experience by personalizing the websites and to improve the subscription services.
  • Send information about CDT.
  • Promote our services to you and share promotional and informational content with you in accordance with your communication preferences.
  • Send information to you regarding changes to our customers’ terms of service, Privacy Policy (including the cookie policy), or other legal agreements

Cookies Technology

Cookies are small pieces of data that the site transfers to the user’s computer hard drive when the user visits the website. Cookies can record your preferences when visiting a particular site and give the advantage of identifying the interest of our visitor for statistical analysis of our site. This information can enable us to improve the content, modifying and making our site more user friendly.

Cookies were used for some reasons such as technical reasons for our website to operate. Cookies also enable us to track and target the interest of our users to enhance the experience of our website and subscription service. This data is used to deliver customized content and promotions within the Helios to customers who have an interest on particular subjects.

You have the right to decide whether to accept or refuse cookies. You can edit your cookies preferences on browser setup. If you choose to refuse the cookies, you may still use our website though your access to some functionality and areas of our website may be restricted.

This Website may also display advertisements from third parties containing links to other websites of interest. Once you have used these links to leave our site, please note that we do not have any control over the website. CDT cannot be responsible for the protection and privacy of any information that you provide while visiting such websites and this Privacy Policy does not govern such websites.

Control Your Personal Data

CDT give control to you to manage your personal data. You can request access, correction, updates or deletion of your personal information. You may unsubscribe from our marketing activity by clicking unsubscribe us from the bottom of our email or contacting us directly to remove you from our subscription list.

We will keep your personal information accurate, and we allow you to correct or change your personal identifiable information through marketing@centraldatatech.com