Enterprise solutions are the solutions we o˜er to the customer fromswitching solutions, servers, storage, back-up, thin client, zero clientsystem to centralization and virtualization (virtual applications and virtual hardware). The more rapid development of information systems and technology today, we are of the PT. Trikarasa Sempurna Sistemindo will always strive to meet all customer needs in realizing the objectives to be achieved.

Go beyond hyperconverged infrastructure

Hyperconvergence can bring radical simplicity to private clouds. But, it takes much more to build an enterprise datacenter with the power of public cloud.

The Xtreme Computing Platform is a 100% software-driven infrastructure solution that natively converges storage, compute and virtualization into a turnkey appliance that can be deployed in minutes to run any application out of the box. Datacenter capacity can be easily expanded one node at a time with no disruption, delivering linear and predictable scalability with pay-as- you-grow flexibility and eliminates complexity and allows IT to drive better business outcomes.

Hyper convergence is built with the same web-scale technologies and architectures that power leading Internet and cloud infrastructures, such as Google, Facebook, and Amazon – and runs any workload at any scale. The Xtreme Computing Platform brings together web-scale engineering with consumer-grade management to make infrastructure invisible and elevate IT teams so they can focus on what matters most – applications.


  • Fast Deployment
  • Scale-out One Node at a Time
  • Predictable Performance
  • One Platform to Manage
  • 40-60% Lower TCO


Data is critical for any business and storage systemsTrikarsa provides expert advice when businesses make a decision to upgrade their storage solution. A custom designed solution can mean lower costs for data storage costs and more e°cient business operations. We will ensure you are provided with a storage solution capable of supporting your business needs and scalable for the future.If your business is already working at storage capacity, this can bring serious resource issues and interruptions are likely to occur and may even lead to downtime of business critical IT systems which has the ability to impact the service to your customers.


  • Recovery Point Objective (RPO)
  • Test Recovery Objective (TRO)
  • Recovery Time Objective
  • Replication
  • Migration



In addition to the traditional 'speeds and feeds' philosophy, we also leverage a methods of technologies to design, implement and support various network and infrastructure solutions with both security and quality of service in mind. As organizations constantly evolve, it is critical that the foundation on which all network services depend is both reliable and secure. Our engineering teams are cross certified in multiple infrastructure solutions and will assist with the design, implementation and support of those components required to uphold and maintain the stability of your core environment. Our Infrastructure services and solutions encompass all aspects of critical back-end IT environments.

Our network engineers and consultants have advanced certifications in network infrastructure, so you know you’re getting the help you need when you work with us. Through our network infrastructure solutions, Mindsight will enable you to increase productivity and capture new business, all while lowering both capital and operating costs.


  • LAN/WAN Design, Installation and Configuration
  • Wireless & Connectivity
  • VoIP Solutions
  • Load Balancing Solutions (Network, Servers & Applications, Internet)
  • Bandwidth Management
  • WAN Optimization
  • Caching and Proxy Solutions
  • Network Audits & Base-lining


PT. Trikarsa Sempurna Sistemindo specializes itself in the design and installation of structured cabling systems on new construction or corporate relocation, whether upgrading current cabling networks, relocating offces or upfitting facilities.

Our engineers and installation technicians are highly trained and take responsibility of your network project from design to implementation. We provide products and services designed to build and manage local area networks and wide area network infrastructures for customers large and small alike.

Professional cable and wiring installers will work around your business hours to ensure your satisfaction. Our dedication to customer service and project management is hard to match as we strive to best align business strategies with business technology.


  • Voice and Data LAN Cabling
  • Facsimile LAN Cabling
  • Low-Voltage LAN Wiring
  • Adds, Moves, and Changes
  • Building to Building LAN Cabling & Wiring
  • New and Old Buildings LAN Wiring
  • LAN Cabling Repairs
  • LAN Design
  • Cat 3, Cat 5, and Cat 6 LAN Wiring
  • Single and Multiple Floor LAN Cabling and Wiring



Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access.

Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.


PT. Trikarsa Sempurna Sistemindo was built on top quality personal service and a genuine concern for its customers. We bring together highly trained professional technicians and a state-of-the-art product line to provide the most comprehensive security source. Our expertise and experience in security systems will prove invaluable.

Security Camera/CCTV Security cameras nowadays form part of surveillance systems for all sorts of settings, from convenience stores to parking areas to offices and homes.

Access Control
Physical Access Control refers to the practice of restricting entrance to a property, building or room to authorized people. This can be accomplished by a person, such as a receptionist or guard, or by mechanical means such as locks and keys.

Surveilance systems (CCTV) are being installed in the following applications.

  • Banking Industry
  • Commercial office buildings and campuses
  • Residential Homes and Home Owner Associations
  • Multi-unit apartment properties
  • Industrial and manufacturing
  • Retail and wholesale businesses
  • Warehousing and supply chain management


IT Security Technology which are Delivered by Trikarsa Consist of some Layers :

Perimeter Level Layer
We provide comprehensive solutions enable organizations to secure deep protection without compromising network performance by network, internal network, server farm network and DMZ network

Gateway Level Layer
When we open certain port (services) such as smtp, pop3, http, https and etc on perimeter layer to other network zones. The threat will be there, by implementing our gateway solution (web and mail), we can reduce and eliminate threats regarding web & mail threat such as spam, malicious web, etc.

Internal Network Layer
treatments. Beside implementing departmental VLAN, we also need a solution which can drop or isolate a malicious computer in our internal LAN and redirect it by using certain enforcement mechanism such as redirect it to our patch and vulnerability technology solution.

Server & Endpoint Layer
Common traditional AV virus is not enough to protect server & endpoint, we need more than this. We need a complete and comprehensive server and endpoint protection such as: device control, application control, management and data loss protection.

Confidentiality is defined as preventing unauthorized disclosure of data. Confidentiality security services prevent disclosure of data in storage, being processed on a local machine, transiting a local network, or flowing over a public Internet. An aspect of confidentiality is “anonymity,” a service that prevents disclosure of information that could lead to the identification of the end user.

Risk Assessment & Compliance
With few exceptions, whether related to financial, physical, or technological resources, different types of risk can be calculated using the same universal formula. Risk can be defined by the following calculation:



We offer two great virtual compute services. A Virtual Server (VPS) and Virtual Data Center (VDC). They are related but they have significantly different purposes. In a traditional physical sense, a data center building allows the co-location of lots of racks containing servers. The same theory applies within Zettagrid but the items are virtual.

Virtual Server (VPS)

A Virtual Server is a standalone virtual image that contain the operating system (Windows, Linux etc).

Virtual Data Center (VDC)

A Virtual Data Center is the management environment that acts as a container for many Virtual Servers or VMs.


Offsite Backup with Confidence

Veeam Backup makes it easy for Veeam customers to extend their backup infrastructure to the cloud. When you are running Veeam Availability Suite, Veeam Backup & Replication or Veeam Backup Essentials in your local private on-premises servers you can now select Zettagrid as a target for your offsite backups.

Simple Backup
We have made Veeam Backup as simple as possible. You only pay a low fee per VM and storage, nothing else. Monthly pay as you go pricing without any contract.

Free Data Transfer
Use Zettagrid as your Veeam Backup provider and you will not incur any data transfer charges from us. Backup and restore as much as you like.

Setup in Minutes
Within minutes of signing up with Zettagrid you will be able to use Veeam Backup service. Choose how much storage you want or need then start backing-up without any waiting.



Disasters, such as floods, fires, equipment failure, or terrorism, can strike with little or no time for warning.

Recovering from the impact of a disaster can be a massive undertaking if companies are not prepared. The downtime alone can be very expensive. The difference between companies which successfully manage crisis and those which do not is in the business continuity and disaster recovery planning.

Traditionally, disaster recovery solutions required significant investment, with adequate resourcing from an IT team, with lengthy set up and training while managing many teams and resources.

We have removed the complex setup and the financial risk, making it easy and affordable to get the security and risk mitigation you need to protect your business and your customers.

SecondSite is a great product and has so many benefits to partners and customers, we’ve tried to keep the list as short as we could and came up with the below:

Low RPOs: The SecondSite DR solution can give Recovery Point Objectives (RPOs) of as little as 3 seconds. DR you can test: A lot of solutions are great but too hard to properly test. SecondSite allows you to do full ring fenced testing during business hours without pausing replication or impacting production.

Low RTOs: Right after you hit the Failover button we can have your VMs up and running in a few minutes anytime day or night giving you a great Recovery Time Objective (RTO).

Simple Pricing: Lets not kid ourselves, you can pour good money after bad into DR projects that end up costing millions and often don’t deliver. We have made it simple, $99 per VM, no hidden costs, contracts or gotchas.

Automation, Automation, Automation: At Zettagrid if we can’t automate it we don’t want to do it. Take advantage of all the development we’ve done from our mature VDC product, networking and the Zerto product itself to make life easier for your company.

Multi-Hypervisor: Yes, you can protect your on premise environment no matter if you use either VMware or Hyper-V.

Scalability: No matter whether you need protection of 1 VM or 1000, this product allows for it all. Gone are the days when a solution this mature is only available to large enterprise customers.

Multiple Australian Data Centres: Take your pick, do you want it in the same state as you or would you prefer it in Perth or Melbourne, or even Sydney perhaps?

Real-time Monitoring: At any stage you can log into the portal and check exactly what RPO you are getting. You can find out graphically whether there is network congestion or anything in the way of you having a simple and painless DR failover if it were required.

MyAccount UI: Enjoy purchasing and managing this product from our familiar MyAccount Portal with granular configuration of components.

Management Reports: We have made over 20 different reports available to make reporting to senior management or the board about how protected the company is from disasters a simple process.

Software Solution: Since this is totally a software based solution it means that there are no more underutilised SANs, servers and switches out in your DR site going rusty. No more requirement to buy new hardware for the DR site every 3-5 years even though it never gets used. Our solution is truly an Opex solution that you pay by the month.

Direct Ethernet Connections: Is your outbound internet not good enough for your DR requirements? We can set you up with whatever link size or type that you need.

Colocation: What about if you also have non-virtualised assets such as firewalls or tape libraries? Yes, we can house them in racks nearby and make them available by cross connect.

Expert Support: We at Zettagrid have done countless successful implementations, we know what works and what doesn’t. Let our experience in providing DR guide you to a successful implementation. Don’t reinvent the wheel.



PT. Trikarsa Sempurna Sistemindo helps you gain increased visibility into service delivery by helping you develop business focused processes. We deliver Information Technology (IT) Outsourcing Services with the same level of transparency.

PT. Trikarsa Sempurna Sistemindo is recognized for creating career enhancing opportunities for customers’ IT employees. Our excellent IT professionals and our ability to leverage intellectual capital has led to one of the most respected groups of IT skills in the industry.

IT Outsourcing Service Capabilities

  • Be responsible for hardware (PCs, laptops, servers, printers, etc.) installation to meet companies’ Standard Operating Procedure.
  • Diagnose and resolve hardware/software problem and user service request.
  • Manage equipment installation (install, configure, and test to meet Security and Control Guidelines)
  • Be responsible to ensure the most updated antivirus definitions are properly applied on all PC laptops and desktops and all servers at their premises.
  • Provide support to the operation of Local Area Network and Wide Area Network connectivity and security, problem-solving and configuration network access for PCs and Notebooks.
  • IT Outsourcing should protect and maintain confidentiality of customers’ business information and should not share it with internal or external party in any circumstances
  • Be responsible for support performance by delivering reports regularly at least once a month

IT Outsourcing Service Benefit

  • Focus in-house resources on core functions
  • Reduce downtime due to software and hardware defects
  • Save personnel costs
  • Enjoy improved quality of information systems services
  • Enjoy increased flexibility
  • Enjoy increased access to new technology
  • Provide alternatives to in-house costs
  • Stabilize information systems costs
  • Save technology costs
  • Re-engineer process
  • Reduce technological obsolescence risk.



Maintenance Services

“Minimize Downtime and maximize productivity with Preventive Maintenance”. That's our motto for maintenance services product. PT. Trikarsa Sempurna Sistemindo offers service contracts for the maintenance of your IT equipment.

We offer customized agreement and standard agreement. Our customized service contract can be modified to your specific business. Service contracts help protect your IT investment and save your money over the life of your system.

Maintenance Service Capabilities

  • Analyze and troubleshoot problems of the computer system, including software and hardware (if problem occurred cause by the hardware component failure, the vendor will be contacted).
  • Provide Assistance in operating hardware and equipment.
  • Data backup and restore practices. The data itself remains fully under the responsibility
  • Manage Equipment Installation ( Install, configure, and test to meet Security and Control Guidelines )
  • Be responsible to ensure the Most Updated antivirus definitions are properly applied on all PC laptops and desktops and all servers at their premises.
  • Provide support to the operational of Local Area Network and Wide Area Network connectivity and Security, Solving problem and configuration network access for PC and Notebook.

Maintenance Service Benefit

  • Optimize performance by performing regularly scheduled analysis, maintenance, and cleaning of your computer system,
  • Extend Equipment Life by Routine maintenance not only enhances performance, it extends the life of your equipment by keeping it in top operation condition.
  • Maximize Security by Routine updates and analysis assures the best possible security of your equipment and data.
  • Help budget by erasing costly repairs for Expired Warranty Hardware issue.


To give comfort to its main customers, PT. Trikarsa Sempurna Sistemindo establish or provide hardware repair services, and it also does not rule out accepting new customers. We repair or upgrade all major brandnames of computers (PCs), laptops (Notebooks), servers, LCD monitors, printers and other hardware.

Computer Hardware Repair Capabilities

  • Highly trained Technician to detect your hardware system failure
  • 2 hour response time maximum calculated from compalints received
  • The checking and repair process can be conducted in client’s place

Computer hardware repair Provides the following Support Services:

  • Phone Support – Either at your site or our call center
  • After Hours Phone Support Our call center take the call from your staff
  • Tool Identification and Implementation Services
  • On-Site Deskside Support Services