Serving The Innovative Solutions To The Customers

About Us

PT Aldy Berkah Sejahtera (Alestra), established on October 15, 1986, has been focusing in the business of information security solution. Starting from end user security to infrastructure security, Alestra build human capital in IT and security in order to shift customer's IT infrastructure management to secured and controlled environment. Alestra do the mission by creating security Operation Center (SOC) for our main customers.

  • Professional Services
  • Vulnerablility Assesment
  • IT Master Plan
  • Disaster Recovery Plan
  • IT Security Assessment and Remediations
  • IT Security Consultancy
  • IT Security Design
  • Consulting
  • Network Design and Implementations
  • Training
  • IT Security Training
  • Networking Training
  • Web Design Training
  • Computer H/W Maintenance
  • IT Security / Networking Maintenance

Our Vision and Mission


To be the leading and the foremost IT Security and Infrastructure Service Provider in Indonesia


Delivering IT Solutions that meet the Client's needs by utilizing the latest technology.


Intrusion Detection and Prevention System (Radware)

Multilayer Intrusion Prevention and DoS Protection DefensePro® - Radware provides enterprises with comprehensive intrusion prevention, behavioral anomaly detection and Denial of Service (DoS) protection from a wide variety of known and unknown zero-day attacks. This easy-to-use scalable solution protects against worms, viruses, pre-attack probes, server cracking, DoS and other threats. It proactively prevents both network- and server-based attacks while ensuring high performance for legitimate application traffic, even when under attack.

Email Protection (BoxSentry)Authentication / Anti Spam

Advanced, Secure and Powerful Enterprise Solution. The RealMail - BoxSentry Appliance is the most advanced perimeter security solution for ensuring delivery of legitimate email. It is unique in its approach, and is recognized as a new class of email security solution – based on positive email authentication. The RealMail Appliance is a secure gateway appliance that forms part of a multi-layered approach to email security. It is a hardened Linux-based appliance that has the power to support up to 5,000 users* and in excess of 0.5 million messages per day, providing a powerful enterprise-class solution.

Content Collaboration and Communication Technology

Polycom entered the video conferencing market in 1998. Polycom introduced the ViewStation product line which included models with embedded multipoint capabilities, content sharing capabilities, and support for the emerging H.323 IP network protocol. In 2000, Polycom introduced a personal desktop video conferencing appliance called ViaVideo.

The compact device was essentially a web cam with inboard processing capabilities, to offset the compute limitations of most desktop and laptop computers at the time. As computer processing power increased, Polycom transitioned the desktop solution to a software-based client called Polycom PVX.

Centrally Automated Vulnerability Assessment, Patch and Remediation, End Point Security (Lumension)

Security Management Software That Secures Critical Information at the Endpoint By automatically identifying and remediating security and operational vulnerabilities and enforcing application and device use policies at the endpoint, Lumension’s Common Criteria EAL 2 Certified security management software enables government organizations to reduce the risk of network instability and protect the confidentiality and integrity of sensitive data.

Security Connected from Intel Security

McAfee is now part of Intel Security. With its integrated security strategy, innovative approach to hardware-enhanced security, and unique Global Threat Intelligence, Intel Security is intensely focused on developing proactive, proven security solutions and services that protect systems, networks, and mobile devices for business and personal use around the world.

The Security Connected platform is a unified, adaptive framework for encouraging Intel Security and third-party products and services to learn from each other, share threat intelligence and context in real time, and act as a team to keep data and networks safe. It’s a sustainable way to reduce risk, minimize incident volume and response time, and lower overhead and operational costs.

Network Access Control (NAC)

NetClarity's NACwalls appliances are designed to harden your network and provide immediate threat assessment and remediation capabilities. This ensures compliance to the most stringent regulatory guidelines while thwarting malicious attempts to gain access to your network data. Our NACwall appliances can increase the quality of your audit and compliance reporting and decrease the time, effort and expense in doing so. Benefits to you: Simple, continuous network vulnerability audit reports Workflow tools to manage identified threats Immediate blocking of network access to any asset that identified as a threat. Make network access control, vulnerability audits and regulatory compliance simple, automated and real-time with the addition of a NetClarity NACwall.

Security Information and Event Management (SIEM) and Forensic

The RSA enVision™ platform gives organizations a single, integrated 3-in-1 log management solution for: - Simplifying Compliance - Enhancing Security and Risk Mitigation - Optimizing IT and Network Operations through the automated collection, analysis, alerting, auditing, reporting, and secure storage of all logs.

Storage System

NetApp provides an integrated solution that enables storage, delivery, and management of network data and content to achieve your business goals.

Next Generation Security Platform

Palo Alto Networks, Inc. is a network and enterprise security company based in Santa Clara, California. The company’s core products are a platform that includes advanced firewalls designed to provide network security, visibility and granular control of network activity based on application, user, and content identification and cloud-based offerings that extend those firewalls to cover other aspects of security. Palo Alto Networks competes against traditional firewall, IPS and IDS, and UTM vendors including Cisco, Fortinet, Cyberoam, Check Point, Juniper Networks and others.

Blue Coat PacketShaper

Blue Coat PacketShaper delivers integrated visibility, control and compression capabilities in a single appliance. With PacketShaper's application performance monitoring capabilities, IT can identify all the applications on the network and monitor response times and utilization at the application level. In addition, IT can optimize application performance by using granular quality of service (QoS) controls to regulate traffic and increase WAN capacity through application-specific compression techniques. Designed as a scalable, flexible platform, PacketShaper Application Performance Monitoring can be easily configured for additional functionality with a flexible range of appliances that can be enhanced by software modules or hardware components.

Vulnerability Management

Qualys, Inc. is a provider of cloud security, compliance and related services for small and medium-sized businesses and large corporations based in Redwood Shores, California. Founded in 1999, Qualys was the first company to deliver vulnerability management solutions as applications through the web using a "software as a service" (SaaS) model, and as of 2013 Gartner Group for the fifth time gave Qualys a "Strong Positive" rating for these services. It has added cloud-based compliance and web application security offerings.

Qualys has over 7,700 customers in more than 100 countries, including a majority of the Forbes Global 100. The company has strategic partnerships with major managed services providers and consulting organizations including BT, Dell SecureWorks, Fujitsu, IBM, NTT, Symantec, Verizon, and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA).

Cyberoam Unified Threat Management

Cyberoam UTM appliances integrate best-of-breed security and productivity solutions cost-effectively over a single platform. With a single device to manage, a single set up and direct, unified support, these security appliances provide security to the entire organization, including remote offices and road warriors. The Cyberoam UTM Appliance delivers comprehensive protection from existing and emerging threats that include spyware, viruses, spam, DoS, phishing, and pharming attacks. The Cyberoam UTM appliance features include Stateful Inspection Firewall, VPN (SSL VPN & IPSec), Gateway Anti-virus and Anti-spyware, Gateway Anti-Spam, Intrusion Prevention System, Content & Application Filtering, Bandwidth Management and Multiple Link Management.

Data Storage Software

Open-E, Inc. lays its main focus on IP-based storage management software. The company is well known for its Open-E Data Storage Software V7 (DSS V7), a file and block storage management software supporting iSCSIs storage, NAS storage, InfiniBand, and FibreChannel. The software is iSCSI Active-Active Ready for high-availability and additionally includes Remote Mirroring for disaster recovery, WORM (Write Once Read Many) support for digital archiving, and NDMP (Network Data Management Protocol) support for universal backup. Open-E's philosophy is simple: develop high quality software, use the latest technology and maintain a competitive edge in all market areas - for the benefit of customers and partners.

Unified Communication

Avaya provides solutions across multiple channels and devices for better customer experience, increased productivity and enhanced financial performance.

Our Customers


  • Badan Pengkajian dan Penerapan Teknologi (BPPT)
  • Universitas Pertahanan (UNHAN)
  • Badan Kepegawaian Negara (BKN)
  • Badan Pusat Statistik (BPS)
  • Komisi Pemberantasan Korupsi (KPK)
  • Pusat Pelaporan dan Analisis Transaksi Keuangan (PPATK)
  • Kementrian Perindustrian (Kemenperin)
  • Lembaga Pengelola Dana Bergulir Koperasi dan Usaha Mikro, Kecil dan Menengah (LPDB-KUMM)
  • Departemen Pertahanan (Dephan)
  • Kementrian Koordinator Politik Hukum dan Keamanan (Polhukam)


  • Mabes TNI
  • TNI Angkatan Laut (TNI AL)
  • Komando Armada Barat (Koarmabar) TNI AL
  • Komando Armada Timur (Koarmatim) TNI AL
  • TNI Angkatan Udara (TNI AU)
  • Mabes POLRI

Private Sector

  • PLN Distribusi Jawa Timur
  • PT Jasa Raharja
  • Yappindo STEKPI

Alestra - Intel Security

We have been partnering with Intel Security (McAfee) for more than 10 years in Indonesia's government and Military sector, thus bringing the mission to deliver IT Solutions that meet the client's need by utilizing the latest technology. With 30 (thirty) years of experience, Alestra commited to deliver the best protection solution for all our customer datacenters.

Whether you are a security professional or simply looking to learn more about online threats, our researchers will guide you through the current threat landscape. Our analysis helps you understand overall threat trends, how malware and Internet threats are evolving.

Safeguard data and stay compliant with Intel Security enterprise data protection solutions. McAfee Complete Data Protection Suites and McAfee Data Loss Prevention (DLP) solutions provide multilayered protection for data regardless of where it resides—on the network, in the cloud, or at the endpoint. Encryption options include enterprise-grade drive encryption or management of native encryption. As a part of our Security Connected framework, enterprise data protection solutions are fully integrated with McAfee ePolicy Orchestrator software, which unifies and simplifies data security management.

McAfee Complete Data Protection—Advanced
Block unauthorized access to your sensitive information and prevent exfiltration—anytime, anywhere. Strong encryption, DLP, policy-driven security, management of Apple FileVault and Microsoft BitLocker native encryption, and data protection for cloud storage combine with a centralized management platform in our most robust data protection suite.

McAfee Complete Data Protection
Enable data protection with drive, file, folder, removable media encryption, and data protection for cloud storage. This suite includes data encryption integrated with centralized management and encryption for Apple FileVault and Microsoft BitLocker to prevent unauthorized access and loss or theft of sensitive data.

McAfee Complete Data Protection—Essential
Get powerful data encryption with management of native encryption for Apple FileVault and Microsoft BitLocker. This data protection software suite also includes file, folder, removable media encryption, data protection for cloud storage, and centralized security management.

McAfee Total Protection for Data Loss Prevention
Safeguard intellectual property and ensure compliance by protecting sensitive data wherever it lives—on the network, in storage systems, or at the endpoint, while saving time and money with centralized deployment, management, and reporting.