Lintasarta

Lintasarta

Speciality: Comprehensive Penetration Testing and Cybersecurity Assessments

Jakarta, Indonesia 3105 employees
[01] About

Indonesia-based IT services and consulting company founded in 1988; 1,813 employees (+9.5% YoY growth), $113M revenue; offers ICT solutions, digital transformation, and penetration testing services including automated attack simulations; ranked #246,635 globally and #8,805 in Indonesia; active in cybersecurity, cloud, and data communications.

Lintasarta is an Information and Communication Technology (ICT) total solutions company founded in 1988. We have enabled companies to grow beyond their capabilities regarding digital transformation. For over three decades, we have become a pioneer in many services for all industry segments, including finance, resources, government, manufacturing, services, trading/distribution, etc. We are proud to serve more than 2.400 corporate clients and we will continue evolving to keep delivering services and solutions in each industry. We are supported by certified experts and local support that encourage our growth to enhance businesses and government performance in accelerating digital transformation. The challenge upon us is unforeseeable, but our commitment to bring connectivity and empower people and the nation remains steady. Lintasarta #EmpoweringYourFuture
[02] Services
Lintasarta Offers Comprehensive ICT Solutions Including Infrastructure And Industry-specific Services
Cybersecurity With Penetration Testing
Managed Security Services
Private Cloud
SD-WAN
Digital Transformation Support Across Various Sectors Such As Public
Manufacturing
Retail
Finance
Natural Resources.
[03] Certifications
AICPA SOC
ISO 27001

ISO 27001: Information Security Management Certification


Origin


ISO 27001 was developed by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), and was first published in 2005. It evolved from the British Standard BS 7799-2, which was created in the late 1990s. The standard was developed in response to the growing need for organizations to systematically manage and protect sensitive information in an increasingly digital business environment. ISO 27001 has since been revised, with major updates released in 2013 and 2022 to address evolving cybersecurity threats and best practices.


Industry Value and Importance


ISO 27001 is globally recognized as the leading standard for information security management systems (ISMS) and is valued for providing a systematic, risk-based approach to protecting sensitive data. Organizations that achieve ISO 27001 certification demonstrate to clients, partners, and regulators that they have implemented comprehensive security controls and are committed to maintaining confidentiality, integrity, and availability of information. The certification is particularly important for organizations handling sensitive data, as it helps meet regulatory compliance requirements, reduces security incidents, builds customer trust, and often provides a competitive advantage in procurement processes where information security assurance is required.

ISO 27701

ISO 27701: Privacy Information Management


Origin


ISO 27701 was developed by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), published in August 2019. The standard was created in response to the growing global emphasis on data privacy regulations, particularly following the implementation of the European Union's General Data Protection Regulation (GDPR) in 2018. It extends the existing ISO 27001 and ISO 27002 information security standards by adding specific requirements and guidance for establishing, implementing, maintaining, and continually improving a Privacy Information Management System (PIMS).


Industry Value and Importance


ISO 27701 certification is highly valued because it demonstrates an organization's commitment to protecting personal data and complying with privacy regulations worldwide. The standard provides a framework that helps organizations meet diverse privacy law requirements across different jurisdictions, reducing compliance complexity and legal risk. For businesses handling personal information, certification serves as a competitive differentiator, building trust with customers, partners, and regulators. It also streamlines audit processes by providing a unified approach to privacy management that integrates seamlessly with existing information security practices, making it particularly attractive to multinational organizations seeking to demonstrate accountability and privacy governance maturity.

ISO 27017

ISO 27017: Origin


ISO 27017 was developed by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), published in December 2015. It was created as an extension of ISO 27002 to address the growing need for specific security guidelines in cloud computing environments. The standard emerged from industry recognition that traditional information security controls required adaptation and supplementation to adequately address the unique risks and responsibilities associated with cloud service provision and use.


Industry Importance and Value


ISO 27017 is valued in the industry because it provides clear, internationally recognized guidance for both cloud service providers and cloud customers on their respective security responsibilities. The certification helps organizations demonstrate their commitment to cloud security best practices, facilitating trust between providers and customers in an increasingly cloud-dependent business environment. For businesses, achieving ISO 27017 certification can be a competitive differentiator, meeting procurement requirements, satisfying regulatory expectations, and providing assurance to stakeholders that cloud-specific security controls are properly implemented and maintained.

ISO 27018

ISO 27018: Origin


ISO 27018 was developed by the International Organization for Standardization (ISO) and officially published in 2014. It was created as the first international code of practice specifically designed to address the protection of personally identifiable information (PII) in public cloud computing environments. The standard emerged in response to growing concerns about data privacy and security as organizations increasingly migrated their operations and sensitive data to cloud service providers, necessitating clear guidelines for how cloud providers should handle personal information.


Industry Importance and Value


ISO 27018 is highly valued in the industry because it provides cloud service providers with a recognized framework for demonstrating their commitment to protecting customer data privacy. The certification is particularly important for organizations operating under strict data protection regulations like GDPR, as it helps establish compliance with privacy requirements and builds trust with clients who are entrusting their sensitive information to cloud environments. For businesses selecting cloud providers, ISO 27018 certification serves as a reliable indicator that the provider implements appropriate controls for PII protection, including transparent data handling practices, customer rights management, and restrictions on how personal data can be used or disclosed.

ISO 14001

ISO 14001: Environmental Management Standard


ISO 14001 was developed by the International Organization for Standardization (ISO) and first published in 1996, with the most recent update released in 2015. The standard was created to provide organizations with a framework for establishing and maintaining an effective Environmental Management System (EMS). It emerged from growing global awareness of environmental issues and the need for businesses across all sectors to systematically manage their environmental responsibilities, reduce their ecological footprint, and comply with environmental regulations.


For penetration testing and cybersecurity companies, ISO 14001 certification demonstrates corporate responsibility and operational maturity beyond technical capabilities. Many clients, particularly large enterprises and government agencies, require or prefer vendors who hold multiple ISO certifications as indicators of well-rounded business practices. Penetration testing firms pursue ISO 14001 to show they manage their environmental impact—including energy consumption from data centers and testing infrastructure, proper disposal of electronic equipment, and reduction of their carbon footprint from business operations. This certification helps cybersecurity companies differentiate themselves in competitive procurements, meet vendor assessment requirements, and align with clients' own sustainability goals and supply chain standards, ultimately making them more attractive partners for environmentally-conscious organizations.

ISO 20000-1

ISO 20000-1: IT Service Management Certification


Origin


ISO 20000-1 was developed by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), first published in 2005. It was based on the British Standard BS 15000, which itself evolved from IT Infrastructure Library (ITIL) best practices. The standard was created to provide organizations with a formal framework for establishing, implementing, maintaining, and continually improving an IT Service Management System (SMS). It aimed to address the growing need for consistent, high-quality IT service delivery as businesses became increasingly dependent on technology.


Industry Value and Importance


ISO 20000-1 certification is highly valued because it demonstrates an organization's commitment to delivering consistent, high-quality IT services aligned with business needs and customer requirements. The certification helps organizations improve service efficiency, reduce costs through better resource management, and minimize service disruptions. For vendors and service providers, achieving ISO 20000-1 certification serves as a competitive differentiator and provides assurance to clients that IT services are managed according to internationally recognized best practices. The standard's focus on continual improvement and risk management makes it particularly relevant in today's rapidly evolving technology landscape.

ISO 9001

ISO 9001 and Cybersecurity/IT


Origin


ISO 9001 is a quality management system standard developed by the International Organization for Standardization (ISO), first published in 1987. However, it's important to note that ISO 9001 itself is not a cybersecurity or IT-specific certification—it's a general quality management standard applicable to any industry. For cybersecurity and IT specifically, ISO created ISO/IEC 27001 in 2005, which focuses on information security management systems. ISO 9001 was created to establish consistent quality management practices across organizations worldwide, while ISO/IEC 27001 was developed to address the growing need for standardized information security controls.


Industry Value


ISO 9001 is valued across industries for demonstrating an organization's commitment to quality, customer satisfaction, and continuous improvement, which can indirectly support IT operations. For actual cybersecurity and IT security certification, ISO/IEC 27001 is the recognized standard, valued because it provides a systematic approach to managing sensitive information, demonstrates due diligence to clients and stakeholders, and is often required for government contracts or business partnerships. ISO/IEC 27001 certification signals that an organization has implemented internationally recognized security controls and risk management processes, making it essential for building trust in an increasingly security-conscious business environment.

ISO 45001

ISO 45001: Occupational Health and Safety Management


ISO 45001 was developed by the International Organization for Standardization (ISO) and published in March 2018. It replaced the earlier OHSAS 18001 standard and represents the first global ISO standard for occupational health and safety management systems. The standard was created through collaboration among occupational health and safety experts, governments, industry representatives, and labor organizations from around the world to provide a unified framework for protecting workers from workplace-related injuries and illnesses.


For penetration testing and cybersecurity companies, ISO 45001 demonstrates a commitment to employee well-being and workplace safety, which is particularly valued by enterprise clients and government contractors who require comprehensive corporate governance. While penetration testers may not face traditional physical hazards, the certification shows that a company maintains systematic processes for managing workplace health concerns including stress management, ergonomics for desk workers, mental health support, and safe working conditions for staff who may work irregular hours or in high-pressure environments. Many cybersecurity firms pursue ISO 45001 alongside information security certifications like ISO 27001 to present a complete picture of organizational maturity and duty of care, making them more competitive when bidding for contracts with large organizations that mandate comprehensive management system certifications across their supply chain.

ISO 22301:2019
ISO 37001

ISO 37001: Anti-Bribery Management Systems


Note: ISO 37001 is not a cybersecurity/IT certification. It is an anti-bribery management system standard.


Origin


ISO 37001 was published in October 2015 by the International Organization for Standardization (ISO), the independent international body that develops voluntary standards. The standard was created in response to growing global concern about corruption and bribery in business transactions. It was developed by ISO's Project Committee ISO/PC 278, which included anti-corruption experts from over 30 countries, to provide organizations with a framework for establishing, implementing, and maintaining an anti-bribery management system.


Industry Value


ISO 37001 is valued because it demonstrates an organization's commitment to preventing, detecting, and addressing bribery. Certification helps organizations reduce the risk of bribery occurring, reassure stakeholders about ethical business practices, and potentially provide a defense in legal proceedings by showing due diligence. The standard is particularly important for companies operating internationally or in high-risk sectors, as it provides a recognized framework for compliance with anti-bribery laws such as the UK Bribery Act and the US Foreign Corrupt Practices Act.


---


*If you're looking for cybersecurity/IT certifications, you may be thinking of standards like ISO/IEC 27001 (Information Security Management) or ISO/IEC 27032 (Cybersecurity).*

SMK3 PP 50/2012
PCI DSS

PCI DSS Certification


Origin


The Payment Card Industry Data Security Standard (PCI DSS) was created in 2004 by the major credit card companies: Visa, Mastercard, American Express, Discover, and JCB International. These companies formed the PCI Security Standards Council in 2006 to manage and evolve the standard. PCI DSS was developed in response to increasing credit card fraud and data breaches, establishing a unified set of security requirements for all organizations that store, process, or transmit cardholder data. The goal was to create consistent security measures across the payment card industry to protect sensitive payment information.


Industry Value and Importance


PCI DSS compliance is mandatory for any business that handles credit card transactions, making it one of the most critical security standards in commerce today. The certification demonstrates that an organization has implemented robust security controls, including network protection, access management, encryption, and regular security testing. Non-compliance can result in severe consequences, including substantial fines (up to $100,000 per month), increased transaction fees, loss of payment processing privileges, and reputational damage following a breach. For IT professionals, PCI DSS expertise is highly valued as organizations across all industries need qualified personnel to implement, maintain, and audit these security controls.

UPTIME INSTITUTE CERTIFIED Tier 3 Design & Facility Data Center
LOGRHYTHM SECURITY SERVICES AUTHORIZED
[05] Notable Clients
  • Fast Food Indonesia (KFC
  • Taco Bell)