Telkom Indonesia

Telkom Indonesia

Speciality: Vulnerability Assessment & Penetration Testing

Jakarta Selatan, Indonesia 21666 employees
[01] About

Indonesian telecommunications giant with 7,537 employees, $9.5B revenue, and IDR 284 quadrillion market cap; offers telecom, media, and digital services. Provides penetration testing services, including VAPT for cloud platforms, highlighting cybersecurity expertise.

PT Telkom Indonesia (Persero) Tbk (Telkom) is a state-owned information and communications technology enterprise and telecommunications network in Indonesia. The Government of Indonesia is the majority shareholder with 52.09 percent shares while the remaining 47.91 percent shares belong to public shareholders. Telkom’s shares are traded on the Indonesian Stock Exchange (IDX) where it is listed as “TLKM” and on the New York Stock Exchange (NYSE), which lists it as “TLK”. As it transforms to become a digital telecommunication company, TelkomGroup implements a customer-oriented business and company operational strategy. The transformation aims to trim down TelkomGroup’s organization to be leaner and more agile in adapting the fast-changing nature of telecommunications industry. The new organization is expected to be able to improve efficiency and be more effective in producing a quality customer experience. TelkomGroup’s activities grow and change in accordance to the development of new technology, information and digitalization, but still within the corridor of telecommunications and information technology. This is evident in the newly developed business lines, which complements the company’s existing legacy business.
[02] Services
Telkom Indonesia Provides Comprehensive Telecommunications And Digital Services Including Extensive Network Infrastructure
Broadband And Mobile Services
Cloud Platform Solutions With Vulnerability Assessment And Penetration Testing
Data Center Operations
Satellite Communications
Managed IT Services Through Its Subsidiaries.
[03] Certifications
ISO/IEC 27001:2013

ISO/IEC 27001:2013


Origin


ISO/IEC 27001:2013 was developed jointly by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). The standard was first published in 2005, with the 2013 version representing a major revision that updated the framework to address evolving cybersecurity challenges. It originated from the British Standard BS 7799, which was developed in the 1990s to provide organizations with a systematic approach to managing sensitive information. The standard was created to establish an internationally recognized framework for information security management systems (ISMS), enabling organizations to protect their information assets through a risk-based approach.


Industry Value


ISO/IEC 27001:2013 is highly valued in the industry because it provides organizations with a comprehensive, vendor-neutral framework for establishing, implementing, and continuously improving information security practices. Certification to this standard demonstrates to clients, partners, and regulators that an organization has implemented robust security controls and follows international best practices for protecting sensitive data. Many industries, particularly those handling personal data, financial information, or critical infrastructure, consider ISO 27001 certification essential for vendor selection and compliance with regulatory requirements. The certification also provides competitive advantages in the marketplace and helps organizations systematically identify and mitigate information security risks.

ISO 9001:2015

ISO 9001:2015 and Cybersecurity/IT


Origin and Development


ISO 9001:2015 is a quality management system standard developed by the International Organization for Standardization (ISO), a global federation of national standards bodies. However, it's important to clarify that ISO 9001:2015 is not specifically a cybersecurity or IT certification—it's a general quality management standard applicable to any organization regardless of industry. The standard was released in 2015 as the fifth revision of ISO 9001, which was first published in 1987. For cybersecurity specifically, ISO created ISO/IEC 27001, which is the actual information security management system standard.


Industry Value and Importance


ISO 9001:2015 is valued across industries because it demonstrates an organization's commitment to consistent quality management, customer satisfaction, and continuous improvement. When applied to IT and cybersecurity contexts, it helps organizations establish systematic processes for service delivery and quality assurance. However, for cybersecurity-specific certification, organizations typically pursue ISO/IEC 27001, which directly addresses information security controls, risk management, and data protection. Both certifications are internationally recognized and often required for government contracts, enterprise partnerships, and demonstrating due diligence to customers and stakeholders.

ISO 22301:2012
ISO 20000-1:2011
ISO 37001:2016
ISO 45001:2008
ISO 14001:2015

ISO 14001:2015 Certification


Important Correction: ISO 14001:2015 is not a cybersecurity or IT certification. It is an Environmental Management System (EMS) standard published by the International Organization for Standardization (ISO) in 2015 as a revision to the original 1996 standard.


You may be thinking of ISO/IEC 27001, which is the international standard for Information Security Management Systems (ISMS). Here's the information about that certification:


ISO/IEC 27001 - Information Security


ISO/IEC 27001 was developed jointly by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). First published in 2005 and revised in 2013 and 2022, it evolved from the British Standard BS 7799. The standard was created to provide organizations with a systematic framework for managing sensitive information and mitigating cybersecurity risks through documented policies, procedures, and controls.


ISO/IEC 27001 certification is highly valued in the industry because it demonstrates an organization's commitment to protecting information assets and maintaining customer trust. Many organizations require their vendors and partners to hold this certification as proof of adequate security practices. It provides competitive advantages in procurement processes, helps meet regulatory compliance requirements, and offers a structured approach to identifying and managing information security risks in an increasingly digital business environment.

Payment Card Industry Data Security
Data Center Tier III
Data Center Tier IV
Certificate Of Conformance ANSI/TIA-942-B:2017 Rate 3
[05] Notable Clients
  • Telkomsel
  • Danantara
  • Telin
  • Telkom Akses
  • Mitratel
  • Pramindo
  • TelkomMetra
  • Graha Sarana Duta