Modern IT & Cybersecurity Solutions for Businesses and Government Institutions

Protecting your data, systems, and network with advanced hardware-based security and cryptographic technology.

Security Chip with Embedded Cryptographic Algorithms

Diverse Algorithms

Exceptional Flexibility for various needs.

Ultimate High Security

Top- tier data protection standards

Strong Encryption

Superior encryption/decryption.

Low Power Consumption

Efficient for power-limited devices.

Diverse Official Certification

Guarantee of compliance and reliability.

Asymmetric Cryptography
Symmetric Cryptography
Hash Algorithm
The security chip provides basic protection for data confidentiality, integrity, and identity credibility through hardware encryption, various algorithms, and attack protection.

Product Technical Advantages

Integrated Security Platform for the Digital Era

Security Chip

Strong Flexibility
High Reliability
Multiple Applications

Cryptography Module

High Security
Strong Flexibility
High Adaptability
Compliance

Gateway Security Function Architecture

Risk Perception

Asset identification, Risk scanning, Monitoring, Copying

Pre-incident Risk Monitoring

Threat Protection

Threat defense and detection against intrusion, malware, and DoS/DDoS.

Ongoing Protection Response​

Trace Analysis

Tracking and Tracing, Security Visualization, and Security Reports.

Post-analysis Audit
Security and Traffic Filtering
Advanced Network Management
Network Control and Optimization
Perceived Security Assurance

One-Stop Solution for Unmatched Protection

PT. Tarzan Teknologi Informasi provides IT and cybersecurity solutions built on technology developed by a company with over 20 years of experience in the cybersecurity industry. We help organizations secure their data, strengthen networks, and ensure operational continuity in the digital era.

Built for Secure Systems & Modern Infrastructure

We provide advanced IT and cybersecurity solutions designed to protect data, networks, and mission-critical systems across government institutions and businesses. Our technologies integrate hardware-level encryption, secure storage, and real-time threat protection to ensure safe and reliable operations.

0 +

Trusted Company

Product

Network & Data Security

Network & Data Security

Protect your network infrastructure and sensitive data from unauthorized access and malicious threats, effectively.

Anti-Spy Security

Anti-Spy Security

Prevent surveillance and unauthorized monitoring via advanced security against spyware and malicious actors.

Tracking <br>Security

Tracking
Security

Control your digital footprint by securing against unwanted tracking and ensuring your online activities remain private.

Trusted
Trusted
Testimonials

Absolute Protection, Proven.

In a hyper-connected world, vulnerabilities are everywhere. We provide you with complete control over your digital security, ensuring your sensitive information remains encrypted and confidential, regardless of your location. Our solutions are specifically designed for individuals and professionals who demand absolute communication security.

David Wiranata
David Wiranata

Leading Financial Institution

"Before implementing this solution, the integrity of our field communications was a constant concern. Now, with the Encrypted Phones and Encrypted Communication infrastructure, our data security is virtually absolute. The system's integration with our existing network was seamless and highly effective."

Ratna D.
Ratna D.

Major Telecommunications Provider

"Managing the sheer volume of sensitive personal data required a highly specialized solution. Their Encrypted Server Storage provides the robust security and high-availability required by the ministry. It truly is a new standard for data security in government operations."

David Howard
David Howard

National Energy Company

The power of the 4U Cipher Machine paired with Asymmetric Cryptography allowed us to achieve high-speed encryption necessary for real-time traffic analysis and secure data transfer across our entire operational domain. Reliability and performance have been flawless.

Discover The Latest Cyber Security Blog Articles

Indonesia Faces Surge in Cyber Anomalies and Attacks, Data Reveals

Indonesia experienced a significant wave of cyber activity in 2024, characterized by an overwhelming number of traffic anomalies and specific, targeted threats, according to data from the Indonesia Cyber Security Landscape 2024. This surge underscores the growing vulnerability of national digital infrastructure, a concern highlighted by the recent high-profile attack on the Ministry of Home Affairs. Alarming Traffic Anomalies Dominate Cyber Landscape The total volume of traffic anomalies recorded in Indonesia during 2024 reached a staggering 330,527,636 incidents. The vast majority of this abnormal traffic was attributed to the Mirai Botnet, which alone accounted for 81,286,596 activities. Meanwhile, the country saw millions of specific malicious activities, including: Phishing: The most prevalent attack type, recording 26,771,000 activities. Advanced Persistent Threat (APT): Registered 2,487,041 activities. Ransomware: Recorded 514,508 activities. Critical Incidents and Data Leaks Based on monitoring and Cyber Threat Intelligence results, the National Cyber and Crypto Agency (BSSN) has identified 241 suspected cyber incident leaks. Further darknet investigations uncovered 56,128,160 exposure findings that impacted the data of 461 public interest entities in Indonesia. In cases involving website damage, BSSN recorded 5,780 incidents that targeted several domains and 4,071 incidents specifically targeting online gambling websites. Furthermore, public complaints received by BSSN regarding phishing attacks in 2024 totaled 1,814. The sector grouping of these attacks is based on Presidential Regulation No. 82 of 2022 concerning the Protection of Vital Information Infrastructure (II). High-Profile Attack on Ministry of Home Affairs The severity of the cyber threat was underscored by a direct attack on the official website of the Ministry of Home Affairs (Kemendagri), www.kemendagri.go.id. Service Refusal: Attempts to access the site around 20:40 local time resulted in an error message stating, "This site can't be reached www.kemendagri.go.id refused to connect". Alleged Motive: The then Minister of Home Affairs, Tjahjo Kumolo, confirmed the incident, stating that based on his team's reports, the goal of the hack was allegedly "related to KPK aspirations". Exploited Vulnerability: The security breach was suspected to have been initiated by exploiting a vulnerability within the system, potentially "through the port file transfer and/or through the port database". This incident, alongside the overwhelming statistics on digital anomalies, highlights the pressing challenge Indonesia faces in securing its critical government and public sector digital assets against sophisticated and relentless cyber threats.

Cyber Attack Hits Indonesia’s Ministry of Home Affairs Website

The official website of Indonesia's Ministry of Home Affairs (Kemendagri), www.kemendagri.go.id, was recently targeted by a cyber attack, causing a significant disruption to the ministry's online presence. The incident was swiftly confirmed by the then Minister of Home Affairs, Tjahjo Kumolo. Site Connectivity Refused The attack resulted in accessibility issues for the primary government portal. At approximately 20:40 local time, attempts to visit the Kemendagri site were unsuccessful, with users being met with a clear error message: "This site can't be reached www.kemendagri.go.id refused to connect." This indicated that the core server or network infrastructure supporting the website had been compromised or taken offline as a result of the breach. Alleged Motive Linked to KPK Aspirations Minister Tjahjo Kumolo addressed the media regarding the incident, providing preliminary details on the potential motive behind the sophisticated attack. Based on reports compiled by his technical team, the Minister stated that the hack's objective was allegedly "related to KPK aspirations," connecting the digital intrusion to ongoing public debates or policy matters concerning the nation’s anti-corruption body, the Corruption Eradication Commission (KPK). Technical Vulnerability Identified Further detailing the mechanics of the attack, Minister Kumolo explained the suspected entry point utilized by the perpetrators. The hackers are believed to have exploited a specific technical vulnerability within the ministry’s system architecture. "The flaw is suspected to have been entered through the port file transfer and/or through the port database," Tjahjo confirmed. This technical assessment suggests the attackers may have gained unauthorized access by targeting unsecured file transfer protocols (FTP) or weaknesses within the database management system (DBMS), which houses critical website data. Call for Heightened Cyber Security The incident serves as a stark reminder of the persistent and evolving threat landscape facing critical government digital infrastructure in Indonesia. While the ministry worked rapidly to restore full functionality and strengthen its security protocols, the attack highlights the need for continuous vigilance and investment in cyber resilience, especially during periods of political sensitivity and controversy surrounding key national institutions.

Major IT Failure: National Data Center Disruption Paralyzes Indonesia’s Immigration System

The National Data Center (PDN), managed by the Ministry of Communication and Information Technology (Kominfo), has been hit by a significant system disruption, causing widespread governmental service interruptions across Indonesia. The most immediate and visible consequence is the complete paralysis of the electronic immigration system at several major international airports, most notably at Jakarta's Soekarno-Hatta International Airport (CGK). The disruption, stemming from a core component of the country's data infrastructure, has affected various government data management facilities. Crucially, the system responsible for processing international arrivals and departures—a vital component of airport operations—has become inoperative. Chaos at Soekarno-Hatta Eyewitness accounts and the provided photographic evidence illustrate the chaotic scene at Soekarno-Hatta Airport. Passengers are being forced to navigate significantly extended immigration inspection queues due to the system failure. With automated processes non-functional, airport personnel are likely resorting to manual or backup verification procedures, dramatically increasing processing times. The resulting delays have caused massive bottlenecks in passenger flow, leading to: Hours-long waits for travelers. Missed connecting flights for transit passengers. Operational headaches for airlines and airport management. Public Outcry and Digital Impact The widespread inconvenience has quickly translated into public frustration and complaints airing across various digital channels, particularly on the social media platform X (formerly Twitter). Citizens and international travelers alike are voicing their dismay over the unexpected delays and the inability of a key government system to withstand technical failure. Government Response and Next Steps While Kominfo has acknowledged the disruption, an official timeline for the full restoration of the PDN and the return of seamless immigration services has yet to be clearly established. Authorities are currently working to isolate the cause of the failure—whether it is due to a technical glitch, a power issue, or a potential security incident—while implementing contingency measures to minimize further impact. The incident underscores the urgent need for robust backup systems and better disaster recovery planning for critical national infrastructure. Until the PDN is fully operational, travelers utilizing Indonesian airports should anticipate and prepare for significant delays.

Alleged Data Leak of 700 Thousand Individuals Related to CPNS Selection, Hacker ‘DigitalGhost’ Claims Cyberattack

Indonesia's cybersecurity landscape is once again stirred by a data breach claim targeting sensitive information of prospective state civil servants. A hacker using the pseudonym DigitalGhost claims to have successfully leaked data belonging to 700,000 individuals who are participants in the Civil Servant Candidate Selection (CPNS) process at one of the ministries. This claim was first announced via the social media account X (formerly Twitter) with the handle @H4ckmanac. Sensitive Data at Risk The data claimed to have been stolen by DigitalGhost is highly specific and sensitive because it is directly related to the identity of the participants and the history of the state recruitment process. According to the post, the leaked information allegedly includes: NIK (National Identity Number) Selection participant number Full name Exam session date and location Applied job position Assigned department Potential Danger to Victims A data breach encompassing NIK and full names is highly susceptible to misuse for various criminal acts, ranging from fraud (phishing), creation of illegal online loan accounts, to scams impersonating government institutions. Moreover, this data also contains details of the CPNS selection process, making it an easy target for cybercriminals. As of now, there has been no official confirmation or statement from the ministry concerned regarding this breach claim. Authorities are expected to immediately conduct a digital forensic audit to verify the authenticity of DigitalGhost's claims and take mitigation steps to protect the privacy rights of hundreds of thousands of prospective civil servants whose data is at risk.