Purchase License

Buy licenses for Products, Implementation, and Services

Training

Choose the perfect license plan for your organization

Security Monitoring with Wazuh

Coming Soon

Courses IT
Coming Soon

ISO 27001 Implementasi

Coming Soon

Courses IT
Coming Soon

ITIL V4

coming soon

Courses IT
Coming Soon

Pelindungan Data Pribadi

coming soon

Courses IT Hacking & Cyber Security
Coming Soon

Template

Choose the perfect license plan for your organization

Personal Data Protection Guidelines in the Fintech Industry by AFTECH

The fintech industry is growing rapidly, but behind digital innovation, personal data protection is a crucial issue. Regulations such as Law No. 27 of 2022 on Personal Data Protection (PDP Law) and OJK Regulation No. 22 of 2023 on Consumer Protection in the Financial Services Sector set obligations for fintech companies to protect user data. Compliance is not just a legal requirement but also a way to build consumer trust.

Others
Free Forever

OJK Cybersecurity Guidelines for Financial Sector Technology Innovation (ITSK)

The financial sector is one of the most vulnerable industries to cyber threats. Therefore, the Financial Services Authority (OJK) has developed the Cybersecurity Guidelines for Financial Sector Technology Innovation (ITSK) as a guide for industry players to strengthen cyber resilience and protect financial data and transactions.

Cybersecurity in the financial industry is crucial due to the high risks of cyberattacks, data breaches, and other threats. This guideline aims to:

Increase understanding and awareness of cybersecurity.

Provide guidance on protecting customer data and information.

Ensure compliance with applicable regulations.

Mitigate risks and build a secure and reliable digital financial ecosystem.

Others
Free Forever

Cybersecurity Incident Response Plan (CIRP) Plan 1 & Plan 2

A strong Cybersecurity Incident Response Plan is crucial in today's threat landscape. By following a structured approach—from preparation to recovery—organizations can effectively mitigate cyber threats, protect their digital assets, and ensure compliance with global security standards. Cybersecurity is not just about defense; it's about proactive resilience and continuous improvement.

Others
Free Forever

Hardening Policy

This document outlines the technical standards and procedures applied to the cloud and on-premise environments. The policies aim to uphold information security, adhering to organizational standards and external requirements.

• To protect the data and information stored within the cloud and on-premise environment.
• To ensure the confidentiality, integrity, and availability of the data.
• To maintain standards and procedures that align with the information security management program requirements.
• To implement network segregation based on trust, sensitivity, and criticality.

Toolkits
Free Forever

NDA Template for Indonesia Company (Eng/Indo)

A Non-Disclosure Agreement (NDA) is a legally binding contract that prevents one party from sharing or using confidential information disclosed by another party. It acts as a shield to protect sensitive business data, trade secrets, and proprietary information.

Here are some real-world scenarios where an NDA is essential:

📌 Business Partnerships & Mergers – When discussing potential collaborations, mergers, or acquisitions.
📌 Hiring Employees & Contractors – To ensure they don’t disclose trade secrets or client information.
📌 Investor & Startup Discussions – Protects your business plan while pitching ideas to investors.
📌 Vendor & Supplier Agreements – When sharing production details or proprietary processes.
📌 Product Development & Innovation – To safeguard patents, designs, or unpublished research.

💡 Pro Tip: Always customize your NDA based on the specific nature of the information being protected!

Legal
Free Forever

PCI DSS Requirements V 4.0.1

The Payment Card Industry Data Security Standard (PCI DSS) was developed to encourage and enhance payment account data security and facilitate the broad adoption of consistent data security measures globally. 

PCI DSS provides a baseline of technical and operational requirements designed to protect account data. While specifically designed to focus on environments with payment account data, PCI DSS can also be used to protect against threats and secure other elements in the payment ecosystem.

Pdf
Free Forever

Employee Screening Form Template

The Employee Screening Form (FRM-1.12.5) is used as a standard document to record all the verification steps during the recruitment process. This form includes checks on various aspects such as identity verification, education, work history, credit records, criminal background, and social media presence.

Reduced Hiring Risks – Prevents recruitment of unqualified or dishonest candidates.
Workplace Safety – Ensures employees have no history of violence or misconduct.
Stronger Company Reputation – Avoids scandals related to employee fraud or criminal activities.
Regulatory Compliance – Meets industry-specific hiring regulations and legal requirements.
Higher Employee Retention – Helps hire candidates who are genuinely suitable for the job, reducing turnover.

Toolkits
Free Forever

THREAT INTELLIGENCE POLICY

The purpose of this Threat Intelligence Policy is to establish a structured approach to identifying, assessing and mitigating security threats. This policy ensures that the organization proactively collects, analyzes and responds to security threats to protect information assets, operations and systems in accordance with the ISO 27001 standard.

Toolkits
Free Forever

Business Continuity Plan (BCP) Document (Bahasa)

This document is a comprehensive guide to implementing a Business Continuity Plan (BCP) to ensure that an organization can maintain or continue critical operations during a disruption. The BCP includes recovery procedures, risk mitigation strategies, and critical roles to play during an emergency, so that the organization remains resilient to challenges.

Pdf ISO27001 BCP
Free Forever

Platform

Choose the perfect license plan for your organization

Vulnerability Assessment

Identifying vulnerabilities is crucial step to address your security posture and to achieve minimal requirement fr ISO 27001

USD 1,000 /month

Risk Program Implementation

We help you define a custom Risk framework for your organisation, identify risks and treatment through interviews and implement the entire system on Open Leo using built-in notifications and reports.

Custom Pricing Request Quote

Audit IT (System, Process etc)

We will perform system information audit to ensure your IT readiness across the organization

Custom Pricing Request Quote

Penetration Testing

We will perform Realistic, Industry-Specific Attack Simulations

Top Pick
Custom Pricing Request Quote

No Implementation Workshop

You decide to implement Open Leo on your own. Note that 70% customers with no assistance will likely delay the implementation for up to 12 months.

USD 0

Community

A free and open version of Open Leo that allows you to move from spreadsheets at no cost.

On Premise
USD 0

Generic Consulting

Consulting hours packs for you to use them in any way you want.

8 hours
USD 800 /month

Certification Ready

We will help your organisation become certification-ready in ISO 27001 or SOC1/2.

ISO 27001 or SOC1/2
Custom Pricing Request Quote

Online Assessments

We will help you create questionnaires and upload them to Open Leo so your suppliers can log in and provide feedback.

Workshop Top Pick
USD 800 /month

Compliance Management

We will help you configure Open Leo for Compliance Management and link Controls and Policies to any Compliance Package (ISO, PCI, etc.) you wish.

Workshop Top Pick
USD 800 /month

Risk Management

We will help you configure Open Leo for Risk Management as well as to create your first Risks.

Workshop Top Pick
USD 800 /month

Instructor Led Training

If you don't want to learn Open Leo using our learning portal or Instructor-led training, a dedicated instructor will teach your GRC team how to use and implement Open Leo in dedicated Zoom workshops of up to 8 Hours of duration.

Workshop
USD 1,750 /month

Online Learning Platform

Our learning portal is free and packed with content to learn how Open Leo and GRC works in the real world.

USD 0

Extended Support

Upgrade your standard E-Mail support to Zoom calls - up to 12 hours a year to help you with generic support questions.

Top Pick
USD 1,500 /year Subscription

Enterprise

Our Enterprise version is hosted by Open Leo. Install and updates taken care of by our teams. Email Support Included.

SaaS
USD 5,000 /year Subscription

Enterprise

Our Enterprise version of Open Leo with no data or user limits and all modules. Email support is included.

On Premise
USD 3,000 /year Subscription

Tools

Choose the perfect license plan for your organization

Nagios - Open-source Monitoring Solution

Enterprise-Grade Monitoring – Provides real-time monitoring for IT infrastructure, applications, networks, and security.

Open-Source & Extensible – Highly customizable with thousands of plugins and integrations.

Proactive Alerting & Incident Response – Detects issues before failures occur, reducing downtime.

Log Management & Compliance Support – Helps meet ISO 27001, PCI DSS, GDPR, HIPAA, NIST, SOC 2, and more.

Scalable & Distributed Architecture – Supports large IT environments with high availability.

Security & Threat Detection – Monitors logs, detects anomalies, and prevents unauthorized access.

Cloud & Hybrid Monitoring – Supports AWS, Azure, GCP, and on-premises environments.

Comprehensive Reporting & Dashboards – Provides insights for audits, compliance, and performance tuning.

Would you like assistance with Nagios setup, best practices, or integrations? Call meeee 😊

IT Security; Forensic & Network
Install Nagios

Zabbix - Network Monitoring Open Source

What is Zabbix?

  • Open-source IT infrastructure monitoring software.
  • Tracks networks, servers, applications, cloud services, etc.
  • Supports agent-based & agentless monitoring (SNMP, ICMP, API, JMX).
  • Provides real-time alerts, dashboards, and automation.

Key Features:

  • Comprehensive Monitoring (network, cloud, databases, apps).
  • Automated Alerts (email, SMS, Slack, Telegram, etc.).
  • Scalability (monitors thousands of devices).
  • Custom Dashboards & Reports.
  • Integration (Ansible, Kubernetes, AWS, Azure, Grafana)

Would you like assistance with Zabbix setup, best practices, or integrations? Call meeee 😊

IT Security; Forensic & Network
Install Now

Wazuh - Open Source SIEM

Wazuh is a free and open source security platform that provides unified SIEM and XDR protection. It protects workloads across on-premises, virtualized, containerized, and cloud-based environments.

The Wazuh platform uses a server/agent model:

  • Wazuh central components (server, indexer, and dashboard) that analyze security data collected from the agents. They can be set up on-premises or in the cloud using the Wazuh Cloud solution.
  • Lightweight and universal security agents are deployed on monitored endpoints to collect security data and perform automatic responses to threats.

The Wazuh solution also provides agentless monitoring for devices such as routers, firewalls, and switches that do not support the installation of agents.

IT Security; Forensic & Network
Install Now

Framework

Choose the perfect license plan for your organization

SOC Type 2 (System and Organization Controls Type 2)

SOC Type 2 (System and Organization Controls Type 2) is an auditing standard developed by the American Institute of Certified Public Accountants (AICPA) to assess the effectiveness of a service organization's internal controls related to security, availability, processing integrity, confidentiality, and privacy over a period of time (typically 3–12 months).

Types:

  • SOC 2 Type 1 – Evaluates control design at a point in time.
  • SOC 2 Type 2 – Assesses control effectiveness over time (3–12 months).

Need help with SOC 2 compliance or audit prep? Call Bitlion NOWWWWW 🚀

IT & Cyber Security
Contact Us

ISO 22301 Business Continuity Management Systems (BCMS)

  • ISO 22301: International standard for Business Continuity Management Systems (BCMS).
  • Objective: Ensures business resilience against disruptions.
  • Key Elements:
    • Business Impact Analysis (BIA)
    • Risk Assessment
    • Business Continuity Strategy
    • Business Continuity Plans (BCP)
    • Incident Response & Crisis Management
    • Testing & Exercising
    • Continuous Improvement

Quality; Health & Safety
Contact Us

PBI 18 Foreign Exchange Activities

Foreign exchange (forex) services play a pivotal role in enabling international trade, investment, and travel. For Indonesia, a country deeply integrated into global commerce, maintaining a stable, transparent, and secure foreign exchange system is critical. Recognizing this, Bank Indonesia (BI) issued PBI No. 18/19/PBI/2016 concerning Foreign Exchange Activities Against Rupiah Conducted by Non-Bank Institutions (referred to hereafter as “PBI 18/2016”).

If you consider to do business about Foreign Exchange Activities in Indonesia, Contact Us

Financial Compliance
Contact Us

POJK Manajemen Resiko

Manajemen risiko bagi perusahaan adalah proses sistematis untuk mengidentifikasi, menilai, mengendalikan, dan memantau risiko yang dapat mengganggu pencapaian tujuan perusahaan.

Implementasi Manajemen Resiko Dengan Bitlion

Financial Compliance
Contact Us

PBI 14 Fund Transfer - Bank Indonesia

Fund Transfers – BI Regulation No. 14/23/PBI/2012

Official Regulation – Governs fund transfer management in Indonesia for security and efficiency.
Regulation Scope – Applies to banks, fintech companies, and payment service providers.
Fund Transfer Process – Movement of funds from sender to recipient via authorized providers.
Obligations of Providers – Ensure fast, secure, transparent, and compliant services.
Security & Compliance – Must implement AML, CFT, encryption, and customer verification.
Sanctions & Supervision – BI has the authority to impose administrative sanctions up to license revocation.
Positive Impact – Enhances public trust, strengthens transaction security, and supports financial inclusion.

Financial Compliance
Contact Us

POJK 11 IT Implementation by Commercial Banks

The Financial Services Authority Regulation (POJK) Number 11/POJK.03/2022 on the Implementation of Information Technology by Commercial Banks is a strategic step in strengthening Indonesia's banking information technology (IT) infrastructure. This regulation is designed to ensure that commercial banks have reliable, secure IT systems capable of effectively supporting digital transformation.

Financial Compliance
Contact Us

PBI 23 Penyelenggara Jasa Pembayaran

Peraturan Bank Indonesia (PBI) No. 23/6/PBI/2021 tentang Penyelenggaraan Penyedia Jasa Pembayaran (PJP) merupakan regulasi yang mengatur ekosistem layanan pembayaran di Indonesia, termasuk persyaratan dan kewajiban bagi para pelaku industri pembayaran digital.

Hubungi Bitlion untuk membantu anda mengelola perizinan PJP!

Financial Compliance
Contact Us

ISO 9001 Quality Management Standard

ISO 9001 is an international standard that sets out the criteria for a Quality Management System (QMS).

We provide ISO 9001 implementation consultation.
Partner with Bitlion to implement ISO 9001 and future-proof your operations.
Start with a free consultation — reach out to Bitlion today!

Quality; Health & Safety ISO9001
Contact Us

Payment Card Industry Data Security Standard

Global Security Standard – Protects payment card data and reduces fraud risks
Applies to All Entities – Merchants, payment processors, financial institutions, and service providers handling card transactions
12 Core Requirements – Covers network security, access control, encryption, and monitoring
Cardholder Data Protection – Encryption, masking, and secure storage of sensitive payment information
Compliance Validation – Self-assessments or third-party audits based on transaction volume
Enforced by Payment Brands – Required by Visa, MasterCard, American Express, Discover, and JCB
Failure Consequences – Non-compliance can result in fines, increased fees, or revocation of payment processing privileges

IT & Cyber Security PCIDSS
Contact Us

UU Perlindungan Data Pribadi

Legal Basis – Law No. 27 of 2022, enacted on October 17, 2022
Full Implementation – October 2024
Personal Data Types – General (name, email) & Sensitive (health, biometrics, financial)
Data Subject Rights – Access, correct, delete, withdraw consent, object to processing
Controller Obligations – Obtain explicit consent, ensure security, provide complaint mechanisms
Penalties & Fines – Up to 2% of annual revenue, 6 years in prison, IDR 6 billion fine
DPO Requirement – Mandatory for large-scale data processing
Regulatory Compliance – Aligns with GDPR principles for privacy protection
Objective – Strengthen data security, privacy rights, and regulatory compliance

Need assistant? Bitlion help you fasterrrr 🚀

IT & Cyber Security Data Privacy
Contact Us

ISO 27001 Information Security Management System

International Standard for Information Security (ISMS framework)
Risk-Based Approach – Identifies, assesses, and mitigates security risks
Annex A Controls – 93 security controls across organizational, technical, people, and physical aspects
Certification Process – Requires internal audit and external audit by accredited bodies
Compliance & Legal Alignment – Supports GDPR, PCI-DSS, and other regulations
Plan-Do-Check-Act (PDCA) Cycle – Ensures continuous security improvements
Protects Confidentiality, Integrity, and Availability (CIA) of information assets
Applies to All Industries – Finance, healthcare, IT, government, etc.

Need assistant? Bitlion help you fasterrrr 🚀

IT & Cyber Security
Contact Us