is a Malaysian based IT services firm providing a variety ofsolutions on a nationwide basis.
Offering professional services using TREETECH's internal IT staff, as an extension of TREETECH' clients' IT teams. The top core competencies include Virtualization, Application Delivery, Storage, Backup, DR/BC, Security, Networking, Directory and Messaging.
Offering recruiting services for temp, temp to hire and direct hire talent when the customer's need is beyond TREETECH's internal capability and staff size.
In addition to professional services on a time and materials basis, TREETECH also offers network device monitoring and management services on a monthly fixed price basis and Help Desk outsourcing services. In 2017, TREETECH also added Infrastructure Hosting Services (cloud computing) to its portfolio in collaboration with top tier vendors.
We have a team of application specialists providing our customers application development, implementation and customization services across various vcsoftware and solutions.
TREETECH facilitates product reselling and procurement for customers especially helping customers with software and hardware maintenance contracts.
In addition to IT solutions and services, we also help some of our smaller customers with general business planning and advice co-relating to their IT needs for the business.
SERVICES METHODOLOGY
Qualified and
Experienced Engineer
Business and
Technology Centric
Processes
Customer Service
Engagement Model
TREETECHpremises are equipped with security cameras to record activities within the area encompassing the front entrance, inventory room and server room. All activities in these areas are recorded on 24 hours-a-day. A card access control system is used to gain access to all our premise front entrance doors. Each card is coded to permit admission to designated work areas in our premise based on staff's job function. This is to ensure only authorized personnel have access to highly sensitive areas such as account/finance department, server room, store room etc.
Segregated areas are allocated to separate our call center work area from other work areas as these areas are considered sensitive and critical information areas.
Our company network is protected from unauthorized access with firewall system/policies and only allowing legitimate communication to pass. We also adopt web application filtering to mitigate ever increasing web-based threats. To enhance the security of our company wireless access, we employ MAC address authentication & Encryption on access point and only authorized users are granted access to wireless network.
Data loss can be very costly and cause business disruption on company of all sizes. As such, TREETECH always implement appropriate backup and contingency plans for disaster recovery based on risk assessment and customer's business requirements. We also employ data encryption as one of the means to protect highly sensitive data from unauthorized and unlawful access.
Staff's laptops and computers are subjected to Group Policy Object (GPO) to control security for user and computer account. When it comes to disposing of computer (desktop, laptop, or tablet), we will ensure all information and data in the storages/hard drives are securely deleted.
Our call tracking application is designed to capture the complete cycle of sales and support processes and is well linked to our inventory and equipment check-in and check-out control system. All the case or event logged by the system is timestamp to ensure data integrity. Access to certain highly sensitive/critical application is restricted and subject to management approval.