{"id":92077,"date":"2016-06-21T08:19:35","date_gmt":"2016-06-21T08:19:35","guid":{"rendered":"https:\/\/it.telkomuniversity.ac.id\/about-us\/"},"modified":"2025-12-08T08:52:20","modified_gmt":"2025-12-08T01:52:20","slug":"puti-profile","status":"publish","type":"page","link":"https:\/\/it.telkomuniversity.ac.id\/en\/puti-profile\/","title":{"rendered":"PuTI Profile"},"content":{"rendered":"\n<section id=\"section-16e4c490-7220-46c1-8dca-c13d4ff00f3f\" class=\"wp-block-gutentor-image-slider gutentor-section gutentor-image-slider imageSlider-template1 gutentor-block-shape-bottom-bring-front\"><div class=\"gutentor-grid-item-wrap\"><div class=\"gutentor-slider-wrapper\" data-dots=\"false\" data-arrows=\"false\" data-infinite=\"false\" data-nextarrow=\"fas fa-angle-right\" data-prevarrow=\"fas fa-angle-left\" data-autoplay=\"true\" data-autoplayspeed=\"2000\" data-fade=\"false\" data-speed=\"1500\"><div class=\"gutentor-slider-item\"><div class=\"gutentor-single-item gutentor-single-item-0\"><div class=\"gutentor-single-item-wrap\"><div class=\"gutentor-single-item-image-box\"><div class=\"gutentor-bg-image\"><div class=\"overlay\"><\/div><\/div><\/div><div class=\"gutentor-single-item-content\"><div class=\"grid-container\"><div class=\"slider-caption text-right\"><h3 class=\"gutentor-single-item-title\">We care about TelUtizen IT activities<\/h3><p class=\"gutentor-single-item-desc\">We are here to ensure optimal technology, provide innovative solutions, and create a more efficient and integrated digital ecosystem. With full attention, we support TelUtizen&#8217;s growth, creativity, and productivity in the use of technology.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"gutentor-slider-item\"><div class=\"gutentor-single-item gutentor-single-item-1\"><div class=\"gutentor-single-item-wrap\"><div class=\"gutentor-single-item-image-box\"><div class=\"gutentor-bg-image\"><div class=\"overlay\"><\/div><\/div><\/div><div class=\"gutentor-single-item-content\"><div class=\"grid-container\"><div class=\"slider-caption text-right\"><h3 class=\"gutentor-single-item-title\">Connecting TelUtizen<\/h3><p class=\"gutentor-single-item-desc\">We deliver digital solutions that connect individuals, communities, and systems in one integrated ecosystem. With technology, collaboration, and innovation, we ensure that every TelUtizen can easily connect, share insights, and grow together in a dynamic digital environment.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section id=\"section-5339feab-0ada-4ede-9c6d-23c5541eb340\" class=\"wp-block-gutentor-about-block gutentor-section gutentor-about about-template4\"><div class=\"grid-container\"><div class=\"gutentor-grid-item-wrap\"><div class=\"gutentor-single-item\"><div class=\"grid-row\"><div class=\"grid-md-6 about-grid\"><div class=\"gutentor-single-item-content\"><div class=\"gutentor-about-content\"><h3 class=\"gutentor-single-item-title\">Customer Satisfaction is our priority<\/h3><p class=\"gutentor-single-item-desc\">The Directorate of Information Technology Center\u00a0abbreviated as PuTI, is under the Chancellor (see <a href=\"https:\/\/telkomuniversity.ac.id\/pimpinan-telkom-university\/\" target=\"_blank\" rel=\"noreferrer noopener\">Telkom University organizational structure<\/a>). Responsible for supporting the institution&#8217;s business processes in accordance with Telkom University&#8217;s vision and mission through Information Technology services.<br><br>The role of the Directorate of Information Technology Center (PuTI) is very crucial in supporting Telkom University&#8217;s vision to become a research and entrepreneurial university that plays an active role in the development of technology, science, and arts based on information technology. By having strong and integrated infrastructure, applications, and information technology services, Telkom University can achieve its vision to become a center of excellence for research and entrepreneurship in the development of technology, science, and arts based on information technology. In addition, the Directorate of PuTI strives to establish better communication and collaboration with all stakeholders to improve services and realize Telkom University&#8217;s vision.<\/p><a class=\"gutentor-button gutentor-single-item-button gutentor-icon-hide\" href=\"https:\/\/it.telkomuniversity.ac.id\/organisasi\/\"><i class=\"gutentor-button-icon fas fa-book\"><\/i><span>Organizational structure<\/span><\/a><\/div><\/div><\/div><div class=\"grid-md-6 about-grid\"><div class=\"gutentor-single-item-image-box\"><div class=\"gutentor-image-thumb\"><img loading=\"lazy\" decoding=\"async\" class=\"normal-image\" src=\"https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2025\/07\/Group-256.png\" alt=\"Rio Guntur Utomo - Puti\" height=\"474\" width=\"343\"\/><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section id=\"section-3f4319f4-43d0-4416-a4b1-26e54edeeaa7\" class=\"wp-block-gutentor-advanced-columns gutentor-section gutentor-advanced-columns has-image-bg has-custom-bg has-gutentor-overlay\"><div class=\"grid-container\"><div class=\"grid-row\">\n<section id=\"section-29ab3447-a5bd-47fe-9b3a-69a78cefaae8\" class=\"wp-block-gutentor-single-column gutentor-single-column  grid-lg-4 grid-md-12 grid-12\">\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"298\" height=\"591\" src=\"https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2021\/11\/Maskot-PuTI-right-side.png\" alt=\"Maskot-PuTI-right-side\" class=\"wp-image-94364\" srcset=\"https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2021\/11\/Maskot-PuTI-right-side.png 298w, https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2021\/11\/Maskot-PuTI-right-side-151x300.png 151w, https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2021\/11\/Maskot-PuTI-right-side-255x506.png 255w\" sizes=\"auto, (max-width: 298px) 100vw, 298px\" \/><\/figure>\n<\/section>\n\n\n\n<section id=\"section-42523e09-73b1-43a8-8fb0-7c55aca78a96\" class=\"wp-block-gutentor-single-column gutentor-single-column  grid-lg-8 grid-md-12 grid-12\">\n<section id=\"section-34cfa10b-4810-47e3-bc14-facecd90b6f2\" class=\"wp-block-gutentor-icon-box gutentor-section gutentor-icon-wrapper icon-template1\"><div class=\"grid-container\"><div class=\"grid-row gutentor-grid-item-wrap\"><div class=\"gutentor-grid-column grid-lg-6 grid-md-4 grid-12\"><div class=\"gutentor-single-item gutentor-icon gutentor-single-item-0\"><div class=\"gutentor-single-item-wrap\"><div class=\"gutentor-single-item-icon-box\"><i class=\"fas fa-infinity\"><\/i><\/div><div class=\"gutentor-single-item-content\"><h3 class=\"gutentor-single-item-title\">IT Product Development<\/h3><p class=\"gutentor-single-item-desc\">Responsible for developing information systems and technology for university stakeholders, involved in the ICT blueprint development team for information systems and technology development. Conducting analysis and compiling work programs and application development activities and information systems as strategic tools for optimizing university performance.<\/p><\/div><\/div><\/div><\/div><div class=\"gutentor-grid-column grid-lg-6 grid-md-4 grid-12\"><div class=\"gutentor-single-item gutentor-icon gutentor-single-item-1\"><div class=\"gutentor-single-item-wrap\"><div class=\"gutentor-single-item-icon-box\"><i class=\"fas fa-cogs\"><\/i><\/div><div class=\"gutentor-single-item-content\"><h3 class=\"gutentor-single-item-title\">Information Technology\u00a0<br>Research and Services<\/h3><p class=\"gutentor-single-item-desc\">This section aims to coordinate, organize and review the information technology quality standard management process of the Directorate of Information Technology Center on an ongoing basis in accordance with internal and external quality assurance standards to improve the effectiveness of the Directorate of Information Technology Center Quality Assurance, the process of requesting services and IT incidents can be resolved completely in accordance with the SLA (Service Level Agreement) and managing feedback from services, research on the needs of the University&#8217;s Information Technology both in terms of hardware and software, managing all resources and performance of the university&#8217;s webometric ranking which is the responsibility of the Directorate of Information Technology Center.<\/p><\/div><\/div><\/div><\/div><div class=\"gutentor-grid-column grid-lg-6 grid-md-4 grid-12\"><div class=\"gutentor-single-item gutentor-icon gutentor-single-item-2\"><div class=\"gutentor-single-item-wrap\"><div class=\"gutentor-single-item-icon-box\"><i class=\"fas fa-handshake\"><\/i><\/div><div class=\"gutentor-single-item-content\"><h3 class=\"gutentor-single-item-title\">Information Technology\u00a0<br>Infrastructure and Security<\/h3><p class=\"gutentor-single-item-desc\">Responsible for the management and development of IT infrastructure and security.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n<\/section>\n<\/div><\/div><\/section>\n\n\n\n<section id=\"section-755fe899-6a17-4589-8bf9-0e36bd62be2b\" class=\"wp-block-gutentor-counter-box gutentor-section gutentor-counter-wrapper counter-template3 has-image-bg has-custom-bg has-gutentor-overlay\"><div class=\"grid-container\"><div class=\"gutentor-block-header\"><div class=\"gutentor-section-title text-center\"><h2 class=\"gutentor-title\">Certification (ISO)<\/h2><\/div><\/div><div class=\"grid-row gutentor-grid-item-wrap\"><div class=\"gutentor-grid-column grid-lg-6 grid-md-4 grid-12\"><div class=\"gutentor-single-item gutentor-counter gutentor-single-item-0\"><div class=\"gutentor-single-item-wrap\"><div class=\"gutentor-single-item-icon-box\"><i class=\"fas fa-globe\"><\/i><\/div><div class=\"gutentor-single-item-content\"><p class=\"gutentor-single-item-number\" data-duration=\"2\" data-start=\"0\" data-end=\"20000\"><\/p><h3 class=\"gutentor-single-item-title\">Quality Management<\/h3><\/div><\/div><\/div><\/div><div class=\"gutentor-grid-column grid-lg-6 grid-md-4 grid-12\"><div class=\"gutentor-single-item gutentor-counter gutentor-single-item-1\"><div class=\"gutentor-single-item-wrap\"><div class=\"gutentor-single-item-icon-box\"><i class=\"fas fa-globe\"><\/i><\/div><div class=\"gutentor-single-item-content\"><p class=\"gutentor-single-item-number\" data-duration=\"2\" data-start=\"0\" data-end=\"27000\"><\/p><h3 class=\"gutentor-single-item-title\">Security System<\/h3><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n<section class=\"gutentor-section gutentor-blog-post-wrapper blog-template1 wp-block-gutentor-blog-post\" id=\"section-fb83b185-88a2-45f2-ae89-b27ffb1bc114\" >\n<div class='grid-container'><div class=\"gutentor-block-header\"><div class=\"gutentor-section-title  seperator-bottom text-center \"  >\n<h2 class=\"gutentor-title\">\nPuTI Activities<\/h2>\n<\/div>\n<\/div><div class='gutentor-grid-item-wrap '  ><div class='grid-row ' ><article class='gutentor-post-has-thumb  grid-lg-6 grid-md-4 grid-12 blog-grid'><div class=\"gutentor-single-item\"><div class=\"gutentor-single-item-image-box\"><div class=\"gutentor-image-thumb\"><img loading=\"lazy\" decoding=\"async\" width=\"1536\" height=\"1024\" src=\"https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2026\/03\/cyber_security_feature_compressed.jpg\" class=\"attachment- size- wp-post-image\" alt=\"Cyber Security Awareness untuk Mahasiswa\" srcset=\"https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2026\/03\/cyber_security_feature_compressed.jpg 1536w, https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2026\/03\/cyber_security_feature_compressed-300x200.jpg 300w, https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2026\/03\/cyber_security_feature_compressed-1024x683.jpg 1024w, https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2026\/03\/cyber_security_feature_compressed-768x512.jpg 768w\" sizes=\"auto, (max-width: 1536px) 100vw, 1536px\" \/><\/div><\/div><div class=\"gutentor-post-content\"><h3 class=\"gutentor-single-item-title\"><a href=\"https:\/\/it.telkomuniversity.ac.id\/en\/cyber-security-awareness\/\" rel=\"bookmark\">Cyber Security Awareness for Students and Data Security<\/a><\/h3><div class=\"entry-meta\"><div class=\"posted-on\"><i class=\"far fa-calendar-alt\"><\/i><a href=\"https:\/\/it.telkomuniversity.ac.id\/en\/cyber-security-awareness\/\" rel=\"bookmark\">20 March 2026<\/a><\/div><div class=\"author vcard\"><i class=\"far fa-user\"><\/i><a href=\"https:\/\/it.telkomuniversity.ac.id\/en\/cyber-security-awareness\/\" rel=\"bookmark\">BAHRAN ADINATA<\/a><\/div><div class=\"cat-links\"><i class=\"fas fa-tags\"><\/i><a href=\"https:\/\/it.telkomuniversity.ac.id\/en\/category\/blogs-en\/\" rel=\"category tag\">Blogs<\/a>, <a href=\"https:\/\/it.telkomuniversity.ac.id\/en\/category\/security\/\" rel=\"category tag\">Security<\/a><\/div><\/div><div class=\"gutentor-post-excerpt gutentor-single-item-desc\"><p class='gutentor-single-item-desc'>Learn the importance of cyber security awareness for students to avoid cyber threats such as phishin&hellip;<\/p><\/div><\/div><\/div><\/article><article class='gutentor-post-has-thumb  grid-lg-6 grid-md-4 grid-12 blog-grid'><div class=\"gutentor-single-item\"><div class=\"gutentor-single-item-image-box\"><div class=\"gutentor-image-thumb\"><img loading=\"lazy\" decoding=\"async\" width=\"1536\" height=\"1024\" src=\"https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2026\/03\/zero_trust_compressed.jpg\" class=\"attachment- size- wp-post-image\" alt=\"Zero Trust Security: Konsep dan Implementasi di Kampus\" srcset=\"https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2026\/03\/zero_trust_compressed.jpg 1536w, https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2026\/03\/zero_trust_compressed-300x200.jpg 300w, https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2026\/03\/zero_trust_compressed-1024x683.jpg 1024w, https:\/\/it.telkomuniversity.ac.id\/wp-content\/uploads\/2026\/03\/zero_trust_compressed-768x512.jpg 768w\" sizes=\"auto, (max-width: 1536px) 100vw, 1536px\" \/><\/div><\/div><div class=\"gutentor-post-content\"><h3 class=\"gutentor-single-item-title\"><a href=\"https:\/\/it.telkomuniversity.ac.id\/en\/zero-trust-security\/\" rel=\"bookmark\">Zero Trust Security: Concepts and Implementation in Campus<\/a><\/h3><div class=\"entry-meta\"><div class=\"posted-on\"><i class=\"far fa-calendar-alt\"><\/i><a href=\"https:\/\/it.telkomuniversity.ac.id\/en\/zero-trust-security\/\" rel=\"bookmark\">19 March 2026<\/a><\/div><div class=\"author vcard\"><i class=\"far fa-user\"><\/i><a href=\"https:\/\/it.telkomuniversity.ac.id\/en\/zero-trust-security\/\" rel=\"bookmark\">BAHRAN ADINATA<\/a><\/div><div class=\"cat-links\"><i class=\"fas fa-tags\"><\/i><a href=\"https:\/\/it.telkomuniversity.ac.id\/en\/category\/blogs-en\/\" rel=\"category tag\">Blogs<\/a>, <a href=\"https:\/\/it.telkomuniversity.ac.id\/en\/category\/security\/\" rel=\"category tag\">Security<\/a><\/div><\/div><div class=\"gutentor-post-excerpt gutentor-single-item-desc\"><p class='gutentor-single-item-desc'>Learn the concept of Zero Trust Security and its implementation in campuses to improve data, system,&hellip;<\/p><\/div><\/div><\/div><\/article><\/div><\/div><\/div><\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":91925,"parent":0,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"template-gutentor-full-width.php","meta":{"footnotes":""},"class_list":["post-92077","page","type-page","status-publish","has-post-thumbnail","hentry"],"blocksy_meta":{"disable_featured_image":"yes","page_structure_type":"type-4","has_hero_section":"disabled","content_style_source":"custom","styles_descriptor":{"styles":{"desktop":"[data-prefix=\"single_page\"] [class*=\"ct-container\"] > article[class*=\"post\"] {--has-boxed:var(--false);--has-wide:var(--true);}","tablet":"","mobile":""},"google_fonts":[],"version":6}},"_links":{"self":[{"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/pages\/92077","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/comments?post=92077"}],"version-history":[{"count":1,"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/pages\/92077\/revisions"}],"predecessor-version":[{"id":179528,"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/pages\/92077\/revisions\/179528"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/media\/91925"}],"wp:attachment":[{"href":"https:\/\/it.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/media?parent=92077"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}