To be a trusted business partner in IT Solution
About Us
Founded in 2018, PT Awan Teknologi Inovasi is an Information Technology company that provided Application and Security Solution to our Customer. Our Vision is To be a trusted business partner in IT Solution.
We are committed to take on every job order professionally and driven to deliver as accordance with the agreement, as we believe that trust building is an essential part in forming continuous relationships.
With the support of professional manpower, we always prioritize to deliver high quality products and provide the best services to all of our customers.

Product

HRM Application
Web-based HRM application, which can be customized according to needs, with complete features.
Features:- E-attendance
- Employee Database
- Payroll and Tax PPH21
- Android Support
- iOS Support

CRM & Project
Web-based CRM & Project application, which can be customized according to needs, with complete features.
Features:- Product & Pricebook
- Customer Database
- Sales Pipeline / Opportunity
- Quotation
- Sales Order Process
- Sales Dashboard
- Project
- Project Dashboard
- Project Activity
- Review Project
- Report
- Android Support

Custom Application
We provide custom application which can provide a unique. We make it simple, effective and secure. Contact us, we will help you.
Example:- Mobile Application Development
- Web & API Development
- Whatsapp Notification
Services

Security Audit
Security audit is the process of evaluating an IT system or infrastructure to find security vulnerabilities and threats that can be exploited by unauthorized parties, and provide recommendations to improve security and protect the organization from attacks or threats.

Security Policy Guide
Security policy guide is a document that contains guidelines and policies set by an organization to maintain the security and confidentiality of its information and IT systems.

Application Security Review
Application security review is a process of evaluating and analyzing application security in order to identify vulnerabilities and security holes that can be exploited by unauthorized parties.
