Intidata Solution

  • Create an account
    Fields marked with an asterisk (*) are required.

Top Products

Confessions of a Shopaholic
ERP (Enterprise Resource Planning)
Leading provider of ERP consulting services
Nothing like the holidays
Package Application
Helps you meet your business goals effectively
How to lose Friends and Alienate people
Best Security striving to protect behind firewalls and passwords
Sample image
  • Contact Us

  • People

PT. Intidata Anugrah Pratama

Kompleks Taman Palem Lestari Blok H/61, Outer Ringroad
Jakarta 11730 - Indonesia

Telephone : +6221-55952979
Facsimile : +6221-55958058
Mail : This e-mail address is being protected from spambots. You need JavaScript enabled to view it

Welcome to Intidata Solution

Sample image

Intidata is commited to providing the highest quality IT consulting services and solutions to the corporate and public sector. We are provides a broad portfolio of business and technology solutions to help its clients improve their business performance.

We are not just an ordinary software development house that offers technology solutions to satisfy our clients. We start by unlocking the interactive potential of a client’s business objectives and then build a team that is as imaginative as are intelligent.

Intidata objective is to truly understand our partner’s needs, demands and challenges and to then provide our partners with dependable, highly-skilled resources to ensure project success. We approach every project as part of an integrated plan geared towards meeting each client’s specific business needs. Our goal is to create a synergy between technology expertise and client requirements, in order to present a complete IT solution.


Customer Testimonial

Sample ImagesFor us, as a newly setup carton box factory company - Intidata provides more than the accounting system and we are confident to recommend Intidata to other companies.
(Rudy S, Director PT. TKI)

Hot Product

Sample Images
For every lost or stolen laptop or backup tape that makes it into the headlines, consider the many unreported, undocumented data leaks that occur when proprietary information is copied by either unwitting employees or users with malicious intent from their PCs to flash memory sticks, cell phones, cameras, PDA’s, or other convenient forms of portable storage
You are here: Home