Information Technology


This has been our primary business since inception and which we have built up considerable expertise. We are now able to offer you our experience and expertise in the following areas of specialization, namely: Network Engineering, System Engineering, Application Development, Deployment services as well as Hardware and Software sales.

    Network Engineering

    Network Engineering is one of the main sectors under the information technology that we are giving extra focus. The services that we are offering our customers are as follows:

  • Network planning, design, implementation, commissioning and maintenance.
  • Remote network monitoring & maintenance.
  • Security systems compliance design, implementation, commissioning and maintenance.
  • Network security architecture implementation, commissioning and maintenance.
  • Network penetration testing.
  • Voice Over IP (VOIP) design and implementation.

  • Systems Engineering

    Under this sub sector we are offering the following services:

  • System Requirements Analysis
  • Systems Analysis & Design
  • Project Management
  • Quality Assurance & Management
  • Independent Verification & Validation Assessment
  • Enterprise Resource Planning

  • Application Development

    This sector has risen in prominence in recent years due to a large extent to the emergence and importance of Internet both for business and personal / leisure. Now just about everybody can do business online with just a computer and an Internet connection. Under this sector we are concentrating on the following:

  • Web, Portal & Ecommerce Development

  • Deployment Services

    For this sub-sector we are offering the following services.

  • Project Management
  • Requirements Management
  • Desktop Deployment
  • Server and Storage Deployment
  • Technical Refresh Services

Computer Networking Hardware and Software Sales

This has been the backbone of our business since starting operation. We are serving our customers as dealers, distributors, resellers, systems integrator and service providers for a wide range of IT products and services. These include workstations; desktop computers, personal computers, notebooks/laptops, servers, printers, scanners, monitors, UPS, routers, switches and other computer and IT related products, accessories and peripherals. We are vendors and distributors for all the major computers and IT companies such as HP/Compaq, Acer, Apple, Toshiba, Dell, NEC, IBM, Fujitsu, Lenovo, BenQ, Asus, Sony, Cisco, 3Com, AMP, Linksys, Microsoft, Adobe, Regcure, AVG, Symantec, Trend Micro and many more. As we carry a large range of products as well as services to offer, we are able to cater to our varied customers needs and preferences. Just request any products or services from us, and more likely than not, we’ll be able to fulfill them.

Integrasi ICT (M) Sdn Bhd is committed to assisting your organization identify and procure the best hardware and software solutions tailored to you r immediate and long term needs. We offer evaluation and design support prior to your purchase and leverage our extensive portfolio of vendor partnerships and government schedules to ensure you are maximizing your return on investment. Our sales team has been serving our clients since 2003 and is positioned to offer your organization a broad selection of programs and services. In addition to Hardware and Software, Integrasi ICT (M) Sdn Bhd can also help with education, training, and marketing services, as well as pre- and post-sales technical assistance.

Library Automation Systems

INTEGRASI ICT (M) SDN BHD has been a distributor of this system since 2005. We are providing solutions to libraries for their security problem in protecting their valuable assets against theft and collection lapses. We are able to help libraries by offering either Electromagnetic Security System (EM) or Radio Frequency Identification System (RFID). Both of these systems have their own components to work properly and need to work in tandem with a detection and circulation system to provide a complete security system as follows:

Security solution based on Radio Frequency Identification System (RFID) which comprises of the following:
  1. RFID Tags
  2. RFID Detection Equipment and Accessories
  3. Radio Frequency Identification System (RFID) and its jobs/tasks specific components below:
      i) 3M Conversion Station
      ii) Print Conversion System
      iii) Digital Library Assistant
      iv) Staff Workstation
      v) Pad Staff Workstation

Electromagnetic Security System (EM) which comprises of the following:

  1. EM Strips & Applicators (tattle tapes application System, Book Holder, Tattle Tape Security strip B1, B2, DAC-1, DCD-2, DVM-1 & R2)
  2. EM Detection Equipment & Accessories
  3. Electromagnetic Security System (EM)
  4. Circulation Accessories for check-in, check-out or both check-in/check-outs.

Automatic ID Solutions:

  1. Barcode Hardware
  2. Barcode Software
  3. Barcode Printer
  4. Barcode Scanner
  5. Receipt Printer
  6. Data Collection
  7. Wireless Networking
  8. Labeling
  9. Mobile Computing
  10. Automatic Label Applicators.
We are offering library automation solutions from 3M and Checkpoint. Contact our consultant for system recommendations, planning and price quotes.

Biometric Security System

Authentication plays a very critical role in security-related applications like e-commerce. There are a number of methods and techniques for accomplishing this key process. In this regard, biometrics is gaining increasing attention these days. Security systems, having realized the value of biometrics, use biometrics for two basic purposes: to verify or identify users. There are a number of biometrics and different applications need different biometrics.

What is a Biometric

Biometric is the most secure and convenient authentication tool. It can not be borrowed, stolen, or forgotten and forging one is practically impossible. Biometrics measure individual's unique physical or behavioral characteristics to recognize or authenticate their identity. Common physical biometrics include fingerprints, hand or palm geometry, retina, iris, and facial characteristics. Behavioral characters characteristics include signature, voice, keystroke pattern, and gait. Of this class of biometrics, technologies for signature and voice are the most developed.

Biometric Technologies

There are many biometric technologies to suit different types of applications. To choose the right biometric to be highly fit for the particular situation, one has to navigate through some complex vendor products and keep an eye on future developments in technology and standards. Here comes a list of biometrics :

Fingerprints - A fingerprint looks at the patterns found on a fingertip. There are a variety of approaches to fingerprint verification, such as traditional police method, using pattern-matching devices, and things like moire fringe patterns and ultrasonics. This seems to be a very good choice for in-house systems.

Hand geometry - This involves analyzing and measuring the shape of the hand. It might be suitable where there are more users or where user access the system infrequently. Accuracy can be very high if desired, and flexible performance tuning and configuration can accommodate a wide range of applications. Organizations are using hand geometry readers in various scenarios, including time and attendance recording.

Retina - A retina-based biometric involves analyzing the layer of blood vessels situated at the back of the eye. This technique involves using a low intensity light source through an optical coupler to scan the unique patterns of the retina. Retinal scanning can be quite accurate but does require the user to look into a receptacle and focus on a given point.

Iris - An iris-based biometric involves analyzing features found in the colored ring of tissue that surrounds the pupil. This uses a fairly conventional camera element and requires no close contact between the user and the reader. Further, it has the potential for higher than average template-matching performance.

Face- Face recognition analyses facial characteristics. It requires a digital camera to develop a facial image of the user for authentication. Because facial scanning needs an extra peripheral things that are not included in basic PCs, it is more of a niche market for network authentication. However, the casino industry has capitalized on this technology to create a facial database of scam artists for quick detection by security personal.

Signature - Signature verification analyses the way user signs his name. Signing features such as speed, velocity, and pressure are as important as the finished signature's static shape. People are used to signatures as a means of transaction-related identity verification.

Voice - Voice authentication is based on voice-to-print authentication, where complex technology transforms voice into text. Voice biometrics requires a microphone, which is available with PCs nowadays. Voice biometrics is to replace the currently used methods, such as PINs, passwords, or account names. But voice will be a complementary technique for finger-scan technology as many people see finger scanning as a higher authentication form.