{"id":144,"date":"2025-06-03T12:02:57","date_gmt":"2025-06-03T12:02:57","guid":{"rendered":"https:\/\/procentric.my\/wp2\/?page_id=144"},"modified":"2025-07-02T23:06:55","modified_gmt":"2025-07-02T15:06:55","slug":"genian-nac","status":"publish","type":"page","link":"https:\/\/procentric.my\/wp2\/index.php\/genian-nac\/","title":{"rendered":"GENIAN NAC"},"content":{"rendered":"\n<div class=\"wp-block-group alignfull has-base-background-color has-background\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-container-core-group-is-layout-2bafd31c wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-4d397ad4 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"804\" height=\"268\" src=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/cropped-Genians-Horizontal-1-2.png\" alt=\"\" class=\"wp-image-78\" style=\"width:325px;height:auto\" srcset=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/cropped-Genians-Horizontal-1-2.png 804w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/cropped-Genians-Horizontal-1-2-300x100.png 300w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/cropped-Genians-Horizontal-1-2-768x256.png 768w\" sizes=\"auto, (max-width: 804px) 100vw, 804px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-705f6781 wp-block-columns-is-layout-flex\" style=\"margin-top:0;margin-bottom:0;padding-right:0;padding-left:0;text-transform:uppercase\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<h2 class=\"wp-block-heading has-text-color has-link-color has-x-large-font-size wp-elements-1d39bc3421428a9e86cc43b79eedd016\" style=\"color:#4cb570\"><strong>Ensuring Secure Access Everywhere<\/strong><\/h2>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center has-text-color has-link-color has-large-font-size wp-elements-d6e642f414ed76b319834decf3250e44\" style=\"color:#4cb570\">         <em><strong>NETWORK ACCESS CONTROL<\/strong><\/em>          <\/h1>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-accent-4-background-color has-background is-vertical is-layout-flex wp-container-core-group-is-layout-b2cb4619 wp-block-group-is-layout-flex\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\">\n<h2 class=\"wp-block-heading has-base-color has-text-color has-link-color wp-elements-48386c753fe9ed1ccd10e4db98767135\" style=\"text-decoration:underline\">Network Surveillance<\/h2>\n\n\n\n<p class=\"has-base-color has-text-color has-link-color wp-elements-fb3b3f7c73573f09ff5a61b08ce931a9\">Genian NAC can monitor IP-enabled devices on your network in real-time using a non-disruptive Layer 2 based Network Sensor and classifies those devices and their users into logical groups based on your business requirements. Genian NAC has the intelligence to sort out a wide range of network-connected devices and their states to present immediate, meaningful, and actionable information.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.34%\">\n<p class=\"has-base-color has-text-color has-link-color wp-elements-1e56162f00a69408eba6a82126a6a163\"><strong>Detection<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list has-base-2-color has-text-color has-link-color wp-elements-44d4f37bb17edb40f6ba3c3c28017959\">\n<li class=\"has-base-color has-text-color has-link-color wp-elements-9546a4e4f90f06f93011b596c38c5dd9\">Provide the most accurate device platform information and see access trends<\/li>\n\n\n\n<li class=\"has-base-color has-text-color has-link-color wp-elements-17c0dcb3c708d09d485dadd1ff9c2e84\">Discover contextual access information (Who, What, Where, When, How)<\/li>\n\n\n\n<li class=\"has-base-color has-text-color has-link-color wp-elements-b8a9350e4d1bf628b1777729aab4788e\">Detect compliance status change on time<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.34%\">\n<p class=\"has-base-color has-text-color has-link-color wp-elements-c8cabcddb9a9db28698e318b116888e3\"><strong>Coverage<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list has-base-color has-text-color has-link-color wp-elements-3867893f78d360e8f5440afec7615e82\">\n<li class=\"has-base-2-color has-text-color has-link-color wp-elements-071e64cfcc6afaa53f405fd2c839f9ed\">Monitor heterogeneous network environments without changing existing network configuration<\/li>\n\n\n\n<li class=\"has-base-2-color has-text-color has-link-color wp-elements-eb1d22b2fc81552b0c6b60eafcb4cdce\">Monitor wireless packets by Wireless Sensors or Agents<\/li>\n\n\n\n<li class=\"has-base-2-color has-text-color has-link-color wp-elements-2f6c8a5d5a04335812d781ffa7cfcb86\">Monitor all managed, unmanaged, and even legacy networking devices<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<p class=\"has-base-color has-text-color has-link-color wp-elements-a94189dfa94c54fdeae664ced7088b82\"><strong>Observation<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list has-base-color has-text-color has-link-color wp-elements-d88cc0dd5d9668f1199516cac3917146\">\n<li class=\"has-base-2-color has-text-color has-link-color wp-elements-6c12c89584a1ec0b5996bc552084c1a5\">Find non-compliant, unknown, rogue, misconfigured devices<\/li>\n\n\n\n<li class=\"has-base-2-color has-text-color has-link-color wp-elements-ea841ec0e852c82d7f8c64d0a71dd079\">Discover abnormal network traffics (e.g. ARP Spoofing\/Bombing, MAC\/IP Cloning, Port scanning, Invalid Gateway)<\/li>\n\n\n\n<li class=\"has-base-2-color has-text-color has-link-color wp-elements-f396eeef921b8df25fc31d86822a1d3d\">Present personalized information through fully customizable dashboards<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-ad2f72ca wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/n1-1-1024x683.png\" alt=\"\" class=\"wp-image-148\" srcset=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/n1-1-1024x683.png 1024w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/n1-1-300x200.png 300w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/n1-1-768x512.png 768w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/n1-1-1536x1024.png 1536w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/n1-1-2048x1365.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/n2-1024x683.png\" alt=\"\" class=\"wp-image-149\" srcset=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/n2-1024x683.png 1024w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/n2-300x200.png 300w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/n2-768x512.png 768w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/n2-1536x1024.png 1536w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/n2-2048x1365.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-base-background-color has-background is-vertical is-layout-flex wp-container-core-group-is-layout-b2cb4619 wp-block-group-is-layout-flex\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\">\n<h2 class=\"wp-block-heading\" style=\"text-decoration:underline\">Device Platform Intelligence<\/h2>\n\n\n\n<p>\u201cDevice Platform\u201d refers to any hardware or software, or any combination of hardware and software (OS), used to access a network. Genian NAC incorporated with Device Platform Intelligence (DPI) can present the most accurate device identity, its contextual, and its risk information in order to enhance network visibility and secure network access for the IoT era. DPI can be shared through the Genians Cloud.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.34%\">\n<p><strong>Identity<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Distinct information\n<ul class=\"wp-block-list\">\n<li>The name of Device Platform consists of manufacturer, device name, model number (Integrated with the Common Platform Enumeration (CPE) dictionary)<\/li>\n\n\n\n<li>The actual picture of the device platforms<\/li>\n\n\n\n<li>The list of device fingerprinting sources<\/li>\n\n\n\n<li>Network connection type (Wired, Wireless)&nbsp;<\/li>\n\n\n\n<li>Released Date<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.34%\">\n<p><strong>Context<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Business Information\n<ul class=\"wp-block-list\">\n<li>Product end of life (EOL)<\/li>\n\n\n\n<li>Product end of support (EOS)<\/li>\n\n\n\n<li>Manufacturer business status<\/li>\n\n\n\n<li>Manufacturer location (Country)<\/li>\n\n\n\n<li>Manufacturer homepage<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Extended Information\n<ul class=\"wp-block-list\">\n<li>Linked to Product webpage<\/li>\n\n\n\n<li>Linked to Google search engine<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<p><strong>Risk<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Technology Vulnerability\n<ul class=\"wp-block-list\">\n<li>Provide Common Vulnerabilities and Exposures (CVE)<\/li>\n\n\n\n<li>Report device platforms exposed to vulnerability issues in real time<\/li>\n\n\n\n<li>Alert and notification<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Business Vulnerability\n<ul class=\"wp-block-list\">\n<li>Report manufacturer\/vendor going out of business or being acquired, which can introduce systems that cannot be upgraded or patched<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-ad2f72ca wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/n1-1-1024x683.png\" alt=\"\" class=\"wp-image-148\" srcset=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/n1-1-1024x683.png 1024w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/n1-1-300x200.png 300w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/n1-1-768x512.png 768w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/n1-1-1536x1024.png 1536w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/n1-1-2048x1365.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/n2-1024x683.png\" alt=\"\" class=\"wp-image-149\" srcset=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/n2-1024x683.png 1024w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/n2-300x200.png 300w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/n2-768x512.png 768w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/n2-1536x1024.png 1536w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/n2-2048x1365.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-accent-4-background-color has-background is-vertical is-layout-flex wp-container-core-group-is-layout-b2cb4619 wp-block-group-is-layout-flex\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\">\n<h2 class=\"wp-block-heading has-base-color has-text-color has-link-color wp-elements-504076954cd6097defd1d4136b1acca8\" style=\"text-decoration:underline\">Network Access Control<\/h2>\n\n\n\n<p class=\"has-base-color has-text-color has-link-color wp-elements-9be99de5753b5d94eca425484c7673ce\">Genian NAC leverages multiple techniques to enforce IT security policies dynamically using contextual information (What, Who, When, Where, How) to quarantine any non-compliant devices and remediate them to be compliant through automated processes.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-base-color has-text-color has-link-color wp-elements-33378146dbc6f3a8f258ad6208231f0e\"><strong><strong>Dynamic Acess Control<\/strong><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"has-base-color has-text-color has-link-color wp-elements-5787f72487594e5839c1e61bae6c95ef\">Condition-based grouping (Over 500 predefined conditions)<\/li>\n\n\n\n<li class=\"has-base-color has-text-color has-link-color wp-elements-033377b58c6b2084c9aeacd9c8ea62f6\">Policy assignment based on the status change of endpoint compliance<\/li>\n\n\n\n<li class=\"has-base-color has-text-color has-link-color wp-elements-165af7f7f9093c81ea2030b413fd2abf\">End-to-end access control inside of LAN<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-base-color has-text-color has-link-color wp-elements-d50934b9d1836938e40ae2be26f0b1b3\"><strong><strong>Multi-layered Access Control<\/strong><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"has-base-color has-text-color has-link-color wp-elements-20dc784105e67934d084cfa46fbfb642\">802.1x: Built-in RADIUS server<\/li>\n\n\n\n<li class=\"has-base-color has-text-color has-link-color wp-elements-acdd3d0a7f86dea86fef1b6fa87e95bc\">DHCP: Built-in DHCP server<\/li>\n\n\n\n<li class=\"has-base-color has-text-color has-link-color wp-elements-f7ac2fa0c5f75888ee7f011d29190a26\">Layer 2: ARP Enforcement (using Network Sensor)<\/li>\n\n\n\n<li class=\"has-base-color has-text-color has-link-color wp-elements-aae4d5d172c92538e6635cb1d0a0a73d\">Layer 3: TCP reset (using Mirror\/SPAN Sensor)<\/li>\n\n\n\n<li class=\"has-base-color has-text-color has-link-color wp-elements-0a153c624ca15fd657d16c788de5148d\">Layer 3: Inline Enforcement (Dual-homed Gateway)<\/li>\n\n\n\n<li class=\"has-base-color has-text-color has-link-color wp-elements-24098cda2ef69a8f46f01dd4876d2035\">Agent: NIC\/Power Control, Alert Popup<\/li>\n\n\n\n<li class=\"has-base-color has-text-color has-link-color wp-elements-756e16f5ef8a7feeaedcaae50187d1b5\">Integration: Firewall, Switch port shutdown (SNMP,Webhook)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-ad2f72ca wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/nac-enforce-policy-1024x683.png\" alt=\"\" class=\"wp-image-158\" srcset=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/nac-enforce-policy-1024x683.png 1024w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/nac-enforce-policy-300x200.png 300w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/nac-enforce-policy-768x512.png 768w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/nac-enforce-policy-1536x1024.png 1536w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/nac-enforce-policy-2048x1365.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/nac-policy-conditions-1024x683.png\" alt=\"\" class=\"wp-image-159\" srcset=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/nac-policy-conditions-1024x683.png 1024w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/nac-policy-conditions-300x200.png 300w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/nac-policy-conditions-768x512.png 768w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/nac-policy-conditions-1536x1024.png 1536w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/nac-policy-conditions-2048x1365.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-base-background-color has-background is-vertical is-layout-flex wp-container-core-group-is-layout-b2cb4619 wp-block-group-is-layout-flex\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\">\n<h2 class=\"wp-block-heading\" style=\"text-decoration:underline\">Mobile, BYOD, Guest<\/h2>\n\n\n\n<p>In the hyper-connected world of the Internet of Things (IoT), organizations are grappling with implementing Bring Your Own Device (BYOD) initiatives to deal with the rapidly evolving and increasingly complex tsunami of mobile devices, from laptops and tablets to other smart \u201dThings\u201d, such as phones, watches, cars and more. Genian NAC can provide flexible and secure network access, wherever you are located, and for whatever devices you bring to the network.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong><strong>Onboarding Process<\/strong><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Check user authentication and device compliance status<\/li>\n\n\n\n<li>Guide users to meet compliance (Self-service process)<\/li>\n\n\n\n<li>Provide role-based access control<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong><strong><strong>Secure Access Request<\/strong><\/strong><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Captive Web Portal service<\/li>\n\n\n\n<li>Built-in RADIUS server (802.1x)<\/li>\n\n\n\n<li>User authentication (AD, local DB, RDBMS, Google G-Suite)<\/li>\n\n\n\n<li>Request approval system (Device, IP, User, Peripherals)                                  <\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-ad2f72ca wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/cwp-device-1024x683.png\" alt=\"\" class=\"wp-image-161\" srcset=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/cwp-device-1024x683.png 1024w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/cwp-device-300x200.png 300w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/cwp-device-768x512.png 768w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/cwp-device-1536x1024.png 1536w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/cwp-device-2048x1365.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/cwp-saml-1024x683.png\" alt=\"\" class=\"wp-image-162\" srcset=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/cwp-saml-1024x683.png 1024w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/cwp-saml-300x200.png 300w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/cwp-saml-768x512.png 768w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/cwp-saml-1536x1024.png 1536w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/cwp-saml-2048x1365.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-accent-4-background-color has-background is-vertical is-layout-flex wp-container-core-group-is-layout-b2cb4619 wp-block-group-is-layout-flex\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\">\n<h2 class=\"wp-block-heading has-base-color has-text-color has-link-color wp-elements-94f3c6725ae0d2ce7a680cf34cc2fc36\" style=\"text-decoration:underline\">IP Address Management<\/h2>\n\n\n\n<p class=\"has-base-color has-text-color has-link-color wp-elements-f3d83b4822b8361c28af960779bcc251\">Through our intuitive IP matrix interface (Class C Subnet mask), see how many IP addresses are being used and available, which IP\u2019s are assigned via DHCP, which are reserved, and more.<\/p>\n\n\n\n<div class=\"wp-block-columns has-base-color has-text-color has-link-color wp-elements-4567c2a1c398ef391b621a95cb546f2f is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong><strong>Monitoring<\/strong><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list has-base-color has-text-color has-link-color wp-elements-0016155cb9cd9489745f784a79194cf1\">\n<li>See the usage of IP address for each network segment<\/li>\n\n\n\n<li>Identify who\/what device connecting to an IP address<br>Monitor the change of IP addresses<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong><strong><strong>Comprehensive IP Management<\/strong><\/strong><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list has-base-color has-text-color has-link-color wp-elements-38060030bbbc838eed8643525abcc004\">\n<li>Built-in DHCP Server<\/li>\n\n\n\n<li>IP Address (Allow, Deny, Lease, Assign)<\/li>\n\n\n\n<li>IP Conflict \/ Change Prevention<\/li>\n\n\n\n<li>MAC\/IP Cloning Detection                                                                                    <\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-ad2f72ca wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/ipam-details-1024x683.png\" alt=\"\" class=\"wp-image-164\" srcset=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/ipam-details-1024x683.png 1024w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/ipam-details-300x200.png 300w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/ipam-details-768x512.png 768w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/ipam-details-1536x1024.png 1536w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/ipam-details-2048x1365.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/ipam-matrix-1024x683.png\" alt=\"\" class=\"wp-image-165\" srcset=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/ipam-matrix-1024x683.png 1024w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/ipam-matrix-300x200.png 300w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/ipam-matrix-768x512.png 768w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/ipam-matrix-1536x1024.png 1536w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/ipam-matrix-2048x1365.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-base-background-color has-background is-vertical is-layout-flex wp-container-core-group-is-layout-b2cb4619 wp-block-group-is-layout-flex\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\">\n<h2 class=\"wp-block-heading\" style=\"text-decoration:underline\">Switch Port Management<\/h2>\n\n\n\n<p>See how many devices are connected to specific ports, their connection status, port-level security, 802.1x information, traffic, utilization and more. Using 802.1x port-based access control, control any ports connected to non-compliant devices.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong><strong>Monitoring<\/strong><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Identify how many devices are connected to specific ports<\/li>\n\n\n\n<li>Check the authentication status of connected devices<\/li>\n\n\n\n<li>Monitor Switch port status (Up\/down, Security, 802.1x, VLAN, etc.)<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong><strong><strong>Port Management<\/strong><\/strong><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Switch and Port Description<\/li>\n\n\n\n<li>Administratively Down<\/li>\n\n\n\n<li>Discover Top 10 Switch Port Traffics                                               <\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-ad2f72ca wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/cwp-device-1024x683.png\" alt=\"\" class=\"wp-image-161\" srcset=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/cwp-device-1024x683.png 1024w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/cwp-device-300x200.png 300w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/cwp-device-768x512.png 768w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/cwp-device-1536x1024.png 1536w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/cwp-device-2048x1365.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/cwp-saml-1024x683.png\" alt=\"\" class=\"wp-image-162\" srcset=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/cwp-saml-1024x683.png 1024w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/cwp-saml-300x200.png 300w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/cwp-saml-768x512.png 768w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/cwp-saml-1536x1024.png 1536w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/cwp-saml-2048x1365.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-accent-4-background-color has-background is-vertical is-layout-flex wp-container-core-group-is-layout-b2cb4619 wp-block-group-is-layout-flex\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\">\n<h2 class=\"wp-block-heading has-base-color has-text-color has-link-color wp-elements-6900277a3d5a5c3e9236dacc040ba248\" style=\"text-decoration:underline\">WLAN Security<\/h2>\n\n\n\n<p class=\"has-base-color has-text-color has-link-color wp-elements-7e6dbdcd45e244f55d26ac135462d37c\">Genians\u2019 Network Sensor has the capability of scanning all SSIDs in your network and identifying who connects to which SSIDs, capturing not only your organization\u2019s APs but also neighboring APs and controlling what is connecting to those APs. You can allow or deny Wifi-enabled devices accessing different SSIDs based on their policy compliance by groups, such as Authorized AP, Rogue AP, Misconfigured AP, Tethering device, and more.<\/p>\n\n\n\n<div class=\"wp-block-columns has-base-color has-text-color has-link-color wp-elements-422c3e1fdd416c502a417982a20fe538 is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.34%\">\n<p><strong><strong>WLAN Monitoring<\/strong><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Detect SSIDs by Wireless Sensor or Agent<\/li>\n\n\n\n<li>Discover all connected wireless devices per SSIDs<\/li>\n\n\n\n<li>Discover where SSIDs are located<\/li>\n\n\n\n<li>Detect APs connected to corporate networks<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.34%\">\n<p><strong><strong>WLAN Compliance<\/strong><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Detect non-compliant wireless devices (APs, mobile devices)<\/li>\n\n\n\n<li>Detect rogue and misconfigured APs<\/li>\n\n\n\n<li>Detect hidden APs and softAPs<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<p><strong><strong>Wireless Connection Manager<\/strong><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Manage wireless connection profile<\/li>\n\n\n\n<li>Disable SoftAP<\/li>\n\n\n\n<li>Provide a single-click wireless connection service<\/li>\n\n\n\n<li>Allow connections only to authorized APs<\/li>\n\n\n\n<li>802.1x supplicant plugin (EAP-GTC)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-ad2f72ca wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/wlan-list-1024x683.png\" alt=\"\" class=\"wp-image-171\" srcset=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/wlan-list-1024x683.png 1024w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/wlan-list-300x200.png 300w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/wlan-list-768x512.png 768w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/wlan-list-1536x1024.png 1536w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/wlan-list-2048x1365.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/wlan-ssid-1024x683.png\" alt=\"\" class=\"wp-image-172\" srcset=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/wlan-ssid-1024x683.png 1024w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/wlan-ssid-300x200.png 300w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/wlan-ssid-768x512.png 768w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/wlan-ssid-1536x1024.png 1536w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/wlan-ssid-2048x1365.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-base-background-color has-background is-vertical is-layout-flex wp-container-core-group-is-layout-b2cb4619 wp-block-group-is-layout-flex\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\">\n<h2 class=\"wp-block-heading\" style=\"text-decoration:underline\">Endpoint Security\u200b<\/h2>\n\n\n\n<p>Manage all desktop configurations, applications, OS Updates, peripheral devices, wireless connections and more. Standardize the configuration of corporate-owned devices automatically and control them remotely.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li>Change Computer Name<\/li>\n\n\n\n<li>Check Password Validation<\/li>\n\n\n\n<li>Collect System Information Using WMI<\/li>\n\n\n\n<li>Configure Windows Security Settings<\/li>\n\n\n\n<li>Control OS Updates (Works for the isolated network)<\/li>\n\n\n\n<li>Configure 802.1X Wired Authentication<\/li>\n\n\n\n<li>Profile Settings<\/li>\n\n\n\n<li>Control Antivirus Software Settings<\/li>\n\n\n\n<li>Control DNS<\/li>\n\n\n\n<li>Control External Devices (e.g. USB, Printer)<\/li>\n\n\n\n<li>Control Internet Explorer Security Settings<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li>Control Network Folder Sharing \/ Interface \/ Traffic<\/li>\n\n\n\n<li>Control Power Options, Screen Lock<\/li>\n\n\n\n<li>Provide Wireless Connection Manager (Zero configuration)<\/li>\n\n\n\n<li>Control WLAN<\/li>\n\n\n\n<li>Deploy Files<\/li>\n\n\n\n<li>Inspect TCP Connections<\/li>\n\n\n\n<li>Manage ARP Table<\/li>\n\n\n\n<li>Install \/ Remove software<\/li>\n\n\n\n<li>Run Scripts<\/li>\n\n\n\n<li>Terminate Processes                                                                                                <\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-ad2f72ca wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/endpoint-system-1024x683.png\" alt=\"\" class=\"wp-image-174\" srcset=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/endpoint-system-1024x683.png 1024w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/endpoint-system-300x200.png 300w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/endpoint-system-768x512.png 768w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/endpoint-system-1536x1024.png 1536w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/endpoint-system-2048x1365.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/endpoint-agent-actions-1024x683.png\" alt=\"\" class=\"wp-image-175\" srcset=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/endpoint-agent-actions-1024x683.png 1024w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/endpoint-agent-actions-300x200.png 300w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/endpoint-agent-actions-768x512.png 768w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/endpoint-agent-actions-1536x1024.png 1536w, https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/06\/endpoint-agent-actions-2048x1365.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Ensuring Secure Access Everywhere NETWORK ACCESS CONTROL Network Surveillance Genian NAC can monitor IP-enabled devices on your network in real-time using a non-disruptive Layer 2 based Network Sensor and classifies those devices and their users into logical groups based on your business requirements. Genian NAC has the intelligence to sort out a wide range of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-144","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/procentric.my\/wp2\/index.php\/wp-json\/wp\/v2\/pages\/144","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/procentric.my\/wp2\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/procentric.my\/wp2\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/procentric.my\/wp2\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/procentric.my\/wp2\/index.php\/wp-json\/wp\/v2\/comments?post=144"}],"version-history":[{"count":40,"href":"https:\/\/procentric.my\/wp2\/index.php\/wp-json\/wp\/v2\/pages\/144\/revisions"}],"predecessor-version":[{"id":443,"href":"https:\/\/procentric.my\/wp2\/index.php\/wp-json\/wp\/v2\/pages\/144\/revisions\/443"}],"wp:attachment":[{"href":"https:\/\/procentric.my\/wp2\/index.php\/wp-json\/wp\/v2\/media?parent=144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}