{"id":450,"date":"2025-09-05T16:52:13","date_gmt":"2025-09-05T08:52:13","guid":{"rendered":"https:\/\/procentric.my\/wp2\/?page_id=450"},"modified":"2026-01-15T23:57:25","modified_gmt":"2026-01-15T15:57:25","slug":"homepage-v1","status":"publish","type":"page","link":"https:\/\/procentric.my\/wp2\/","title":{"rendered":"Homepage &#8211; V1"},"content":{"rendered":"<section class=\"new-site\">\n<p>    <!-- Hero Section --><\/p>\n<section class=\"hero\">\n<div class=\"container\">\n<h1>Cyber Attacks Hit Malaysian Businesses Every 2 Hours<\/h1>\n<p class=\"subtitle\">Don&#8217;t Be Next. Protect Your Organization with Award-Winning Security Solutions Trusted<br \/>\n                by Leading Malaysian Companies Across Government, Aviation, and Media Sectors.<\/p>\n<div class=\"hero-cta\">\n                <a href=\"#contact\" class=\"btn-primary\">Get Your Free Security Risk Assessment<\/a><br \/>\n                <a href=\"#customers\" class=\"btn-secondary\">See Customer Success Stories<\/a>\n            <\/div>\n<div class=\"risk-reversal\">No obligation \u2022 Immediate insights \u2022 Local consultation<\/div>\n<\/p><\/div>\n<\/section>\n<p>    <!-- Partners Carousel --><\/p>\n<section class=\"partners\" id=\"partners\">\n<div class=\"container\">\n<h3>Trusted Technology Partners Around The Globe<\/h3>\n<div class=\"partner-logos\">\n<div><img decoding=\"async\" src=\"https:\/\/procentric.my\/wp2\/wp-content\/uploads\/2025\/09\/Logo-219x92-1-1.png\" alt=\"logo\" style=\"width:200px; height:92px;\"><\/div>\n<div>Genians<\/div>\n<div>Hiware<\/div>\n<div>Optitune<\/div>\n<div>AppsAnywhere<\/div>\n<div>NetSupport<\/div>\n<div>SysReturn<\/div>\n<div>FASOO<\/div>\n<div>SonicWall<\/div>\n<div>PRTG<\/div>\n<div>CurrentWare<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/section>\n<p>    <!-- Why Choose Us --><\/p>\n<section class=\"why-choose\">\n<div class=\"container\">\n<h2>Why Smart Malaysian Organizations Choose Procentric Technology<\/h2>\n<div class=\"benefits-grid\">\n<div class=\"benefit-card\">\n<h3>Stop Worrying About the Next Cyber Attack<\/h3>\n<p>When you work with us, you get the same security technology that protects global enterprises &#8211;<br \/>\n                        but with local expertise that understands Malaysian business needs. Organizations across<br \/>\n                        government, aviation, and media sectors trust us because we eliminate their biggest security<br \/>\n                        risks while making their operations smoother.<\/p>\n<\/p><\/div>\n<div class=\"benefit-card\">\n<h3>Get Real Support From Real People<\/h3>\n<p>Forget about overseas call centers and time zone headaches. Our Malaysian team provides same-day<br \/>\n                        response and understands your local challenges. We&#8217;re here when you need us most, speaking your<br \/>\n                        language and working in your timezone.<\/p>\n<\/p><\/div>\n<div class=\"benefit-card\">\n<h3>Simplify Your IT Operations (And Your Budget)<\/h3>\n<p>Why juggle multiple vendors when one trusted partner can handle everything? Consolidate your<br \/>\n                        security operations and reduce the complexity that drives up costs. Less complexity, lower<br \/>\n                        overhead, stronger security.<\/p>\n<\/p><\/div>\n<div class=\"benefit-card\">\n<h3>Make Compliance Simple, Not Stressful<\/h3>\n<p>Whether it&#8217;s PDPA compliance or industry-specific requirements, our solutions automate the heavy<br \/>\n                        lifting. Organizations across various sectors rely on us because we turn compliance from a<br \/>\n                        nightmare into a routine process.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div style=\"text-align: center; margin-top: 3rem;\">\n                <a href=\"#contact\" class=\"btn-primary\">Let&#8217;s Talk About Your Security Needs<\/a>\n            <\/div>\n<\/p><\/div>\n<\/section>\n<p>    <!-- Solutions --><\/p>\n<section class=\"solutions\">\n<div class=\"container\">\n<h2>Our Key Technology Solutions<\/h2>\n<p style=\"text-align: center; margin-bottom: 3rem; font-size: 1.1rem; color: #6B7280;\">We partner with<br \/>\n                award-winning experts to offer innovative, sustainable solutions. Whether it&#8217;s protecting your network<br \/>\n                and identities or ensuring smooth application delivery, our comprehensive systems tackle every IT<br \/>\n                challenge with excellence and reliability.<\/p>\n<div class=\"solutions-grid\">\n<div class=\"solution-card\">\n<div class=\"award\">Network Access Control Winner 2018<\/div>\n<h3>Network Access Control (NAC)<\/h3>\n<p>Ensure that only trusted devices and users access your network through next-generation visibility<br \/>\n                        and control. Powered by Genians NAC, recognized for its Device Platform Intelligence.<\/p>\n<p>                    <a href=\"#\" class=\"btn-secondary\" style=\"margin-top: 1rem;\">Learn More<\/a>\n                <\/div>\n<div class=\"solution-card\">\n<div class=\"award\">Gartner Magic Quadrant 2021<\/div>\n<h3>Identity &#038; Access Management (IAM)<\/h3>\n<p>Enhance security with privileged access control and identity governance. ISO\/IEC 27001 Certified<br \/>\n                        and featured in Silicon Review&#8217;s Top 5 Cybersecurity Companies to Watch.<\/p>\n<p>                    <a href=\"#\" class=\"btn-secondary\" style=\"margin-top: 1rem;\">Learn More<\/a>\n                <\/div>\n<div class=\"solution-card\">\n<div class=\"award\">Cloud &#038; On-Premises Ready<\/div>\n<h3>Remote Monitoring &#038; Management (RMM)<\/h3>\n<p>Simplify IT operations and endpoint management with secure and scalable RMM. A cost-effective,<br \/>\n                        all-in-one solution powered by Optitune RMM.<\/p>\n<p>                    <a href=\"#\" class=\"btn-secondary\" style=\"margin-top: 1rem;\">Learn More<\/a>\n                <\/div>\n<div class=\"solution-card\">\n<div class=\"award\">EdTech Cool Tool Award 2018<\/div>\n<h3>Application Virtualization<\/h3>\n<p>Offer a seamless platform to make software available on demand. In use by 3 million students<br \/>\n                        across more than 300 universities in 22 countries. Powered by AppsAnywhere.<\/p>\n<p>                    <a href=\"#\" class=\"btn-secondary\" style=\"margin-top: 1rem;\">Learn More<\/a>\n                <\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/section>\n<p>    <!-- Threat Statistics --><\/p>\n<section class=\"threat-stats\">\n<div class=\"container\">\n<h2>Your Business Is At Risk Right Now<\/h2>\n<div class=\"stats-grid\">\n<div class=\"stat-card\">\n<div class=\"stat-number\">29%<\/div>\n<div class=\"stat-text\">Increase in data breaches in Malaysia (Q1 2025)<\/div>\n<\/p><\/div>\n<div class=\"stat-card\">\n<div class=\"stat-number\">2,300+<\/div>\n<div class=\"stat-text\">Cyber incidents reported in first half of 2025<\/div>\n<\/p><\/div>\n<div class=\"stat-card\">\n<div class=\"stat-number\">4x<\/div>\n<div class=\"stat-text\">More data breach cases in 2023 vs 2022<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<p style=\"font-size: 1.3rem; margin-bottom: 2rem;\">Don&#8217;t wait for the next headline. Protect your<br \/>\n                organization today.<\/p>\n<p>            <a href=\"#contact\" class=\"btn-primary\" style=\"font-size: 1.1rem; padding: 15px 30px;\">Get Your Security<br \/>\n                Assessment Now<\/a>\n        <\/div>\n<\/section>\n<p>    <!-- Customer Logos --><\/p>\n<section class=\"customers\" id=\"customers\">\n<div class=\"container\">\n<h2>Trusted by Leading Malaysian Organizations<\/h2>\n<div class=\"customer-grid\">\n<div class=\"customer-logo\">Lembaga Zakat Selangor<\/div>\n<div class=\"customer-logo\">MAHB<\/div>\n<div class=\"customer-logo\">Media Prima<\/div>\n<div class=\"customer-logo\">TDCX<\/div>\n<div class=\"customer-logo\">Salcon Engineering<\/div>\n<div class=\"customer-logo\">KARA Marketing<\/div>\n<div class=\"customer-logo\">Toyo Tires<\/div>\n<div class=\"customer-logo\">ACM<\/div>\n<div class=\"customer-logo\">UUM<\/div>\n<div class=\"customer-logo\">New Era University<\/div>\n<div class=\"customer-logo\">Sri KDU<\/div>\n<div class=\"customer-logo\">Hin Hua High School<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/section>\n<p>    <!-- Testimonials --><\/p>\n<section class=\"testimonials\">\n<div class=\"container\">\n<h2>What Our Users Are Saying<\/h2>\n<div class=\"testimonial-grid\">\n<div class=\"testimonial\">\n<div class=\"testimonial-text\">&#8220;A great RMM overall, you can&#8217;t go wrong with Optitune. Their customer<br \/>\n                        support is excellent as well, and they are quick to respond.&#8221;<\/div>\n<div class=\"testimonial-author\">Steven, Retail Product Company, Malaysia<\/div>\n<\/p><\/div>\n<div class=\"testimonial\">\n<div class=\"testimonial-text\">&#8220;It&#8217;s incredibly user-friendly and provides great functionality for<br \/>\n                        deploying, managing and accessing apps&#8221;<\/div>\n<div class=\"testimonial-author\">IT Support Engineer, Private University, Malaysia<\/div>\n<\/p><\/div>\n<div class=\"testimonial\">\n<div class=\"testimonial-text\">&#8220;With Genians NAC, we finally have full visibility of every device on<br \/>\n                        our network. The solution helped us enforce security policies without disrupting our daily<br \/>\n                        operations&#8221;<\/div>\n<div class=\"testimonial-author\">IT Manager, Semi-Private Company, Malaysia<\/div>\n<\/p><\/div>\n<div class=\"testimonial\">\n<div class=\"testimonial-text\">&#8220;Simple to deploy yet powerful. Genians NAC gave us the control we<br \/>\n                        needed to ensure only compliant devices can access our network.&#8221;<\/div>\n<div class=\"testimonial-author\">Security Architect, Private Company, Malaysia<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/section>\n<p>    <!-- FAQ --><\/p>\n<section class=\"faq\">\n<div class=\"container\">\n<h2>Frequently Asked Questions<\/h2>\n<div class=\"faq-item\">\n                <button class=\"faq-question\">What happens if we do nothing about cybersecurity?<\/button><\/p>\n<div class=\"faq-answer\">With cyber attacks increasing 29% in Malaysia and the average breach costing<br \/>\n                    millions, doing nothing puts your business, reputation, and customer data at serious risk. The<br \/>\n                    question isn&#8217;t if you&#8217;ll be attacked, but when.<\/div>\n<\/p><\/div>\n<div class=\"faq-item\">\n                <button class=\"faq-question\">Can these solutions integrate with my existing systems?<\/button><\/p>\n<div class=\"faq-answer\">Yes. All solutions are designed to work with diverse environments, whether<br \/>\n                    cloud, on-premises, or hybrid. We assess your current ecosystem to ensure seamless integration<br \/>\n                    without disrupting your operations.<\/div>\n<\/p><\/div>\n<div class=\"faq-item\">\n                <button class=\"faq-question\">How quickly can we see ROI from these solutions?<\/button><\/p>\n<div class=\"faq-answer\">Many customers report seeing value within weeks, not months. You&#8217;ll immediately<br \/>\n                    reduce security risks, streamline operations, and gain the peace of mind that comes with<br \/>\n                    enterprise-grade protection.<\/div>\n<\/p><\/div>\n<div class=\"faq-item\">\n                <button class=\"faq-question\">What makes you different from international cybersecurity<br \/>\n                    companies?<\/button><\/p>\n<div class=\"faq-answer\">We combine global award-winning technology with local Malaysian expertise. You<br \/>\n                    get same-day support, understanding of local regulations like PDPA, and a team that works in your<br \/>\n                    timezone and speaks your language.<\/div>\n<\/p><\/div>\n<div class=\"faq-item\">\n                <button class=\"faq-question\">Is a free assessment really free with no obligations?<\/button><\/p>\n<div class=\"faq-answer\">Absolutely. Our security assessment provides immediate value with actionable<br \/>\n                    insights about your current risks, with no pressure to buy anything. We believe in earning your<br \/>\n                    trust through expertise, not sales tactics.<\/div>\n<\/p><\/div>\n<div style=\"text-align: center; margin-top: 3rem;\">\n                <a href=\"#contact\" class=\"btn-primary\">Get Your Questions Answered<\/a>\n            <\/div>\n<\/p><\/div>\n<\/section>\n<p>    <!-- Final CTA --><\/p>\n<section class=\"final-cta\" id=\"contact\">\n<div class=\"container\">\n<h2>Ready to Secure &#038; Empower Your Organisation?<\/h2>\n<p>Let Procentric guide you with global award-winning solutions and local expertise.<\/p>\n<p>            <a href=\"#\" class=\"btn-primary\" style=\"font-size: 1.2rem; padding: 18px 36px;\">Start Your Free<br \/>\n                Consultation<\/a>\n        <\/div>\n<\/section>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Attacks Hit Malaysian Businesses Every 2 Hours Don&#8217;t Be Next. Protect Your Organization with Award-Winning Security Solutions Trusted by Leading Malaysian Companies Across Government, Aviation, and Media Sectors. Get Your Free Security Risk Assessment See Customer Success Stories No obligation \u2022 Immediate insights \u2022 Local consultation Trusted Technology Partners Around The Globe Genians Hiware [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-450","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/procentric.my\/wp2\/index.php\/wp-json\/wp\/v2\/pages\/450","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/procentric.my\/wp2\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/procentric.my\/wp2\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/procentric.my\/wp2\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/procentric.my\/wp2\/index.php\/wp-json\/wp\/v2\/comments?post=450"}],"version-history":[{"count":33,"href":"https:\/\/procentric.my\/wp2\/index.php\/wp-json\/wp\/v2\/pages\/450\/revisions"}],"predecessor-version":[{"id":579,"href":"https:\/\/procentric.my\/wp2\/index.php\/wp-json\/wp\/v2\/pages\/450\/revisions\/579"}],"wp:attachment":[{"href":"https:\/\/procentric.my\/wp2\/index.php\/wp-json\/wp\/v2\/media?parent=450"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}