{"id":5055,"date":"2024-09-07T09:57:06","date_gmt":"2024-09-07T02:57:06","guid":{"rendered":"https:\/\/mcm.net.id\/?page_id=5055"},"modified":"2025-09-16T14:39:55","modified_gmt":"2025-09-16T07:39:55","slug":"layanan-keamanan-jaringan","status":"publish","type":"page","link":"https:\/\/mcm.net.id\/en\/layanan-keamanan-jaringan\/","title":{"rendered":"Network Security Services"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"5055\" class=\"elementor elementor-5055\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-54ce533 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"54ce533\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wide\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-41a3a2f ot-flex-column-vertical\" data-id=\"41a3a2f\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b3fcdf4 elementor-section-content-bottom elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b3fcdf4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f65080d ot-flex-column-vertical\" data-id=\"f65080d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2095712 elementor-widget elementor-widget-text-editor\" data-id=\"2095712\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em><strong>Network security services are essential to protect data and systems from cyber threats, attacks, and unauthorized access<\/strong><\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d8d26e8 elementor-widget elementor-widget-iheading\" data-id=\"d8d26e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading left-align text-light\">\r\n\t\t\t\r\n\t\t\t\t\r\n\r\n\t        \t            <h6 class=\"sub-heading\"><span>BUILD YOUR NETWORK SECURITY WITH US<\/span><\/h6>\r\n\t         \r\n\r\n\t        \t        \t<h4 class=\"main-heading\">The following are some commonly used network security services:<\/h4>\r\n\t        \t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6d3982b ot-flex-column-vertical\" data-id=\"6d3982b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-fed63c0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fed63c0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-ad29b18 ot-flex-column-vertical\" data-id=\"ad29b18\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e905320 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e905320\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-0d2e2ce ot-flex-column-vertical\" data-id=\"0d2e2ce\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7f7adf3 elementor-widget elementor-widget-itabtitle\" data-id=\"7f7adf3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"itabtitle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class=\"tab-titles row\" >\r\n\t\t\t\t\t\t<div>\r\n\t\t\t\t<div class=\"col-md\">\r\n\t\t\t\t\t<a class=\"title-item\" href=\"#content-audit\">\r\n\t\t\t\t\t\t<div class=\"icon-main\">\r\n\t\t\t\t\t        \t\t\t\t\t        \t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-history\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 255.531c.253 136.64-111.18 248.372-247.82 248.468-59.015.042-113.223-20.53-155.822-54.911-11.077-8.94-11.905-25.541-1.839-35.607l11.267-11.267c8.609-8.609 22.353-9.551 31.891-1.984C173.062 425.135 212.781 440 256 440c101.705 0 184-82.311 184-184 0-101.705-82.311-184-184-184-48.814 0-93.149 18.969-126.068 49.932l50.754 50.754c10.08 10.08 2.941 27.314-11.313 27.314H24c-8.837 0-16-7.163-16-16V38.627c0-14.254 17.234-21.393 27.314-11.314l49.372 49.372C129.209 34.136 189.552 8 256 8c136.81 0 247.747 110.78 248 247.531zm-180.912 78.784l9.823-12.63c8.138-10.463 6.253-25.542-4.21-33.679L288 256.349V152c0-13.255-10.745-24-24-24h-16c-13.255 0-24 10.745-24 24v135.651l65.409 50.874c10.463 8.137 25.541 6.253 33.679-4.21z\"><\/path><\/svg>\t\t\t\t\t        \r\n\t\t\t\t\t\t    \r\n\t\t\t\t\t        \t\t\t\t        <\/div>\r\n\t\t\t\t\t\t<h5 class=\"tab-titles_heading\">Security Monitoring and Auditing<\/h5>\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t\t\t<div>\r\n\t\t\t\t<div class=\"col-md\">\r\n\t\t\t\t\t<a class=\"title-item\" href=\"#encrypt\">\r\n\t\t\t\t\t\t<div class=\"icon-main\">\r\n\t\t\t\t\t        \t\t\t\t\t        \t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-database\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M448 73.143v45.714C448 159.143 347.667 192 224 192S0 159.143 0 118.857V73.143C0 32.857 100.333 0 224 0s224 32.857 224 73.143zM448 176v102.857C448 319.143 347.667 352 224 352S0 319.143 0 278.857V176c48.125 33.143 136.208 48.572 224 48.572S399.874 209.143 448 176zm0 160v102.857C448 479.143 347.667 512 224 512S0 479.143 0 438.857V336c48.125 33.143 136.208 48.572 224 48.572S399.874 369.143 448 336z\"><\/path><\/svg>\t\t\t\t\t        \r\n\t\t\t\t\t\t    \r\n\t\t\t\t\t        \t\t\t\t        <\/div>\r\n\t\t\t\t\t\t<h5 class=\"tab-titles_heading\">Data Encryption<br><br><br><\/h5>\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t\t\t<div>\r\n\t\t\t\t<div class=\"col-md\">\r\n\t\t\t\t\t<a class=\"title-item\" href=\"#nirkabel-security\">\r\n\t\t\t\t\t\t<div class=\"icon-main\">\r\n\t\t\t\t\t        \t\t\t\t\t        \t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-code-branch\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M384 144c0-44.2-35.8-80-80-80s-80 35.8-80 80c0 36.4 24.3 67.1 57.5 76.8-.6 16.1-4.2 28.5-11 36.9-15.4 19.2-49.3 22.4-85.2 25.7-28.2 2.6-57.4 5.4-81.3 16.9v-144c32.5-10.2 56-40.5 56-76.3 0-44.2-35.8-80-80-80S0 35.8 0 80c0 35.8 23.5 66.1 56 76.3v199.3C23.5 365.9 0 396.2 0 432c0 44.2 35.8 80 80 80s80-35.8 80-80c0-34-21.2-63.1-51.2-74.6 3.1-5.2 7.8-9.8 14.9-13.4 16.2-8.2 40.4-10.4 66.1-12.8 42.2-3.9 90-8.4 118.2-43.4 14-17.4 21.1-39.8 21.6-67.9 31.6-10.8 54.4-40.7 54.4-75.9zM80 64c8.8 0 16 7.2 16 16s-7.2 16-16 16-16-7.2-16-16 7.2-16 16-16zm0 384c-8.8 0-16-7.2-16-16s7.2-16 16-16 16 7.2 16 16-7.2 16-16 16zm224-320c8.8 0 16 7.2 16 16s-7.2 16-16 16-16-7.2-16-16 7.2-16 16-16z\"><\/path><\/svg>\t\t\t\t\t        \r\n\t\t\t\t\t\t    \r\n\t\t\t\t\t        \t\t\t\t        <\/div>\r\n\t\t\t\t\t\t<h5 class=\"tab-titles_heading\">Wireless Network Security<\/h5>\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t\t\t<div>\r\n\t\t\t\t<div class=\"col-md\">\r\n\t\t\t\t\t<a class=\"title-item\" href=\"#bug-manage\">\r\n\t\t\t\t\t\t<div class=\"icon-main\">\r\n\t\t\t\t\t        \t\t\t\t\t        \t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-bug\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M511.988 288.9c-.478 17.43-15.217 31.1-32.653 31.1H424v16c0 21.864-4.882 42.584-13.6 61.145l60.228 60.228c12.496 12.497 12.496 32.758 0 45.255-12.498 12.497-32.759 12.496-45.256 0l-54.736-54.736C345.886 467.965 314.351 480 280 480V236c0-6.627-5.373-12-12-12h-24c-6.627 0-12 5.373-12 12v244c-34.351 0-65.886-12.035-90.636-32.108l-54.736 54.736c-12.498 12.497-32.759 12.496-45.256 0-12.496-12.497-12.496-32.758 0-45.255l60.228-60.228C92.882 378.584 88 357.864 88 336v-16H32.666C15.23 320 .491 306.33.013 288.9-.484 270.816 14.028 256 32 256h56v-58.745l-46.628-46.628c-12.496-12.497-12.496-32.758 0-45.255 12.498-12.497 32.758-12.497 45.256 0L141.255 160h229.489l54.627-54.627c12.498-12.497 32.758-12.497 45.256 0 12.496 12.497 12.496 32.758 0 45.255L424 197.255V256h56c17.972 0 32.484 14.816 31.988 32.9zM257 0c-61.856 0-112 50.144-112 112h224C369 50.144 318.856 0 257 0z\"><\/path><\/svg>\t\t\t\t\t        \r\n\t\t\t\t\t\t    \r\n\t\t\t\t\t        \t\t\t\t        <\/div>\r\n\t\t\t\t\t\t<h5 class=\"tab-titles_heading\"> Vulnerability Assessment and Management<\/h5>\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t\t\t<div>\r\n\t\t\t\t<div class=\"col-md\">\r\n\t\t\t\t\t<a class=\"title-item\" href=\"#layanan-terkelola\">\r\n\t\t\t\t\t\t<div class=\"icon-main\">\r\n\t\t\t\t\t        \t\t\t\t\t        \t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-street-view\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M367.9 329.76c-4.62 5.3-9.78 10.1-15.9 13.65v22.94c66.52 9.34 112 28.05 112 49.65 0 30.93-93.12 56-208 56S48 446.93 48 416c0-21.6 45.48-40.3 112-49.65v-22.94c-6.12-3.55-11.28-8.35-15.9-13.65C58.87 345.34 0 378.05 0 416c0 53.02 114.62 96 256 96s256-42.98 256-96c0-37.95-58.87-70.66-144.1-86.24zM256 128c35.35 0 64-28.65 64-64S291.35 0 256 0s-64 28.65-64 64 28.65 64 64 64zm-64 192v96c0 17.67 14.33 32 32 32h64c17.67 0 32-14.33 32-32v-96c17.67 0 32-14.33 32-32v-96c0-26.51-21.49-48-48-48h-11.8c-11.07 5.03-23.26 8-36.2 8s-25.13-2.97-36.2-8H208c-26.51 0-48 21.49-48 48v96c0 17.67 14.33 32 32 32z\"><\/path><\/svg>\t\t\t\t\t        \r\n\t\t\t\t\t\t    \r\n\t\t\t\t\t        \t\t\t\t        <\/div>\r\n\t\t\t\t\t\t<h5 class=\"tab-titles_heading\">Managed Security Services <\/h5>\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dc6a89a elementor-widget elementor-widget-itabtitle\" data-id=\"dc6a89a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"itabtitle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class=\"tab-titles row\" >\r\n\t\t\t\t\t\t<div>\r\n\t\t\t\t<div class=\"col-md\">\r\n\t\t\t\t\t<a class=\"title-item\" href=\"#content-firewall\">\r\n\t\t\t\t\t\t<div class=\"icon-main\">\r\n\t\t\t\t\t        \t\t\t\t\t        \t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-fire\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M216 23.86c0-23.8-30.65-32.77-44.15-13.04C48 191.85 224 200 224 288c0 35.63-29.11 64.46-64.85 63.99-35.17-.45-63.15-29.77-63.15-64.94v-85.51c0-21.7-26.47-32.23-41.43-16.5C27.8 213.16 0 261.33 0 320c0 105.87 86.13 192 192 192s192-86.13 192-192c0-170.29-168-193-168-296.14z\"><\/path><\/svg>\t\t\t\t\t        \r\n\t\t\t\t\t\t    \r\n\t\t\t\t\t        \t\t\t\t        <\/div>\r\n\t\t\t\t\t\t<h5 class=\"tab-titles_heading\">Firewall <br><br><br><\/h5>\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t\t\t<div>\r\n\t\t\t\t<div class=\"col-md\">\r\n\t\t\t\t\t<a class=\"title-item\" href=\"#ids-ips\">\r\n\t\t\t\t\t\t<div class=\"icon-main\">\r\n\t\t\t\t\t        \t\t\t\t\t        \t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-searchengin\" viewbox=\"0 0 460 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M220.6 130.3l-67.2 28.2V43.2L98.7 233.5l54.7-24.2v130.3l67.2-209.3zm-83.2-96.7l-1.3 4.7-15.2 52.9C80.6 106.7 52 145.8 52 191.5c0 52.3 34.3 95.9 83.4 105.5v53.6C57.5 340.1 0 272.4 0 191.6c0-80.5 59.8-147.2 137.4-158zm311.4 447.2c-11.2 11.2-23.1 12.3-28.6 10.5-5.4-1.8-27.1-19.9-60.4-44.4-33.3-24.6-33.6-35.7-43-56.7-9.4-20.9-30.4-42.6-57.5-52.4l-9.7-14.7c-24.7 16.9-53 26.9-81.3 28.7l2.1-6.6 15.9-49.5c46.5-11.9 80.9-54 80.9-104.2 0-54.5-38.4-102.1-96-107.1V32.3C254.4 37.4 320 106.8 320 191.6c0 33.6-11.2 64.7-29 90.4l14.6 9.6c9.8 27.1 31.5 48 52.4 57.4s32.2 9.7 56.8 43c24.6 33.2 42.7 54.9 44.5 60.3s.7 17.3-10.5 28.5zm-9.9-17.9c0-4.4-3.6-8-8-8s-8 3.6-8 8 3.6 8 8 8 8-3.6 8-8z\"><\/path><\/svg>\t\t\t\t\t        \r\n\t\t\t\t\t\t    \r\n\t\t\t\t\t        \t\t\t\t        <\/div>\r\n\t\t\t\t\t\t<h5 class=\"tab-titles_heading\">DDoS <br><br><br><\/h5>\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t\t\t<div>\r\n\t\t\t\t<div class=\"col-md\">\r\n\t\t\t\t\t<a class=\"title-item\" href=\"#endpoint-security\">\r\n\t\t\t\t\t\t<div class=\"icon-main\">\r\n\t\t\t\t\t        \r\n\t\t\t\t\t\t    \r\n\t\t\t\t\t        <span class=\"flaticon-document\"><\/span>\t\t\t\t        <\/div>\r\n\t\t\t\t\t\t<h5 class=\"tab-titles_heading\">Endpoint Security<br><br><\/h5>\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t\t\t<div>\r\n\t\t\t\t<div class=\"col-md\">\r\n\t\t\t\t\t<a class=\"title-item\" href=\"#email-security\">\r\n\t\t\t\t\t\t<div class=\"icon-main\">\r\n\t\t\t\t\t        \r\n\t\t\t\t\t\t    \r\n\t\t\t\t\t        <span class=\"flaticon-search-1\"><\/span>\t\t\t\t        <\/div>\r\n\t\t\t\t\t\t<h5 class=\"tab-titles_heading\">Email Security<br><br><\/h5>\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t\t\t<div>\r\n\t\t\t\t<div class=\"col-md\">\r\n\t\t\t\t\t<a class=\"title-item\" href=\"#web-security\">\r\n\t\t\t\t\t\t<div class=\"icon-main\">\r\n\t\t\t\t\t        \r\n\t\t\t\t\t\t    \r\n\t\t\t\t\t        <span class=\"flaticon-coding\"><\/span>\t\t\t\t        <\/div>\r\n\t\t\t\t\t\t<h5 class=\"tab-titles_heading\">Web Application Security<br><br><\/h5>\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t\t\t<div>\r\n\t\t\t\t<div class=\"col-md\">\r\n\t\t\t\t\t<a class=\"title-item\" href=\"#iam-manage\">\r\n\t\t\t\t\t\t<div class=\"icon-main\">\r\n\t\t\t\t\t        \r\n\t\t\t\t\t\t    \r\n\t\t\t\t\t        <span class=\"flaticon-cloud-computing\"><\/span>\t\t\t\t        <\/div>\r\n\t\t\t\t\t\t<h5 class=\"tab-titles_heading\">Identity and Access Management<\/h5>\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-color=\"#fe4c1c,#00c3ff,#0160e7\" class=\"elementor-section elementor-top-section elementor-element elementor-element-1830e66 particles-js elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1830e66\" data-element_type=\"section\" data-e-type=\"section\" id=\"content-tabs\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d8d6e4b ot-flex-column-vertical\" data-id=\"d8d6e4b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-c330340 elementor-section-full_width elementor-section-content-middle elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"c330340\" data-element_type=\"section\" data-e-type=\"section\" id=\"content-firewall\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-9f9fa28 ot-flex-column-vertical\" data-id=\"9f9fa28\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a62c863 elementor-widget elementor-widget-heading\" data-id=\"a62c863\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">What is firewall?\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57db07a elementor-widget elementor-widget-text-editor\" data-id=\"57db07a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">A firewall is a device or software that monitors and controls network traffic based on predefined security rules.<\/span><\/p><p><b>Function:<\/b><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Blocks unauthorized access.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Allows authorized traffic.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Filter dangerous content.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-24a338f ot-flex-column-vertical\" data-id=\"24a338f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-29089d9 elementor-widget elementor-widget-image\" data-id=\"29089d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1000\" height=\"663\" src=\"https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/2149595831.jpg\" class=\"attachment-full size-full wp-image-5439\" alt=\"\" srcset=\"https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/2149595831.jpg 1000w, https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/2149595831-300x199.jpg 300w, https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/2149595831-768x509.jpg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7c0bdd5 elementor-section-full_width elementor-section-content-middle elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"7c0bdd5\" data-element_type=\"section\" data-e-type=\"section\" id=\"ids-ips\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e8764a7 ot-flex-column-vertical\" data-id=\"e8764a7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d64b748 elementor-widget elementor-widget-heading\" data-id=\"d64b748\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"web-dev\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">DDoS, IDS \/ IPS is<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9a7af74 elementor-widget elementor-widget-text-editor\" data-id=\"9a7af74\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>DDoS (Distributed Denial of Service) is an attack that overwhelms a server or network with massive fake traffic, causing disruption and making services inaccessible to real users.<br \/><span style=\"font-weight: 400;\">IDS (Intrusion Detection System) and IPS (Intrusion Prevention System) are devices that monitor a network for suspicious activity.<\/span><\/p><p><b>Function:<\/b><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>IDS<\/b><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"><br \/>Detect threats and provide alerts.<\/span><\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>IPS<\/b><br \/>Detects and automatically prevents threats by blocking malicious traffic.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4befd9b ot-flex-column-vertical\" data-id=\"4befd9b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-66b8224 elementor-widget elementor-widget-image\" data-id=\"66b8224\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1000\" height=\"750\" src=\"https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/pikaso_embed-2.png\" class=\"attachment-full size-full wp-image-5438\" alt=\"\" srcset=\"https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/pikaso_embed-2.png 1000w, https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/pikaso_embed-2-300x225.png 300w, https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/pikaso_embed-2-768x576.png 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-43cede1 elementor-section-full_width elementor-section-content-middle elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"43cede1\" data-element_type=\"section\" data-e-type=\"section\" id=\"endpoint-security\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e33cbf6 ot-flex-column-vertical\" data-id=\"e33cbf6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c721aac elementor-widget elementor-widget-heading\" data-id=\"c721aac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">What is Endpoint Security ?\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-98cecb7 elementor-widget elementor-widget-text-editor\" data-id=\"98cecb7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Endpoint security services involve protecting individual devices such as computers, phones, and tablets.<\/span><\/p><p><b>Function:<\/b><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Antivirus and antimalware.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Firewall personal.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Threat detection and data protection.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-eea02ba ot-flex-column-vertical\" data-id=\"eea02ba\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bac813e elementor-widget elementor-widget-image\" data-id=\"bac813e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1000\" height=\"667\" src=\"https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/2150010144.jpg\" class=\"attachment-full size-full wp-image-5443\" alt=\"\" srcset=\"https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/2150010144.jpg 1000w, https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/2150010144-300x200.jpg 300w, https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/2150010144-768x512.jpg 768w, https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/2150010144-750x500.jpg 750w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-81a5899 elementor-section-full_width elementor-section-content-middle elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"81a5899\" data-element_type=\"section\" data-e-type=\"section\" id=\"email-security\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f605cfe ot-flex-column-vertical\" data-id=\"f605cfe\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9bd533d elementor-widget elementor-widget-heading\" data-id=\"9bd533d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">What is Email Security ?\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d5069d7 elementor-widget elementor-widget-text-editor\" data-id=\"d5069d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">This service protects email communications from threats such as phishing, malware, and spam.<\/span><\/p><p><b>Function:<\/b><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Filter spam.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Encrypt Email<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Scanning attachments for malware.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4d56ff4 ot-flex-column-vertical\" data-id=\"4d56ff4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8adaf5f elementor-widget elementor-widget-image\" data-id=\"8adaf5f\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"web-dev\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"666\" src=\"https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/objects-with-icon-what-they.jpg\" class=\"attachment-full size-full wp-image-5398\" alt=\"\" srcset=\"https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/objects-with-icon-what-they.jpg 1000w, https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/objects-with-icon-what-they-300x200.jpg 300w, https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/objects-with-icon-what-they-768x511.jpg 768w, https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/objects-with-icon-what-they-750x500.jpg 750w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-30a9baa elementor-section-full_width elementor-section-content-middle elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"30a9baa\" data-element_type=\"section\" data-e-type=\"section\" id=\"web-security\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-225fbd6 ot-flex-column-vertical\" data-id=\"225fbd6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-be39195 elementor-widget elementor-widget-heading\" data-id=\"be39195\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">What is Web Application Security?\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-891d7a2 elementor-widget elementor-widget-text-editor\" data-id=\"891d7a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">This service protects web applications from attacks such as SQL injection, XSS (Cross-Site Scripting), and DDoS (Distributed Denial of Service).<\/span><\/p><p><b>Function:<\/b><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Web Application Firewall (WAF).<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Vulnerability scanning.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Penetration testing.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d785147 ot-flex-column-vertical\" data-id=\"d785147\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-828c1c6 elementor-widget elementor-widget-image\" data-id=\"828c1c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"513\" src=\"https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/web_firewall.jpg\" class=\"attachment-full size-full wp-image-5980\" alt=\"\" srcset=\"https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/web_firewall.jpg 768w, https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/web_firewall-300x200.jpg 300w, https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/web_firewall-18x12.jpg 18w, https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/web_firewall-750x500.jpg 750w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ee6a42e elementor-section-full_width elementor-section-content-middle elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"ee6a42e\" data-element_type=\"section\" data-e-type=\"section\" id=\"iam-manage\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1793bc8 ot-flex-column-vertical\" data-id=\"1793bc8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b398b4 elementor-widget elementor-widget-heading\" data-id=\"5b398b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">What is Identity and Access Management?\n\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8c627b8 elementor-widget elementor-widget-text-editor\" data-id=\"8c627b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">IAM services control who can access network resources and what they can do.<\/span><\/p><p><b>Function:<\/b><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Multiple Factor Authentication<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Role-based access control (RBAC).<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">User identity management.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3db9539 ot-flex-column-vertical\" data-id=\"3db9539\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e0bf8b4 elementor-widget elementor-widget-image\" data-id=\"e0bf8b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"730\" src=\"https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/137622.jpg\" class=\"attachment-full size-full wp-image-5445\" alt=\"\" srcset=\"https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/137622.jpg 1000w, https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/137622-300x219.jpg 300w, https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/137622-768x561.jpg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-18e9961 elementor-section-full_width elementor-section-content-middle elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"18e9961\" data-element_type=\"section\" data-e-type=\"section\" id=\"content-audit\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-163bf6c ot-flex-column-vertical\" data-id=\"163bf6c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-68262cc elementor-widget elementor-widget-heading\" data-id=\"68262cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">What is Security Monitoring and Auditing?\n\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5df4304 elementor-widget elementor-widget-text-editor\" data-id=\"5df4304\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">This service involves monitoring networks and systems for suspicious activity as well as conducting audits to ensure compliance with security policies.<\/span><\/p><p><b>Function:<\/b><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">SIEM (Security Information and Event Management).<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Logging dan real-time checking.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Regular security audits.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-96e6434 ot-flex-column-vertical\" data-id=\"96e6434\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3dfb25e elementor-widget elementor-widget-image\" data-id=\"3dfb25e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1380\" height=\"935\" src=\"https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/top-secret-privacy-confidential-classified-stamp-concept_53876-124147.jpg\" class=\"attachment-full size-full wp-image-5448\" alt=\"\" srcset=\"https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/top-secret-privacy-confidential-classified-stamp-concept_53876-124147.jpg 1380w, https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/top-secret-privacy-confidential-classified-stamp-concept_53876-124147-300x203.jpg 300w, https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/top-secret-privacy-confidential-classified-stamp-concept_53876-124147-1024x694.jpg 1024w, https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/top-secret-privacy-confidential-classified-stamp-concept_53876-124147-768x520.jpg 768w\" sizes=\"(max-width: 1380px) 100vw, 1380px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d4a3015 elementor-section-full_width elementor-section-content-middle elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"d4a3015\" data-element_type=\"section\" data-e-type=\"section\" id=\"encrypt\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-aa3f368 ot-flex-column-vertical\" data-id=\"aa3f368\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-497a6c6 elementor-widget elementor-widget-heading\" data-id=\"497a6c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">What is Data Encryption?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10d5cfe elementor-widget elementor-widget-text-editor\" data-id=\"10d5cfe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Data encryption is the process of securing data by converting it into a format that cannot be read without a decryption key.<\/span><\/p><p><b>Function:<\/b><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Encryption of data in transit (data-in-transit).<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Encrypt data while it is stored (data-at-rest).<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">End-to-end encryption.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5f0fe00 ot-flex-column-vertical\" data-id=\"5f0fe00\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e742fe7 elementor-widget elementor-widget-image\" data-id=\"e742fe7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"667\" src=\"https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/2149270838.jpg\" class=\"attachment-full size-full wp-image-5446\" alt=\"\" srcset=\"https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/2149270838.jpg 1000w, https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/2149270838-300x200.jpg 300w, https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/2149270838-768x512.jpg 768w, https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/2149270838-750x500.jpg 750w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-92dbba4 elementor-section-full_width elementor-section-content-middle elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"92dbba4\" data-element_type=\"section\" data-e-type=\"section\" id=\"nirkabel-security\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5f00c73 ot-flex-column-vertical\" data-id=\"5f00c73\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fdfce26 elementor-widget elementor-widget-heading\" data-id=\"fdfce26\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">What is Wireless Network Security?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71077ba elementor-widget elementor-widget-text-editor\" data-id=\"71077ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">This service protects wireless networks from unauthorized access and attacks.<\/span><\/p><p><b>Function:<\/b><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Encrypt WPA3<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">MAC address based access control.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Wireless attack monitoring and detection.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-08926f0 ot-flex-column-vertical\" data-id=\"08926f0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c5a8437 elementor-widget elementor-widget-image\" data-id=\"c5a8437\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"879\" src=\"https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/128107.jpg\" class=\"attachment-full size-full wp-image-5447\" alt=\"\" srcset=\"https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/128107.jpg 1000w, https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/128107-300x264.jpg 300w, https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/128107-768x675.jpg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-bc839d5 elementor-section-full_width elementor-section-content-middle elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"bc839d5\" data-element_type=\"section\" data-e-type=\"section\" id=\"bug-manage\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-cd95794 ot-flex-column-vertical\" data-id=\"cd95794\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e5ed5f2 elementor-widget elementor-widget-heading\" data-id=\"e5ed5f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">What is Vulnerability Assessment and Management ?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d81dbde elementor-widget elementor-widget-text-editor\" data-id=\"d81dbde\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">This service involves scanning networks and systems to find vulnerabilities and then managing and fixing them.<\/span><\/p><p><b>Function:<\/b><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Vulnerability scanning.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Patch and update management.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Penetration testing.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0f88c66 ot-flex-column-vertical\" data-id=\"0f88c66\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cb3c2e3 elementor-widget elementor-widget-image\" data-id=\"cb3c2e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1380\" height=\"921\" src=\"https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/programming-background-with-html_23-2150038861.jpg\" class=\"attachment-full size-full wp-image-5450\" alt=\"\" srcset=\"https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/programming-background-with-html_23-2150038861.jpg 1380w, https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/programming-background-with-html_23-2150038861-300x200.jpg 300w, https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/programming-background-with-html_23-2150038861-1024x683.jpg 1024w, https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/programming-background-with-html_23-2150038861-768x513.jpg 768w, https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/programming-background-with-html_23-2150038861-750x500.jpg 750w\" sizes=\"(max-width: 1380px) 100vw, 1380px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-57b3a01 elementor-section-full_width elementor-section-content-middle elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"57b3a01\" data-element_type=\"section\" data-e-type=\"section\" id=\"layanan-terkelola\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f8b66a7 ot-flex-column-vertical\" data-id=\"f8b66a7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8035ac5 elementor-widget elementor-widget-heading\" data-id=\"8035ac5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">What is Managed Security Services ?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ed34c12 elementor-widget elementor-widget-text-editor\" data-id=\"ed34c12\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Managed security services are the outsourcing of security services to a third-party provider that manages and monitors network security.<\/span><\/p><p><b>Function:<\/b><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">24\/7 security monitoring.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Incident response.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Compliance and reporting.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-31c43ab ot-flex-column-vertical\" data-id=\"31c43ab\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-524bb11 elementor-widget elementor-widget-image\" data-id=\"524bb11\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1380\" height=\"980\" src=\"https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/protection-surveillance-safety-privacy-policy-concept_53876-128098.jpg\" class=\"attachment-full size-full wp-image-5449\" alt=\"\" srcset=\"https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/protection-surveillance-safety-privacy-policy-concept_53876-128098.jpg 1380w, https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/protection-surveillance-safety-privacy-policy-concept_53876-128098-300x213.jpg 300w, https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/protection-surveillance-safety-privacy-policy-concept_53876-128098-1024x727.jpg 1024w, https:\/\/mcm.net.id\/wp-content\/uploads\/2024\/09\/protection-surveillance-safety-privacy-policy-concept_53876-128098-768x545.jpg 768w\" sizes=\"(max-width: 1380px) 100vw, 1380px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>&#8220;Layanan keamanan jaringan sangat penting untuk melindungi data dan sistem dari ancaman cyber, serangan, dan akses yang tidak sah&#8221; BANGUN KEAMANAN JARINGAN ANDA BERSAMA KAMI Berikut adalah beberapa layanan keamanan jaringan yang umum digunakan : Pemantauan dan Audit Keamanan Enkripsi Data Keamanan Jaringan Nirkabel Penilaian dan Manajemen Kerentanan Layanan Keamanan Terkelola Firewall DDoS Keamanan Endpoint [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5055","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/mcm.net.id\/en\/wp-json\/wp\/v2\/pages\/5055","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mcm.net.id\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/mcm.net.id\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/mcm.net.id\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mcm.net.id\/en\/wp-json\/wp\/v2\/comments?post=5055"}],"version-history":[{"count":49,"href":"https:\/\/mcm.net.id\/en\/wp-json\/wp\/v2\/pages\/5055\/revisions"}],"predecessor-version":[{"id":6351,"href":"https:\/\/mcm.net.id\/en\/wp-json\/wp\/v2\/pages\/5055\/revisions\/6351"}],"wp:attachment":[{"href":"https:\/\/mcm.net.id\/en\/wp-json\/wp\/v2\/media?parent=5055"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}