{"id":102774,"date":"2025-02-05T11:57:57","date_gmt":"2025-02-05T03:57:57","guid":{"rendered":"https:\/\/version-2.com\/?p=102774"},"modified":"2025-01-28T12:01:19","modified_gmt":"2025-01-28T04:01:19","slug":"your-nis2-compliance-partner-greycortex-mendel-for-stronger-cybersecurity","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2025\/02\/your-nis2-compliance-partner-greycortex-mendel-for-stronger-cybersecurity\/","title":{"rendered":"Your NIS2 Compliance Partner: GREYCORTEX Mendel for Stronger Cybersecurity"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"102774\" class=\"elementor elementor-102774\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-534888b post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"534888b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;80510b6&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-40115d5\" data-id=\"40115d5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ca14f89 elementor-widget elementor-widget-text-editor\" data-id=\"ca14f89\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"field field--name-body field--type-text-with-summary field--label-hidden field__item\"><p style=\"font-size: 20px;\"><strong>The NIS2 Directive has introduced a\u00a0new era of cybersecurity regulation across the EU. Its focus on process setup and technical requirements challenges organizations to rethink how they manage cybersecurity risks. While setting up governance frameworks is crucial, NIS2 also mandates essential technical measures like asset management, network segmentation, and incident detection.<\/strong><\/p><p>For many organizations, these technical demands can feel overwhelming: <em>How do we meet them effectively? Do we have the right tools in place?<\/em> This is where GREYCORTEX Mendel steps in, helping you bridge the gap between process and technology. Mendel empowers organizations like yours to simplify compliance by offering you the tool to monitor, secure, and optimize their network infrastructure effectively.<\/p><p>In this article, we\u2019ll show you how Mendel supports compliance with the technical aspects of NIS2, helping you strengthen your cybersecurity posture while meeting the directive\u2019s requirements.<\/p><h2>A Brief Overview of the NIS2 Directive<\/h2><p>The NIS2 Directive (Network and Information Security) is a\u00a0pivotal EU cybersecurity regulation introduced in December 2020. Its primary objective is to establish a\u00a0uniform level of cybersecurity protection across all EU Member States by mandating specific requirements and measures. Compared to its predecessor, the NIS Directive, NIS2 represents a\u00a0significant expansion of scope and ambition.<\/p><p>While the specific requirements may vary by country as national legislations adopt the directive, certain challenges remain universal. This is where GREYCORTEX Mendel can help. No matter the regulatory nuances in your country, Mendel provides you with practical tools and insights to address key technical requirements, ensuring your organization stays secure and compliant.<\/p><h2>NIS2\u00a0in Practice: How GREYCORTEX Mendel Helps<\/h2><h3>Asset management<\/h3><p>Organizations must maintain <strong>visibility of all devices and systems <\/strong>within their infrastructure, including their interactions. GREYCORTEX Mendel lets you simplify this process by automatically auditing assets and mapping their connections.<\/p><p>For instance, a\u00a0regional healthcare provider discovered 15 undocumented devices using Mendel. This helped them uncover legacy systems that were vulnerable to exploitation and provided a\u00a0roadmap for mitigation.<\/p><p>Mendel detects and stores information about every device communicating on your network. Use it to view a\u00a0list of networks and subnets and see in detail the devices in these subnets. This overview is supplemented with information about the risk level of these devices and subnets, and detailed information about hostname, tags, operating system, and other parameters.<\/p><p>In the system, you will see a\u00a0<strong>visualization of the individual connections <\/strong>between devices and networks as well as an overview of users. By integrating this with identity sources such as Active Directory or an LDAP server, Mendel connects specific communications to individual users.<\/p><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/nis2-mendel-topology-en.png?itok=RaG_tUr4\" data-lg-id=\"51f2bbbb-6fe0-4e16-9185-57c4cb639053\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/nis2-mendel-topology-en.png?itok=RaG_tUr4\" type=\"image\/png\" \/><\/picture><br \/><picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/nis2-mendel-topology-en.webp?itok=RaG_tUr4\" alt=\"\" \/><\/picture><br \/><\/a><\/div><\/article><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/nis2-mendel-tags-en.png?itok=XY4X9Iqn\" data-lg-id=\"c9c19a37-7fc2-45d1-b9c9-ad9df15b8b28\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/nis2-mendel-tags-en.png?itok=XY4X9Iqn\" type=\"image\/png\" \/><\/picture><br \/><picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/nis2-mendel-tags-en.webp?itok=XY4X9Iqn\" alt=\"\" \/><\/picture><br \/><\/a><\/div><\/article><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/nis2-mendel-risks-en2.jpg?itok=etAHStDW\" data-lg-id=\"f314bb25-9a61-4c6d-9233-7a612bec4819\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/nis2-mendel-risks-en2.jpg?itok=etAHStDW\" type=\"image\/jpeg\" \/><\/picture><br \/><picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/nis2-mendel-risks-en2.webp?itok=etAHStDW\" alt=\"\" \/><\/picture><br \/><\/a><\/div><\/article><h3>Risk management<\/h3><p>Understanding which systems are critical\u2014and the impact of their failure\u2014is fundamental. Mendel allows organizations to <strong>identify and prioritize key assets<\/strong>, enabling them to assess the potential consequences of disruptions.<\/p><p>By identifying the criticality of assets, organizations can allocate resources effectively, focusing on what truly matters to their operations and compliance efforts.<\/p><p>For instance, a\u00a0manufacturing company used Mendel to uncover inadequate segmentation around a\u00a0legacy control system. Addressing this gap protected them from a\u00a0ransomware attack that could have halted production.<\/p><p>Mendel allows you to filter the communication clients that access a\u00a0particular service or application as a\u00a0basis for determining the criticality of those services and applications.<\/p><h3>Human resource security and access control<\/h3><p>Monitoring user behavior and access is vital to <strong>preventing unauthorized activity<\/strong>. Such examples are users communicating with a\u00a0system to which they should not have permission to communicate, accessing a\u00a0VPN with an account or remote access that should be blocked, or an external vendor having access to a\u00a0company\u2019s internal network that occurs after a\u00a0contract has been terminated.<\/p><p>Mendel <strong>identifies unusual access patterns<\/strong>, such as attempts to log into restricted systems or use compromised credentials.<\/p><p>Our customer discovered that an employee\u2019s credentials were being misused to access sensitive applications after hours. Mendel flagged the anomaly, enabling the IT team to act swiftly and prevent a\u00a0breach.<\/p><p>By <strong>integrating Mendel with asset management tools <\/strong>or identity sources, it is possible to create a\u00a0list of users and explore their communication with other users and services. This allows you to check whether there is a\u00a0user on the network who should not be\u00a0there.<\/p><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/mendel_4.1_inventory_users_0.jpg?itok=ZxKUbeiX\" data-lg-id=\"10046090-6248-4e27-af08-4e30ba2cf1c1\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/mendel_4.1_inventory_users_0.jpg?itok=ZxKUbeiX\" type=\"image\/jpeg\" \/><\/picture><br \/><picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/mendel_4.1_inventory_users_0.webp?itok=ZxKUbeiX\" alt=\"\" \/><\/picture><br \/><\/a><\/div><\/article><article class=\"align-center media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/mendel_4.1_network_peers_specific_user.jpg?itok=WyDtwDKx\" data-lg-id=\"79c1b175-4631-4cb1-8977-17644ff1c95a\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/mendel_4.1_network_peers_specific_user.jpg?itok=WyDtwDKx\" type=\"image\/jpeg\" \/><\/picture><br \/><picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/mendel_4.1_network_peers_specific_user.webp?itok=WyDtwDKx\" alt=\"\" \/><\/picture><br \/><\/a><\/div><\/article><h3>Cybersecurity audit<\/h3><p>Regular audits ensure that security measures align with daily operations. While traditional audits are conducted, for example, twice a\u00a0year, Mendel enables you to carry out continuous verification of policies and compliance on a\u00a0daily basis.<\/p><h3>Security of communication networks<\/h3><p>Network <strong>segmentation is a\u00a0cornerstone of effective cybersecurity<\/strong>. With GREYCORTEX Mendel, you can easily verify the correct implementation of your network segmentation. Mendel provides clear insights into whether devices from one subnet are improperly communicating with devices in another subnet or are accessible from the Internet when they shouldn\u2019t be.<\/p><p>Consider critical production devices, these are typically restricted to an internal network for security reasons but may occasionally require temporary Internet access for upgrades or remote servicing. If this access is not revoked after use, Mendel will detect and <strong>alert you to any unauthorized communication<\/strong>, ensuring your network remains secure.<\/p><p>Mendel\u2019s capabilities go further, <strong>processing protocols like MODBUS <\/strong>and other OT-specific protocols to visualize communication flows for production devices. This helps verify not only where these devices are communicating but also whether the communication complies with security policies.<\/p><p>Additionally, Mendel simplifies the <strong>detection of illegitimate connections<\/strong>. For example, you can filter and monitor Remote Desktop Protocol (RDP) communications that might be restricted by company policy or identify unauthorized TeamViewer connections.<\/p><p>\u00a0<\/p><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/mendel_4.1_network_peers_modbus.png?itok=PaPN4OKr\" data-lg-id=\"1a708c00-a3af-4410-b0c5-96278af04d81\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/mendel_4.1_network_peers_modbus.png?itok=PaPN4OKr\" type=\"image\/png\" \/><\/picture><br \/><picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/mendel_4.1_network_peers_modbus.webp?itok=PaPN4OKr\" alt=\"\" \/><\/picture><br \/><\/a><\/div><\/article><article class=\"align-center media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/mendel_4.1_network_peers_rdp_external.jpg?itok=RuPbbJi5\" data-lg-id=\"1c390bc4-4a12-4981-9795-f25d858c168c\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/mendel_4.1_network_peers_rdp_external.jpg?itok=RuPbbJi5\" type=\"image\/jpeg\" \/><\/picture><br \/><picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/mendel_4.1_network_peers_rdp_external.webp?itok=RuPbbJi5\" alt=\"\" \/><\/picture><br \/><\/a><\/div><\/article><h3>Detection of cybersecurity events<\/h3><p><strong>Detection is one of the key capabilities <\/strong>of GREYCORTEX Mendel, along with its recording and analysis. All this is key for effective incident prevention.<\/p><p>Mendel excels at identifying threats by analyzing network traffic and detecting both signature-based and anomalous behavior. This capability allows organizations to address issues at different stages of a\u00a0cyberattack.<\/p><p>For example, Mendel <strong>detects command-and-control communication<\/strong>, a\u00a0hallmark of advanced persistent threats, and <strong>brute force attacks<\/strong>, which are a\u00a0common tactic in ransomware campaigns. Also, it<strong> detects other dangerous behaviour<\/strong>, such as scans or tunnels.<\/p><h3>Event logging<\/h3><p>One of NIS2\u2019s key requirements is retaining cybersecurity event records for at least 18 months. GREYCORTEX Mendel lets you simplify compliance by securely recording all mandatory data and making it easily traceable over <strong>months or even years<\/strong>\u2014limited only by your available storage capacity.<\/p><p>Mendel also supports seamless integration with other tools through its ability to <strong>upload and export PCAP files<\/strong>. This feature enables you to analyze records externally or import PCAPs back into Mendel for detailed investigations, ensuring your organization stays agile in handling cybersecurity events.<\/p><h3>Analysis of cybersecurity events<\/h3><p><strong>Continuous and centralized evaluation<\/strong> of detected cybersecurity events is essential for maintaining a\u00a0robust security posture. This process involves identifying correlations, assessing the relevance of sources, and generating alerts\u2014whether automatically in real-time or through manual configuration.<\/p><p>With GREYCORTEX Mendel, you gain the ability to <strong>drill down into the specifics of every detected event<\/strong>. Mendel categorizes events using the MITRE ATT<span class=\"amp\">&amp;<\/span>CK Framework, providing a\u00a0structured and industry-recognized approach to understanding threats. Additionally, it offers various intuitive views and filters, enabling you to <strong>analyze your data from multiple perspectives <\/strong>and focus on what matters most to your organization.<\/p><article class=\"align-center media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/mendel_4.1_dashboard_mitre_attck.png?itok=7vqOh6JJ\" data-lg-id=\"fefbf96f-4564-4239-8b4f-52c2df00e2f6\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/mendel_4.1_dashboard_mitre_attck.png?itok=7vqOh6JJ\" type=\"image\/png\" \/><\/picture><br \/><picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/mendel_4.1_dashboard_mitre_attck.webp?itok=7vqOh6JJ\" alt=\"\" \/><\/picture><br \/><\/a><\/div><\/article><h3>Cryptographic algorithms<\/h3><p>GREYCORTEX Mendel helps you verify that your systems are using <strong>up-to-date encryption standards<\/strong> and eliminates the risks associated with unencrypted communications or plaintext password transmissions.<br \/>For example, Mendel flagged several plaintext password transmissions in a\u00a0client\u2019s system, enabling them to enforce encryption policies and prevent credential theft.<\/p><p>Additionally, Mendel checks the validity of communication certificates, ensuring that your encrypted connections are both secure and compliant with best practices.<\/p><h3>Security of industrial assets<\/h3><p>The NIS2 Directive places significant emphasis on securing industrial networks, an area where many organizations still face challenges. GREYCORTEX Mendel addresses these gaps by <strong>supporting industrial protocols <\/strong>like MODBUS, OMRON, BACnet, and others, enabling comprehensive monitoring of operational technology (OT) environments.<\/p><p>Beyond analyzing IT network traffic, Mendel <strong>visualizes communication between devices up to level 2\u00a0of the Purdue model<\/strong>, including sensors, motors, and other industrial components. With proper configuration, it can extract detailed insights about OT devices, such as furnace temperatures, centrifuge speeds, pipeline pressures, and water levels in storage vessels.<\/p><p>Mendel delivers critical data to ensure the reliability and security of production infrastructure, including:<\/p><ul><li>Identification of Common Vulnerabilities and Exposures (CVEs) affecting OT devices<\/li><li>Configuration settings of industrial systems<\/li><li>Firmware information for better version control and security assessments<\/li><\/ul><h2>Prepare in\u00a0Time<\/h2><p>Applicability, enforcement, and fines will vary from one EU Member State to another. Yet in cybersecurity, more than anywhere else, the saying \u201cyesterday was too late\u201d applies.<\/p><p>There is no need to panic, but don\u2019t underestimate the security of your business or institution. Your organization doesn\u2019t need to face NIS2 alone. Whether you\u2019re just starting your compliance journey or refining existing processes, GREYCORTEX Mendel provides the visibility and control you need to succeed.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ead54a5 elementor-widget elementor-widget-shortcode\" data-id=\"ead54a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18179\" class=\"elementor elementor-18179\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;],&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ff2a228 elementor-widget elementor-widget-text-editor\" data-id=\"ff2a228\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<p><strong>About GREYCORTEX<br \/><\/strong>GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.<\/p>\n<p>MENDEL, GREYCORTEX\u2019s network traffic analysis solution, helps corporations, governments, and the critical infrastructure sector protect their futures by detecting cyber threats to sensitive data, networks, trade secrets, and reputations, which other network security products miss.<\/p>\n<p>MENDEL is based on 10 years of extensive academic research and is designed using the same technology which was successful in four US-based NIST Challenges.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>The NIS2 Directive has introduced a\u00a0new era of cybersec [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1305,24,61],"tags":[23,435,1077],"class_list":["post-102774","post","type-post","status-publish","format-standard","hentry","category-1305","category-greycortex","category-press-release","tag-greycortex","tag-mendel","tag-1077"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Your NIS2 Compliance Partner: GREYCORTEX Mendel for Stronger Cybersecurity - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.greycortex.com\/blog\/your-nis2-compliance-partner-greycortex-mendel-stronger-cybersecurity\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Your NIS2 Compliance Partner: GREYCORTEX Mendel for Stronger Cybersecurity - Version 2\" \/>\n<meta property=\"og:description\" content=\"The NIS2 Directive has introduced a\u00a0new era of cybersec [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.greycortex.com\/blog\/your-nis2-compliance-partner-greycortex-mendel-stronger-cybersecurity\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-05T03:57:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/nis2-mendel-topology-en.webp?itok=RaG_tUr4\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/your-nis2-compliance-partner-greycortex-mendel-stronger-cybersecurity#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/02\\\/your-nis2-compliance-partner-greycortex-mendel-for-stronger-cybersecurity\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Your NIS2 Compliance Partner: GREYCORTEX Mendel for Stronger Cybersecurity\",\"datePublished\":\"2025-02-05T03:57:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/02\\\/your-nis2-compliance-partner-greycortex-mendel-for-stronger-cybersecurity\\\/\"},\"wordCount\":1492,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/your-nis2-compliance-partner-greycortex-mendel-stronger-cybersecurity#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.greycortex.com\\\/sites\\\/default\\\/files\\\/styles\\\/default\\\/public\\\/perm\\\/image\\\/nis2-mendel-topology-en.webp?itok=RaG_tUr4\",\"keywords\":[\"Greycortex\",\"MENDEL\",\"2025\"],\"articleSection\":[\"2025\",\"Greycortex\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/02\\\/your-nis2-compliance-partner-greycortex-mendel-for-stronger-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/your-nis2-compliance-partner-greycortex-mendel-stronger-cybersecurity\",\"name\":\"Your NIS2 Compliance Partner: GREYCORTEX Mendel for Stronger Cybersecurity - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/your-nis2-compliance-partner-greycortex-mendel-stronger-cybersecurity#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/your-nis2-compliance-partner-greycortex-mendel-stronger-cybersecurity#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.greycortex.com\\\/sites\\\/default\\\/files\\\/styles\\\/default\\\/public\\\/perm\\\/image\\\/nis2-mendel-topology-en.webp?itok=RaG_tUr4\",\"datePublished\":\"2025-02-05T03:57:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/your-nis2-compliance-partner-greycortex-mendel-stronger-cybersecurity#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/your-nis2-compliance-partner-greycortex-mendel-stronger-cybersecurity\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/your-nis2-compliance-partner-greycortex-mendel-stronger-cybersecurity#primaryimage\",\"url\":\"https:\\\/\\\/www.greycortex.com\\\/sites\\\/default\\\/files\\\/styles\\\/default\\\/public\\\/perm\\\/image\\\/nis2-mendel-topology-en.webp?itok=RaG_tUr4\",\"contentUrl\":\"https:\\\/\\\/www.greycortex.com\\\/sites\\\/default\\\/files\\\/styles\\\/default\\\/public\\\/perm\\\/image\\\/nis2-mendel-topology-en.webp?itok=RaG_tUr4\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/your-nis2-compliance-partner-greycortex-mendel-stronger-cybersecurity#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Your NIS2 Compliance Partner: GREYCORTEX Mendel for Stronger Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Your NIS2 Compliance Partner: GREYCORTEX Mendel for Stronger Cybersecurity - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.greycortex.com\/blog\/your-nis2-compliance-partner-greycortex-mendel-stronger-cybersecurity","og_locale":"en_US","og_type":"article","og_title":"Your NIS2 Compliance Partner: GREYCORTEX Mendel for Stronger Cybersecurity - Version 2","og_description":"The NIS2 Directive has introduced a\u00a0new era of cybersec [&hellip;]","og_url":"https:\/\/www.greycortex.com\/blog\/your-nis2-compliance-partner-greycortex-mendel-stronger-cybersecurity","og_site_name":"Version 2","article_published_time":"2025-02-05T03:57:57+00:00","og_image":[{"url":"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/nis2-mendel-topology-en.webp?itok=RaG_tUr4","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.greycortex.com\/blog\/your-nis2-compliance-partner-greycortex-mendel-stronger-cybersecurity#article","isPartOf":{"@id":"https:\/\/version-2.com\/2025\/02\/your-nis2-compliance-partner-greycortex-mendel-for-stronger-cybersecurity\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Your NIS2 Compliance Partner: GREYCORTEX Mendel for Stronger Cybersecurity","datePublished":"2025-02-05T03:57:57+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2025\/02\/your-nis2-compliance-partner-greycortex-mendel-for-stronger-cybersecurity\/"},"wordCount":1492,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.greycortex.com\/blog\/your-nis2-compliance-partner-greycortex-mendel-stronger-cybersecurity#primaryimage"},"thumbnailUrl":"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/nis2-mendel-topology-en.webp?itok=RaG_tUr4","keywords":["Greycortex","MENDEL","2025"],"articleSection":["2025","Greycortex","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2025\/02\/your-nis2-compliance-partner-greycortex-mendel-for-stronger-cybersecurity\/","url":"https:\/\/www.greycortex.com\/blog\/your-nis2-compliance-partner-greycortex-mendel-stronger-cybersecurity","name":"Your NIS2 Compliance Partner: GREYCORTEX Mendel for Stronger Cybersecurity - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.greycortex.com\/blog\/your-nis2-compliance-partner-greycortex-mendel-stronger-cybersecurity#primaryimage"},"image":{"@id":"https:\/\/www.greycortex.com\/blog\/your-nis2-compliance-partner-greycortex-mendel-stronger-cybersecurity#primaryimage"},"thumbnailUrl":"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/nis2-mendel-topology-en.webp?itok=RaG_tUr4","datePublished":"2025-02-05T03:57:57+00:00","breadcrumb":{"@id":"https:\/\/www.greycortex.com\/blog\/your-nis2-compliance-partner-greycortex-mendel-stronger-cybersecurity#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.greycortex.com\/blog\/your-nis2-compliance-partner-greycortex-mendel-stronger-cybersecurity"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.greycortex.com\/blog\/your-nis2-compliance-partner-greycortex-mendel-stronger-cybersecurity#primaryimage","url":"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/nis2-mendel-topology-en.webp?itok=RaG_tUr4","contentUrl":"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/nis2-mendel-topology-en.webp?itok=RaG_tUr4"},{"@type":"BreadcrumbList","@id":"https:\/\/www.greycortex.com\/blog\/your-nis2-compliance-partner-greycortex-mendel-stronger-cybersecurity#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Your NIS2 Compliance Partner: GREYCORTEX Mendel for Stronger Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-qJE","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/102774","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=102774"}],"version-history":[{"count":5,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/102774\/revisions"}],"predecessor-version":[{"id":102779,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/102774\/revisions\/102779"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=102774"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=102774"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=102774"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}