{"id":37523,"date":"2021-07-15T11:40:41","date_gmt":"2021-07-15T03:40:41","guid":{"rendered":"https:\/\/version-2.com\/?p=37523"},"modified":"2021-09-03T16:37:47","modified_gmt":"2021-09-03T08:37:47","slug":"why-greycortex-mendel-is-the-essential-member-of-your-network-security-product-family","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2021\/07\/why-greycortex-mendel-is-the-essential-member-of-your-network-security-product-family\/","title":{"rendered":"Why GREYCORTEX Mendel Is the Essential Member of Your Network Security Product Family"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"37523\" class=\"elementor elementor-37523\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-534888b post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"534888b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;80510b6&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-40115d5\" data-id=\"40115d5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d4201ee elementor-widget elementor-widget-text-editor\" data-id=\"d4201ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>There are several basic tools for securing network infrastructure that should not be missing from any organization. Let\u2019s take a\u00a0look at the role of\u00a0GREYCORTEX\u00a0Mendel in all those products protecting the data and network in your company.<\/strong><\/p><p>Antivirus software, firewalls and intrusion prevention systems (<span class=\"caps\">IPS<\/span>) should be an integral part of any organization\u2019s cybersecurity solution. Nowadays, however, they are often not enough. That\u2019s where Mendel steps\u00a0in.<\/p><p><a href=\"https:\/\/www.greycortex.com\/mendel\"><span class=\"caps\">GREYCORTEX<\/span>\u00a0Mendel<\/a>\u00a0stands on several levels:<\/p><ul><li>It is a\u00a0unique tool that\u00a0<strong>sees, visualizes and analyzes everything<\/strong>\u00a0in your network \u2013 devices, access and all communications.<\/li><li>It is a\u00a0great\u00a0<strong>extension to the functionality of standard cybersecurity tools<\/strong>: antivirus, firewalls and network performance monitoring. They are crucial, but there are some threats that even they cannot detect. The reason is simple: attackers are often ready for these standard systems.<\/li><\/ul><h3>Mendel Sees and Visualizes in the Context of Time and Events<\/h3><p>Imagine a\u00a0tool that sees all the devices in your network, how they are communicating together, what protocols they are using and where your data is going. With Mendel, you can see all of that. You can also view the details of a\u00a0specific device, its\u00a0<strong>communication and where it is connected to<\/strong>\u00a0at the moment, and\u00a0<strong>also yesterday or a\u00a0year ago<\/strong>.<\/p><p><a href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/perm\/image\/1-peersgraph.png\"><img decoding=\"async\" class=\"img-fluid\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/perm\/image\/1-peersgraph.png\" \/><\/a><\/p><p>With this unique analysis, you can\u00a0<strong>uncover a\u00a0sophisticated attack<\/strong>\u00a0on your infrastructure before it really happens. That\u2019s because you can relate current events to events that happened before, even in the more distant past.<\/p><p><img decoding=\"async\" class=\"img-fluid\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/perm\/image\/divider.png\" \/><\/p><p>Let\u2019s take a\u00a0look at an example of an attack that may go unnoticed by a\u00a0standard detection mechanism: Advanced malware is not detected on the end device, but that device shows behavior that could endanger the network \u2013 for example, trying to access somewhere it has not accessed before. It could be spyware or an\u00a0<span class=\"caps\">APT<\/span>\u00a0in your internal domains that is gradually spreading across your network through a\u00a0domain, while the infected machines start accessing unusual devices and data sources and performing lateral movement. Mendel can identify and notify you of such unusual behavior.<\/p><p><img decoding=\"async\" class=\"img-fluid\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/perm\/image\/divider.png\" \/><\/p><h3>More Reliable End-Point Security<\/h3><p>Because end-points are an easy target, often provide valuable data and are an entry point for gaining deeper access to your network, they are the frequent initial targets of cyber-attacks.<\/p><p>Commonly known end-point attacks include:<\/p><ul><li>network mapping<\/li><li>data exfiltration (sending data in non-standard or encrypted channels, communication with control devices)<\/li><li>Dictionary attacks, password data breaches<\/li><li>Data mining (reading important information, mining data from a\u00a0database, mining users from information systems or from a\u00a0domain controller)<\/li><\/ul><p><strong>Mendel flags such attacks as dangerous behavior<\/strong>\u00a0and recognizes the threat that might not have been recognized by endpoint security or that is well hidden by the attacker. Even if antivirus software is deployed, Mendel monitors the communication of your devices and reveals any anomalies in it. All of that using a\u00a0broad database specializing in network cyber threats that include not only known threats but also signatures of unusual behavior.<\/p><h3>A Smarter Firewall<\/h3><p>We can understand a\u00a0few things that fall under the term\u00a0<strong>firewall<\/strong>: standard firewalls and smart solutions known as an\u00a0<span class=\"caps\">IPS<\/span>.<\/p><p><strong>Traditional firewalls<\/strong>\u00a0stand first in the line of defense and secure broad traffic filtering. They adjust network transitions and the availability of network services and are mostly used on the external perimeter \u2013 in some cases within the internal network. They are\u00a0<strong>often open<\/strong>\u00a0or\u00a0<strong>insufficiently configured<\/strong>.<\/p><p>In such cases, Mendel plays the role of an auditing tool \u2013 controlling the function of the firewall itself and checking its configuration. You can use this feature for verifying and controlling the communication matrix in your internal network and critical systems. It helps you understand who is connecting where, who is using what and who is behaving differently than they should.<\/p><p>Smart solutions such as\u00a0<strong><span class=\"caps\">IPS<\/span>\u00a0see more deeply into your network<\/strong>, can detect known threats and block them. Also here, Mendel provides you a\u00a0<strong>double-check<\/strong>\u00a0by monitoring the operation of web proxies and email gateways. This means<strong>\u00a0no potential threat can pass<\/strong>. Even in this case, Mendel\u2019s advantage is its extensive database of threats, consisting of multiple sources and signatures that verify not only known attacks but also security policies and potentially dangerous access to data sources, such as administrative sharing. This approach is much more effective for the detection of vulnerabilities than just a\u00a0database of known threats from one vendor.<\/p><p>This way, Mendel shows much more \u2013 not only what needs to be blocked but also unwanted or insecure applications and access to risky services. You\u2019ll get a\u00a0much<strong>\u00a0better overview of what is going on<\/strong>\u00a0and what is going through your network and\u00a0how.<\/p><h3>The Danger of Unknown Threats<\/h3><p>In all mentioned cases, Mendel not only\u00a0<strong>deals better with detecting known threats<\/strong>, its strength lies in also\u00a0<strong>detecting unknown threats<\/strong>. How? Mendel recognizes different types of actions using behavioral analysis.<\/p><p>Right after anomalous behavior or an unknown threat is detected, the system notifies you, for example, by email. It\u2019s then your choice. You can either take the necessary steps or you can connect Mendel to the firewall\u00a0<span class=\"caps\">API<\/span>\u00a0and it will block the unwanted communication automatically for\u00a0you.<\/p><h3>A Huge Help for Monitoring Network Performance<\/h3><p>At the next level, there are tools for internal system monitoring. In this case, Mendel shows a\u00a0<strong>clear overview of the network<\/strong>\u00a0\u2013 how it is loaded and used, who is accessing it, what services are operating and what the performance of applications and transmission lines\u00a0is.<\/p><p>Imagine seeing just how loaded your information system, domain controller, Wi-Fi network or data center are!<\/p><p><a href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/perm\/image\/3-performance_b.png\"><img decoding=\"async\" class=\"img-fluid\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/perm\/image\/3-performance_b.png\" \/><\/a><\/p><p><span class=\"caps\">GREYCORTEX<\/span>\u00a0Mendel helps you\u00a0<strong>increase the reliability of your network<\/strong>. Even industrial control systems can get the right amount of control, so any attack or even a\u00a0major network failure has no catastrophic consequences.<\/p><p><img decoding=\"async\" class=\"img-fluid\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/perm\/image\/divider.png\" \/><\/p><p>Antivirus software shows you current threats. A\u00a0firewall displays the current settings and whether it is leaking something or not. But nothing will clearly show you events in your network an hour, a\u00a0week or a\u00a0year ago. In a\u00a0nutshell,\u00a0<strong>Mendel sees, visualizes<\/strong>\u00a0and (thanks to data storage of up to the last several years) also\u00a0<strong>analyzes<\/strong>\u00a0current as well as past events.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ead54a5 elementor-widget elementor-widget-shortcode\" data-id=\"ead54a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18179\" class=\"elementor elementor-18179\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;],&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ff2a228 elementor-widget elementor-widget-text-editor\" data-id=\"ff2a228\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<p><strong>About GREYCORTEX<br \/><\/strong>GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.<\/p>\n<p>MENDEL, GREYCORTEX\u2019s network traffic analysis solution, helps corporations, governments, and the critical infrastructure sector protect their futures by detecting cyber threats to sensitive data, networks, trade secrets, and reputations, which other network security products miss.<\/p>\n<p>MENDEL is based on 10 years of extensive academic research and is designed using the same technology which was successful in four US-based NIST Challenges.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>There are several basic tools for securing network infr [&hellip;]<\/p>\n","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[461,24,61],"tags":[462,23,435],"class_list":["post-37523","post","type-post","status-publish","format-standard","hentry","category-year2021","category-greycortex","category-press-release","tag-462","tag-greycortex","tag-mendel"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why GREYCORTEX Mendel Is the Essential Member of Your Network Security Product Family - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/version-2.com\/zh\/2021\/07\/why-greycortex-mendel-is-the-essential-member-of-your-network-security-product-family\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why GREYCORTEX Mendel Is the Essential Member of Your Network Security Product Family - Version 2\" \/>\n<meta property=\"og:description\" content=\"There are several basic tools for securing network infr [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/version-2.com\/zh\/2021\/07\/why-greycortex-mendel-is-the-essential-member-of-your-network-security-product-family\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-15T03:40:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-03T08:37:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.greycortex.com\/sites\/default\/files\/perm\/image\/1-peersgraph.png\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/07\\\/why-greycortex-mendel-is-the-essential-member-of-your-network-security-product-family\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/07\\\/why-greycortex-mendel-is-the-essential-member-of-your-network-security-product-family\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"Why GREYCORTEX Mendel Is the Essential Member of Your Network Security Product Family\",\"datePublished\":\"2021-07-15T03:40:41+00:00\",\"dateModified\":\"2021-09-03T08:37:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/07\\\/why-greycortex-mendel-is-the-essential-member-of-your-network-security-product-family\\\/\"},\"wordCount\":1044,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/07\\\/why-greycortex-mendel-is-the-essential-member-of-your-network-security-product-family\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.greycortex.com\\\/sites\\\/default\\\/files\\\/perm\\\/image\\\/1-peersgraph.png\",\"keywords\":[\"2021\",\"Greycortex\",\"MENDEL\"],\"articleSection\":[\"2021\",\"Greycortex\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/07\\\/why-greycortex-mendel-is-the-essential-member-of-your-network-security-product-family\\\/\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/07\\\/why-greycortex-mendel-is-the-essential-member-of-your-network-security-product-family\\\/\",\"name\":\"Why GREYCORTEX Mendel Is the Essential Member of Your Network Security Product Family - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/07\\\/why-greycortex-mendel-is-the-essential-member-of-your-network-security-product-family\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/07\\\/why-greycortex-mendel-is-the-essential-member-of-your-network-security-product-family\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.greycortex.com\\\/sites\\\/default\\\/files\\\/perm\\\/image\\\/1-peersgraph.png\",\"datePublished\":\"2021-07-15T03:40:41+00:00\",\"dateModified\":\"2021-09-03T08:37:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/07\\\/why-greycortex-mendel-is-the-essential-member-of-your-network-security-product-family\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/07\\\/why-greycortex-mendel-is-the-essential-member-of-your-network-security-product-family\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/07\\\/why-greycortex-mendel-is-the-essential-member-of-your-network-security-product-family\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.greycortex.com\\\/sites\\\/default\\\/files\\\/perm\\\/image\\\/1-peersgraph.png\",\"contentUrl\":\"https:\\\/\\\/www.greycortex.com\\\/sites\\\/default\\\/files\\\/perm\\\/image\\\/1-peersgraph.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/07\\\/why-greycortex-mendel-is-the-essential-member-of-your-network-security-product-family\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why GREYCORTEX Mendel Is the Essential Member of Your Network Security Product Family\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why GREYCORTEX Mendel Is the Essential Member of Your Network Security Product Family - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/version-2.com\/zh\/2021\/07\/why-greycortex-mendel-is-the-essential-member-of-your-network-security-product-family\/","og_locale":"zh_HK","og_type":"article","og_title":"Why GREYCORTEX Mendel Is the Essential Member of Your Network Security Product Family - Version 2","og_description":"There are several basic tools for securing network infr [&hellip;]","og_url":"https:\/\/version-2.com\/zh\/2021\/07\/why-greycortex-mendel-is-the-essential-member-of-your-network-security-product-family\/","og_site_name":"Version 2","article_published_time":"2021-07-15T03:40:41+00:00","article_modified_time":"2021-09-03T08:37:47+00:00","og_image":[{"url":"https:\/\/www.greycortex.com\/sites\/default\/files\/perm\/image\/1-peersgraph.png","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"version2hk","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"5 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/version-2.com\/zh\/2021\/07\/why-greycortex-mendel-is-the-essential-member-of-your-network-security-product-family\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/2021\/07\/why-greycortex-mendel-is-the-essential-member-of-your-network-security-product-family\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"Why GREYCORTEX Mendel Is the Essential Member of Your Network Security Product Family","datePublished":"2021-07-15T03:40:41+00:00","dateModified":"2021-09-03T08:37:47+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/zh\/2021\/07\/why-greycortex-mendel-is-the-essential-member-of-your-network-security-product-family\/"},"wordCount":1044,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/version-2.com\/zh\/2021\/07\/why-greycortex-mendel-is-the-essential-member-of-your-network-security-product-family\/#primaryimage"},"thumbnailUrl":"https:\/\/www.greycortex.com\/sites\/default\/files\/perm\/image\/1-peersgraph.png","keywords":["2021","Greycortex","MENDEL"],"articleSection":["2021","Greycortex","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/zh\/2021\/07\/why-greycortex-mendel-is-the-essential-member-of-your-network-security-product-family\/","url":"https:\/\/version-2.com\/zh\/2021\/07\/why-greycortex-mendel-is-the-essential-member-of-your-network-security-product-family\/","name":"Why GREYCORTEX Mendel Is the Essential Member of Your Network Security Product Family - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/version-2.com\/zh\/2021\/07\/why-greycortex-mendel-is-the-essential-member-of-your-network-security-product-family\/#primaryimage"},"image":{"@id":"https:\/\/version-2.com\/zh\/2021\/07\/why-greycortex-mendel-is-the-essential-member-of-your-network-security-product-family\/#primaryimage"},"thumbnailUrl":"https:\/\/www.greycortex.com\/sites\/default\/files\/perm\/image\/1-peersgraph.png","datePublished":"2021-07-15T03:40:41+00:00","dateModified":"2021-09-03T08:37:47+00:00","breadcrumb":{"@id":"https:\/\/version-2.com\/zh\/2021\/07\/why-greycortex-mendel-is-the-essential-member-of-your-network-security-product-family\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/version-2.com\/zh\/2021\/07\/why-greycortex-mendel-is-the-essential-member-of-your-network-security-product-family\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/2021\/07\/why-greycortex-mendel-is-the-essential-member-of-your-network-security-product-family\/#primaryimage","url":"https:\/\/www.greycortex.com\/sites\/default\/files\/perm\/image\/1-peersgraph.png","contentUrl":"https:\/\/www.greycortex.com\/sites\/default\/files\/perm\/image\/1-peersgraph.png"},{"@type":"BreadcrumbList","@id":"https:\/\/version-2.com\/zh\/2021\/07\/why-greycortex-mendel-is-the-essential-member-of-your-network-security-product-family\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"Why GREYCORTEX Mendel Is the Essential Member of Your Network Security Product Family"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/zh\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-9Ld","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/37523","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=37523"}],"version-history":[{"count":10,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/37523\/revisions"}],"predecessor-version":[{"id":37533,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/37523\/revisions\/37533"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=37523"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=37523"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=37523"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}