{"id":14752,"date":"2020-06-01T02:35:50","date_gmt":"2020-06-01T02:35:50","guid":{"rendered":"https:\/\/pusatsoftware.com\/?post_type=product&#038;p=14752"},"modified":"2024-10-08T09:50:11","modified_gmt":"2024-10-08T09:50:11","slug":"data-leakage-protection-software","status":"publish","type":"product","link":"https:\/\/pusatsoftware.com\/en\/product\/data-leakage-protection-software\/","title":{"rendered":"Paladion Data Leakage Protection Software"},"content":{"rendered":"<h2 style=\"text-align: center;\"><strong>AI-Driven MDR\u00a0<\/strong>for High Speed Cyber Defense<\/h2>\n<p style=\"text-align: center;\">Join us as we change the game for managed information security \u2013 from a slow, reactive, and faceless service to a\u00a0HIGH SPEED,\u00a0HIGH TOUCH\u00a0cyber defense partner.<\/p>\n<p style=\"text-align: center;\">Attacks are swift. You need speed to anticipate, detect, and respond to current threats (such as ransomware) and cyber incidents. We leverage AI in our\u00a0Managed Detection and Response service\u00a0to provide high speed cyber defense.<\/p>\n<p style=\"text-align: center;\">Reporting is easy; execution is complex. Managed information security providers stop with sending alerts and reports. We augment our AI platform with hands-on response and cybersecurity consulting services from one of the largest pool of cyber experts to deliver 24\u00d77 high touch service, executing a wide spectrum of security tasks for you.<\/p>\n<p style=\"text-align: center;\">Whether you are an Enterprise, or require cybersecurity for small business solutions, choose a service that keeps your business ahead in a fast-paced digital world.<\/p>\n<p style=\"text-align: center;\">\n<div class=\"row-fluid-wrapper row-depth-1 row-number-10\" style=\"text-align: center;\">\n<div class=\"row-fluid\">\n<div class=\"span12 widget-span widget-type-rich_text home-page-sec-header story-section-header\" data-widget-type=\"rich_text\" data-x=\"0\" data-w=\"12\">\n<div class=\"cell-wrapper layout-widget-wrapper\">\n<h2>AI That is Built on Solid Ground<\/h2>\n<p>To develop our AI platform, we leveraged everything we learned from our 19 years of experience delivering cyber defense to 700+ clients, and from our 1,000+ cybersecurity specialists monitoring billions of events. Our AI platform applies techniques including Supervised, Unsupervised, and Deep Learning, as well as NLP, to deliver high speed cybersecurity services across every stage of a threat&#8217;s lifecycle:<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"row-fluid-wrapper row-depth-1 row-number-11\">\n<div class=\"row-fluid\">\n<div class=\"span10 widget-span widget-type-cell story-two\" data-widget-type=\"cell\" data-x=\"1\" data-w=\"10\">\n<div class=\"row-fluid-wrapper row-depth-1 row-number-13\">\n<div class=\"row-fluid\">\n<div class=\"span4 widget-span widget-type-cell story-inner-right story-inner-right11\" style=\"text-align: center;\" data-widget-type=\"cell\" data-x=\"0\" data-w=\"4\">\n<div class=\"row-fluid-wrapper row-depth-2 row-number-2\">\n<div class=\"row-fluid\">\n<div class=\"span12 widget-span widget-type-rich_text story-right-text-2\" data-widget-type=\"rich_text\" data-x=\"0\" data-w=\"12\">\n<div class=\"cell-wrapper layout-widget-wrapper\">\n<ul>\n<li style=\"text-align: left;\">Threat Anticipation<br \/>\nOur patent-pending platform mines over 100 TB of global threat data every day to detect new threats, correlate their impact (in seconds) on millions of your assets within your critical infrastructure and networks, and to proactively raise your defenses against the emerging threats most likely coming your way.<\/li>\n<li style=\"text-align: left;\">Threat Hunting<br \/>\nWe deploy 25+ AI models, and 450+ use case scenarios, to proactively search for, and uncover, threats within your endpoint, user, network, and application data. Our AI platform can analyze 100 TB of data in seconds to detect any threat hiding in your network.<\/li>\n<li style=\"text-align: left;\">Incident Response<br \/>\nWhen we detect a threat, our AI platform performs automated containment measures\u2014such as deploying 50+ playbook\u2014to quickly remediate your threats. By leveraging our AI-Driven MDR service, you can reduce attacker dwell time\u2014from malware to ransomware\u2014from a months to under 3 days.<\/li>\n<\/ul>\n<div class=\"row-fluid-wrapper row-depth-1 row-number-6\">\n<div class=\"row-fluid\">\n<div class=\"span11 widget-span widget-type-rich_text home-page-sec-header get-paladion-header\" data-widget-type=\"rich_text\" data-x=\"1\" data-w=\"11\">\n<div class=\"cell-wrapper layout-widget-wrapper\">\n<h2>What You Get with Paladion\u2019s MDR<\/h2>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"row-fluid-wrapper row-depth-1 row-number-7\">\n<div class=\"row-fluid\">\n<div class=\"span12 widget-span widget-type-cell get-mdr-inner-wrp get-mdr-inner-wrp1\" data-widget-type=\"cell\" data-x=\"0\" data-w=\"12\">\n<div class=\"row-fluid-wrapper row-depth-1 row-number-8\">\n<div class=\"row-fluid\">\n<div class=\"span1 widget-span widget-type-cell get-inner-left\" data-widget-type=\"cell\" data-x=\"0\" data-w=\"1\">\n<div class=\"row-fluid-wrapper row-depth-2 row-number-1\">\n<div class=\"row-fluid\">\n<div class=\"span12 widget-span widget-type-linked_image get-mdr-num-img get-mdr-num-img1\" data-widget-type=\"linked_image\" data-x=\"0\" data-w=\"12\">\n<ol>\n<li class=\"cell-wrapper layout-widget-wrapper\" style=\"text-align: left;\"><strong>No Half Measures in Defending your Cyber<\/strong><br \/>\nThe limited scope of offerings from traditional MSSP cybersecurity consulting firms leaves blind spots in your enterprise defense. There are no half measures in our MDR offering. Our program and cybersecurity consulting services provide all six components of threat management \u2013 intelligence, analytics, SIEM, forensics, cyber incident remediation, and breach management\u2014to protect your critical infrastructure and networks.<img decoding=\"async\" src=\"https:\/\/www.paladion.net\/hs-fs\/hubfs\/Paladion-v2\/Home%20V3\/Left-of-Hack-to-Right-Of-Hack-Image.png?width=1920&amp;name=Left-of-Hack-to-Right-Of-Hack-Image.png\" alt=\"Left-of-Hack-to-Right-Of-Hack-Image.png\" \/><\/li>\n<li>\n<p style=\"text-align: left;\"><strong>Speed up Your Threat Detection and Response<\/strong><br \/>\nOur patent pending AI platform and threat hunters continuously scour your entire IT stack for threats. We combine Endpoint Detection and Response (EDR), User Behavior Analytics (UEBA), Network Threat Analytics (NTA and NFT) and Application Threat Analytics (ATA) on a single platform. Analytics performed in silos cannot uncover blended threats \u2013 only a unified application of AI on all data protects you from modern threats.<br \/>\n<img decoding=\"async\" src=\"https:\/\/www.paladion.net\/hs-fs\/hubfs\/Paladion--2020\/Home-page\/home-execute-detection-to-response-lifecycle_new.jpg?width=2000&amp;name=home-execute-detection-to-response-lifecycle_new.jpg\" alt=\"home-execute-detection-to-response-lifecycle_new\" \/><\/p>\n<\/li>\n<li style=\"text-align: left;\"><strong>Augment AI with Cyber Experts<\/strong><br \/>\nTechnology alone, even AI based, is never enough in cybersecurity. You need human experts to constantly finetune AI models, investigate results, decide remedial actions, and collaborate with your team for execution. Our cybersecurity solution therefore augments our AI platform with hands-on work and cybersecurity consulting services delivered by our large pool of 700+ threat intel analysts, hunters, SOC analysts, investigators, cybersecurity consultants and responders to deliver high speed yet high touch service.<\/li>\n<\/ol>\n<h2>Work with a Leader in MDR<\/h2>\n<p><img decoding=\"async\" src=\"https:\/\/www.paladion.net\/hs-fs\/hubfs\/Paladion--2020\/Home-page\/Paladion-Company-Overview4-2020.png?width=1000&amp;name=Paladion-Company-Overview4-2020.png\" alt=\"Paladion-Company-Overview4-2020\" \/><\/p>\n<div class=\"body-container-wrapper\">\n<div class=\"body-container container-fluid\">\n<div class=\"row-fluid-wrapper row-depth-1 row-number-11\">\n<div class=\"row-fluid\">\n<div class=\"span12 widget-span widget-type-cell work-mdr-wrap\" data-widget-type=\"cell\" data-x=\"0\" data-w=\"12\">\n<div class=\"row-fluid-wrapper row-depth-1 row-number-12\">\n<div class=\"row-fluid\">\n<div class=\"span12 widget-span widget-type-cell page-center\" data-widget-type=\"cell\" data-x=\"0\" data-w=\"12\">\n<div class=\"row-fluid-wrapper row-depth-1 row-number-15\">\n<div class=\"row-fluid\">\n<div class=\"span10 widget-span widget-type-rich_text about_paladion\" data-widget-type=\"rich_text\" data-x=\"1\" data-w=\"10\">\n<div class=\"cell-wrapper layout-widget-wrapper\">\n<p>Paladion is a global leader in cybersecurity and managed detection and response services. Protect yourself from cyber threats and attacks by utilizing our wide range of cybersecurity consulting services.<\/p>\n<\/div>\n<\/div>\n<div class=\"span1 widget-span widget-type-rich_text\" data-widget-type=\"rich_text\" data-x=\"11\" data-w=\"1\">\n<div class=\"cell-wrapper layout-widget-wrapper\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"footer-container-wrapper\">\n<div class=\"footer-container container-fluid\">\n<div class=\"row-fluid-wrapper row-depth-1 row-number-1\">\n<div class=\"row-fluid\">\n<div class=\"span12 widget-span widget-type-raw_html\" data-widget-type=\"raw_html\" data-x=\"0\" data-w=\"12\">\n<div class=\"cell-wrapper layout-widget-wrapper\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"row-fluid-wrapper row-depth-1 row-number-2\">\n<div class=\"row-fluid\">\n<div class=\"span12 widget-span widget-type-global_group\" data-widget-type=\"global_group\" data-x=\"0\" data-w=\"12\">\n<div class=\"\" data-global-widget-path=\"generated_global_groups\/5482253897.html\">\n<div class=\"row-fluid-wrapper row-depth-1 row-number-1\">\n<div class=\"row-fluid\">\n<div class=\"span12 widget-span widget-type-cell footer-outer-wrap\" data-widget-type=\"cell\" data-x=\"0\" data-w=\"12\">\n<div class=\"row-fluid-wrapper row-depth-1 row-number-2\">\n<div class=\"row-fluid\">\n<div class=\"span12 widget-span widget-type-cell page-center\" data-widget-type=\"cell\" data-x=\"0\" data-w=\"12\">\n<div class=\"row-fluid-wrapper row-depth-1 row-number-3\">\n<div class=\"row-fluid\">\n<div class=\"span2 widget-span widget-type-cell footer-inner-wrap\" data-widget-type=\"cell\" data-x=\"0\" data-w=\"2\">\n<div class=\"row-fluid-wrapper row-depth-1 row-number-4\">\n<div class=\"row-fluid\">\n<div class=\"span12 widget-span widget-type-rich_text footer-header\" data-widget-type=\"rich_text\" data-x=\"0\" data-w=\"12\">\n<div class=\"cell-wrapper layout-widget-wrapper\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>AI-Driven MDR\u00a0for High Speed Cyber Defense Join us as we change the game for managed information security \u2013 from a slow, reactive, and faceless service to a\u00a0HIGH SPEED,\u00a0HIGH TOUCH\u00a0cyber defense<\/p>","protected":false},"featured_media":26192,"comment_status":"open","ping_status":"closed","template":"","meta":[],"product_cat":[138],"product_tag":[],"class_list":{"0":"post-14752","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-data-loss-prevention-software","8":"first","9":"instock","10":"shipping-taxable","11":"purchasable","12":"product-type-simple"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Paladion Data Leakage Protection Software - Pusat Software<\/title>\n<meta name=\"description\" content=\"Meet Paladion, a long serving cyber security provider that integrates business context intelligence, threat data, and cyber insights from its team of specialized researchers, ethical hackers, and security experts\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pusatsoftware.com\/en\/product\/data-leakage-protection-software\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Paladion Data Leakage Protection Software - Pusat Software\" \/>\n<meta property=\"og:description\" content=\"Meet Paladion, a long serving cyber security provider that integrates business context intelligence, threat data, and cyber insights from its team of specialized researchers, ethical hackers, and security experts\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pusatsoftware.com\/en\/product\/data-leakage-protection-software\/\" \/>\n<meta property=\"og:site_name\" content=\"Pusat Software\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-08T09:50:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pusatsoftware.com\/wp-content\/uploads\/2024\/10\/E-Guide-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"378\" \/>\n\t<meta property=\"og:image:height\" content=\"378\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pusatsoftware.com\\\/product\\\/data-leakage-protection-software\\\/\",\"url\":\"https:\\\/\\\/pusatsoftware.com\\\/product\\\/data-leakage-protection-software\\\/\",\"name\":\"Paladion Data Leakage Protection Software - Pusat Software\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pusatsoftware.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/pusatsoftware.com\\\/product\\\/data-leakage-protection-software\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/pusatsoftware.com\\\/product\\\/data-leakage-protection-software\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pusatsoftware.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/E-Guide-1.png\",\"datePublished\":\"2020-06-01T02:35:50+00:00\",\"dateModified\":\"2024-10-08T09:50:11+00:00\",\"description\":\"Meet Paladion, a long serving cyber security provider that integrates business context intelligence, threat data, and cyber insights from its team of specialized researchers, ethical hackers, and security experts\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pusatsoftware.com\\\/product\\\/data-leakage-protection-software\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pusatsoftware.com\\\/product\\\/data-leakage-protection-software\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pusatsoftware.com\\\/product\\\/data-leakage-protection-software\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pusatsoftware.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/E-Guide-1.png\",\"contentUrl\":\"https:\\\/\\\/pusatsoftware.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/E-Guide-1.png\",\"width\":378,\"height\":378},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pusatsoftware.com\\\/product\\\/data-leakage-protection-software\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/pusatsoftware.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shop\",\"item\":\"https:\\\/\\\/pusatsoftware.com\\\/shop\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Paladion Data Leakage Protection Software\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pusatsoftware.com\\\/#website\",\"url\":\"https:\\\/\\\/pusatsoftware.com\\\/\",\"name\":\"Pusat Software\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/pusatsoftware.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pusatsoftware.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/pusatsoftware.com\\\/#organization\",\"name\":\"Pusat Software\",\"url\":\"https:\\\/\\\/pusatsoftware.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pusatsoftware.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/pusatsoftware.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/footer-logo.png\",\"contentUrl\":\"https:\\\/\\\/pusatsoftware.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/footer-logo.png\",\"width\":200,\"height\":32,\"caption\":\"Pusat Software\"},\"image\":{\"@id\":\"https:\\\/\\\/pusatsoftware.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Paladion Data Leakage Protection Software - Pusat Software","description":"Meet Paladion, a long serving cyber security provider that integrates business context intelligence, threat data, and cyber insights from its team of specialized researchers, ethical hackers, and security experts","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pusatsoftware.com\/en\/product\/data-leakage-protection-software\/","og_locale":"en_US","og_type":"article","og_title":"Paladion Data Leakage Protection Software - Pusat Software","og_description":"Meet Paladion, a long serving cyber security provider that integrates business context intelligence, threat data, and cyber insights from its team of specialized researchers, ethical hackers, and security experts","og_url":"https:\/\/pusatsoftware.com\/en\/product\/data-leakage-protection-software\/","og_site_name":"Pusat Software","article_modified_time":"2024-10-08T09:50:11+00:00","og_image":[{"width":378,"height":378,"url":"https:\/\/pusatsoftware.com\/wp-content\/uploads\/2024\/10\/E-Guide-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/pusatsoftware.com\/product\/data-leakage-protection-software\/","url":"https:\/\/pusatsoftware.com\/product\/data-leakage-protection-software\/","name":"Paladion Data Leakage Protection Software - Pusat Software","isPartOf":{"@id":"https:\/\/pusatsoftware.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pusatsoftware.com\/product\/data-leakage-protection-software\/#primaryimage"},"image":{"@id":"https:\/\/pusatsoftware.com\/product\/data-leakage-protection-software\/#primaryimage"},"thumbnailUrl":"https:\/\/pusatsoftware.com\/wp-content\/uploads\/2024\/10\/E-Guide-1.png","datePublished":"2020-06-01T02:35:50+00:00","dateModified":"2024-10-08T09:50:11+00:00","description":"Meet Paladion, a long serving cyber security provider that integrates business context intelligence, threat data, and cyber insights from its team of specialized researchers, ethical hackers, and security experts","breadcrumb":{"@id":"https:\/\/pusatsoftware.com\/product\/data-leakage-protection-software\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pusatsoftware.com\/product\/data-leakage-protection-software\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pusatsoftware.com\/product\/data-leakage-protection-software\/#primaryimage","url":"https:\/\/pusatsoftware.com\/wp-content\/uploads\/2024\/10\/E-Guide-1.png","contentUrl":"https:\/\/pusatsoftware.com\/wp-content\/uploads\/2024\/10\/E-Guide-1.png","width":378,"height":378},{"@type":"BreadcrumbList","@id":"https:\/\/pusatsoftware.com\/product\/data-leakage-protection-software\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pusatsoftware.com\/"},{"@type":"ListItem","position":2,"name":"Shop","item":"https:\/\/pusatsoftware.com\/shop\/"},{"@type":"ListItem","position":3,"name":"Paladion Data Leakage Protection Software"}]},{"@type":"WebSite","@id":"https:\/\/pusatsoftware.com\/#website","url":"https:\/\/pusatsoftware.com\/","name":"Pusat Software","description":"","publisher":{"@id":"https:\/\/pusatsoftware.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pusatsoftware.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/pusatsoftware.com\/#organization","name":"Pusat Software","url":"https:\/\/pusatsoftware.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pusatsoftware.com\/#\/schema\/logo\/image\/","url":"https:\/\/pusatsoftware.com\/wp-content\/uploads\/2024\/10\/footer-logo.png","contentUrl":"https:\/\/pusatsoftware.com\/wp-content\/uploads\/2024\/10\/footer-logo.png","width":200,"height":32,"caption":"Pusat Software"},"image":{"@id":"https:\/\/pusatsoftware.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/pusatsoftware.com\/en\/wp-json\/wp\/v2\/product\/14752","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pusatsoftware.com\/en\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pusatsoftware.com\/en\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/pusatsoftware.com\/en\/wp-json\/wp\/v2\/comments?post=14752"}],"version-history":[{"count":2,"href":"https:\/\/pusatsoftware.com\/en\/wp-json\/wp\/v2\/product\/14752\/revisions"}],"predecessor-version":[{"id":26193,"href":"https:\/\/pusatsoftware.com\/en\/wp-json\/wp\/v2\/product\/14752\/revisions\/26193"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pusatsoftware.com\/en\/wp-json\/wp\/v2\/media\/26192"}],"wp:attachment":[{"href":"https:\/\/pusatsoftware.com\/en\/wp-json\/wp\/v2\/media?parent=14752"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pusatsoftware.com\/en\/wp-json\/wp\/v2\/product_cat?post=14752"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pusatsoftware.com\/en\/wp-json\/wp\/v2\/product_tag?post=14752"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}