{"id":2063,"date":"2017-01-30T13:19:38","date_gmt":"2017-01-30T12:19:38","guid":{"rendered":"https:\/\/www.enigma.com.pl\/en\/?page_id=2063"},"modified":"2024-09-17T12:58:25","modified_gmt":"2024-09-17T10:58:25","slug":"history","status":"publish","type":"page","link":"https:\/\/www.enigma.com.pl\/en\/history\/","title":{"rendered":"History"},"content":{"rendered":"[mk_page_section bg_image=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/11\/grafika-pod-histori.jpg&#8221; attachment=&#8221;fixed&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; padding_top=&#8221;0&#8243; padding_bottom=&#8221;0&#8243; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_fancy_title color=&#8221;#0099cc&#8221; size=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;50&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221; align=&#8221;center&#8221;]<span style=\"font-size: medium;\">HISTORY &#8211; RESEARCH AND DEVELOPMENT<\/span>[\/mk_fancy_title][vc_column_text disable_pattern=&#8221;false&#8221; align=&#8221;center&#8221; margin_bottom=&#8221;50&#8243;]<span style=\"color: #0099cc;\">Enigma Information Security Systems &#8211; as a high-technology company pays enormous attention to research, constant development and enhancement of offered solutions. Research works outpace market needs, increase Enigma\u2019s competitive advantage and ensure security at many social and institutional levels.<br \/>\nOur key projects:<\/span>[\/vc_column_text]<div id=\"mpc_timeline_basic-106a0ad89d72919\" class=\"mpc-timeline-basic mpc-init mpc-layout--both mpc-pointer--line mpc-pointer--middle \" ><div class=\"mpc-timeline__track\"><\/div><div class=\"mpc-track__icon\"><i class=\"mpc-transition  fa fa-circle\"><\/i><\/div><div class=\"mpc-timeline-item__wrap mpc-init mpc-parent-hover mpc-tooltip--always\" ><div data-id=\"mpc_timeline_item-486a0ad89d72b4f\" class=\"mpc-timeline-item mpc-transition mpc-align--center \"><div class=\"mpc-tl-before\"><\/div><h3 class=\"mpc-timeline-item__heading mpc-transition\">2023<\/h3><div data-id=\"mpc_divider-926a0ad89d72bbc\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \" ><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-timeline-item__description\"><p><span style=\"color: #ffffff;\">Installation of biometric gates for fast border clearance at the airport in Rzesz\u00f3w<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Launch of the Electronic Surveillance System project in Armenia<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Implementation of HSM devices at the Ministry of Family and Social Policy<\/span><\/p>\n<p><span style=\"color: #ffffff;\">PKI for the Central Dynamic Passenger Information System<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Start of the first stage of SDE implementation in the Czech Republic<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Modernization and service of the central backup for the Ministry of National Defense<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Finalization of the implementation of the iBTM IT system for the Chief Road Transport Inspectorate<\/span><\/p>\n<\/div><\/div><div class=\"mpc-tl-icon\"><div data-id=\"mpc_icon-276a0ad89d72b90\" class=\"mpc-icon mpc-init mpc-transition mpc-effect-slide-down \"><div class=\"mpc-icon-wrap\"><i class=\"mpc-icon-part mpc-regular mpc-transition \"><\/i><\/div><\/div><\/div><\/div><div class=\"mpc-timeline-item__wrap mpc-init mpc-parent-hover mpc-tooltip--always\" ><div data-id=\"mpc_timeline_item-366a0ad89d72cce\" class=\"mpc-timeline-item mpc-transition mpc-align--center \"><div class=\"mpc-tl-before\"><\/div><h3 class=\"mpc-timeline-item__heading mpc-transition\">2022<\/h3><div data-id=\"mpc_divider-816a0ad89d72d10\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \" ><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-timeline-item__description\"><p><span style=\"color: #ffffff;\">ABC gates for quick border clearance at the airport in Gda\u0144sk<\/span><\/p>\n<p><span style=\"color: #ffffff;\">A new generation of the Electronic Supervision System for the Ministry of Justice<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Network devices for NASK for the purposes of the Combined Operations Center Project<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Implementation of HSM devices at the Ministry of Family and Social Policy<\/span><\/p>\n<p><span style=\"color: #ffffff;\">BIG DATA project in the Police<\/span><\/p>\n<p><span style=\"color: #ffffff;\">CenCert certificates in the National Health Fund<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Delivery of Hitachi arrays for the Ministry of Agriculture<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Body-worn cameras in the Police<\/span><\/p>\n<\/div><\/div><div class=\"mpc-tl-icon\"><div data-id=\"mpc_icon-736a0ad89d72cf3\" class=\"mpc-icon mpc-init mpc-transition mpc-effect-slide-down \"><div class=\"mpc-icon-wrap\"><i class=\"mpc-icon-part mpc-regular mpc-transition \"><\/i><\/div><\/div><\/div><\/div><div class=\"mpc-timeline-item__wrap mpc-init mpc-parent-hover mpc-tooltip--always\" ><div data-id=\"mpc_timeline_item-186a0ad89d72e03\" class=\"mpc-timeline-item mpc-transition mpc-align--center \"><div class=\"mpc-tl-before\"><\/div><h3 class=\"mpc-timeline-item__heading mpc-transition\">2021<\/h3><div data-id=\"mpc_divider-296a0ad89d72e43\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \" ><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-timeline-item__description\"><p><span style=\"color: #ffffff;\">Delivery of ENIBOX devices for biometric registration for the needs of the Border Guard.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Delivery and implementation of another Police order for a wearable camera system.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Modernization of the Centaur Public Key Infrastructure at the National Bank of Poland.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Provision of services for Netia based on the LogPoint product.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Integrated IT System in the Marshal&#8217;s Office of the Ma\u0142opolskie Voivodeship.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Installation of Rubrik CDM at Polaris.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Software Asset Management (SAM) system support for KRUS.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Implementation of the Integrated IT System for the rolling stock Tramwaje Warszawskie S.A.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">IBTM system for the General Road Transport Inspectorate.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Supply of VMware software for Poczta Polska.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">CenCert is the provider of trust services for Szpitale Wielkopolski Sp. z o.o., ZUS and NFZ.<\/span><\/p>\n<\/div><\/div><div class=\"mpc-tl-icon\"><div data-id=\"mpc_icon-166a0ad89d72e26\" class=\"mpc-icon mpc-init mpc-transition mpc-effect-slide-down \"><div class=\"mpc-icon-wrap\"><i class=\"mpc-icon-part mpc-regular mpc-transition \"><\/i><\/div><\/div><\/div><\/div><div class=\"mpc-timeline-item__wrap mpc-init mpc-parent-hover mpc-tooltip--always\" ><div data-id=\"mpc_timeline_item-356a0ad89d72f54\" class=\"mpc-timeline-item mpc-transition mpc-align--center \"><div class=\"mpc-tl-before\"><\/div><h3 class=\"mpc-timeline-item__heading mpc-transition\">2020<\/h3><div data-id=\"mpc_divider-76a0ad89d72f96\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \" ><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-timeline-item__description\"><p><span style=\"color: #ffffff;\">Development of the Data Processing Center (3DC) for Armed Forces Cyberspace Resource Center.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Istallation of ABC biometric gates at the Okecie Airport in Warsaw and the Lawica Airport in Poznan.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Deployment of body-worn camera program for the next 11 police stations in Poland.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Launch of an encryption device CompCrypt ETA MILL 1000P for the protection of classified information rated as CONFIDENTIAL\/NATO CONFIDENTIAL\/EU CONFIDENTIAL.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Building and Implementing a Single Center Data Processing (CPD) for dedicated systems in the Ministry of Defense.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Provision of Commvault licenses for the Informatics Center of the Ministry of Finance.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Implementation of PKI in the Ministry of Defense and in the PIT-RADWAR company.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Delivery of a device for signing passport applications in the Passport Document Registry for the Ministry of Digital Affairs.<\/span><\/p>\n<\/div><\/div><div class=\"mpc-tl-icon\"><div data-id=\"mpc_icon-256a0ad89d72f79\" class=\"mpc-icon mpc-init mpc-transition mpc-effect-slide-down \"><div class=\"mpc-icon-wrap\"><i class=\"mpc-icon-part mpc-regular mpc-transition \"><\/i><\/div><\/div><\/div><\/div><div class=\"mpc-timeline-item__wrap mpc-init mpc-parent-hover mpc-tooltip--always\" ><div data-id=\"mpc_timeline_item-996a0ad89d73087\" class=\"mpc-timeline-item mpc-transition mpc-align--center \"><div class=\"mpc-tl-before\"><\/div><h3 class=\"mpc-timeline-item__heading mpc-transition\">2019<\/h3><div data-id=\"mpc_divider-106a0ad89d730c7\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \" ><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-timeline-item__description\"><p><span style=\"color: #ffffff;\">Implementation of the Electronic Supervision System.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Installation of ABC border control gates at Warsaw airports.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Mobile Worn Enigma Terminals at the Police Headquarters Asylum identification system for foreigners &#8211; dactyloscopy in the Border Guard.<\/span><\/p>\n<\/div><\/div><div class=\"mpc-tl-icon\"><div data-id=\"mpc_icon-236a0ad89d730aa\" class=\"mpc-icon mpc-init mpc-transition mpc-effect-slide-down \"><div class=\"mpc-icon-wrap\"><i class=\"mpc-icon-part mpc-regular mpc-transition \"><\/i><\/div><\/div><\/div><\/div><div class=\"mpc-timeline-item__wrap mpc-init mpc-parent-hover mpc-tooltip--always\" ><div data-id=\"mpc_timeline_item-736a0ad89d731a4\" class=\"mpc-timeline-item mpc-transition mpc-align--center \"><div class=\"mpc-tl-before\"><\/div><h3 class=\"mpc-timeline-item__heading mpc-transition\">2018<\/h3><div data-id=\"mpc_divider-336a0ad89d731e2\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \" ><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-timeline-item__description\"><p><span style=\"color: #ffffff;\">Implementation of the Electronic Surveillance System.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Supply and commisioning of the body-worn camera system for Police.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Asylum identification system for foreigners \u2013 dactyloscopy in the Border Guard.<\/span><\/p>\n<\/div><\/div><div class=\"mpc-tl-icon\"><div data-id=\"mpc_icon-546a0ad89d731c6\" class=\"mpc-icon mpc-init mpc-transition mpc-effect-slide-down \"><div class=\"mpc-icon-wrap\"><i class=\"mpc-icon-part mpc-regular mpc-transition \"><\/i><\/div><\/div><\/div><\/div><div class=\"mpc-timeline-item__wrap mpc-init mpc-parent-hover mpc-tooltip--always\" ><div data-id=\"mpc_timeline_item-566a0ad89d732d0\" class=\"mpc-timeline-item mpc-transition mpc-align--center \"><div class=\"mpc-tl-before\"><\/div><h3 class=\"mpc-timeline-item__heading mpc-transition\">2017<\/h3><div data-id=\"mpc_divider-186a0ad89d73316\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \" ><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-timeline-item__description\"><p style=\"margin: 0cm; margin-bottom: .0001pt; line-height: 19.9pt; vertical-align: baseline;\"><span style=\"font-family: Dosis, serif; color: #ffffff;\">The launch of Vozilla \u2013 first municipal electric carsharing in Poland \u2013 Wroc\u0142aw.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p style=\"margin: 0cm; margin-bottom: .0001pt; line-height: 19.9pt; vertical-align: baseline;\"><span style=\"font-family: Dosis, serif; color: #ffffff;\">Improving the accessibility of international systems at the Police Headquarters.<\/span><\/p>\n<\/div><\/div><div class=\"mpc-tl-icon\"><div data-id=\"mpc_icon-286a0ad89d732f9\" class=\"mpc-icon mpc-init mpc-transition mpc-effect-slide-down \"><div class=\"mpc-icon-wrap\"><i class=\"mpc-icon-part mpc-regular mpc-transition \"><\/i><\/div><\/div><\/div><\/div><div class=\"mpc-timeline-item__wrap mpc-init mpc-parent-hover mpc-tooltip--always\" ><div data-id=\"mpc_timeline_item-736a0ad89d733fc\" class=\"mpc-timeline-item mpc-transition mpc-align--center \"><div class=\"mpc-tl-before\"><\/div><h3 class=\"mpc-timeline-item__heading mpc-transition\">2016<\/h3><div data-id=\"mpc_divider-116a0ad89d7343d\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \" ><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-timeline-item__description\"><p><span style=\"color: #ffffff;\">Establishment of a system of access to classified resources of the National Crime Information Centre for the Ministry of Finance.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Delivery of mobile carry-on terminals, enabling police officers in the field access to the Police IT systems.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Participation in the project regarding the ELIXIR 2 interbank settlement system &#8211; delivery and maintenance of cryptographic devices.<\/span><\/p>\n<\/div><\/div><div class=\"mpc-tl-icon\"><div data-id=\"mpc_icon-246a0ad89d73421\" class=\"mpc-icon mpc-init mpc-transition mpc-effect-slide-down \"><div class=\"mpc-icon-wrap\"><i class=\"mpc-icon-part mpc-regular mpc-transition \"><\/i><\/div><\/div><\/div><\/div><div class=\"mpc-timeline-item__wrap mpc-init mpc-parent-hover mpc-tooltip--always\" ><div data-id=\"mpc_timeline_item-986a0ad89d73519\" class=\"mpc-timeline-item mpc-transition mpc-align--center \"><div class=\"mpc-tl-before\"><\/div><h3 class=\"mpc-timeline-item__heading mpc-transition\">2015<\/h3><div data-id=\"mpc_divider-676a0ad89d73558\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \" ><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-timeline-item__description\"><p><span style=\"color: #f6f6f6;\">Launch of the Electronic Monitoring System in Italy based on Enigma\u2019s solutions.<\/span><\/p>\n<p><span style=\"color: #f6f6f6;\">First implementation of the APTO system &#8211; a mobile two-factor system for authentication and authorization.<\/span><\/p>\n<p><span style=\"color: #f6f6f6;\">Establishment of a secure restricted and confidential communication subsystem for the Coastal Missile Squadron NDR II.<\/span><\/p>\n<\/div><\/div><div class=\"mpc-tl-icon\"><div data-id=\"mpc_icon-336a0ad89d7353c\" class=\"mpc-icon mpc-init mpc-transition mpc-effect-slide-down \"><div class=\"mpc-icon-wrap\"><i class=\"mpc-icon-part mpc-regular mpc-transition \"><\/i><\/div><\/div><\/div><\/div><div class=\"mpc-timeline-item__wrap mpc-init mpc-parent-hover mpc-tooltip--always\" ><div data-id=\"mpc_timeline_item-246a0ad89d7362f\" class=\"mpc-timeline-item mpc-transition mpc-align--center \"><div class=\"mpc-tl-before\"><\/div><h3 class=\"mpc-timeline-item__heading mpc-transition\">2014<\/h3><div data-id=\"mpc_divider-796a0ad89d7367d\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \" ><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-timeline-item__description\"><p><span style=\"color: #f6f6f6;\">Certificate for the Kryptomail system with regard to classified information processing up to the level \u201cRestricted\u201d.<\/span><\/p>\n<p><span style=\"color: #f6f6f6;\">Certificate for the ETA-MIL 10Z, 10Z ex, 10Z N7 device for classified information processing up to the level \u201cRestricted\u201d.<\/span><\/p>\n<\/div><\/div><div class=\"mpc-tl-icon\"><div data-id=\"mpc_icon-456a0ad89d7365e\" class=\"mpc-icon mpc-init mpc-transition mpc-effect-slide-down \"><div class=\"mpc-icon-wrap\"><i class=\"mpc-icon-part mpc-regular mpc-transition \"><\/i><\/div><\/div><\/div><\/div><div class=\"mpc-timeline-item__wrap mpc-init mpc-parent-hover mpc-tooltip--always\" ><div data-id=\"mpc_timeline_item-36a0ad89d73758\" class=\"mpc-timeline-item mpc-transition mpc-align--center \"><div class=\"mpc-tl-before\"><\/div><h3 class=\"mpc-timeline-item__heading mpc-transition\">2013<\/h3><div data-id=\"mpc_divider-496a0ad89d73797\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \" ><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-timeline-item__description\"><p><span style=\"color: #f6f6f6;\">Incorporation of the company Pacomp into the structure of Enigma.<\/span><\/p>\n<p><span style=\"color: #f6f6f6;\">BIO PKI project &#8211; a system of bank customer authentication with the use of biometric finger vein patterns (cooperation with Hitachi).<\/span><\/p>\n<p><span style=\"color: #f6f6f6;\">Project entitled \u201cICT forensic module supporting the detection of traces of fingerprints on difficult absorbing and non-absorbing surfaces\u201d (within National Centre for Research and Development 2013-2016).<\/span><\/p>\n<p><span style=\"color: #f6f6f6;\">Certificate for the ETA-MIL 10P N7 device \u2013 the first VPN outdoor encryptor.<\/span><\/p>\n<\/div><\/div><div class=\"mpc-tl-icon\"><div data-id=\"mpc_icon-696a0ad89d7377b\" class=\"mpc-icon mpc-init mpc-transition mpc-effect-slide-down \"><div class=\"mpc-icon-wrap\"><i class=\"mpc-icon-part mpc-regular mpc-transition \"><\/i><\/div><\/div><\/div><\/div><div class=\"mpc-timeline-item__wrap mpc-init mpc-parent-hover mpc-tooltip--always\" ><div data-id=\"mpc_timeline_item-376a0ad89d73875\" class=\"mpc-timeline-item mpc-transition mpc-align--center \"><div class=\"mpc-tl-before\"><\/div><h3 class=\"mpc-timeline-item__heading mpc-transition\">2012<\/h3><div data-id=\"mpc_divider-46a0ad89d738b3\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \" ><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-timeline-item__description\"><p><span style=\"color: #f6f6f6;\">Establishment of the \u201cCentre for Abductions\u201d (within National Centre for Research and Development 2012-2015).<\/span><\/p>\n<\/div><\/div><div class=\"mpc-tl-icon\"><div data-id=\"mpc_icon-146a0ad89d73898\" class=\"mpc-icon mpc-init mpc-transition mpc-effect-slide-down \"><div class=\"mpc-icon-wrap\"><i class=\"mpc-icon-part mpc-regular mpc-transition \"><\/i><\/div><\/div><\/div><\/div><div class=\"mpc-timeline-item__wrap mpc-init mpc-parent-hover mpc-tooltip--always\" ><div data-id=\"mpc_timeline_item-746a0ad89d73982\" class=\"mpc-timeline-item mpc-transition mpc-align--center \"><div class=\"mpc-tl-before\"><\/div><h3 class=\"mpc-timeline-item__heading mpc-transition\">2011<\/h3><div data-id=\"mpc_divider-166a0ad89d739c1\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \" ><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-timeline-item__description\"><p><span style=\"color: #f6f6f6;\">Certificate for the ETA-MIL 10P device.<\/span><\/p>\n<p><span style=\"color: #f6f6f6;\">Incorporation of the company Safe Technologies into the structure of Enigma.<\/span><\/p>\n<p><span style=\"color: #f6f6f6;\">Implementation of IT system for the Europol National Unit, offering the possibility of processing classified information.<\/span><\/p>\n<p><span style=\"color: #f6f6f6;\">Design and implementation of the biggest Digital Archives in Poland for the Institute of National Remembrance &#8211; Commission for the Prosecution of Crimes against the Polish Nation.<\/span><\/p>\n<p><span style=\"color: #f6f6f6;\">Establishment of a secure restricted and confidential communication subsystem for the Coastal Missile Squadron NDR I.<\/span><\/p>\n<\/div><\/div><div class=\"mpc-tl-icon\"><div data-id=\"mpc_icon-756a0ad89d739a5\" class=\"mpc-icon mpc-init mpc-transition mpc-effect-slide-down \"><div class=\"mpc-icon-wrap\"><i class=\"mpc-icon-part mpc-regular mpc-transition \"><\/i><\/div><\/div><\/div><\/div><div class=\"mpc-timeline-item__wrap mpc-init mpc-parent-hover mpc-tooltip--always\" ><div data-id=\"mpc_timeline_item-806a0ad89d73aad\" class=\"mpc-timeline-item mpc-transition mpc-align--center \"><div class=\"mpc-tl-before\"><\/div><h3 class=\"mpc-timeline-item__heading mpc-transition\">2010<\/h3><div data-id=\"mpc_divider-646a0ad89d73aec\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \" ><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-timeline-item__description\"><p><span style=\"color: #ffffff;\">Implementation of electronic dactyloscopy stations, so-called \u201cbooking cabins\u201d for the Polish National Police.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Establishment of the e-Passport system in Lithuania &#8211; a system performing cryptographic functions in the process of reading passport data.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Incorporation of the company M2Net into the structure of Enigma.<\/span><\/p>\n<\/div><\/div><div class=\"mpc-tl-icon\"><div data-id=\"mpc_icon-946a0ad89d73ad1\" class=\"mpc-icon mpc-init mpc-transition mpc-effect-slide-down \"><div class=\"mpc-icon-wrap\"><i class=\"mpc-icon-part mpc-regular mpc-transition \"><\/i><\/div><\/div><\/div><\/div><div class=\"mpc-timeline-item__wrap mpc-init mpc-parent-hover mpc-tooltip--always\" ><div data-id=\"mpc_timeline_item-516a0ad89d73bcd\" class=\"mpc-timeline-item mpc-transition mpc-align--center \"><div class=\"mpc-tl-before\"><\/div><h3 class=\"mpc-timeline-item__heading mpc-transition\">2009<\/h3><div data-id=\"mpc_divider-706a0ad89d73c0c\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \" ><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-timeline-item__description\"><p><span style=\"color: #ffffff;\">Design and implementation of the biggest Electronic Monitoring System (SDE) in the East-Central Europe.<\/span><br \/>\n<span style=\"color: #ffffff;\">Entry of the CenCert Certification Centre in the Register of Qualified Entities and commencement of the provision of electronic signature services.<\/span><\/p>\n<\/div><\/div><div class=\"mpc-tl-icon\"><div data-id=\"mpc_icon-676a0ad89d73bf0\" class=\"mpc-icon mpc-init mpc-transition mpc-effect-slide-down \"><div class=\"mpc-icon-wrap\"><i class=\"mpc-icon-part mpc-regular mpc-transition \"><\/i><\/div><\/div><\/div><\/div><div class=\"mpc-timeline-item__wrap mpc-init mpc-parent-hover mpc-tooltip--always\" ><div data-id=\"mpc_timeline_item-96a0ad89d73ce1\" class=\"mpc-timeline-item mpc-transition mpc-align--center \"><div class=\"mpc-tl-before\"><\/div><h3 class=\"mpc-timeline-item__heading mpc-transition\">2008<\/h3><div data-id=\"mpc_divider-526a0ad89d73d1e\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \" ><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-timeline-item__description\"><p><span style=\"color: #ffffff;\">Design and implementation of the Secure Notebook system for the Ministry of Foreign Affairs for secure communication of Polish diplomats and consular and diplomatic employees.<\/span><\/p>\n<\/div><\/div><div class=\"mpc-tl-icon\"><div data-id=\"mpc_icon-866a0ad89d73d03\" class=\"mpc-icon mpc-init mpc-transition mpc-effect-slide-down \"><div class=\"mpc-icon-wrap\"><i class=\"mpc-icon-part mpc-regular mpc-transition \"><\/i><\/div><\/div><\/div><\/div><div class=\"mpc-timeline-item__wrap mpc-init mpc-parent-hover mpc-tooltip--always\" ><div data-id=\"mpc_timeline_item-76a0ad89d73df1\" class=\"mpc-timeline-item mpc-transition mpc-align--center \"><div class=\"mpc-tl-before\"><\/div><h3 class=\"mpc-timeline-item__heading mpc-transition\">2007<\/h3><div data-id=\"mpc_divider-796a0ad89d73e3f\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \" ><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-timeline-item__description\"><p><span style=\"color: #ffffff;\">Launch of the BTUU (Secure User Authentication) identity management system for the Polish National Police.<\/span><br \/>\n<span style=\"color: #ffffff;\">Development of the Kryptomail solution.<\/span><\/p>\n<\/div><\/div><div class=\"mpc-tl-icon\"><div data-id=\"mpc_icon-816a0ad89d73e23\" class=\"mpc-icon mpc-init mpc-transition mpc-effect-slide-down \"><div class=\"mpc-icon-wrap\"><i class=\"mpc-icon-part mpc-regular mpc-transition \"><\/i><\/div><\/div><\/div><\/div><div class=\"mpc-timeline-item__wrap mpc-init mpc-parent-hover mpc-tooltip--always\" ><div data-id=\"mpc_timeline_item-696a0ad89d73f17\" class=\"mpc-timeline-item mpc-transition mpc-align--center \"><div class=\"mpc-tl-before\"><\/div><h3 class=\"mpc-timeline-item__heading mpc-transition\">2006<\/h3><div data-id=\"mpc_divider-36a0ad89d73f55\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \" ><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-timeline-item__description\"><p><span style=\"color: #ffffff;\">Certificate for the ETA-VPN 100P device.<\/span><br \/>\n<span style=\"color: #ffffff;\">Development of the ProtLog solution.<\/span><\/p>\n<\/div><\/div><div class=\"mpc-tl-icon\"><div data-id=\"mpc_icon-126a0ad89d73f3a\" class=\"mpc-icon mpc-init mpc-transition mpc-effect-slide-down \"><div class=\"mpc-icon-wrap\"><i class=\"mpc-icon-part mpc-regular mpc-transition \"><\/i><\/div><\/div><\/div><\/div><div class=\"mpc-timeline-item__wrap mpc-init mpc-parent-hover mpc-tooltip--always\" ><div data-id=\"mpc_timeline_item-676a0ad89d74028\" class=\"mpc-timeline-item mpc-transition mpc-align--center \"><div class=\"mpc-tl-before\"><\/div><h3 class=\"mpc-timeline-item__heading mpc-transition\">2005<\/h3><div data-id=\"mpc_divider-26a0ad89d74065\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \" ><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-timeline-item__description\"><p><span style=\"color: #ffffff;\">Incorporation of Enigma in the COMP Capital Group.<\/span><br \/>\n<span style=\"color: #ffffff;\">Start-up of new production lines: CompCrypt encryptor, Eta, VPN.<\/span><br \/>\n<span style=\"color: #ffffff;\">Development of a specialised Signet reader.<\/span><br \/>\n<span style=\"color: #ffffff;\">Implementation for the Polish National Police of the Frejzap software, operating in the KSIP (National Police Information System) and KCIK (National Crime Information Centre) systems.<\/span><br \/>\n<span style=\"color: #ffffff;\">Establishment of Safe Technologies and commencement of the creation of the CenCert Qualified Certification Centre.<\/span><br \/>\n<span style=\"color: #ffffff;\">PEM-HEART and Centaur software update for the needs of NATO, certified by the Internal Security Agency.<\/span><\/p>\n<\/div><\/div><div class=\"mpc-tl-icon\"><div data-id=\"mpc_icon-226a0ad89d74049\" class=\"mpc-icon mpc-init mpc-transition mpc-effect-slide-down \"><div class=\"mpc-icon-wrap\"><i class=\"mpc-icon-part mpc-regular mpc-transition \"><\/i><\/div><\/div><\/div><\/div><div class=\"mpc-timeline-item__wrap mpc-init mpc-parent-hover mpc-tooltip--always\" ><div data-id=\"mpc_timeline_item-186a0ad89d74141\" class=\"mpc-timeline-item mpc-transition mpc-align--center \"><div class=\"mpc-tl-before\"><\/div><h3 class=\"mpc-timeline-item__heading mpc-transition\">2003<\/h3><div data-id=\"mpc_divider-556a0ad89d7417f\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \" ><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-timeline-item__description\"><p><span style=\"color: #ffffff;\">Establishment of the CEPiK (Central Vehicles and Drivers Register) security subsystem &#8211; the first comprehensive implementation of the PKI system, authentication with the use of microprocessor cards, transmission protection, connected to the network security system.<\/span><br \/>\n<span style=\"color: #ffffff;\">Development of a new version of the Delta encryptor.<\/span><br \/>\n<span style=\"color: #ffffff;\">Creation of subsequent software products, including:<\/span><br \/>\n<span style=\"color: #ffffff;\">middleware for Encard Centaur SU<\/span><br \/>\n<span style=\"color: #ffffff;\">microprocessor cards<\/span><br \/>\n<span style=\"color: #ffffff;\">eGINA<\/span><\/p>\n<\/div><\/div><div class=\"mpc-tl-icon\"><div data-id=\"mpc_icon-476a0ad89d74163\" class=\"mpc-icon mpc-init mpc-transition mpc-effect-slide-down \"><div class=\"mpc-icon-wrap\"><i class=\"mpc-icon-part mpc-regular mpc-transition \"><\/i><\/div><\/div><\/div><\/div><div class=\"mpc-timeline-item__wrap mpc-init mpc-parent-hover mpc-tooltip--always\" ><div data-id=\"mpc_timeline_item-536a0ad89d74266\" class=\"mpc-timeline-item mpc-transition mpc-align--center \"><div class=\"mpc-tl-before\"><\/div><h3 class=\"mpc-timeline-item__heading mpc-transition\">2002<\/h3><div data-id=\"mpc_divider-156a0ad89d742b6\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \" ><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-timeline-item__description\"><p><span style=\"color: #ffffff;\">Development of the PEM-HEART 3.5 software fully consistent with the Act on Electronic Signature.<\/span><\/p>\n<\/div><\/div><div class=\"mpc-tl-icon\"><div data-id=\"mpc_icon-956a0ad89d74294\" class=\"mpc-icon mpc-init mpc-transition mpc-effect-slide-down \"><div class=\"mpc-icon-wrap\"><i class=\"mpc-icon-part mpc-regular mpc-transition \"><\/i><\/div><\/div><\/div><\/div><div class=\"mpc-timeline-item__wrap mpc-init mpc-parent-hover mpc-tooltip--always\" ><div data-id=\"mpc_timeline_item-756a0ad89d74399\" class=\"mpc-timeline-item mpc-transition mpc-align--center \"><div class=\"mpc-tl-before\"><\/div><h3 class=\"mpc-timeline-item__heading mpc-transition\">2001<\/h3><div data-id=\"mpc_divider-146a0ad89d743d7\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \" ><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-timeline-item__description\"><p><span style=\"color: #ffffff;\">Certificate of the Office of State Protection for the PEM-HEART 3.0 software package up to the levels \u201cRestricted\u201d, \u201cConfidential\u201d and \u201cSecret\u201d.<\/span><\/p>\n<\/div><\/div><div class=\"mpc-tl-icon\"><div data-id=\"mpc_icon-236a0ad89d743bb\" class=\"mpc-icon mpc-init mpc-transition mpc-effect-slide-down \"><div class=\"mpc-icon-wrap\"><i class=\"mpc-icon-part mpc-regular mpc-transition \"><\/i><\/div><\/div><\/div><\/div><div class=\"mpc-timeline-item__wrap mpc-init mpc-parent-hover mpc-tooltip--always\" ><div data-id=\"mpc_timeline_item-316a0ad89d744a9\" class=\"mpc-timeline-item mpc-transition mpc-align--center \"><div class=\"mpc-tl-before\"><\/div><h3 class=\"mpc-timeline-item__heading mpc-transition\">2000<\/h3><div data-id=\"mpc_divider-926a0ad89d744e6\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \" ><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-timeline-item__description\"><p><span style=\"color: #ffffff;\">Establishment of M2Net.<\/span><\/p>\n<\/div><\/div><div class=\"mpc-tl-icon\"><div data-id=\"mpc_icon-236a0ad89d744cb\" class=\"mpc-icon mpc-init mpc-transition mpc-effect-slide-down \"><div class=\"mpc-icon-wrap\"><i class=\"mpc-icon-part mpc-regular mpc-transition \"><\/i><\/div><\/div><\/div><\/div><div class=\"mpc-timeline-item__wrap mpc-init mpc-parent-hover mpc-tooltip--always\" ><div data-id=\"mpc_timeline_item-496a0ad89d745b4\" class=\"mpc-timeline-item mpc-transition mpc-align--center \"><div class=\"mpc-tl-before\"><\/div><h3 class=\"mpc-timeline-item__heading mpc-transition\">1999<\/h3><div data-id=\"mpc_divider-726a0ad89d74605\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \" ><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-timeline-item__description\"><p><span style=\"color: #ffffff;\">Establishment of Pacomp as a design and production base for encryption devices.<\/span><br \/>\n<span style=\"color: #ffffff;\">Development of four lines of CompCrypt cryptographic products: Alfa, Gamma, Ro, Delta, which obtained certificates issued by the Office of State Protection up to the level \u201cTop Secret\u201d (Comp and Pacomp cooperation 1999-2002).<\/span><br \/>\n<span style=\"color: #ffffff;\">Adjustment of the CENTAUR and PEM-HEART software to cooperate with HSM CompCrypt Delta devices.<\/span><br \/>\n<span style=\"color: #ffffff;\">Development of cryptographic libraries implemented in the environment of CompCrypt Delta devices and subject to the process of certification by the Office of State Protection together with the device.<\/span><\/p>\n<\/div><\/div><div class=\"mpc-tl-icon\"><div data-id=\"mpc_icon-996a0ad89d745d6\" class=\"mpc-icon mpc-init mpc-transition mpc-effect-slide-down \"><div class=\"mpc-icon-wrap\"><i class=\"mpc-icon-part mpc-regular mpc-transition \"><\/i><\/div><\/div><\/div><\/div><div class=\"mpc-timeline-item__wrap mpc-init mpc-parent-hover mpc-tooltip--always\" ><div data-id=\"mpc_timeline_item-536a0ad89d746e8\" class=\"mpc-timeline-item mpc-transition mpc-align--center \"><div class=\"mpc-tl-before\"><\/div><h3 class=\"mpc-timeline-item__heading mpc-transition\">1998<\/h3><div data-id=\"mpc_divider-746a0ad89d74726\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \" ><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-timeline-item__description\"><p><span style=\"color: #ffffff;\">Development works in cryptography for the Office of State Protection.<\/span><\/p>\n<\/div><\/div><div class=\"mpc-tl-icon\"><div data-id=\"mpc_icon-276a0ad89d7470b\" class=\"mpc-icon mpc-init mpc-transition mpc-effect-slide-down \"><div class=\"mpc-icon-wrap\"><i class=\"mpc-icon-part mpc-regular mpc-transition \"><\/i><\/div><\/div><\/div><\/div><div class=\"mpc-timeline-item__wrap mpc-init mpc-parent-hover mpc-tooltip--always\" ><div data-id=\"mpc_timeline_item-706a0ad89d74810\" class=\"mpc-timeline-item mpc-transition mpc-align--center \"><div class=\"mpc-tl-before\"><\/div><div data-id=\"mpc_divider-566a0ad89d74852\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \" ><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><h3 class=\"mpc-timeline-item__heading mpc-transition\">1997<\/h3><div class=\"mpc-timeline-item__description\"><p><span style=\"color: #ffffff;\">First edition of the ongoing ENIGMA National Cryptographic Conference.<\/span><\/p>\n<\/div><\/div><div class=\"mpc-tl-icon\"><div data-id=\"mpc_icon-456a0ad89d74837\" class=\"mpc-icon mpc-init mpc-transition mpc-effect-none \"><div class=\"mpc-icon-wrap\"><i class=\"mpc-icon-part mpc-regular mpc-transition \"><\/i><\/div><\/div><\/div><\/div><div class=\"mpc-timeline-item__wrap mpc-init mpc-parent-hover mpc-tooltip--always\" ><div data-id=\"mpc_timeline_item-536a0ad89d7493d\" class=\"mpc-timeline-item mpc-transition mpc-align--center \"><div class=\"mpc-tl-before\"><\/div><div data-id=\"mpc_divider-936a0ad89d7497c\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \" ><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><h3 class=\"mpc-timeline-item__heading mpc-transition\">1996<\/h3><div class=\"mpc-timeline-item__description\"><p><span style=\"color: #ffffff;\">Development and implementation of the NBP-HEART software in the interbank large-value settlement system in the National Bank of Poland.<\/span><\/p>\n<\/div><\/div><div class=\"mpc-tl-icon\"><div data-id=\"mpc_icon-836a0ad89d74961\" class=\"mpc-icon mpc-init mpc-transition mpc-effect-none \"><div class=\"mpc-icon-wrap\"><i class=\"mpc-icon-part mpc-regular mpc-transition \"><\/i><\/div><\/div><\/div><\/div><div class=\"mpc-timeline-item__wrap mpc-init mpc-parent-hover mpc-tooltip--always\" ><div data-id=\"mpc_timeline_item-556a0ad89d74a5e\" class=\"mpc-timeline-item mpc-transition mpc-align--center \"><div class=\"mpc-tl-before\"><\/div><h3 class=\"mpc-timeline-item__heading mpc-transition\">1995<\/h3><div data-id=\"mpc_divider-226a0ad89d74a9c\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \" ><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-timeline-item__description\"><p><span style=\"color: #ffffff;\">Change of the company\u2019s legal status into Enigma Information Security Systems Sp. z o.o.<\/span><\/p>\n<\/div><\/div><div class=\"mpc-tl-icon\"><div data-id=\"mpc_icon-86a0ad89d74a81\" class=\"mpc-icon mpc-init mpc-transition mpc-effect-none \"><div class=\"mpc-icon-wrap\"><i class=\"mpc-icon-part mpc-regular mpc-transition \"><\/i><\/div><\/div><\/div><\/div><div class=\"mpc-timeline-item__wrap mpc-init mpc-parent-hover mpc-tooltip--always\" ><div data-id=\"mpc_timeline_item-436a0ad89d74b7e\" class=\"mpc-timeline-item mpc-transition mpc-align--center \"><div class=\"mpc-tl-before\"><\/div><h3 class=\"mpc-timeline-item__heading mpc-transition\">1994<\/h3><div data-id=\"mpc_divider-596a0ad89d74bbe\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \" ><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-timeline-item__description\"><p><span style=\"color: #ffffff;\">Implementation of the first secure e-mail system for NASK.<\/span><\/p>\n<\/div><\/div><div class=\"mpc-tl-icon\"><div data-id=\"mpc_icon-526a0ad89d74ba3\" class=\"mpc-icon mpc-init mpc-transition mpc-effect-none \"><div class=\"mpc-icon-wrap\"><i class=\"mpc-icon-part mpc-regular mpc-transition \"><\/i><\/div><\/div><\/div><\/div><div class=\"mpc-timeline-item__wrap mpc-init mpc-parent-hover mpc-tooltip--always\" ><div data-id=\"mpc_timeline_item-386a0ad89d74ca0\" class=\"mpc-timeline-item mpc-transition mpc-align--center \"><div class=\"mpc-tl-before\"><\/div><h3 class=\"mpc-timeline-item__heading mpc-transition\">1993<\/h3><div data-id=\"mpc_divider-756a0ad89d74ce4\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \" ><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-timeline-item__description\"><p><span style=\"color: #ffffff;\">Establishment of Enigma Information Security Systems s.c.<\/span><\/p>\n<\/div><\/div><div class=\"mpc-tl-icon\"><div data-id=\"mpc_icon-346a0ad89d74cc4\" class=\"mpc-icon mpc-init mpc-transition mpc-effect-none \"><div class=\"mpc-icon-wrap\"><i class=\"mpc-icon-part mpc-regular mpc-transition \"><\/i><\/div><\/div><\/div><\/div><\/div>[mk_padding_divider size=&#8221;50&#8243;][\/vc_column][\/mk_page_section]\n","protected":false},"excerpt":{"rendered":"<p>[mk_page_section bg_image=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/11\/grafika-pod-histori.jpg&#8221; attachment=&#8221;fixed&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; padding_top=&#8221;0&#8243; padding_bottom=&#8221;0&#8243; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_fancy_title color=&#8221;#0099cc&#8221; size=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;50&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221; align=&#8221;center&#8221;]HISTORY &#8211; RESEARCH AND DEVELOPMENT[\/mk_fancy_title][vc_column_text disable_pattern=&#8221;false&#8221; align=&#8221;center&#8221; margin_bottom=&#8221;50&#8243;]Enigma Information Security Systems &#8211; as a high-technology company pays enormous attention to research, constant development and enhancement of offered solutions. Research works outpace market needs, increase Enigma\u2019s competitive advantage and ensure<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":14,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>History - Enigma<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.enigma.com.pl\/en\/history\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"History - Enigma\" \/>\n<meta property=\"og:description\" content=\"[mk_page_section bg_image=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/11\/grafika-pod-histori.jpg&#8221; attachment=&#8221;fixed&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; padding_top=&#8221;0&#8243; padding_bottom=&#8221;0&#8243; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_fancy_title color=&#8221;#0099cc&#8221; size=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;50&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221; align=&#8221;center&#8221;]HISTORY &#8211; RESEARCH AND DEVELOPMENT[\/mk_fancy_title][vc_column_text disable_pattern=&#8221;false&#8221; align=&#8221;center&#8221; margin_bottom=&#8221;50&#8243;]Enigma Information Security Systems &#8211; as a high-technology company pays enormous attention to research, constant development and enhancement of offered solutions. Research works outpace market needs, increase Enigma\u2019s competitive advantage and ensure\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.enigma.com.pl\/en\/history\/\" \/>\n<meta property=\"og:site_name\" content=\"Enigma\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-17T10:58:25+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"16 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.enigma.com.pl\/en\/history\/\",\"url\":\"https:\/\/www.enigma.com.pl\/en\/history\/\",\"name\":\"History - Enigma\",\"isPartOf\":{\"@id\":\"https:\/\/www.enigma.com.pl\/en\/#website\"},\"datePublished\":\"2017-01-30T12:19:38+00:00\",\"dateModified\":\"2024-09-17T10:58:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.enigma.com.pl\/en\/history\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.enigma.com.pl\/en\/history\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.enigma.com.pl\/en\/history\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/www.enigma.com.pl\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"History\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.enigma.com.pl\/en\/#website\",\"url\":\"https:\/\/www.enigma.com.pl\/en\/\",\"name\":\"Enigma\",\"description\":\"Information Security Systems\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.enigma.com.pl\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"History - Enigma","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.enigma.com.pl\/en\/history\/","og_locale":"en_US","og_type":"article","og_title":"History - Enigma","og_description":"[mk_page_section bg_image=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/11\/grafika-pod-histori.jpg&#8221; attachment=&#8221;fixed&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; padding_top=&#8221;0&#8243; padding_bottom=&#8221;0&#8243; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_fancy_title color=&#8221;#0099cc&#8221; size=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;50&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221; align=&#8221;center&#8221;]HISTORY &#8211; RESEARCH AND DEVELOPMENT[\/mk_fancy_title][vc_column_text disable_pattern=&#8221;false&#8221; align=&#8221;center&#8221; margin_bottom=&#8221;50&#8243;]Enigma Information Security Systems &#8211; as a high-technology company pays enormous attention to research, constant development and enhancement of offered solutions. Research works outpace market needs, increase Enigma\u2019s competitive advantage and ensure","og_url":"https:\/\/www.enigma.com.pl\/en\/history\/","og_site_name":"Enigma","article_modified_time":"2024-09-17T10:58:25+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"16 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.enigma.com.pl\/en\/history\/","url":"https:\/\/www.enigma.com.pl\/en\/history\/","name":"History - Enigma","isPartOf":{"@id":"https:\/\/www.enigma.com.pl\/en\/#website"},"datePublished":"2017-01-30T12:19:38+00:00","dateModified":"2024-09-17T10:58:25+00:00","breadcrumb":{"@id":"https:\/\/www.enigma.com.pl\/en\/history\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.enigma.com.pl\/en\/history\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.enigma.com.pl\/en\/history\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/www.enigma.com.pl\/en\/"},{"@type":"ListItem","position":2,"name":"History"}]},{"@type":"WebSite","@id":"https:\/\/www.enigma.com.pl\/en\/#website","url":"https:\/\/www.enigma.com.pl\/en\/","name":"Enigma","description":"Information Security Systems","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.enigma.com.pl\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/pages\/2063"}],"collection":[{"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/comments?post=2063"}],"version-history":[{"count":12,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/pages\/2063\/revisions"}],"predecessor-version":[{"id":7187,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/pages\/2063\/revisions\/7187"}],"wp:attachment":[{"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/media?parent=2063"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}