{"id":2082,"date":"2017-01-30T14:26:12","date_gmt":"2017-01-30T13:26:12","guid":{"rendered":"https:\/\/www.enigma.com.pl\/en\/?page_id=2082"},"modified":"2022-03-23T10:55:29","modified_gmt":"2022-03-23T09:55:29","slug":"classified-information-protection","status":"publish","type":"page","link":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/classified-information-protection\/","title":{"rendered":"Classified information protection"},"content":{"rendered":"[mk_page_section bg_image=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/header-enigma-products-4.jpg&#8221; bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; enable_3d=&#8221;true&#8221; speed_factor=&#8221;0.6&#8243; min_height=&#8221;250&#8243; padding_top=&#8221;0&#8243; padding_bottom=&#8221;0&#8243; top_shape_color=&#8221;#ffffff&#8221; has_bottom_shape_divider=&#8221;true&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][\/vc_column][\/mk_page_section][mk_page_section bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; padding_top=&#8221;40&#8243; padding_bottom=&#8221;70&#8243; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_style=&#8221;folded-bottom&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;50&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;30&#8243; size_tablet=&#8221;30&#8243; size_phone=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]CLASSIFIED INFORMATION PROTECTION[\/mk_fancy_title][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;16&#8243; txt_transform=&#8221;none&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;20&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]\n<p style=\"text-align: justify;\">As part of the activity supporting the protection of classified information according to the Act of 5 August 2010 on the Protection of Classified Information, we create devices, systems and solutions with various confidentiality clauses. Moreover, we specialise in counselling, trainings and assistance in the processes of appointing and creating divisions of classified information protection in the companies.<\/p>\n[\/mk_fancy_title][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1474020673953{padding-top: 3% !important;}&#8221;][vc_column_inner width=&#8221;1\/3&#8243;]<a href=\"\/#poufne\" target=\"\" title=\"Link\"  data-id=\"mpc_button-5369d20ad3d0e8d\" class=\"mpc-button mpc-init mpc-transition mpc-animation mpc-typography--default mpc-display--block \"  data-animation-in=\"transition.perspectiveUpIn||1000||500||100\"><div class=\"mpc-button__content mpc-effect-type--none mpc-effect-side--none\"><span class=\"mpc-button__title mpc-transition\">CLASSIFIED SYSTEMS ``CONFIDENTIAL`` CLAUSE<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--slide mpc-effect-side--top\"><\/div><\/a>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<a href=\"\/#zastrzezone\" target=\"\" title=\"Link\"  data-id=\"mpc_button-1569d20ad3d0f1a\" class=\"mpc-button mpc-init mpc-transition mpc-animation mpc-typography--default mpc-display--block \"  data-animation-in=\"transition.perspectiveUpIn||1000||500||100\"><div class=\"mpc-button__content mpc-effect-type--none mpc-effect-side--none\"><span class=\"mpc-button__title mpc-transition\">CLASSIFIED SYSTEMS ``RESTRICTED`` CLAUSE<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--slide mpc-effect-side--top\"><\/div><\/a>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<a href=\"\/#systemy-dedykowane\" target=\"\" title=\"Link\"  data-id=\"mpc_button-2769d20ad3d0f80\" class=\"mpc-button mpc-init mpc-transition mpc-animation mpc-typography--default mpc-display--block \"  data-animation-in=\"transition.perspectiveUpIn||1000||500||100\"><div class=\"mpc-button__content mpc-effect-type--none mpc-effect-side--none\"><span class=\"mpc-button__title mpc-transition\">DEDICATED SYSTEMS &amp; SERVICES<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--slide mpc-effect-side--top\"><\/div><\/a>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/mk_page_section][mk_page_section bg_color=&#8221;#ffffff&#8221; bg_position=&#8221;center top&#8221; bg_repeat=&#8221;repeat-x&#8221; enable_3d=&#8221;true&#8221; speed_factor=&#8221;1.3&#8243; video_opacity=&#8221;0.3&#8243; padding_top=&#8221;80&#8243; top_shape_style=&#8221;jagged-rounded-top&#8221; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_color=&#8221;#ffffff&#8221; section_id=&#8221;poufne&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_padding_divider size=&#8221;50&#8243;][mk_fancy_title size=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]CLASSIFIED SYSTEMS &#8220;CONFIDENTIAL&#8221; CLAUSE[\/mk_fancy_title][mk_padding_divider][vc_tabs][vc_tab title=&#8221;CompCrypt ETA-MIL 10P&#8221; tab_id=&#8221;1473857226-1-35&#8243;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]\n<p style=\"text-align: justify;\"><strong>IP encryption devices<\/strong><br \/>\nClient devices for the encryption of information in the IP networks and the creation of separated Virtual Private Networks (VPN). It allows to add single workstations or IP secure communication systems based on the complex solution CompCrypt ETA-MIL. Devices may be used both in military and civil systems.<br \/>\nEncryption devices are made in three versions:<\/p>\n<ul>\n<li>ETA-MIL 10P &#8211; to be built in computer devices and servers,<\/li>\n<li>Free-standing ETA-MIL 10P EX,<\/li>\n<li>Special version: ETA-MIL 10P N7 meeting the requirements of the Defence Standard \u2013 NO-06-A103.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<strong>Device properties:<\/strong><\/p>\n<ul>\n<li>Certificate for the protection of information with the following clauses: CONFIDENTIAL, NATO CONFIDENTIAL and CONFIDENTIEL EU,<\/li>\n<li>The tempest housing meeting the requirements of the SDIP-27 A standard,<\/li>\n<li>Authentication of users based on PKI and microchip cards,<\/li>\n<li>Advanced network functions: static routing, dynamic routing, translation of IP addresses (NAT Traversal), built-in firewall, Quality of Service (QoS), High Availability,<\/li>\n<li>AES public encryption algorithm,<\/li>\n<li>Automatic encryption of sessions without participation of a user,<\/li>\n<li>Anti-penetration security of a device according to FIPS 140-3,<\/li>\n<li>Possibility to configure many redundant management and audit networks,<\/li>\n<li>VPN tunnels &#8211; 100,<\/li>\n<li>Total speed \u2013 up to 20 Mbit\/s,<\/li>\n<li>Capacity up to 30000 pps.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_column_text]<strong>Technical parameters<\/strong>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243;][mk_image heading_title=&#8221;ETA-MIL 10P &#8211; TO BE BUILT IN&#8221; src=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/eta-mil_10p.jpg&#8221; image_size=&#8221;medium&#8221; lightbox=&#8221;true&#8221; align=&#8221;center&#8221; margin_bottom=&#8221;0&#8243; animation=&#8221;fade-in&#8221;][vc_column_text]\n<ul>\n<li>Communication interfaces: 2 x Ethernet 10\/100 Base-T<\/li>\n<li>Management interfaces: 2 x RS-232<\/li>\n<li>Supply: external, stabilised +12 V,<\/li>\n<li>Sizes (width, height, depth): 150 x 41.5 x 197 mm<\/li>\n<li>Weight: 1.5 kg<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][mk_image heading_title=&#8221;ETA-MIL 10P EX &#8211; FREE-STANDING VERSION&#8221; src=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/eta_mil_zew_10P_ex.jpg&#8221; image_size=&#8221;medium&#8221; lightbox=&#8221;true&#8221; align=&#8221;center&#8221; margin_bottom=&#8221;0&#8243; animation=&#8221;fade-in&#8221;][vc_column_text]\n<ul>\n<li>Communication interfaces: \u2013 2 x Ethernet 100 Base-FX, ST connection,<\/li>\n<li>MMF light pipe 50\/125, 62.5\/125 mm<\/li>\n<li>Management interfaces: 2 x RS-232<\/li>\n<li>Supply: external switch mode power supply<\/li>\n<li>Sizes (width, height, depth): 167.5 x 93.5 x 253 mm<\/li>\n<li>Weight: 3.25 kg<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][mk_image heading_title=&#8221;ETA-MIL 10P N7 VERSION&#8221; src=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/ETA-MIL-10P-N7.jpg&#8221; image_size=&#8221;medium&#8221; lightbox=&#8221;true&#8221; align=&#8221;center&#8221; margin_bottom=&#8221;0&#8243; animation=&#8221;fade-in&#8221;][vc_column_text]\n<ul>\n<li>Consistent with the environmental requirements of the NO-06-A103 standard for devices within group N7,<\/li>\n<li>Strength at a temperature between -40\u00b0C and +60\u00b0C,<\/li>\n<li>Range of permissible operating temperatures between -30\u00b0C and +50\u00b0C,<\/li>\n<li>Sizes (width, height, depth): 482.5 x 88 x 300 mm,<\/li>\n<li>Weight: approx. 15 kg.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_column_text css=&#8221;.vc_custom_1648029305485{margin-bottom: 0px !important;}&#8221;]\n[\/vc_column_text][\/vc_tab][vc_tab title=&#8221;CompCrypt DELTA 1&#8243; tab_id=&#8221;1473859711988-2-2&#8243;][vc_row_inner][vc_column_inner width=&#8221;2\/3&#8243;][vc_column_text]\n<p style=\"text-align: justify;\"><strong>HSM device<\/strong><br \/>\nCompCrypt Delta 1 is a device intended for the safe storage and use of the private key of the Certification Office in the PKI infrastructure. A device is intended to be used in extensive IT networks with a hierarchically complex and territorially dispersed structure. A device increases the effectiveness and safety of information exchange in classified networks, for example in government administration systems, bank and telecommunications systems.<\/p>\n<p>A device has a valid certificate for the processing of classified information with the &#8220;confidential&#8221; clause until 30 August 2018.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][mk_image heading_title=&#8221;DELTA 1&#8243; src=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/delta-1.jpg&#8221; image_size=&#8221;medium&#8221; lightbox=&#8221;true&#8221; align=&#8221;center&#8221; margin_bottom=&#8221;0&#8243; animation=&#8221;fade-in&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tab][vc_tab title=&#8221;CompCrypt ETA-VPN 100P&#8221; tab_id=&#8221;1473859928105-2-9&#8243;][vc_row_inner][vc_column_inner width=&#8221;2\/3&#8243;][vc_column_text]\n<p style=\"text-align: justify;\"><strong>IP encryption device<\/strong><br \/>\nCompCrypt ETA-VPN 100P makes it possible to create safe separated Virtual Private Networks (VPN). The CompCrypt ETA VPN 100P hardware encryption device ensures safe communication between workstations, systems or local networks (LAN). This solution is mainly designed for government administration units that process and send information between their locations according to the Act on the Protection of Classified Information.<\/p>\n<p>A device has a valid certificate for the processing of classified information with the &#8220;confidential&#8221; clause until 30 November 2019.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][mk_image heading_title=&#8221;ETA-VPN 100P&#8221; src=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/ETA-VPN.jpg&#8221; image_size=&#8221;medium&#8221; lightbox=&#8221;true&#8221; align=&#8221;center&#8221; margin_bottom=&#8221;0&#8243; animation=&#8221;fade-in&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tab][\/vc_tabs][mk_padding_divider size=&#8221;20&#8243;][\/vc_column][\/mk_page_section][mk_page_section bg_image=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/header-enigma-products-4.jpg&#8221; bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; enable_3d=&#8221;true&#8221; has_top_shape_divider=&#8221;true&#8221; top_shape_color=&#8221;#ffffff&#8221; has_bottom_shape_divider=&#8221;true&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_padding_divider size=&#8221;200&#8243;][\/vc_column][\/mk_page_section][mk_page_section bg_position=&#8221;center top&#8221; bg_repeat=&#8221;repeat-x&#8221; enable_3d=&#8221;true&#8221; speed_factor=&#8221;1.3&#8243; video_opacity=&#8221;0.3&#8243; padding_top=&#8221;70&#8243; top_shape_style=&#8221;jagged-rounded-top&#8221; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_color=&#8221;#ffffff&#8221; section_id=&#8221;zastrzezone&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_padding_divider size=&#8221;50&#8243;][mk_fancy_title size=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]CLASSIFIED SYSTEMS &#8220;RESTRICTED&#8221; CLAUSE[\/mk_fancy_title][mk_padding_divider][vc_tabs][vc_tab title=&#8221;CompCrypt ETA-MIL 10Z&#8221; tab_id=&#8221;1473857226-1-35&#8243;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]\n<p style=\"text-align: justify;\"><strong>Encryption devices<\/strong><br \/>\nCompCrypt ETA-MIL 10Z is an encryption device intended for the encryption of information in the IP networks by creating safe VPN tunnels between safety zones or separated workstations. A device has a mechanisms of automatic switching depending on the connection capacity. Encryption devices may operate in two various modes: by establishing secure connection between themselves or by establishing interconnections with devices of other producers.<br \/>\nEncryption devices are made in three versions:<\/p>\n<ul>\n<li>ETA-MIL 10Z &#8211; to be built in computer devices and servers<\/li>\n<li>ETA-MIL 10Z EX &#8211; free-standing<\/li>\n<li>ETA-MIL 10Z N7 &#8211; special version meeting the requirements of the Defence Standard \u2013 NO-06-A103.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<strong>Device properties:<\/strong><\/p>\n<ul>\n<li>Certificate of the protection of classified information with the clause RESTRICTED, NATO RESTRICTED, RESTREINT UE\/EU RESTRICTED,<\/li>\n<li>Safe negotiation of keys with the use of elliptical curves (ECDH algorithm),<\/li>\n<li>Advanced network functions: dynamic routing, QoS, Load Balancing, NAT traversal, High Availability,<\/li>\n<li>AES public encryption algorithm,<\/li>\n<li>Automatic encryption of sessions without participation of a user,<\/li>\n<li>Authentication of users based on PKI infrastructure and microchip cards,<\/li>\n<li>Establishing a session according to RFC 2409, RFC 3947,<\/li>\n<li>Encryption of packages according to RFC 4303,<\/li>\n<li>Possibility to compile a VPN tunnel with Cisco ASA and Juniper devices,<\/li>\n<li>Work in the rsa-sig or pre-shared key mode,<\/li>\n<li>Dedicated software for building the HA\/LB cluster,<\/li>\n<li>VPN tunnels &#8211; up to 250,<\/li>\n<li>Total speed &#8211; up to 50 Mbit\/s,<\/li>\n<li>Capacity up to 20k pps.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_column_text]<strong>Technical parameters<\/strong>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243;][mk_image heading_title=&#8221;ETA-MIL 10Z N7 VERSION&#8221; image_size=&#8221;medium&#8221; lightbox=&#8221;true&#8221; align=&#8221;center&#8221; margin_bottom=&#8221;0&#8243; animation=&#8221;fade-in&#8221;][vc_column_text]\n<ul>\n<li>Consistency with the environmental requirements of the NO-06-A103 standard for devices within group N7,<\/li>\n<li>Strength at a temperature between -40\u00b0C and +60\u00b0C,<\/li>\n<li>Range of permissible work temperatures between -30\u00b0C and +50\u00b0C,<\/li>\n<li>Sizes (width, height, depth): 482.5 x 88 x 300 mm,<\/li>\n<li>Weight: approx. 15 kg.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][mk_image heading_title=&#8221;ETA-MIL 10Z &#8211; TO BE BUILT IN&#8221; src=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/eta_mil_10z_int.jpg&#8221; image_size=&#8221;medium&#8221; lightbox=&#8221;true&#8221; align=&#8221;center&#8221; margin_bottom=&#8221;0&#8243; animation=&#8221;fade-in&#8221;][vc_column_text]\n<ul>\n<li>Communication interfaces: 2 x Ethernet 10\/100 Base-T<\/li>\n<li>Management interfaces: 2 x RS-232<\/li>\n<li>Supply: external, stabilised +12 V,<\/li>\n<li>Sizes (width, height, depth): 150 x 41.5 x 197 mm<\/li>\n<li>Weight: 1.5 kg<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][mk_image heading_title=&#8221;ETA-MIL 10Z EX &#8211; FREE-STANDING VERSION&#8221; image_size=&#8221;medium&#8221; lightbox=&#8221;true&#8221; align=&#8221;center&#8221; margin_bottom=&#8221;0&#8243; animation=&#8221;fade-in&#8221;][vc_column_text]\n<ul>\n<li>Communication interfaces: \u2013 2 x Ethernet 100 Base-FX, ST connection,<\/li>\n<li>MMF light pipe 50\/125, 62.5\/125 mm<\/li>\n<li>Management interfaces: 2 x RS-232<\/li>\n<li>Supply: external switch mode power supply<\/li>\n<li>Sizes (width, height, depth): 167.5 x 93.5 x 253 mm<\/li>\n<li>Weight: 3.25 kg<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_column_text css=&#8221;.vc_custom_1648029316476{margin-bottom: 0px !important;}&#8221;]\n[\/vc_column_text][\/vc_tab][vc_tab title=&#8221;CompCrypt ETA-MIL 100Z&#8221; tab_id=&#8221;1473859711988-2-2&#8243;][vc_row_inner][vc_column_inner width=&#8221;2\/3&#8243;][vc_column_text]\n<p style=\"text-align: justify;\">An encryption device with high capacity \u2013 CompCrypt ETA-MIL 100 Z \u2013 has been added to the group of devices encrypting information in the IP networks. This solution with full external infrastructure \u2013 HSM devices, management and audit software \u2013 creates a cryptographic and complete safety platform.<br \/>\nEncryption devices may be used in central system nodes and backbone networks (up to 10Gbit\/s) requiring high capacity. Devices allow to connect networks offering the most sensitive services such as:<\/p>\n<ul>\n<li>video transmissions,<\/li>\n<li>voice transmissions,<\/li>\n<li>replication between Data Centres.<\/li>\n<\/ul>\n<p>A device may be used both in military and civil systems. The structure of an encryption device allows to adapt the transmission medium to the requirements of a recipient FC 10 Gbit\/Etchernet 1\/Gbit.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][mk_image heading_title=&#8221;DELTA 1&#8243; src=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/eta_mil_100z_wersja-internet-png.jpg&#8221; image_size=&#8221;medium&#8221; lightbox=&#8221;true&#8221; align=&#8221;center&#8221; margin_bottom=&#8221;0&#8243; animation=&#8221;fade-in&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<strong>Technical parameters:<\/strong><\/p>\n<ul>\n<li>VPN tunnels: 500.<\/li>\n<li>Capacity up to 6 Gbit\/s, up to 3M pps.<\/li>\n<li>Keyboard built in the front panel.<\/li>\n<\/ul>\n<p>Encryption devices may operate in two various modes:<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>by establishing secure connection between themselves in the so-called national systems,<\/li>\n<li>by establishing interconnections with devices of other producers, in particular with the CISCO ASA and Juniper solutions, due to operation consistent with standards (RFC 2409, RFC 3947, RFC 4303).\n<ul>A device undergoes a process of certification for the protection of classified information with the following clauses: Restricted, NATO Restricted and EU Restricted.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>Device properties:<\/strong><\/p>\n<ul>\n<li>Safe negotiation of keys with the use of elliptical curves (ECDH algorithm).<\/li>\n<li>Advanced network functions: dynamic routing OSPFv2, High Availability, 802.1Q VLAN Trunk.<\/li>\n<li>AES-256 bit public encryption algorithm.<\/li>\n<li>Automatic encryption of sessions without participation of a user.<\/li>\n<li>Authentication of users based on PKI infrastructure\u2122, optionally RSA-2048 or ECP-521).<\/li>\n<li>Establishing a session according to RFC 2409.<\/li>\n<li>Encryption of packages according to RFC 4303.<\/li>\n<li>Possibility to compile a VPN tunnel with the Cisco ASA and Juniper devices.<\/li>\n<li>Authentication of IPsec tunnels based on PKI (RSA\/ECC) or PSK (Pre-shared Keys).<\/li>\n<li>Minimum delay introduced by encryption devices: up to 0.05 ms.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tab][vc_tab title=&#8221;Bezpieczna Poczta Niejawna&#8221; tab_id=&#8221;1473922147825-2-10&#8243;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]\n<p style=\"text-align: justify;\"><strong>System Bezpiecznej Poczty <\/strong>oferowany przez Enigm\u0119 , bazuj\u0105cy na certyfikowanych rozwi\u0105zaniach KryptoMail 3.1 i PEM-HEART 3.015, zapewnia ochron\u0119 poufno\u015bci i autentyczno\u015bci informacji przesy\u0142anych w systemie poczty elektronicznej. Dzi\u0119ki zastosowanym rozwi\u0105zaniom wy\u0142\u0105cznie nadawca i wskazani odbiorcy mog\u0105 odczyta\u0107 tre\u015b\u0107 wiadomo\u015bci. System dzia\u0142a zar\u00f3wno w komputerach stacjonarnych, jak i urz\u0105dzeniach mobilnych (w tym smartfonach) i mo\u017ce by\u0107 wdro\u017cony w organizacji ka\u017cdej wielko\u015bci.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<strong>Korzy\u015bci:<\/strong><\/p>\n<ul>\n<li>potwierdzenie autentyczno\u015bci nadawcy i odbiorcy w korespondencji elektronicznej,<\/li>\n<li>szybki i bezpieczny spos\u00f3b przekazywania wa\u017cnych informacji,<\/li>\n<li>zabezpieczenie przed nieautoryzowanym odczytem i wykorzystaniem,<\/li>\n<li>ochrona przed atakami elektronicznymi i spamem.<\/li>\n<\/ul>\n<p>Oprogramowanie posiada wa\u017cny certyfikat do przetwarzania informacji niejawnych o klauzuli \u201ezastrze\u017cone\u201d do 30.06.2020 r.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_tab][\/vc_tabs][mk_padding_divider size=&#8221;20&#8243;][\/vc_column][\/mk_page_section][mk_page_section bg_image=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/header-enigma-products-4.jpg&#8221; bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; enable_3d=&#8221;true&#8221; has_top_shape_divider=&#8221;true&#8221; top_shape_color=&#8221;#ffffff&#8221; has_bottom_shape_divider=&#8221;true&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_padding_divider size=&#8221;200&#8243;][\/vc_column][\/mk_page_section][mk_page_section bg_position=&#8221;center top&#8221; bg_repeat=&#8221;repeat-x&#8221; enable_3d=&#8221;true&#8221; speed_factor=&#8221;1.3&#8243; video_opacity=&#8221;0.3&#8243; padding_top=&#8221;70&#8243; top_shape_style=&#8221;jagged-rounded-top&#8221; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_color=&#8221;#ffffff&#8221; section_id=&#8221;systemy-dedykowane&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column width=&#8221;1\/2&#8243;][mk_padding_divider size=&#8221;50&#8243;][mk_fancy_title size=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]DEDICATED SYSTEMS[\/mk_fancy_title][mk_padding_divider][vc_column_text]\n<p style=\"text-align: justify;\">Based on the experience gained over twenty-five years of activity and the knowledge of engineering and design personnel resulting from the implementation of hundreds of IT systems, Enigma develops, from the beginning of its activity, a functional and technical design, and prepares solutions meeting customer\u2019s needs.<br \/>\nThe Data Retention System developed for one of telecommunications operators is an example of a system processing classified information with the restricted clause. This system is designed for the retention of billing data used to store and search data on phone calls made. A custom solution (CentaurOne), integrated with the safety solutions and PKI, has been prepared in the system for the third-party technologies. The system has acquired the accreditation of the national security services.<\/p>\n<p><strong>Benefits:<\/strong><\/p>\n<ul>\n<li>standardisation of the method of access to the operator&#8217;s systems,<\/li>\n<li>improvement of work of the operator&#8217;s safety department.<\/li>\n<\/ul>\n[\/vc_column_text][mk_padding_divider size=&#8221;20&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][mk_padding_divider size=&#8221;50&#8243;][mk_fancy_title size=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]DESIGN AND COUNSELLING SERVICES<\/p>\n<h5>IN THE SCOPE OF SAFETY<\/h5>\n[\/mk_fancy_title][mk_padding_divider size=&#8221;10&#8243;][vc_column_text]\n<p style=\"text-align: justify;\">A significant area of the company&#8217;s activity is widely understood counselling, consultations as well as technical and design support in the scope of safety. Enigma possesses many certificates, concessions and permissions of the specialised government agencies and institutions which confirm the fulfilment of the most restrictive requirements in the scope of safety in the civil and military field.<\/p>\n<p><strong>Scope of services:<\/strong><\/p>\n<ul>\n<li>counselling and assistance in the preparation of safety documentation,<\/li>\n<li>counselling and assistance in carrying out the process of risk assessment for the safety of classified information processed in ICT systems,<\/li>\n<li>consultations and technical support in the preparation of rooms for autonomous computer workstations for the processing of classified information and the optimisation of costs of undertakings,<\/li>\n<li>consultations and counselling in the scope of the selection of devices and their installation meeting the requirements of the national security services,<\/li>\n<li>counselling in the scope of physical and technical protection of rooms for systems and ICT networks, as well as the optimisation of costs of the applied protection measures,<\/li>\n<li>consultations and counselling in the scope of the proper selection, purchase and installation of devices intended for the processing of classified information in accordance with the recommendations of the national security services,<\/li>\n<li>preparation of a company for the ICT system safety audit.<\/li>\n<\/ul>\n[\/vc_column_text][mk_padding_divider size=&#8221;20&#8243;][\/vc_column][\/mk_page_section]\n","protected":false},"excerpt":{"rendered":"<p>[mk_page_section bg_image=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/header-enigma-products-4.jpg&#8221; bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; enable_3d=&#8221;true&#8221; speed_factor=&#8221;0.6&#8243; min_height=&#8221;250&#8243; padding_top=&#8221;0&#8243; padding_bottom=&#8221;0&#8243; top_shape_color=&#8221;#ffffff&#8221; has_bottom_shape_divider=&#8221;true&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][\/vc_column][\/mk_page_section][mk_page_section bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; padding_top=&#8221;40&#8243; padding_bottom=&#8221;70&#8243; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_style=&#8221;folded-bottom&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;50&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;30&#8243; size_tablet=&#8221;30&#8243; size_phone=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]CLASSIFIED INFORMATION PROTECTION[\/mk_fancy_title][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;16&#8243; txt_transform=&#8221;none&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;20&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;] As part of the activity supporting the<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1938,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Classified information protection - Enigma<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/classified-information-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Classified information protection - Enigma\" \/>\n<meta property=\"og:description\" content=\"[mk_page_section bg_image=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/header-enigma-products-4.jpg&#8221; bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; enable_3d=&#8221;true&#8221; speed_factor=&#8221;0.6&#8243; min_height=&#8221;250&#8243; padding_top=&#8221;0&#8243; padding_bottom=&#8221;0&#8243; top_shape_color=&#8221;#ffffff&#8221; has_bottom_shape_divider=&#8221;true&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][\/vc_column][\/mk_page_section][mk_page_section bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; padding_top=&#8221;40&#8243; padding_bottom=&#8221;70&#8243; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_style=&#8221;folded-bottom&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;50&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;30&#8243; size_tablet=&#8221;30&#8243; size_phone=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]CLASSIFIED INFORMATION PROTECTION[\/mk_fancy_title][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;16&#8243; txt_transform=&#8221;none&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;20&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;] As part of the activity supporting the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/classified-information-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"Enigma\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-23T09:55:29+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/classified-information-protection\/\",\"url\":\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/classified-information-protection\/\",\"name\":\"Classified information protection - Enigma\",\"isPartOf\":{\"@id\":\"https:\/\/www.enigma.com.pl\/en\/#website\"},\"datePublished\":\"2017-01-30T13:26:12+00:00\",\"dateModified\":\"2022-03-23T09:55:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/classified-information-protection\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/classified-information-protection\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/classified-information-protection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/www.enigma.com.pl\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Products and solutions\",\"item\":\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Classified information protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.enigma.com.pl\/en\/#website\",\"url\":\"https:\/\/www.enigma.com.pl\/en\/\",\"name\":\"Enigma\",\"description\":\"Information Security Systems\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.enigma.com.pl\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Classified information protection - Enigma","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/classified-information-protection\/","og_locale":"en_US","og_type":"article","og_title":"Classified information protection - Enigma","og_description":"[mk_page_section bg_image=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/header-enigma-products-4.jpg&#8221; bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; enable_3d=&#8221;true&#8221; speed_factor=&#8221;0.6&#8243; min_height=&#8221;250&#8243; padding_top=&#8221;0&#8243; padding_bottom=&#8221;0&#8243; top_shape_color=&#8221;#ffffff&#8221; has_bottom_shape_divider=&#8221;true&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][\/vc_column][\/mk_page_section][mk_page_section bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; padding_top=&#8221;40&#8243; padding_bottom=&#8221;70&#8243; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_style=&#8221;folded-bottom&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;50&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;30&#8243; size_tablet=&#8221;30&#8243; size_phone=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]CLASSIFIED INFORMATION PROTECTION[\/mk_fancy_title][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;16&#8243; txt_transform=&#8221;none&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;20&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;] As part of the activity supporting the","og_url":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/classified-information-protection\/","og_site_name":"Enigma","article_modified_time":"2022-03-23T09:55:29+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/classified-information-protection\/","url":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/classified-information-protection\/","name":"Classified information protection - Enigma","isPartOf":{"@id":"https:\/\/www.enigma.com.pl\/en\/#website"},"datePublished":"2017-01-30T13:26:12+00:00","dateModified":"2022-03-23T09:55:29+00:00","breadcrumb":{"@id":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/classified-information-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/classified-information-protection\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/classified-information-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/www.enigma.com.pl\/en\/"},{"@type":"ListItem","position":2,"name":"Products and solutions","item":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/"},{"@type":"ListItem","position":3,"name":"Classified information protection"}]},{"@type":"WebSite","@id":"https:\/\/www.enigma.com.pl\/en\/#website","url":"https:\/\/www.enigma.com.pl\/en\/","name":"Enigma","description":"Information Security Systems","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.enigma.com.pl\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/pages\/2082"}],"collection":[{"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/comments?post=2082"}],"version-history":[{"count":6,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/pages\/2082\/revisions"}],"predecessor-version":[{"id":4790,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/pages\/2082\/revisions\/4790"}],"up":[{"embeddable":true,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/pages\/1938"}],"wp:attachment":[{"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/media?parent=2082"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}