{"id":2123,"date":"2017-02-09T14:48:55","date_gmt":"2017-02-09T13:48:55","guid":{"rendered":"https:\/\/www.enigma.com.pl\/en\/?page_id=2123"},"modified":"2017-02-09T15:00:43","modified_gmt":"2017-02-09T14:00:43","slug":"mobile-security","status":"publish","type":"page","link":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/mobile-security\/","title":{"rendered":"Mobile security"},"content":{"rendered":"[mk_page_section bg_image=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/header-enigma-products-2-1.jpg&#8221; bg_position=&#8221;center bottom&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; enable_3d=&#8221;true&#8221; speed_factor=&#8221;0.6&#8243; min_height=&#8221;250&#8243; padding_top=&#8221;0&#8243; padding_bottom=&#8221;0&#8243; top_shape_color=&#8221;#ffffff&#8221; has_bottom_shape_divider=&#8221;true&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][\/vc_column][\/mk_page_section][mk_page_section bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; padding_top=&#8221;40&#8243; padding_bottom=&#8221;70&#8243; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_style=&#8221;folded-bottom&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;50&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;30&#8243; size_tablet=&#8221;30&#8243; size_phone=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]MOBILE SECURITY[\/mk_fancy_title][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;16&#8243; txt_transform=&#8221;none&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;20&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]\n<p style=\"text-align: justify;\">In the days when access to mobile services surrounds us, the full safety of information sent with the use of such services becomes more and more significant. Today, laptops, tablets and mobile phones are tools, by means of which we make payments, take out loans, use medical services or company documents. In each of the above-mentioned situation we use sensitive data, the leakage of which may have serious consequences &#8211; both in the context of a specific person and the whole organisations. Therefore, the Enigma&#8217;s portfolio includes products ensuring mobile safety &#8211; allowing to take advantage of modern technologies at each place without fear.<\/p>\n[\/mk_fancy_title][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243;]<a href=\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/mobile-security\/#notebook\" target=\"\" title=\"Link\"  data-id=\"mpc_button-9269d585c352b2f\" class=\"mpc-button mpc-init mpc-transition mpc-animation mpc-typography--default mpc-display--block \"  data-animation-in=\"transition.perspectiveUpIn||1000||500||100\"><div class=\"mpc-button__content mpc-effect-type--none mpc-effect-side--none\"><span class=\"mpc-button__title mpc-transition\">SAFE NOTEBOOK<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--slide mpc-effect-side--top\"><\/div><\/a>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<a href=\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/mobile-security\/#uwierzytelnianie\" target=\"\" title=\"Link\"  data-id=\"mpc_button-4769d585c352bc6\" class=\"mpc-button mpc-init mpc-transition mpc-animation mpc-typography--default mpc-display--block \"  data-animation-in=\"transition.perspectiveUpIn||1000||500||100\"><div class=\"mpc-button__content mpc-effect-type--none mpc-effect-side--none\"><span class=\"mpc-button__title mpc-transition\">APTO \u2013 TWO-CHANNEL AUTHENTICATION SYSTEM<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--slide mpc-effect-side--top\"><\/div><\/a>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<a href=\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/mobile-security\/#egina\" target=\"\" title=\"Link\"  data-id=\"mpc_button-5269d585c352c34\" class=\"mpc-button mpc-init mpc-transition mpc-animation mpc-typography--default mpc-display--block \"  data-animation-in=\"transition.perspectiveUpIn||1000||500||100\"><div class=\"mpc-button__content mpc-effect-type--none mpc-effect-side--none\"><span class=\"mpc-button__title mpc-transition\">EGINA MOBILE \u2013 LOCAL MOBILE AUTHENTICATION SYSTEM<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--slide mpc-effect-side--top\"><\/div><\/a>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/mk_page_section][mk_page_section bg_color=&#8221;#ffffff&#8221; bg_position=&#8221;center top&#8221; bg_repeat=&#8221;repeat-x&#8221; enable_3d=&#8221;true&#8221; speed_factor=&#8221;1.3&#8243; video_loop=&#8221;false&#8221; video_opacity=&#8221;0.3&#8243; padding_top=&#8221;80&#8243; top_shape_style=&#8221;jagged-rounded-top&#8221; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_color=&#8221;#ffffff&#8221; section_id=&#8221;notebook&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_padding_divider size=&#8221;50&#8243;][mk_fancy_title size=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]SAFE NOTEBOOK[\/mk_fancy_title][mk_padding_divider][vc_column_text]\n<p style=\"text-align: justify;\">Recently, we may notice certain evolution of needs in relation to IT equipment. On the one hand, the demand for more mobile and visually attractive devices among employees grows. On the other hand, the company&#8217;s IT departments primarily want devices to be safe. Therefore, we have created a comprehensive system of protection of portable and desktop computers which allows safe office work in a dispersed environment. The solution makes it possible to create two separate work environments with classified information on a computer, each of them with a different safety level \u2013 e.g. classified and restricted information. A set of carefully selected protection technologies allows the system accreditation by appropriate services. One of environments is used for daily office work, the other is dedicated to access to classified systems and work with protected data.<\/p>\n[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243;][mk_fancy_title size=&#8221;20&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]<strong>BENEFITS<\/strong>[\/mk_fancy_title][vc_column_text]\n<ul>\n<li style=\"text-align: left;\">safety of data gathered in portable devices<\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"text-align: left;\">use of the encrypted electronic mail<\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"text-align: left;\">possibility to work in two modes of access to restricted or non-classified information<\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"text-align: left;\">use of anti-virus and anti-spam protection solutions<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;][vc_single_image image=&#8221;1040&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;appear&#8221;][\/vc_column_inner][\/vc_row_inner][mk_padding_divider size=&#8221;20&#8243;][\/vc_column][\/mk_page_section][mk_page_section bg_image=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/header-enigma-products-2-1.jpg&#8221; bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; enable_3d=&#8221;true&#8221; video_loop=&#8221;false&#8221; has_top_shape_divider=&#8221;true&#8221; top_shape_color=&#8221;#ffffff&#8221; has_bottom_shape_divider=&#8221;true&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_padding_divider size=&#8221;200&#8243;][\/vc_column][\/mk_page_section][mk_page_section bg_position=&#8221;center top&#8221; bg_repeat=&#8221;repeat-x&#8221; enable_3d=&#8221;true&#8221; speed_factor=&#8221;1.3&#8243; video_loop=&#8221;false&#8221; video_opacity=&#8221;0.3&#8243; padding_top=&#8221;70&#8243; top_shape_style=&#8221;jagged-rounded-top&#8221; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_color=&#8221;#ffffff&#8221; section_id=&#8221;uwierzytelnianie&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_padding_divider size=&#8221;50&#8243;][mk_fancy_title size=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]APTO \u2013 TWO-CHANNEL AUTHENTICATION SYSTEM[\/mk_fancy_title][mk_padding_divider][vc_column_text]\n<p style=\"text-align: justify;\"><strong>APTO<\/strong> is an innovative platform of authentication and authorization, combining ease of use with high security, based on the two-channel model of authentication mechanisms, mobile operating systems and PKI technology.<br \/>\n<strong>APTO<\/strong> is a program installed on the mobile device and is used to confirm any, outsourced operations. By using PKI it is fully secure and resistant even to sophisticated attacks. Prevents unauthorized access to protected resources. At the same time easily integrates with other systems and applications operating in the company. It replaces cumbersome and expensive to maintain, and, until recently, the most popular methods of user verification. It surpasses existing solutions in terms of safety and reliability. Moreover, clear interface provides intuitive operation. The two-channel mechanism to confirm (&#8220;something you have + something you know&#8221;) is the best way to improve the safety of operations, next to high-technology PKI. The user has the opportunity to refuse the operation if it raises his suspicions. Increasingly frequent incidents of man-in-the-middle theft, phishing and attacks using spyware software are also eliminated. Even highly advanced attacks are not dangerous for the security of information, through the use of encryption, among others.<\/p>\n[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243;][mk_fancy_title size=&#8221;20&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]<strong>BENEFITS<\/strong>[\/mk_fancy_title][vc_column_text]\n<ul>\n<li style=\"text-align: left;\">prevents unauthorised access<\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"text-align: left;\">uses a two-factor transaction authorisation mechanism<\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"text-align: left;\">enables work with the solutions of different vendors<\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"text-align: left;\">provides two-factor authentication to enterprise applications<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;][vc_single_image image=&#8221;1913&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;appear&#8221;][\/vc_column_inner][\/vc_row_inner][mk_padding_divider size=&#8221;20&#8243;][\/vc_column][\/mk_page_section][mk_page_section bg_image=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/header-enigma-products-2-1.jpg&#8221; bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; enable_3d=&#8221;true&#8221; video_loop=&#8221;false&#8221; has_top_shape_divider=&#8221;true&#8221; top_shape_color=&#8221;#ffffff&#8221; has_bottom_shape_divider=&#8221;true&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_padding_divider size=&#8221;200&#8243;][\/vc_column][\/mk_page_section][mk_page_section bg_position=&#8221;center top&#8221; bg_repeat=&#8221;repeat-x&#8221; enable_3d=&#8221;true&#8221; speed_factor=&#8221;1.3&#8243; video_loop=&#8221;false&#8221; video_opacity=&#8221;0.3&#8243; padding_top=&#8221;70&#8243; top_shape_style=&#8221;jagged-rounded-top&#8221; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_color=&#8221;#ffffff&#8221; section_id=&#8221;egina&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_padding_divider size=&#8221;50&#8243;][mk_fancy_title size=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]EGINA MOBILE \u2013 LOCAL MOBILE AUTHENTICATION SYSTEM[\/mk_fancy_title][mk_padding_divider][vc_column_text]\n<p style=\"text-align: justify;\"><strong>eGINA Mobile<\/strong> is a software allowing to log on to the Windows Mobile system by a user with the use of crypto-processor cards and the PKI technologies as an authentication mechanism for mobile devices.<br \/>\nThe system eliminates the problem of weak, rarely changed passwords. It may be used both on computers disconnected from the domain controller as well as those which are members of the Windows domain. The implementation of the software requires the possession of the PKI infrastructure from which cards, keys and certificates will come.<\/p>\n[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243;][mk_fancy_title size=&#8221;20&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]<strong>BENEFITS<\/strong>[\/mk_fancy_title][vc_column_text]\n<ul>\n<li style=\"text-align: left;\">makes it possible to authenticate a user and unblock access to devices and resources,<\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"text-align: left;\">joins the logging process with the possession of a cryptographic card,<\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"text-align: left;\">uses short and easy to remember PIN passwords,<\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"text-align: left;\">automatically blocks a station after removing a card,<\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"text-align: left;\">in terms of equipment it protects a station against unauthorised access.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][mk_padding_divider size=&#8221;20&#8243;][\/vc_column][\/mk_page_section]\n","protected":false},"excerpt":{"rendered":"<p>[mk_page_section bg_image=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/header-enigma-products-2-1.jpg&#8221; bg_position=&#8221;center bottom&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; enable_3d=&#8221;true&#8221; speed_factor=&#8221;0.6&#8243; min_height=&#8221;250&#8243; padding_top=&#8221;0&#8243; padding_bottom=&#8221;0&#8243; top_shape_color=&#8221;#ffffff&#8221; has_bottom_shape_divider=&#8221;true&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][\/vc_column][\/mk_page_section][mk_page_section bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; padding_top=&#8221;40&#8243; padding_bottom=&#8221;70&#8243; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_style=&#8221;folded-bottom&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;50&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;30&#8243; size_tablet=&#8221;30&#8243; size_phone=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]MOBILE SECURITY[\/mk_fancy_title][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;16&#8243; txt_transform=&#8221;none&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;20&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;] In the days when access to mobile services<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1938,"menu_order":5,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Mobile security - Enigma<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/mobile-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile security - Enigma\" \/>\n<meta property=\"og:description\" content=\"[mk_page_section bg_image=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/header-enigma-products-2-1.jpg&#8221; bg_position=&#8221;center bottom&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; enable_3d=&#8221;true&#8221; speed_factor=&#8221;0.6&#8243; min_height=&#8221;250&#8243; padding_top=&#8221;0&#8243; padding_bottom=&#8221;0&#8243; top_shape_color=&#8221;#ffffff&#8221; has_bottom_shape_divider=&#8221;true&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][\/vc_column][\/mk_page_section][mk_page_section bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; padding_top=&#8221;40&#8243; padding_bottom=&#8221;70&#8243; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_style=&#8221;folded-bottom&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;50&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;30&#8243; size_tablet=&#8221;30&#8243; size_phone=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]MOBILE SECURITY[\/mk_fancy_title][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;16&#8243; txt_transform=&#8221;none&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;20&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;] In the days when access to mobile services\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/mobile-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Enigma\" \/>\n<meta property=\"article:modified_time\" content=\"2017-02-09T14:00:43+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/mobile-security\/\",\"url\":\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/mobile-security\/\",\"name\":\"Mobile security - Enigma\",\"isPartOf\":{\"@id\":\"https:\/\/www.enigma.com.pl\/en\/#website\"},\"datePublished\":\"2017-02-09T13:48:55+00:00\",\"dateModified\":\"2017-02-09T14:00:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/mobile-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/mobile-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/mobile-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/www.enigma.com.pl\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Products and solutions\",\"item\":\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Mobile security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.enigma.com.pl\/en\/#website\",\"url\":\"https:\/\/www.enigma.com.pl\/en\/\",\"name\":\"Enigma\",\"description\":\"Information Security Systems\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.enigma.com.pl\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mobile security - Enigma","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/mobile-security\/","og_locale":"en_US","og_type":"article","og_title":"Mobile security - Enigma","og_description":"[mk_page_section bg_image=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/header-enigma-products-2-1.jpg&#8221; bg_position=&#8221;center bottom&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; enable_3d=&#8221;true&#8221; speed_factor=&#8221;0.6&#8243; min_height=&#8221;250&#8243; padding_top=&#8221;0&#8243; padding_bottom=&#8221;0&#8243; top_shape_color=&#8221;#ffffff&#8221; has_bottom_shape_divider=&#8221;true&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][\/vc_column][\/mk_page_section][mk_page_section bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; padding_top=&#8221;40&#8243; padding_bottom=&#8221;70&#8243; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_style=&#8221;folded-bottom&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;50&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;30&#8243; size_tablet=&#8221;30&#8243; size_phone=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]MOBILE SECURITY[\/mk_fancy_title][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;16&#8243; txt_transform=&#8221;none&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;20&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;] In the days when access to mobile services","og_url":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/mobile-security\/","og_site_name":"Enigma","article_modified_time":"2017-02-09T14:00:43+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/mobile-security\/","url":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/mobile-security\/","name":"Mobile security - Enigma","isPartOf":{"@id":"https:\/\/www.enigma.com.pl\/en\/#website"},"datePublished":"2017-02-09T13:48:55+00:00","dateModified":"2017-02-09T14:00:43+00:00","breadcrumb":{"@id":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/mobile-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/mobile-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/mobile-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/www.enigma.com.pl\/en\/"},{"@type":"ListItem","position":2,"name":"Products and solutions","item":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/"},{"@type":"ListItem","position":3,"name":"Mobile security"}]},{"@type":"WebSite","@id":"https:\/\/www.enigma.com.pl\/en\/#website","url":"https:\/\/www.enigma.com.pl\/en\/","name":"Enigma","description":"Information Security Systems","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.enigma.com.pl\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/pages\/2123"}],"collection":[{"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/comments?post=2123"}],"version-history":[{"count":4,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/pages\/2123\/revisions"}],"predecessor-version":[{"id":2127,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/pages\/2123\/revisions\/2127"}],"up":[{"embeddable":true,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/pages\/1938"}],"wp:attachment":[{"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/media?parent=2123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}