{"id":2129,"date":"2017-02-09T15:07:04","date_gmt":"2017-02-09T14:07:04","guid":{"rendered":"https:\/\/www.enigma.com.pl\/en\/?page_id=2129"},"modified":"2017-02-09T15:19:56","modified_gmt":"2017-02-09T14:19:56","slug":"infrastructure-security","status":"publish","type":"page","link":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/infrastructure-security\/","title":{"rendered":"Infrastructure security"},"content":{"rendered":"[mk_page_section bg_image=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/header-enigma-products-1-1.jpg&#8221; bg_position=&#8221;center bottom&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; enable_3d=&#8221;true&#8221; speed_factor=&#8221;0.6&#8243; min_height=&#8221;250&#8243; padding_top=&#8221;0&#8243; padding_bottom=&#8221;0&#8243; top_shape_color=&#8221;#ffffff&#8221; has_bottom_shape_divider=&#8221;true&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][\/vc_column][\/mk_page_section][mk_page_section bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; padding_top=&#8221;40&#8243; padding_bottom=&#8221;0&#8243; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_style=&#8221;folded-bottom&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;50&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;30&#8243; size_tablet=&#8221;30&#8243; size_phone=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;50&#8243; font_family=&#8221;none&#8221;]INFRASTRUCTURE SECURITY[\/mk_fancy_title][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;16&#8243; txt_transform=&#8221;none&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;20&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]\n<p style=\"text-align: justify;\">The measurement of the efficiency of operation of each organisation or company is not how it functions in the course of routine work, but how it manages in the time of chaos. Even the most experienced and prepared services are exposed to chaos related to:<\/p>\n<ul>\n<li>lack of sharing necessary information in the entire team,<\/li>\n<li>lack of coordination of tasks between individual units,<\/li>\n<li>lack of information on the use of technical and personnel resources,<\/li>\n<li>lack of access to reliable and verified information,<\/li>\n<li>lack of information on the progress of activities at individual sections of operation,<\/li>\n<li>lack of a possibility to exchange experience between individual units in critical situations.<\/li>\n<\/ul>\n[\/mk_fancy_title][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]AVISPON<br \/>\n\u2013 WHEN EACH DETAIL COUNTS[\/mk_fancy_title][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1475666845486{padding-top: 5px !important;}&#8221;][mk_fancy_title size=&#8221;16&#8243; txt_transform=&#8221;none&#8221; letter_spacing=&#8221;2&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]\n<p style=\"text-align: justify;\">Even the most advanced control systems will not prevent random events from occurring. The task of modern technical solutions is to support services in daily work in the scope of tackling even the most complex matters.<\/p>\n[\/mk_fancy_title][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/mk_page_section][mk_page_section bg_color=&#8221;#ffffff&#8221; bg_position=&#8221;center top&#8221; bg_repeat=&#8221;repeat-x&#8221; enable_3d=&#8221;true&#8221; speed_factor=&#8221;1.3&#8243; video_loop=&#8221;false&#8221; video_opacity=&#8221;0.3&#8243; padding_top=&#8221;80&#8243; top_shape_style=&#8221;jagged-rounded-top&#8221; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_color=&#8221;#ffffff&#8221; section_id=&#8221;avispon&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column width=&#8221;1\/2&#8243;][vc_column_text]\n<p style=\"text-align: justify;\">The Enigma&#8217;s offer includes the Avispon system created by our architects, computer specialists and engineers with a view to supporting a group of people professionally engaged in investigating criminal cases and other police-related events. This application is used in the case of occurrence of any crisis situation in an institution, failures of various type and scale, threat for the managed infrastructure, environment, employees or population, as well as in the case of image or information crises.<\/p>\n<p style=\"text-align: justify;\">The system contains scenarios for reacting to particular crisis situations, sets of audit recommendations, good practices, and regulations used in handling incidents, as well as human and equipment resources, detailed maps of key areas and facilities speci\ufb01c for the given company. Flexible scenarios can be redefined during the crisis, depending on how the situation develops. The system uses mechanisms based on the GIS to position events, resources, and facilities on a tactical map. It offers the ability of working with or even controlling CCTV and mobile camera systems, has a built-in videoconference module for groups, teams, and external consultants, with the possibility of sharing resources (desktop, \ufb01les, images and documents). High level of security is guaranteed by the possibility of controlling authorisations based on roles performed in the team dealing with the given incident, integration with an authentication system based on Active Directory, and integration with e-signature systems.<\/p>\n[\/vc_column_text][mk_padding_divider][mk_fancy_title size=&#8221;20&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]<strong>MODULES<\/strong>[\/mk_fancy_title][mk_padding_divider size=&#8221;20&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][mk_padding_divider][vc_single_image image=&#8221;1057&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; onclick=&#8221;link_image&#8221; css_animation=&#8221;appear&#8221;][\/vc_column][\/mk_page_section][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_accordions][vc_accordion_tab title=&#8221;A system of assigning tasks to emergency teams &#8220;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8221;][vc_column_text]\n<ul>\n<li>e\ufb00ective assigning of tasks to teams,<\/li>\n<li>control of task completion,<\/li>\n<li>reports supporting decision making,<\/li>\n<li>ability to introduce incident-related information,<\/li>\n<li>automation of basic processes,<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]\n<ul>\n<li>access to key information for authorized team members,<\/li>\n<li>context information as assistance in completing tasks,<\/li>\n<li>dynamic mode \u2013 voice notes instead of manually entered data,<\/li>\n<li>immediate messages to all users.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_accordion_tab][vc_accordion_tab title=&#8221;Comprehensive reports&#8221;][vc_column_text]\n<ul>\n<li>ability to de\ufb01ne any reports supporting the management of an incident,<\/li>\n<li>overview and detailed reports concerning task completion,<\/li>\n<li>reporting progress in completing the assigned tasks.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_accordion_tab][vc_accordion_tab title=&#8221;Support for operational meetings&#8221;][vc_column_text]\n<ul>\n<li>stenographic support,<\/li>\n<li>dynamic mode \u2013 recording the meeting and its playback in the system,<\/li>\n<li>ability to create tasks based on decisions made during operational meetings.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_accordion_tab][vc_accordion_tab title=&#8221;Preparation for a crysis&#8221;][vc_column_text]\n<ul>\n<li>ability to de\ufb01ne scenarios to react to various crisis situations,<\/li>\n<li>\ufb02exible scenarios can be rede\ufb01ned during the crisis, depending on how the situation develops,<\/li>\n<li>implementation of audit recommendations, good practices, and regulations in the incident handling process.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_accordion_tab][vc_accordion_tab title=&#8221;Objects support&#8221;][vc_column_text]\n<ul>\n<li>granular system of de\ufb01ning and introducing objects,<\/li>\n<li>ability to de\ufb01ne objects with any properties\/attributes,<\/li>\n<li>ability to de\ufb01ne links between objects re\ufb02ecting the interdependencies existing in the real world.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_accordion_tab][\/vc_accordions][mk_padding_divider size=&#8221;20&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_accordions][vc_accordion_tab title=&#8221;Use of maps&#8221;][vc_column_text]\n<ul>\n<li>built-in mechanisms using the GIS to position events and objects,<\/li>\n<li>tactical map presenting the arrangement of resources and personnel,<\/li>\n<li>easy searching for and \ufb01ltering of objects,<\/li>\n<li>access to archive data specifying the locations of particular objects.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_accordion_tab][vc_accordion_tab title=&#8221;Visual monitoring systems&#8221;][vc_column_text]\n<ul>\n<li>management of camera control mechanisms,<\/li>\n<li>management of stationary cameras, \ufb01eld reconnaissance vehicles, cameras on drones and o\ufb00-line images,<\/li>\n<li>use of external camera systems and object identi\ufb01cation systems.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_accordion_tab][vc_accordion_tab title=&#8221;Cooperation with any and all external applications&#8221;][vc_column_text]\n<ul>\n<li>ability to send parameters to external systems,<\/li>\n<li>working with external work-support mechanisms.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_accordion_tab][vc_accordion_tab title=&#8221;Built-in resource management mechanisms&#8221;][vc_column_text]\n<ul>\n<li>full warehouse support for task teams,<\/li>\n<li>support for work time and e\ufb03ciency monitoring.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_accordion_tab][vc_accordion_tab title=&#8221;Built-in videoconference module&#8221;][vc_column_text]\n<ul>\n<li>creating rooms for discussions for particular incidents, teams, and groups,<\/li>\n<li>support for videoconferences attended by external consultants,<\/li>\n<li>ability to share local resources: desktop, \ufb01les, images and documents.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_accordion_tab][vc_accordion_tab title=&#8221;High level of security&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]\n<ul>\n<li>role-based access control (RBAC) re\ufb02ecting the structure of the team, de\ufb01ned for each incident,<\/li>\n<li>team structures management \u2013 authorizations and subordination,<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]\n<ul>\n<li>integration with an authentication system based on AD,<\/li>\n<li>integration with e-signature systems.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_accordion_tab][\/vc_accordions][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[mk_page_section bg_image=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/header-enigma-products-1-1.jpg&#8221; bg_position=&#8221;center bottom&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; enable_3d=&#8221;true&#8221; speed_factor=&#8221;0.6&#8243; min_height=&#8221;250&#8243; padding_top=&#8221;0&#8243; padding_bottom=&#8221;0&#8243; top_shape_color=&#8221;#ffffff&#8221; has_bottom_shape_divider=&#8221;true&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][\/vc_column][\/mk_page_section][mk_page_section bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; padding_top=&#8221;40&#8243; padding_bottom=&#8221;0&#8243; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_style=&#8221;folded-bottom&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;50&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;30&#8243; size_tablet=&#8221;30&#8243; size_phone=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;50&#8243; font_family=&#8221;none&#8221;]INFRASTRUCTURE SECURITY[\/mk_fancy_title][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;16&#8243; txt_transform=&#8221;none&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;20&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;] The measurement of the efficiency of operation of<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1938,"menu_order":6,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Infrastructure security - Enigma<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/infrastructure-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Infrastructure security - Enigma\" \/>\n<meta property=\"og:description\" content=\"[mk_page_section bg_image=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/header-enigma-products-1-1.jpg&#8221; bg_position=&#8221;center bottom&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; enable_3d=&#8221;true&#8221; speed_factor=&#8221;0.6&#8243; min_height=&#8221;250&#8243; padding_top=&#8221;0&#8243; padding_bottom=&#8221;0&#8243; top_shape_color=&#8221;#ffffff&#8221; has_bottom_shape_divider=&#8221;true&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][\/vc_column][\/mk_page_section][mk_page_section bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; padding_top=&#8221;40&#8243; padding_bottom=&#8221;0&#8243; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_style=&#8221;folded-bottom&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;50&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;30&#8243; size_tablet=&#8221;30&#8243; size_phone=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;50&#8243; font_family=&#8221;none&#8221;]INFRASTRUCTURE SECURITY[\/mk_fancy_title][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;16&#8243; txt_transform=&#8221;none&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;20&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;] The measurement of the efficiency of operation of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/infrastructure-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Enigma\" \/>\n<meta property=\"article:modified_time\" content=\"2017-02-09T14:19:56+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/infrastructure-security\/\",\"url\":\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/infrastructure-security\/\",\"name\":\"Infrastructure security - Enigma\",\"isPartOf\":{\"@id\":\"https:\/\/www.enigma.com.pl\/en\/#website\"},\"datePublished\":\"2017-02-09T14:07:04+00:00\",\"dateModified\":\"2017-02-09T14:19:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/infrastructure-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/infrastructure-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/infrastructure-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/www.enigma.com.pl\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Products and solutions\",\"item\":\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Infrastructure security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.enigma.com.pl\/en\/#website\",\"url\":\"https:\/\/www.enigma.com.pl\/en\/\",\"name\":\"Enigma\",\"description\":\"Information Security Systems\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.enigma.com.pl\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Infrastructure security - Enigma","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/infrastructure-security\/","og_locale":"en_US","og_type":"article","og_title":"Infrastructure security - Enigma","og_description":"[mk_page_section bg_image=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/header-enigma-products-1-1.jpg&#8221; bg_position=&#8221;center bottom&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; enable_3d=&#8221;true&#8221; speed_factor=&#8221;0.6&#8243; min_height=&#8221;250&#8243; padding_top=&#8221;0&#8243; padding_bottom=&#8221;0&#8243; top_shape_color=&#8221;#ffffff&#8221; has_bottom_shape_divider=&#8221;true&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][\/vc_column][\/mk_page_section][mk_page_section bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; padding_top=&#8221;40&#8243; padding_bottom=&#8221;0&#8243; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_style=&#8221;folded-bottom&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;50&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;30&#8243; size_tablet=&#8221;30&#8243; size_phone=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;50&#8243; font_family=&#8221;none&#8221;]INFRASTRUCTURE SECURITY[\/mk_fancy_title][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;16&#8243; txt_transform=&#8221;none&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;20&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;] The measurement of the efficiency of operation of","og_url":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/infrastructure-security\/","og_site_name":"Enigma","article_modified_time":"2017-02-09T14:19:56+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/infrastructure-security\/","url":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/infrastructure-security\/","name":"Infrastructure security - Enigma","isPartOf":{"@id":"https:\/\/www.enigma.com.pl\/en\/#website"},"datePublished":"2017-02-09T14:07:04+00:00","dateModified":"2017-02-09T14:19:56+00:00","breadcrumb":{"@id":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/infrastructure-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/infrastructure-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/infrastructure-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/www.enigma.com.pl\/en\/"},{"@type":"ListItem","position":2,"name":"Products and solutions","item":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/"},{"@type":"ListItem","position":3,"name":"Infrastructure security"}]},{"@type":"WebSite","@id":"https:\/\/www.enigma.com.pl\/en\/#website","url":"https:\/\/www.enigma.com.pl\/en\/","name":"Enigma","description":"Information Security Systems","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.enigma.com.pl\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/pages\/2129"}],"collection":[{"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/comments?post=2129"}],"version-history":[{"count":4,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/pages\/2129\/revisions"}],"predecessor-version":[{"id":2134,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/pages\/2129\/revisions\/2134"}],"up":[{"embeddable":true,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/pages\/1938"}],"wp:attachment":[{"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/media?parent=2129"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}