{"id":2135,"date":"2017-02-15T08:47:21","date_gmt":"2017-02-15T07:47:21","guid":{"rendered":"https:\/\/www.enigma.com.pl\/en\/?page_id=2135"},"modified":"2017-02-15T08:56:22","modified_gmt":"2017-02-15T07:56:22","slug":"systems-and-networks-security","status":"publish","type":"page","link":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/systems-and-networks-security\/","title":{"rendered":"Systems and networks security"},"content":{"rendered":"[mk_page_section bg_image=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/header-enigma-products-4.jpg&#8221; bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; enable_3d=&#8221;true&#8221; speed_factor=&#8221;0.6&#8243; min_height=&#8221;250&#8243; padding_top=&#8221;0&#8243; padding_bottom=&#8221;0&#8243; top_shape_color=&#8221;#ffffff&#8221; has_bottom_shape_divider=&#8221;true&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][\/vc_column][\/mk_page_section][mk_page_section bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; padding_top=&#8221;40&#8243; padding_bottom=&#8221;70&#8243; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_style=&#8221;folded-bottom&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;50&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;30&#8243; size_tablet=&#8221;30&#8243; size_phone=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]SYSTEMS AND NETWORKS SECURITY[\/mk_fancy_title][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;16&#8243; txt_transform=&#8221;none&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;20&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]\n<p style=\"text-align: justify;\">Development of the IT services should be accompanied by the awareness of dangers and appropriate counteracting. Today, correct functioning of companies and institutions relies on the access to information being in their possession and their effective use. That is why it is so important to pay special attention to data processed in systems and networks, so that not to allow their leakage or loss. In its offer Enigma has solutions allowing to avoid the problem.<\/p>\n[\/mk_fancy_title][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;]<a href=\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/systems-and-networks-security\/#firewall\" target=\"\" title=\"Link\"  data-id=\"mpc_button-446a08294d842ee\" class=\"mpc-button mpc-init mpc-transition mpc-animation mpc-typography--default mpc-display--block \"  data-animation-in=\"transition.perspectiveUpIn||1000||500||100\"><div class=\"mpc-button__content mpc-effect-type--none mpc-effect-side--none\"><span class=\"mpc-button__title mpc-transition\">Firewall<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--slide mpc-effect-side--top\"><\/div><\/a>[\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;]<a href=\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/systems-and-networks-security\/#siem\" target=\"\" title=\"Link\"  data-id=\"mpc_button-846a08294d843ad\" class=\"mpc-button mpc-init mpc-transition mpc-animation mpc-typography--default mpc-display--block \"  data-animation-in=\"transition.perspectiveUpIn||1000||500||100\"><div class=\"mpc-button__content mpc-effect-type--none mpc-effect-side--none\"><span class=\"mpc-button__title mpc-transition\">SIEM (Security Information and Event Management)<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--slide mpc-effect-side--top\"><\/div><\/a>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/mk_page_section][mk_page_section bg_color=&#8221;#ffffff&#8221; bg_position=&#8221;center top&#8221; bg_repeat=&#8221;repeat-x&#8221; enable_3d=&#8221;true&#8221; speed_factor=&#8221;1.3&#8243; video_loop=&#8221;false&#8221; video_opacity=&#8221;0.3&#8243; padding_top=&#8221;80&#8243; top_shape_style=&#8221;jagged-rounded-top&#8221; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_color=&#8221;#ffffff&#8221; section_id=&#8221;firewall&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_padding_divider size=&#8221;50&#8243;][mk_fancy_title size=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]Next Generation Firewall[\/mk_fancy_title][mk_padding_divider][vc_column_text]\n<p style=\"text-align: justify;\">The problem of effective filtering of network traffic is as old as the Internet. The times when information was transferred only on the basis of IP addresses and port numbers protected by traditional firewalls irrevocably pass. Old solutions are displaced by new generation devices &#8211; quicker and more intelligent &#8220;application firewalls&#8221;, defined as NGFW (Next-Generation Firewalls). Enterprises planning to extend its network protection by new generation firewalls should change the way of thinking about safety tasks assigned to firewalls. NGFW specifies the group of network firewalls which deeply analyse traffic at the level of applications used by employees taking advantage of the Internet access &#8211; WWW websites and community portals. Due to it, they prevent the latest types of hacking and allow to avoid threats related to dangerous behaviours of employees. NGFW allow to avoid danger related to changes in the scope of business use of IT systems, in particular threats and new techniques of attacks taking advantage of the vulnerability of business systems. New Generation Firewalls are able to meet these requirements due to a possibility of deep scanning of packets, ability to identify and monitor applications working in a network, ability to verify the identity of a user and enforce a policy on access control. Next Generation Firewall allows to avoid threats resulting from dangerous behaviours of employees in a network.<\/p>\n[\/vc_column_text][vc_column_text]\n<p style=\"text-align: justify;\">In the implemented projects, we offer solutions in the scope of the protection of company networks due to the application of new generation network firewalls, among others, appropriately tailored to the client\u2019s needs. Constant broadening of knowledge and trainings provided by the market leaders allow our architects and network implementation specialists to adapt optimum solutions to the size and complexity of a company.<br \/>\nDue to the application of classic solutions in the scope of safety and the products of intelligent solutions of Next Generation Firewall, our clients may be sure that their networks are protected against new generation attacks.<\/p>\n[\/vc_column_text][mk_padding_divider size=&#8221;20&#8243;][\/vc_column][\/mk_page_section][mk_page_section bg_image=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/header-enigma-products-4.jpg&#8221; bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; enable_3d=&#8221;true&#8221; video_loop=&#8221;false&#8221; has_top_shape_divider=&#8221;true&#8221; top_shape_color=&#8221;#ffffff&#8221; has_bottom_shape_divider=&#8221;true&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_padding_divider size=&#8221;200&#8243;][\/vc_column][\/mk_page_section][mk_page_section bg_position=&#8221;center top&#8221; bg_repeat=&#8221;repeat-x&#8221; enable_3d=&#8221;true&#8221; speed_factor=&#8221;1.3&#8243; video_loop=&#8221;false&#8221; video_opacity=&#8221;0.3&#8243; padding_top=&#8221;70&#8243; top_shape_style=&#8221;jagged-rounded-top&#8221; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_color=&#8221;#ffffff&#8221; section_id=&#8221;siem&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_padding_divider size=&#8221;50&#8243;][mk_fancy_title size=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]SIEM (Security Information and Event Management)[\/mk_fancy_title][mk_padding_divider][vc_column_text]\n<p style=\"text-align: justify;\">In most of IT departments, the constant monitoring of logs is not often the practice. Personnel looks into logs occasionally, usually after any incident happens. The implementation of the SIEM (Security Information and Event Management) platform may be useful in the monitoring of events in a non-stop mode. SIEM specifies the group of products, the main tasks of which is to manage the safety and correlate events. The technology of the platform ensures quick analysis of events generated by network devices, servers, operating systems, databases and applications in real time. In IT environments integrated with the SIEM systems it is possible to monitor all non-standard and suspicious activities performed both by system users and administrators as well as devices or applications. The SIEM software aggregates logs from many sources, then standardises and correlates them, which allows for automatic analysis, detection of operations violating the company&#8217;s safety policy and notification of administrators.<\/p>\n[\/vc_column_text][mk_fancy_title size=&#8221;20&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]<strong>ASSETS OF THE SOLUTION<\/strong>[\/mk_fancy_title][vc_row_inner][vc_column_inner][vc_column_text]\n<ul>\n<li style=\"text-align: left;\">aggregation of data coming from various sources<\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"text-align: left;\">collection of data in one central place<\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"text-align: left;\">provision of comprehensive information on the occurring threats<\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"text-align: left;\">monitoring of potential threats and reacting to safety incidents in real time<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_column_text]\n<p style=\"text-align: justify;\">Enigma delivers the SIEM class systems that easily integrate with other solutions for the information safety management due to which the value of gathered information greatly increases. We integrate the SIEM class solutions with the IDM or DLP tools (protection against data leakage), among others.<br \/>\nThe asset of the implemented solutions of the SIEM systems by Enigma is the improvement of work of the IT\/safety department. A mechanism used to analyse the gathered information allows to keep the optimum level of safety and the proactive support of incidents.<\/p>\n[\/vc_column_text][mk_padding_divider size=&#8221;20&#8243;][\/vc_column][\/mk_page_section]\n","protected":false},"excerpt":{"rendered":"<p>[mk_page_section bg_image=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/header-enigma-products-4.jpg&#8221; bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; enable_3d=&#8221;true&#8221; speed_factor=&#8221;0.6&#8243; min_height=&#8221;250&#8243; padding_top=&#8221;0&#8243; padding_bottom=&#8221;0&#8243; top_shape_color=&#8221;#ffffff&#8221; has_bottom_shape_divider=&#8221;true&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][\/vc_column][\/mk_page_section][mk_page_section bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; padding_top=&#8221;40&#8243; padding_bottom=&#8221;70&#8243; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_style=&#8221;folded-bottom&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;50&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;30&#8243; size_tablet=&#8221;30&#8243; size_phone=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]SYSTEMS AND NETWORKS SECURITY[\/mk_fancy_title][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;16&#8243; txt_transform=&#8221;none&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;20&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;] Development of the IT services should<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1938,"menu_order":7,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Systems and networks security - Enigma<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/systems-and-networks-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Systems and networks security - Enigma\" \/>\n<meta property=\"og:description\" content=\"[mk_page_section bg_image=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/header-enigma-products-4.jpg&#8221; bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; enable_3d=&#8221;true&#8221; speed_factor=&#8221;0.6&#8243; min_height=&#8221;250&#8243; padding_top=&#8221;0&#8243; padding_bottom=&#8221;0&#8243; top_shape_color=&#8221;#ffffff&#8221; has_bottom_shape_divider=&#8221;true&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][\/vc_column][\/mk_page_section][mk_page_section bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; padding_top=&#8221;40&#8243; padding_bottom=&#8221;70&#8243; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_style=&#8221;folded-bottom&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;50&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;30&#8243; size_tablet=&#8221;30&#8243; size_phone=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]SYSTEMS AND NETWORKS SECURITY[\/mk_fancy_title][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;16&#8243; txt_transform=&#8221;none&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;20&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;] Development of the IT services should\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/systems-and-networks-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Enigma\" \/>\n<meta property=\"article:modified_time\" content=\"2017-02-15T07:56:22+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/systems-and-networks-security\/\",\"url\":\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/systems-and-networks-security\/\",\"name\":\"Systems and networks security - Enigma\",\"isPartOf\":{\"@id\":\"https:\/\/www.enigma.com.pl\/en\/#website\"},\"datePublished\":\"2017-02-15T07:47:21+00:00\",\"dateModified\":\"2017-02-15T07:56:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/systems-and-networks-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/systems-and-networks-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/systems-and-networks-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/www.enigma.com.pl\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Products and solutions\",\"item\":\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Systems and networks security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.enigma.com.pl\/en\/#website\",\"url\":\"https:\/\/www.enigma.com.pl\/en\/\",\"name\":\"Enigma\",\"description\":\"Information Security Systems\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.enigma.com.pl\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Systems and networks security - Enigma","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/systems-and-networks-security\/","og_locale":"en_US","og_type":"article","og_title":"Systems and networks security - Enigma","og_description":"[mk_page_section bg_image=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/header-enigma-products-4.jpg&#8221; bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; enable_3d=&#8221;true&#8221; speed_factor=&#8221;0.6&#8243; min_height=&#8221;250&#8243; padding_top=&#8221;0&#8243; padding_bottom=&#8221;0&#8243; top_shape_color=&#8221;#ffffff&#8221; has_bottom_shape_divider=&#8221;true&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][\/vc_column][\/mk_page_section][mk_page_section bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; padding_top=&#8221;40&#8243; padding_bottom=&#8221;70&#8243; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_style=&#8221;folded-bottom&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;50&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;30&#8243; size_tablet=&#8221;30&#8243; size_phone=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]SYSTEMS AND NETWORKS SECURITY[\/mk_fancy_title][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;16&#8243; txt_transform=&#8221;none&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;20&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;] Development of the IT services should","og_url":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/systems-and-networks-security\/","og_site_name":"Enigma","article_modified_time":"2017-02-15T07:56:22+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/systems-and-networks-security\/","url":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/systems-and-networks-security\/","name":"Systems and networks security - Enigma","isPartOf":{"@id":"https:\/\/www.enigma.com.pl\/en\/#website"},"datePublished":"2017-02-15T07:47:21+00:00","dateModified":"2017-02-15T07:56:22+00:00","breadcrumb":{"@id":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/systems-and-networks-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/systems-and-networks-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/systems-and-networks-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/www.enigma.com.pl\/en\/"},{"@type":"ListItem","position":2,"name":"Products and solutions","item":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/"},{"@type":"ListItem","position":3,"name":"Systems and networks security"}]},{"@type":"WebSite","@id":"https:\/\/www.enigma.com.pl\/en\/#website","url":"https:\/\/www.enigma.com.pl\/en\/","name":"Enigma","description":"Information Security Systems","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.enigma.com.pl\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/pages\/2135"}],"collection":[{"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/comments?post=2135"}],"version-history":[{"count":3,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/pages\/2135\/revisions"}],"predecessor-version":[{"id":2139,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/pages\/2135\/revisions\/2139"}],"up":[{"embeddable":true,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/pages\/1938"}],"wp:attachment":[{"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/media?parent=2135"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}