{"id":4868,"date":"2022-03-24T11:36:28","date_gmt":"2022-03-24T10:36:28","guid":{"rendered":"https:\/\/www.enigma.com.pl\/?p=4868"},"modified":"2022-05-18T15:57:24","modified_gmt":"2022-05-18T13:57:24","slug":"joint-cybersecurity-operations-center-project","status":"publish","type":"post","link":"https:\/\/www.enigma.com.pl\/en\/joint-cybersecurity-operations-center-project\/","title":{"rendered":"Joint Cybersecurity Operations Center project"},"content":{"rendered":"<p>Enigma has delivered network devices for NASK, including CompCrypt EtaMIL100Z encryptors for the needs of the participants of the Joint Cybersecurity Operational Center (PCOC) Project. The aim of the project is to equip the participants of the Project with the necessary ICT devices and equipment.<\/p>\n<p>The implementation of this task will allow to build direct secure communication between institutions important from the point of view of state security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Enigma has delivered network devices for NASK, including CompCrypt EtaMIL100Z encryptors for the needs of the participants of the Joint Cybersecurity Operational Center (PCOC) Project. The aim of the project is to equip the participants of the Project with the necessary ICT devices and equipment. The implementation of this task will allow to build direct<\/p>\n","protected":false},"author":5,"featured_media":4935,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[16],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Joint Cybersecurity Operations Center project - Enigma<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.enigma.com.pl\/en\/joint-cybersecurity-operations-center-project\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Joint Cybersecurity Operations Center project - Enigma\" \/>\n<meta property=\"og:description\" content=\"Enigma has delivered network devices for NASK, including CompCrypt EtaMIL100Z encryptors for the needs of the participants of the Joint Cybersecurity Operational Center (PCOC) Project. The aim of the project is to equip the participants of the Project with the necessary ICT devices and equipment. The implementation of this task will allow to build direct\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.enigma.com.pl\/en\/joint-cybersecurity-operations-center-project\/\" \/>\n<meta property=\"og:site_name\" content=\"Enigma\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-24T10:36:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-18T13:57:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2022\/03\/nask.png\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Marek Rozbicki\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marek Rozbicki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.enigma.com.pl\/en\/joint-cybersecurity-operations-center-project\/\",\"url\":\"https:\/\/www.enigma.com.pl\/en\/joint-cybersecurity-operations-center-project\/\",\"name\":\"Joint Cybersecurity Operations Center project - Enigma\",\"isPartOf\":{\"@id\":\"https:\/\/www.enigma.com.pl\/en\/#website\"},\"datePublished\":\"2022-03-24T10:36:28+00:00\",\"dateModified\":\"2022-05-18T13:57:24+00:00\",\"author\":{\"@id\":\"https:\/\/www.enigma.com.pl\/en\/#\/schema\/person\/0402d0470de59aee4419e066e3f79d45\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.enigma.com.pl\/en\/joint-cybersecurity-operations-center-project\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.enigma.com.pl\/en\/joint-cybersecurity-operations-center-project\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.enigma.com.pl\/en\/joint-cybersecurity-operations-center-project\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/www.enigma.com.pl\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Joint Cybersecurity Operations Center project\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.enigma.com.pl\/en\/#website\",\"url\":\"https:\/\/www.enigma.com.pl\/en\/\",\"name\":\"Enigma\",\"description\":\"Information Security Systems\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.enigma.com.pl\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.enigma.com.pl\/en\/#\/schema\/person\/0402d0470de59aee4419e066e3f79d45\",\"name\":\"Marek Rozbicki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.enigma.com.pl\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/07b9f7d39ddbd89cf313da93b73ab916?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/07b9f7d39ddbd89cf313da93b73ab916?s=96&d=mm&r=g\",\"caption\":\"Marek Rozbicki\"},\"url\":\"https:\/\/www.enigma.com.pl\/en\/author\/marek-rozbicki\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Joint Cybersecurity Operations Center project - Enigma","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.enigma.com.pl\/en\/joint-cybersecurity-operations-center-project\/","og_locale":"en_US","og_type":"article","og_title":"Joint Cybersecurity Operations Center project - Enigma","og_description":"Enigma has delivered network devices for NASK, including CompCrypt EtaMIL100Z encryptors for the needs of the participants of the Joint Cybersecurity Operational Center (PCOC) Project. The aim of the project is to equip the participants of the Project with the necessary ICT devices and equipment. The implementation of this task will allow to build direct","og_url":"https:\/\/www.enigma.com.pl\/en\/joint-cybersecurity-operations-center-project\/","og_site_name":"Enigma","article_published_time":"2022-03-24T10:36:28+00:00","article_modified_time":"2022-05-18T13:57:24+00:00","og_image":[{"width":850,"height":350,"url":"https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2022\/03\/nask.png","type":"image\/png"}],"author":"Marek Rozbicki","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Marek Rozbicki","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.enigma.com.pl\/en\/joint-cybersecurity-operations-center-project\/","url":"https:\/\/www.enigma.com.pl\/en\/joint-cybersecurity-operations-center-project\/","name":"Joint Cybersecurity Operations Center project - Enigma","isPartOf":{"@id":"https:\/\/www.enigma.com.pl\/en\/#website"},"datePublished":"2022-03-24T10:36:28+00:00","dateModified":"2022-05-18T13:57:24+00:00","author":{"@id":"https:\/\/www.enigma.com.pl\/en\/#\/schema\/person\/0402d0470de59aee4419e066e3f79d45"},"breadcrumb":{"@id":"https:\/\/www.enigma.com.pl\/en\/joint-cybersecurity-operations-center-project\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.enigma.com.pl\/en\/joint-cybersecurity-operations-center-project\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.enigma.com.pl\/en\/joint-cybersecurity-operations-center-project\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/www.enigma.com.pl\/en\/"},{"@type":"ListItem","position":2,"name":"Joint Cybersecurity Operations Center project"}]},{"@type":"WebSite","@id":"https:\/\/www.enigma.com.pl\/en\/#website","url":"https:\/\/www.enigma.com.pl\/en\/","name":"Enigma","description":"Information Security Systems","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.enigma.com.pl\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.enigma.com.pl\/en\/#\/schema\/person\/0402d0470de59aee4419e066e3f79d45","name":"Marek Rozbicki","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.enigma.com.pl\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/07b9f7d39ddbd89cf313da93b73ab916?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/07b9f7d39ddbd89cf313da93b73ab916?s=96&d=mm&r=g","caption":"Marek Rozbicki"},"url":"https:\/\/www.enigma.com.pl\/en\/author\/marek-rozbicki\/"}]}},"_links":{"self":[{"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/posts\/4868"}],"collection":[{"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/comments?post=4868"}],"version-history":[{"count":1,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/posts\/4868\/revisions"}],"predecessor-version":[{"id":4869,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/posts\/4868\/revisions\/4869"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/media\/4935"}],"wp:attachment":[{"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/media?parent=4868"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/categories?post=4868"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/tags?post=4868"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}