<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>IMNS Systems - IMNS</title>
	<atom:link href="https://imns.pl/en/oferta-kategorie/imns-systems-en/feed/" rel="self" type="application/rss+xml" />
	<link>https://imns.pl/en/oferta-kategorie/imns-systems-en/</link>
	<description></description>
	<lastBuildDate>Mon, 23 Apr 2018 11:53:50 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.5</generator>
	<item>
		<title>Application and data security</title>
		<link>https://imns.pl/en/oferta/application-and-data-security/</link>
		
		<dc:creator><![CDATA[Agencja Proformat]]></dc:creator>
		<pubDate>Tue, 27 Feb 2018 14:51:32 +0000</pubDate>
				<guid isPermaLink="false">http://imns-pl.beep.pl/oferta/bezpieczenstwo-aplikacji-danych/</guid>

					<description><![CDATA[<p>Artykuł <a href="https://imns.pl/en/oferta/application-and-data-security/">Application and data security</a> pochodzi z serwisu <a href="https://imns.pl/en/">IMNS</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Artykuł <a href="https://imns.pl/en/oferta/application-and-data-security/">Application and data security</a> pochodzi z serwisu <a href="https://imns.pl/en/">IMNS</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>End-point protections and mobile security</title>
		<link>https://imns.pl/en/oferta/end-point-protections-and-mobile-security/</link>
		
		<dc:creator><![CDATA[Agencja Proformat]]></dc:creator>
		<pubDate>Tue, 27 Feb 2018 14:50:50 +0000</pubDate>
				<guid isPermaLink="false">http://imns-pl.beep.pl/oferta/bezpieczenstwo-endpoint-urzadzen-mobilnych/</guid>

					<description><![CDATA[<p>Artykuł <a href="https://imns.pl/en/oferta/end-point-protections-and-mobile-security/">End-point protections and mobile security</a> pochodzi z serwisu <a href="https://imns.pl/en/">IMNS</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Artykuł <a href="https://imns.pl/en/oferta/end-point-protections-and-mobile-security/">End-point protections and mobile security</a> pochodzi z serwisu <a href="https://imns.pl/en/">IMNS</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Monitoring of systems and users&#8217; security</title>
		<link>https://imns.pl/en/oferta/monitoring-of-systems-and-users-security/</link>
		
		<dc:creator><![CDATA[Agencja Proformat]]></dc:creator>
		<pubDate>Tue, 27 Feb 2018 14:50:30 +0000</pubDate>
				<guid isPermaLink="false">http://imns-pl.beep.pl/oferta/monitoring-bezpieczenstwa-systemow-uzytkownikow/</guid>

					<description><![CDATA[<p>Artykuł <a href="https://imns.pl/en/oferta/monitoring-of-systems-and-users-security/">Monitoring of systems and users&#8217; security</a> pochodzi z serwisu <a href="https://imns.pl/en/">IMNS</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Artykuł <a href="https://imns.pl/en/oferta/monitoring-of-systems-and-users-security/">Monitoring of systems and users&#8217; security</a> pochodzi z serwisu <a href="https://imns.pl/en/">IMNS</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Managing vulnerabilities</title>
		<link>https://imns.pl/en/oferta/managing-vulnerabilities/</link>
		
		<dc:creator><![CDATA[Agencja Proformat]]></dc:creator>
		<pubDate>Tue, 27 Feb 2018 14:47:55 +0000</pubDate>
				<guid isPermaLink="false">http://imns-pl.beep.pl/oferta/zarzadzanie-podatnosciami/</guid>

					<description><![CDATA[<p>Artykuł <a href="https://imns.pl/en/oferta/managing-vulnerabilities/">Managing vulnerabilities</a> pochodzi z serwisu <a href="https://imns.pl/en/">IMNS</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Artykuł <a href="https://imns.pl/en/oferta/managing-vulnerabilities/">Managing vulnerabilities</a> pochodzi z serwisu <a href="https://imns.pl/en/">IMNS</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Network and communication security</title>
		<link>https://imns.pl/en/oferta/network-and-communication-security/</link>
		
		<dc:creator><![CDATA[Agencja Proformat]]></dc:creator>
		<pubDate>Tue, 27 Feb 2018 14:47:41 +0000</pubDate>
				<guid isPermaLink="false">http://imns-pl.beep.pl/oferta/bezpieczenstwo-sieci-komunikacji/</guid>

					<description><![CDATA[<p>Artykuł <a href="https://imns.pl/en/oferta/network-and-communication-security/">Network and communication security</a> pochodzi z serwisu <a href="https://imns.pl/en/">IMNS</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Artykuł <a href="https://imns.pl/en/oferta/network-and-communication-security/">Network and communication security</a> pochodzi z serwisu <a href="https://imns.pl/en/">IMNS</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Authorization and access management</title>
		<link>https://imns.pl/en/oferta/authorization-and-access-management/</link>
		
		<dc:creator><![CDATA[Agencja Proformat]]></dc:creator>
		<pubDate>Tue, 27 Feb 2018 14:47:27 +0000</pubDate>
				<guid isPermaLink="false">http://imns-pl.beep.pl/oferta/zarzadzanie-uprawnieniami-dostepem/</guid>

					<description><![CDATA[<p>Artykuł <a href="https://imns.pl/en/oferta/authorization-and-access-management/">Authorization and access management</a> pochodzi z serwisu <a href="https://imns.pl/en/">IMNS</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Artykuł <a href="https://imns.pl/en/oferta/authorization-and-access-management/">Authorization and access management</a> pochodzi z serwisu <a href="https://imns.pl/en/">IMNS</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
