Cyberangriffe auf OT-Netzwerke, -Systeme und -Geräte können den Betrieb stören, die Sicherheit gefährden und zu erheblichen finanziellen Verlusten führen. Um diesen Bedrohungen wirksam zu begegnen, müssen Unternehmen künftig sowohl OT als auch IT gleichermaßen absichern. Wir von WAGO setzen daher auf ein ganzheitliches Sicherheitskonzept, das Ihre Cyberresilienz stärkt und folgende Bereiche umfasst:
{"container":false,"catalogVersion":"de-wagoContentCatalog/Online","type":"Hot Spot Komponente","dynamicVisibility":true,"cloneable":true,"uuid":"eyJpdGVtSWQiOiJjb21wX2RlXzAwMDBMREFVIiwiY2F0YWxvZ0lkIjoiZGUtd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","ignoreOnTransfer":false,"uid":"comp_de_0000LDAU","modifiedtime":"2024-11-15T16:40:09+0000","children":["eyJpdGVtSWQiOiJpdGVtX2RlXzAwMDBMR0VOIiwiY2F0YWxvZ0lkIjoiZGUtd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","eyJpdGVtSWQiOiJpdGVtX2RlXzAwMDBMR0VMIiwiY2F0YWxvZ0lkIjoiZGUtd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","eyJpdGVtSWQiOiJpdGVtX2RlXzAwMDBMR0VQIiwiY2F0YWxvZ0lkIjoiZGUtd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","eyJpdGVtSWQiOiJpdGVtX2RlXzAwMDBMR0VSIiwiY2F0YWxvZ0lkIjoiZGUtd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","eyJpdGVtSWQiOiJpdGVtX2RlXzAwMDBMR0VUIiwiY2F0YWxvZ0lkIjoiZGUtd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ=="],"onlyOneRestrictionMustApply":true,"iconType":"PLUS","overline":"<p>gleichermaßen absichern. Wir von WAGO setzen daher auf ein ganzheitliches Sicherheitskonzept, das Ihre Cyberresilienz stärkt und folgende Bereiche umfasst:</p>","image":{"code":"MM-522543_GWA_Titelstory_C-und-A_angebot-cybersecurity-A_2000x1125 (1).jpg","altText":"MM-522543_GWA_Titelstory_C-und-A_angebot-cybersecurity-A_2000x1125 (1).jpg","imageFormats":[{"imageType":null,"format":"2000","url":"/medias/MM-522543-GWA-Titelstory-C-und-A-angebot-cybersecurity-A-2000x1125-1-.jpg?context=bWFzdGVyfGltYWdlc3wxMjY1OTJ8aW1hZ2UvanBlZ3xhR1E0TDJobU5TOHhORFkxTXpjME56VTJNRFEzT0M5TlRTMDFNakkxTkROZlIxZEJYMVJwZEdWc2MzUnZjbmxmUXkxMWJtUXRRVjloYm1kbFltOTBMV041WW1WeWMyVmpkWEpwZEhrdFFWOHlNREF3ZURFeE1qVWdLREVwTG1wd1p3fGQ3ZWJmODQ0YzlkMzQ3ZTkwNTg3OWRmNmMxODVkNzBlMDM0ZmFlZjc0NjZmMGJkYWQ4NmQyNWJkNTE1NjcxNzM","altText":null,"galleryIndex":null,"width":null,"description":null,"mediaType":null,"code":null}],"description":"MM-522543_GWA_Titelstory_C-und-A_angebot-cybersecurity-A_2000x1125 (1).jpg"},"lastLoad":1731688809681,"visible":true,"wagoColumnComponent":[],"availableLanguages":"AVAILABLE","passepartout":false,"restrictions":[],"searchable":true,"typeCode":"WagoHotSpotComponent","slots":["eyJpdGVtSWQiOiJjc18wMDAwMURFQyIsImNhdGFsb2dJZCI6ImRlLXdhZ29Db250ZW50Q2F0YWxvZyIsImNhdGFsb2dWZXJzaW9uIjoiT25saW5lIn0="],"itemtype":"WagoHotSpotComponent","restricted":false,"name":"Hot-Spot_ Cybersecurity","synchronizationBlocked":true,"containers":[],"creationtime":"2024-11-13T17:09:07+0000","items":[{"container":false,"catalogVersion":"de-wagoContentCatalog/Online","contentAlignment":"AUTO","paragraph":"<p>Die neuen gesetzlichen EU-Richtlinien wie die NIS-2 und der CRA stellen Unternehmen vor große Herausforderungen. Was konkret auf Unternehmen zukommt, erfahren Sie hier.</p>","components":["eyJpdGVtSWQiOiJjb21wX2RlXzAwMDBMREFVIiwiY2F0YWxvZ0lkIjoiZGUtd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ=="],"imageZoomable":false,"type":"Hot Spot Popup Item","dynamicVisibility":true,"uuid":"eyJpdGVtSWQiOiJpdGVtX2RlXzAwMDBMR0VMIiwiY2F0YWxvZ0lkIjoiZGUtd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","callToAction":{"container":false,"catalogVersion":"de-wagoContentCatalog/Online","type":"Link-Komponente","dynamicVisibility":true,"contentPageLabelOrId":"/cyberresilienz-staerken","uuid":"eyJpdGVtSWQiOiJpdGVtX2RlXzAwMDBMR0VNIiwiY2F0YWxvZ0lkIjoiZGUtd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","footersSocial":[],"linkName":"Mehr zu den EU-Richtlinien","footers":[],"ignoreOnTransfer":false,"uid":"item_de_0000LGEM","modifiedtime":"2024-11-13T17:09:07+0000","children":[],"onlyOneRestrictionMustApply":true,"selectedCmsFacets":[],"headers":[],"visible":true,"contentPage":"eyJpdGVtSWQiOiJwYWdlX2RlXzAwMDBJSDRHIiwiY2F0YWxvZ0lkIjoiZGUtd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","wagoColumnComponent":[],"availableLanguages":"AVAILABLE","passepartout":false,"restrictions":[],"navigationNodes":[],"searchable":true,"url":"/offene-automatisierung/cyber-security/cyberresilienz-staerken","typeCode":"CMSLinkComponent","target":"SAMEWINDOW","renderWithEmptyTarget":false,"external":false,"slots":[],"itemtype":"CMSLinkComponent","restricted":false,"name":"CMSLinkComponent","synchronizationBlocked":false,"linkType":"SECONDARY","containers":[],"creationtime":"2024-11-13T17:09:07+0000","navigationList":[],"actions":[],"contentVersion":1,"headersUserMenu":[],"parents":[]},"ignoreOnTransfer":false,"uid":"item_de_0000LGEL","modifiedtime":"2024-11-13T17:09:08+0000","children":[],"onlyOneRestrictionMustApply":true,"headline":"<p>Richtlinien</p>","visible":true,"wagoColumnComponent":[],"availableLanguages":"AVAILABLE","passepartout":false,"restrictions":[],"searchable":true,"typeCode":"WagoHotSpotPopupItem","slots":[],"itemtype":"WagoHotSpotPopupItem","restricted":false,"name":"element_policies","x":65,"synchronizationBlocked":false,"y":21,"containers":[],"creationtime":"2024-11-13T17:09:07+0000","actions":[],"contentVersion":2,"parents":[]},{"container":false,"catalogVersion":"de-wagoContentCatalog/Online","contentAlignment":"AUTO","paragraph":"<p>Wenn es um Software und Cybersecurity geht, unterstützt das WAGO „Product Security Incident Response Team“ (PSIRT) proaktiv, um Ihre bestehenden Prozesse im Rahmen der industriellen Automation bestmöglich zu schützen.</p>","components":["eyJpdGVtSWQiOiJjb21wX2RlXzAwMDBMREFVIiwiY2F0YWxvZ0lkIjoiZGUtd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ=="],"imageZoomable":false,"type":"Hot Spot Popup Item","dynamicVisibility":true,"uuid":"eyJpdGVtSWQiOiJpdGVtX2RlXzAwMDBMR0VOIiwiY2F0YWxvZ0lkIjoiZGUtd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","callToAction":{"container":false,"catalogVersion":"de-wagoContentCatalog/Online","type":"Link-Komponente","dynamicVisibility":true,"contentPageLabelOrId":"/psirt","uuid":"eyJpdGVtSWQiOiJpdGVtX2RlXzAwMDBMR0VPIiwiY2F0YWxvZ0lkIjoiZGUtd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","footersSocial":[],"linkName":"Mehr zum PSIRT","footers":[],"ignoreOnTransfer":false,"uid":"item_de_0000LGEO","modifiedtime":"2024-11-13T17:09:07+0000","children":[],"onlyOneRestrictionMustApply":true,"selectedCmsFacets":[],"headers":[],"visible":true,"contentPage":"eyJpdGVtSWQiOiJwYWdlXzAwMDAzMDExIiwiY2F0YWxvZ0lkIjoiZGUtd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","wagoColumnComponent":[],"availableLanguages":"AVAILABLE","passepartout":false,"restrictions":[],"navigationNodes":[],"searchable":true,"url":"/automatisierungstechnik/psirt","typeCode":"CMSLinkComponent","target":"SAMEWINDOW","renderWithEmptyTarget":false,"external":false,"slots":[],"itemtype":"CMSLinkComponent","restricted":false,"name":"CMSLinkComponent","synchronizationBlocked":false,"linkType":"SECONDARY","containers":[],"creationtime":"2024-11-13T17:09:07+0000","navigationList":[],"actions":[],"contentVersion":1,"headersUserMenu":[],"parents":[]},"ignoreOnTransfer":false,"uid":"item_de_0000LGEN","modifiedtime":"2024-11-13T17:09:08+0000","children":[],"onlyOneRestrictionMustApply":true,"headline":"<p>PSIRT</p>","visible":true,"wagoColumnComponent":[],"availableLanguages":"AVAILABLE","passepartout":false,"restrictions":[],"searchable":true,"typeCode":"WagoHotSpotPopupItem","slots":[],"itemtype":"WagoHotSpotPopupItem","restricted":false,"name":"element_PSIRT","x":69,"synchronizationBlocked":false,"y":62,"containers":[],"creationtime":"2024-11-13T17:09:08+0000","actions":[],"contentVersion":1,"parents":[]},{"container":false,"catalogVersion":"de-wagoContentCatalog/Online","contentAlignment":"AUTO","paragraph":"<p>Der Schutz von Daten betrifft jede Branche: Deshalb sind unsere Sicherheitslösungen auf die individuellen Bedürfnisse spezieller Märkte wie Smart Factory, Smart Building oder Smart Energy zugeschnitten.</p>","components":["eyJpdGVtSWQiOiJjb21wX2RlXzAwMDBMREFVIiwiY2F0YWxvZ0lkIjoiZGUtd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ=="],"imageZoomable":false,"type":"Hot Spot Popup Item","dynamicVisibility":true,"uuid":"eyJpdGVtSWQiOiJpdGVtX2RlXzAwMDBMR0VQIiwiY2F0YWxvZ0lkIjoiZGUtd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","callToAction":{"container":false,"catalogVersion":"de-wagoContentCatalog/Online","type":"Link-Komponente","dynamicVisibility":true,"contentPageLabelOrId":"/Cyber-Security-in-der-Gebäudeautomation","uuid":"eyJpdGVtSWQiOiJpdGVtX2RlXzAwMDBMR0VRIiwiY2F0YWxvZ0lkIjoiZGUtd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","footersSocial":[],"linkName":"Sicher loslegen!","footers":[],"ignoreOnTransfer":false,"uid":"item_de_0000LGEQ","modifiedtime":"2024-11-13T17:09:08+0000","children":[],"onlyOneRestrictionMustApply":true,"selectedCmsFacets":[],"headers":[],"visible":true,"contentPage":"eyJpdGVtSWQiOiJwYWdlXzAwMDA3UDBFIiwiY2F0YWxvZ0lkIjoiZGUtd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","wagoColumnComponent":[],"availableLanguages":"AVAILABLE","passepartout":false,"restrictions":[],"navigationNodes":[],"searchable":true,"url":"/gebaeudetechnik/smart-building/cyber-security-in-der-gebaeudeautomation","typeCode":"CMSLinkComponent","target":"SAMEWINDOW","renderWithEmptyTarget":false,"external":false,"slots":[],"itemtype":"CMSLinkComponent","restricted":false,"name":"CMSLinkComponent","synchronizationBlocked":false,"linkType":"SECONDARY","containers":[],"creationtime":"2024-11-13T17:09:08+0000","navigationList":[],"actions":[],"contentVersion":1,"headersUserMenu":[],"parents":[]},"ignoreOnTransfer":false,"uid":"item_de_0000LGEP","modifiedtime":"2024-11-13T17:09:09+0000","children":[],"onlyOneRestrictionMustApply":true,"headline":"<p>Branchen</p>","visible":true,"wagoColumnComponent":[],"availableLanguages":"AVAILABLE","passepartout":false,"restrictions":[],"searchable":true,"typeCode":"WagoHotSpotPopupItem","slots":[],"itemtype":"WagoHotSpotPopupItem","restricted":false,"name":"element_industries","x":50,"synchronizationBlocked":false,"y":84,"containers":[],"creationtime":"2024-11-13T17:09:08+0000","actions":[],"contentVersion":1,"parents":[]},{"container":false,"catalogVersion":"de-wagoContentCatalog/Online","contentAlignment":"AUTO","paragraph":"<p>Mit unseren maßgeschneiderten Softwarelösungen lassen sich Cyberbedrohungen frühzeitig erkennen und z. B. durch Netzwerksegmentierung minimieren.</p>","components":["eyJpdGVtSWQiOiJjb21wX2RlXzAwMDBMREFVIiwiY2F0YWxvZ0lkIjoiZGUtd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ=="],"imageZoomable":false,"type":"Hot Spot Popup Item","dynamicVisibility":true,"uuid":"eyJpdGVtSWQiOiJpdGVtX2RlXzAwMDBMR0VSIiwiY2F0YWxvZ0lkIjoiZGUtd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","callToAction":{"container":false,"catalogVersion":"de-wagoContentCatalog/Online","type":"Link-Komponente","dynamicVisibility":true,"uuid":"eyJpdGVtSWQiOiJpdGVtX2RlXzAwMDBMR0VTIiwiY2F0YWxvZ0lkIjoiZGUtd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","footersSocial":[],"linkName":"Mehr erfahren","footers":[],"ignoreOnTransfer":false,"uid":"item_de_0000LGES","modifiedtime":"2024-11-13T17:09:07+0000","children":[],"onlyOneRestrictionMustApply":true,"selectedCmsFacets":[],"headers":[],"visible":true,"wagoColumnComponent":[],"availableLanguages":"AVAILABLE","passepartout":false,"restrictions":[],"navigationNodes":[],"searchable":true,"url":null,"typeCode":"CMSLinkComponent","target":"SAMEWINDOW","renderWithEmptyTarget":false,"external":false,"slots":[],"itemtype":"CMSLinkComponent","restricted":false,"name":"CMSLinkComponent","synchronizationBlocked":false,"linkType":"SECONDARY","containers":[],"creationtime":"2024-11-13T17:09:07+0000","navigationList":[],"actions":[],"contentVersion":1,"headersUserMenu":[],"parents":[]},"ignoreOnTransfer":false,"uid":"item_de_0000LGER","modifiedtime":"2024-11-13T17:09:07+0000","children":[],"onlyOneRestrictionMustApply":true,"headline":"<p>Produkte</p>","visible":true,"wagoColumnComponent":[],"availableLanguages":"AVAILABLE","passepartout":false,"restrictions":[],"searchable":true,"typeCode":"WagoHotSpotPopupItem","slots":[],"itemtype":"WagoHotSpotPopupItem","restricted":false,"name":"element_products","x":29,"synchronizationBlocked":false,"y":55,"containers":[],"creationtime":"2024-11-13T17:09:07+0000","actions":[],"contentVersion":1,"parents":[]},{"container":false,"catalogVersion":"de-wagoContentCatalog/Online","contentAlignment":"AUTO","paragraph":"<p>Für höchste Sicherheit bieten wir Beratungsdienstleistungen im Bereich der OT-Security an, die durch eine Kombination aus Hard- und Softwarelösungen ergänzt werden.</p>","components":["eyJpdGVtSWQiOiJjb21wX2RlXzAwMDBMREFVIiwiY2F0YWxvZ0lkIjoiZGUtd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ=="],"imageZoomable":false,"type":"Hot Spot Popup Item","dynamicVisibility":true,"uuid":"eyJpdGVtSWQiOiJpdGVtX2RlXzAwMDBMR0VUIiwiY2F0YWxvZ0lkIjoiZGUtd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","callToAction":{"container":false,"catalogVersion":"de-wagoContentCatalog/Online","type":"Link-Komponente","dynamicVisibility":true,"contentPageLabelOrId":"/cybersecurity-consulting","uuid":"eyJpdGVtSWQiOiJpdGVtX2RlXzAwMDBMR0VVIiwiY2F0YWxvZ0lkIjoiZGUtd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","footersSocial":[],"linkName":"Zum Consulting","footers":[],"ignoreOnTransfer":false,"uid":"item_de_0000LGEU","modifiedtime":"2024-11-13T16:23:43+0000","children":[],"onlyOneRestrictionMustApply":true,"selectedCmsFacets":[],"headers":[],"visible":true,"contentPage":"eyJpdGVtSWQiOiJwYWdlX2RlXzAwMDBJVThSIiwiY2F0YWxvZ0lkIjoiZGUtd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","wagoColumnComponent":[],"availableLanguages":"AVAILABLE","passepartout":false,"restrictions":[],"navigationNodes":[],"searchable":true,"url":"/offene-automatisierung/cyber-security/cybersecurity-consulting","typeCode":"CMSLinkComponent","target":"SAMEWINDOW","renderWithEmptyTarget":false,"external":false,"slots":[],"itemtype":"CMSLinkComponent","restricted":false,"name":"CMSLinkComponent","synchronizationBlocked":false,"linkType":"SECONDARY","containers":[],"creationtime":"2024-11-13T16:23:43+0000","navigationList":[],"actions":[],"contentVersion":1,"headersUserMenu":[],"parents":[]},"ignoreOnTransfer":false,"uid":"item_de_0000LGET","modifiedtime":"2024-11-13T17:09:08+0000","children":[],"onlyOneRestrictionMustApply":true,"headline":"<p>Consulting</p>","visible":true,"wagoColumnComponent":[],"availableLanguages":"AVAILABLE","passepartout":false,"restrictions":[],"searchable":true,"typeCode":"WagoHotSpotPopupItem","slots":[],"itemtype":"WagoHotSpotPopupItem","restricted":false,"name":"element_consulting","x":37,"synchronizationBlocked":false,"y":17,"containers":[],"creationtime":"2024-11-13T17:09:08+0000","actions":[],"contentVersion":1,"parents":[]}],"actions":[],"contentVersion":3,"parents":[]}
PSIRT
Hohe Dunkelziffer bei Internet-erreichbaren Steuerungen
„Georgia Institute of Technology“ warnt Automatisierungsgemeinschaft vor unterschätzten Risiken bei extern erreichbaren speicherprogrammierbaren Steuerungen.
CONSULTING
Cyberresilienz stärken
Angesichts steigender Schäden durch Cyberangriffe und neuer EU-Richtlinien wie dem „Cyber Resilience Act“ (CRA) wird ganzheitliche Cybersecurity für Unternehmen unverzichtbar. Wie WAGO diesen Herausforderungen begegnet, erfahren Sie in diesem Interview.
CONSULTING
WAGO und Radiflow bündeln ihre Kräfte
Ziel der Zusammenarbeit ist es, weltweit verbesserte OT-Sicherheitsfunktionen für kritische Infrastrukturen und industrielle Abläufe bereitzustellen sowie die Widerstandsfähigkeit gegen Cyberbedrohungen zu stärken.
RICHTLINIEN
Security-Anforderungen mit WAGO optimal erfüllen
Damit die Kunden hohe Security-Standards erfüllen können, haben wir unsere Entwicklungsprozesse gemäß IEC 62443-4-1 zertifizieren lassen. Ziel ist es, dass die Produkte keine Schwachstellen in der Gesamtlösung der Kunden darstellen – und sie entsprechend sichere Anlagen und Systeme realisieren können.
PSIRT
Cybersecurity – PSIRT bei WAGO
Wenn es um Software und Cybersecurity geht, unterstützt das WAGO „Product Security Incident Response Team“ (PSIRT) proaktiv, um Ihre bestehenden Prozesse im Rahmen der industriellen Automation bestmöglich zu schützen.
Von der Planung bis zur Lieferung einer Schaltanlage bietet WAGO die digitale Unterstützung Ihres Engineeringprozesses.
Modulare Automation
Die modulare Automation entwickelt sich immer mehr zum bestimmenden Trend.
Cloud-Connectivity
Cloud-Lösungen setzen sich auch in der Industrie immer stärker durch.
Industrial Switches
Das Switch-Portfolio von WAGO sorgt für die Skalierbarkeit Ihrer ETHERNET-Netzwerkinfrastruktur mit hervorragenden elektrischen und mechanischen Eigenschaften.
Smart Factory
Auf dem Weg in die smarte und vernetze Produktionswelt der Zukunft unterstützt WAGO Unternehmen dabei, flexibler und sicherer zu produzieren und eine hohe Verfügbarkeit ihrer Anlagen zu gewährleisten.
Cyber-Security in der Gebäudeautomation
Gebäudeautomationssysteme werden zunehmend mit IT-Lösungen vernetzt; Prozesse, die den Fokus auf Sicherheit legen, sind aber nur wenige vorhanden.