[{"term":"Libraries_BA","id":0,"type":"QUICKLINKS"},{"term":"Instructions","id":1,"type":"QUICKLINKS"},{"term":"WAGO-I/O-PRO","id":2,"type":"QUICKLINKS"},{"term":"Building","id":3,"type":"QUICKLINKS"},{"term":"221","id":4,"type":"QUICKLINKS"}]
{ "@context": "https://schema.org", "@type": "BreadcrumbList", "itemListElement": [ { "@type": "ListItem", "position": 1, "name": "Homepage", "item": "https://www.wago.com/ae" }, { "@type": "ListItem", "position": 2, "name": "Solutions", "item": "https://www.wago.com/ae/solutions" }, { "@type": "ListItem", "position": 3, "name": "Open Automation", "item": "https://www.wago.com/ae/open-automation" }, { "@type": "ListItem", "position": 4, "name": "Cybersecurity", "item": "https://www.wago.com/ae/open-automation/cybersecurity" } ] } [{"url":"/solutions","name":"Solutions","linkClass":null,"categoryCode":null},{"url":"/open-automation","name":"Open Automation","linkClass":null,"categoryCode":null},{"url":"/open-automation/cybersecurity","name":"Cybersecurity","linkClass":"active","categoryCode":null}]

Topic

Cybersecurity – Because Digitization Is Only Intelligent if It Is Secure

Security with WAGO

Encrypt Machine Data Securely with WAGO

Within automation, optimized manufacturing processes is the subject of many new business models in the context of digitization. Regardless of whether machines are outsourced or communication occurs between multiple production facilities, it is inevitable that machine data no longer remains where it was generated – data leaves the factory along multiple paths.

Cybersecurity Made by WAGO

For many years, machine data was only evaluated and used in the manufacturing facility in which it was generated. Thus, the risk of unauthorized data access was relatively low. Use of classic defense-in-depth measures ensured that machine data was well protected.

WAGO’s PFC100 and PFC200 Controllers encrypt information directly in the controller and subsequently transmit the data to the cloud via IPsec or OpenVPN. This ensures that machine data is optimally protected against unauthorized access.

Step-by-step to the solution:

  • Previously: Data remained in the manufacturing hall.
  • Digitization: Defense-in-depth carries risks.
  • The solution: Data encryption happens in the controller.
Loesungen_Cyber_Security_2000x2000.jpg

White Paper: IT Security in Production Facilities

Cyber attacks on automation systems and critical infrastructure are increasing. How can companies protect effectively against cyber attacks?

Our white paper “IT Security in Production Facilities – An Introduction for Small and Medium-Sized Enterprises” has answers. Read about how you can achieve optimal protection of your systems with an integrated approach with “defense in depth.”

The core content of the white paper includes:

  • Standards that play a role in the area of IT security
  • Ten point plan for protection against cyber attacks
  • Requirements on future automation systems
digitalisierung_cyber-security_rechnerkabel_mann_tablet_GettyImages-513087873_1_2000x2000.jpg