[{"term":"Libraries_BA","id":0,"type":"QUICKLINKS"},{"term":"Instructions","id":1,"type":"QUICKLINKS"},{"term":"WAGO-I/O-PRO","id":2,"type":"QUICKLINKS"},{"term":"Building","id":3,"type":"QUICKLINKS"},{"term":"221","id":4,"type":"QUICKLINKS"}]
[{"url":"/industries","name":"Solutions","linkClass":null,"categoryCode":null},{"url":"/open-automation","name":"Open Automation","linkClass":null,"categoryCode":null},{"url":"/open-automation/cybersecurity","name":"Cybersecurity","linkClass":"active","categoryCode":null}]
{"container":false,"catalogVersion":"gb-wagoContentCatalog/Online","menuLinksOrdered":[],"lastExportedVersion":3,"type":"Category Stage","dynamicVisibility":true,"cloneable":true,"uuid":"eyJpdGVtSWQiOiJjb21wXzAwMDA3WjFJIiwiY2F0YWxvZ0lkIjoiZ2Itd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","ignoreOnTransfer":false,"uid":"comp_00007Z1I","modifiedtime":"2026-05-11T03:13:04+0000","children":[],"flat":false,"onlyOneRestrictionMustApply":true,"lastLoad":1778469184153,"visible":true,"wagoColumnComponent":[],"availableLanguages":"AVAILABLE","productLinkOverrideType":"PRODUCT","passepartout":false,"restrictions":[],"contentLinkOverrideType":"CONTENT","searchable":true,"typeCode":"WagoCategoryStageComponent","slots":["eyJpdGVtSWQiOiJjc18wMDAwMURFOCIsImNhdGFsb2dJZCI6ImdiLXdhZ29Db250ZW50Q2F0YWxvZyIsImNhdGFsb2dWZXJzaW9uIjoiT25saW5lIn0="],"textboxOpacity":0,"itemtype":"WagoCategoryStageComponent","restricted":false,"name":"Stage","synchronizationBlocked":true,"containers":[],"creationtime":"2021-07-27T11:05:28+0000","actions":[],"contentVersion":3,"parents":[]}

Integrated Approach for Maximum Security

Cyberattacks targeting OT networks, systems and devices can disrupt operations, jeopardize security and result in significant financial losses. To effectively address these threats, companies will need to secure both OT and IT in the future. Therefore, we at WAGO rely on a holistic security concept that strengthens your cyber resilience and encompasses the following areas:

{"container":false,"catalogVersion":"gb-wagoContentCatalog/Online","lastExportedVersion":3,"type":"Hot Spot Component","dynamicVisibility":true,"cloneable":true,"uuid":"eyJpdGVtSWQiOiJjb21wX2RlXzAwMDBMREFVIiwiY2F0YWxvZ0lkIjoiZ2Itd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","ignoreOnTransfer":false,"uid":"comp_de_0000LDAU","modifiedtime":"2026-05-11T03:13:04+0000","children":["eyJpdGVtSWQiOiJpdGVtX2RlXzAwMDBMR0VOIiwiY2F0YWxvZ0lkIjoiZ2Itd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","eyJpdGVtSWQiOiJpdGVtX2RlXzAwMDBMR0VQIiwiY2F0YWxvZ0lkIjoiZ2Itd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","eyJpdGVtSWQiOiJpdGVtX2RlXzAwMDBMR0VUIiwiY2F0YWxvZ0lkIjoiZ2Itd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","eyJpdGVtSWQiOiJpdGVtX2RlXzAwMDBMR0VSIiwiY2F0YWxvZ0lkIjoiZ2Itd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","eyJpdGVtSWQiOiJpdGVtX2RlXzAwMDBMR0VMIiwiY2F0YWxvZ0lkIjoiZ2Itd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ=="],"onlyOneRestrictionMustApply":true,"iconType":"PLUS","overline":"<p>To effectively address these threats, companies will need to secure both OT and IT in the future. Therefore, we at WAGO rely on a holistic security concept that strengthens your cyber resilience and encompasses the following areas:</p>","image":{"code":"MM-515123_website-update_cybersecurity_us_2000x1125.jpg","altText":"MM-515123_website-update_cybersecurity_us_2000x1125.jpg","imageFormats":[{"imageType":null,"format":"2000","url":"/medias/2000-MM-515123-website-update-cybersecurity-us-2000x1125.jpg?context=bWFzdGVyfGltYWdlc3w3Mjg5NHxpbWFnZS9qcGVnfGFHSTVMMmcxWXk4eE5URXpPREEwTkRNeE16WXpNQzh5TURBd1gwMU5MVFV4TlRFeU0xOTNaV0p6YVhSbExYVndaR0YwWlY5amVXSmxjbk5sWTNWeWFYUjVYM1Z6WHpJd01EQjRNVEV5TlM1cWNHY3wzZTNhMzk5MWE2YzM1NWRiOTAwNmZjODhkNDlkMTliMGNkMjA4MDdkNzlhZjIwMjFmNzZlMmM0MTkwNTRmMmYy","altText":null,"galleryIndex":null,"width":null,"description":null,"mediaType":null,"code":null},{"imageType":null,"format":"1600","url":"/medias/1600-MM-515123-website-update-cybersecurity-us-2000x1125.jpg?context=bWFzdGVyfGltYWdlc3w1NDY1N3xpbWFnZS9qcGVnfGFHWXdMMmd5T0M4eE5URXpPRFF6T0RNNE1UVTVPQzh4TmpBd1gwMU5MVFV4TlRFeU0xOTNaV0p6YVhSbExYVndaR0YwWlY5amVXSmxjbk5sWTNWeWFYUjVYM1Z6WHpJd01EQjRNVEV5TlM1cWNHY3xkYmU2NTY3YTk0NGNiOGIwN2I2MDE2MmY0NDczNDkyNDQ0M2Y0YjM1OTAxZmVkMmQwYjRjNDM4ZmZlYTY4Zjlk","altText":null,"galleryIndex":null,"width":null,"description":null,"mediaType":null,"code":null},{"imageType":null,"format":"1280","url":"/medias/1280-MM-515123-website-update-cybersecurity-us-2000x1125.jpg?context=bWFzdGVyfGltYWdlc3w0MjM1MHxpbWFnZS9qcGVnfGFESXhMMmcyTUM4eE5URXpPREEwTkRReE1Ua3pOQzh4TWpnd1gwMU5MVFV4TlRFeU0xOTNaV0p6YVhSbExYVndaR0YwWlY5amVXSmxjbk5sWTNWeWFYUjVYM1Z6WHpJd01EQjRNVEV5TlM1cWNHY3w4MzdmODYzYzE3NzJkNWI3MjIyNmMyYTA4NmM5YTRiMGVkYjVlN2Q2OGU4MTU2MTI1YjI3MDI4MzJlMTllYmRl","altText":null,"galleryIndex":null,"width":null,"description":null,"mediaType":null,"code":null},{"imageType":null,"format":"1024","url":"/medias/1024-MM-515123-website-update-cybersecurity-us-2000x1125.jpg?context=bWFzdGVyfGltYWdlc3wzMzExNnxpbWFnZS9qcGVnfGFEZzVMMmcyTXk4eE5URXpPREEwTkRVeE1ESXpPQzh4TURJMFgwMU5MVFV4TlRFeU0xOTNaV0p6YVhSbExYVndaR0YwWlY5amVXSmxjbk5sWTNWeWFYUjVYM1Z6WHpJd01EQjRNVEV5TlM1cWNHY3wwYjZkYTYyY2FlYTk2YTFkNjRhMTVkODE4NmQ2NWE5NjRlOTQwY2Y0ODQ3M2E0OGViNTc2NTUwNjI4Mjk0Zjkw","altText":null,"galleryIndex":null,"width":null,"description":null,"mediaType":null,"code":null},{"imageType":null,"format":"768","url":"/medias/768-MM-515123-website-update-cybersecurity-us-2000x1125.jpg?context=bWFzdGVyfGltYWdlc3wyNTM5OHxpbWFnZS9qcGVnfGFEVXlMMmc0TWk4eE5URXpPRFF6TnpneU5EVTBNaTgzTmpoZlRVMHROVEUxTVRJelgzZGxZbk5wZEdVdGRYQmtZWFJsWDJONVltVnljMlZqZFhKcGRIbGZkWE5mTWpBd01IZ3hNVEkxTG1wd1p3fGU4MGRiY2JhZmZlZjA0NDU1MzgxZjliMDA3MmQxN2IzYWVmMmQzMGFmNTg4ZWM0OWZiM2FjZDhkNmJlMGI4MTE","altText":null,"galleryIndex":null,"width":null,"description":null,"mediaType":null,"code":null},{"imageType":null,"format":"480","url":"/medias/480-MM-515123-website-update-cybersecurity-us-2000x1125.jpg?context=bWFzdGVyfGltYWdlc3wxNzg5MnxpbWFnZS9qcGVnfGFHVmhMMmczWlM4eE5URXpPRFF6TnpreU1qZzBOaTgwT0RCZlRVMHROVEUxTVRJelgzZGxZbk5wZEdVdGRYQmtZWFJsWDJONVltVnljMlZqZFhKcGRIbGZkWE5mTWpBd01IZ3hNVEkxTG1wd1p3fDUwODMwNTg4NzhkMTEyZTY1NTIxMDUyYTg4YzY3YzMwYTc2ZGRkMzZkNTIzNmZjMGYzMzRkYzgyYzQ0OTNmMzM","altText":null,"galleryIndex":null,"width":null,"description":null,"mediaType":null,"code":null},{"imageType":null,"format":"200","url":"/medias/200-MM-515123-website-update-cybersecurity-us-2000x1125.jpg?context=bWFzdGVyfGltYWdlc3wxMDc4N3xpbWFnZS9qcGVnfGFERTVMMmd5WkM4eE5URXpPRFF6T0RJeE56YzFPQzh5TURCZlRVMHROVEUxTVRJelgzZGxZbk5wZEdVdGRYQmtZWFJsWDJONVltVnljMlZqZFhKcGRIbGZkWE5mTWpBd01IZ3hNVEkxTG1wd1p3fGNhNjE1ZTM5ZDRiOTY2NzdhYTY5ZDVhZGZjOTcxZDc1ZTE3OTU2MmU2YmUyZWI5MGU4YjJjNGYxM2FhNWFkNmE","altText":null,"galleryIndex":null,"width":null,"description":null,"mediaType":null,"code":null}],"description":"MM-515123_website-update_cybersecurity_us_2000x1125.jpg"},"lastLoad":1778469184344,"visible":true,"wagoColumnComponent":[],"availableLanguages":"AVAILABLE","passepartout":false,"restrictions":[],"searchable":true,"typeCode":"WagoHotSpotComponent","slots":["eyJpdGVtSWQiOiJjc18wMDAwMURFQyIsImNhdGFsb2dJZCI6ImdiLXdhZ29Db250ZW50Q2F0YWxvZyIsImNhdGFsb2dWZXJzaW9uIjoiT25saW5lIn0="],"itemtype":"WagoHotSpotComponent","restricted":false,"name":"Hot-Spot_ Cybersecurity","synchronizationBlocked":true,"containers":[],"creationtime":"2025-01-03T11:22:13+0000","items":[{"container":false,"catalogVersion":"gb-wagoContentCatalog/Online","contentAlignment":"AUTO","paragraph":"<p>The new legal EU directives, such as NIS-2 and the CRA, pose great challenges for companies. Find out here what exactly companies can expect.</p>","components":["eyJpdGVtSWQiOiJjb21wX2RlXzAwMDBMREFVIiwiY2F0YWxvZ0lkIjoiZ2Itd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ=="],"imageZoomable":false,"lastExportedVersion":2,"type":"Hot Spot Popup Item","dynamicVisibility":true,"uuid":"eyJpdGVtSWQiOiJpdGVtX2RlXzAwMDBMR0VMIiwiY2F0YWxvZ0lkIjoiZ2Itd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","callToAction":{"container":false,"catalogVersion":"gb-wagoContentCatalog/Online","lastExportedVersion":1,"type":"Link Component","dynamicVisibility":true,"contentPageLabelOrId":"/cyberresilienz-staerken","uuid":"eyJpdGVtSWQiOiJpdGVtX2RlXzAwMDBMR0VNIiwiY2F0YWxvZ0lkIjoiZ2Itd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","footersSocial":[],"linkName":"More about the EU Directives","footers":[],"ignoreOnTransfer":false,"uid":"item_de_0000LGEM","modifiedtime":"2025-07-23T10:11:34+0000","children":[],"onlyOneRestrictionMustApply":true,"selectedCmsFacets":[],"headers":[],"visible":true,"contentPage":"eyJpdGVtSWQiOiJwYWdlX2RlXzAwMDBJSDRHIiwiY2F0YWxvZ0lkIjoiZ2Itd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","wagoColumnComponent":[],"availableLanguages":"AVAILABLE","passepartout":false,"restrictions":[],"footersPayment":[],"navigationNodes":[],"searchable":true,"url":"/open-automation/cybersecurity/enhancing-cyber-resilience","typeCode":"CMSLinkComponent","target":"SAMEWINDOW","renderWithEmptyTarget":false,"external":false,"slots":[],"itemtype":"CMSLinkComponent","restricted":false,"name":"Link-Komponente","synchronizationBlocked":false,"linkType":"SECONDARY","containers":[],"creationtime":"2025-01-03T11:22:15+0000","navigationList":[],"actions":[],"contentVersion":1,"headersUserMenu":[],"parents":[]},"ignoreOnTransfer":false,"uid":"item_de_0000LGEL","modifiedtime":"2025-01-03T11:22:16+0000","children":[],"onlyOneRestrictionMustApply":true,"headline":"<p>Directives</p>","visible":true,"wagoColumnComponent":[],"availableLanguages":"AVAILABLE","passepartout":false,"restrictions":[],"searchable":true,"typeCode":"WagoHotSpotPopupItem","slots":[],"itemtype":"WagoHotSpotPopupItem","restricted":false,"name":"element_policies","x":65,"synchronizationBlocked":false,"y":21,"containers":[],"creationtime":"2025-01-03T11:22:14+0000","actions":[],"contentVersion":2,"parents":[]},{"container":false,"catalogVersion":"gb-wagoContentCatalog/Online","contentAlignment":"AUTO","paragraph":"<p>When it comes to software and cybersecurity, WAGO's “Product Security Incident Response Team” (PSIRT) provides proactive support to help protect your existing processes in industrial automation.</p>","components":["eyJpdGVtSWQiOiJjb21wX2RlXzAwMDBMREFVIiwiY2F0YWxvZ0lkIjoiZ2Itd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ=="],"imageZoomable":false,"lastExportedVersion":1,"type":"Hot Spot Popup Item","dynamicVisibility":true,"uuid":"eyJpdGVtSWQiOiJpdGVtX2RlXzAwMDBMR0VOIiwiY2F0YWxvZ0lkIjoiZ2Itd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","callToAction":{"container":false,"catalogVersion":"gb-wagoContentCatalog/Online","lastExportedVersion":1,"type":"Link Component","dynamicVisibility":true,"contentPageLabelOrId":"/psirt","uuid":"eyJpdGVtSWQiOiJpdGVtX2RlXzAwMDBMR0VPIiwiY2F0YWxvZ0lkIjoiZ2Itd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","footersSocial":[],"linkName":"More about PSIRT","footers":[],"ignoreOnTransfer":false,"uid":"item_de_0000LGEO","modifiedtime":"2025-01-03T10:42:19+0000","children":[],"onlyOneRestrictionMustApply":true,"selectedCmsFacets":[],"headers":[],"visible":true,"contentPage":"eyJpdGVtSWQiOiJwYWdlXzAwMDAzMDExIiwiY2F0YWxvZ0lkIjoiZ2Itd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","wagoColumnComponent":[],"availableLanguages":"AVAILABLE","passepartout":false,"restrictions":[],"footersPayment":[],"navigationNodes":[],"searchable":true,"url":"/automation-technology/psirt","typeCode":"CMSLinkComponent","target":"SAMEWINDOW","renderWithEmptyTarget":false,"external":false,"slots":[],"itemtype":"CMSLinkComponent","restricted":false,"name":"Link-Komponente","synchronizationBlocked":false,"linkType":"SECONDARY","containers":[],"creationtime":"2025-01-03T10:42:19+0000","navigationList":[],"actions":[],"contentVersion":1,"headersUserMenu":[],"parents":[]},"ignoreOnTransfer":false,"uid":"item_de_0000LGEN","modifiedtime":"2025-07-23T10:11:33+0000","children":[],"onlyOneRestrictionMustApply":true,"headline":"<p>PSIRT</p>","visible":true,"wagoColumnComponent":[],"availableLanguages":"AVAILABLE","passepartout":false,"restrictions":[],"searchable":true,"typeCode":"WagoHotSpotPopupItem","slots":[],"itemtype":"WagoHotSpotPopupItem","restricted":false,"name":"element_PSIRT","x":69,"synchronizationBlocked":false,"y":62,"containers":[],"creationtime":"2025-01-03T11:22:14+0000","actions":[],"contentVersion":1,"parents":[]},{"container":false,"catalogVersion":"gb-wagoContentCatalog/Online","contentAlignment":"AUTO","paragraph":"<p>Data protection affects every industry. That's why our security solutions are tailored to meet the specific needs of markets such as Smart Factory, Smart Building and Smart Energy.</p>","components":["eyJpdGVtSWQiOiJjb21wX2RlXzAwMDBMREFVIiwiY2F0YWxvZ0lkIjoiZ2Itd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ=="],"imageZoomable":false,"lastExportedVersion":1,"type":"Hot Spot Popup Item","dynamicVisibility":true,"uuid":"eyJpdGVtSWQiOiJpdGVtX2RlXzAwMDBMR0VQIiwiY2F0YWxvZ0lkIjoiZ2Itd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","callToAction":{"container":false,"catalogVersion":"gb-wagoContentCatalog/Online","lastExportedVersion":1,"type":"Link Component","dynamicVisibility":true,"contentPageLabelOrId":"/Cyber-Security-in-der-Gebäudeautomation","uuid":"eyJpdGVtSWQiOiJpdGVtX2RlXzAwMDBMR0VRIiwiY2F0YWxvZ0lkIjoiZ2Itd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","footersSocial":[],"linkName":"Get started safely!","footers":[],"ignoreOnTransfer":false,"uid":"item_de_0000LGEQ","modifiedtime":"2025-07-23T10:11:31+0000","children":[],"onlyOneRestrictionMustApply":true,"selectedCmsFacets":[],"headers":[],"visible":true,"contentPage":"eyJpdGVtSWQiOiJwYWdlXzAwMDA3UDBFIiwiY2F0YWxvZ0lkIjoiZ2Itd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","wagoColumnComponent":[],"availableLanguages":"AVAILABLE","passepartout":false,"restrictions":[],"footersPayment":[],"navigationNodes":[],"searchable":true,"url":"/building-technology/smart-building/cybersecurity-in-building-automation","typeCode":"CMSLinkComponent","target":"SAMEWINDOW","renderWithEmptyTarget":false,"external":false,"slots":[],"itemtype":"CMSLinkComponent","restricted":false,"name":"Link-Komponente","synchronizationBlocked":false,"linkType":"SECONDARY","containers":[],"creationtime":"2025-01-03T11:22:14+0000","navigationList":[],"actions":[],"contentVersion":1,"headersUserMenu":[],"parents":[]},"ignoreOnTransfer":false,"uid":"item_de_0000LGEP","modifiedtime":"2025-07-23T10:11:35+0000","children":[],"onlyOneRestrictionMustApply":true,"headline":"<p>Industries</p>","visible":true,"wagoColumnComponent":[],"availableLanguages":"AVAILABLE","passepartout":false,"restrictions":[],"searchable":true,"typeCode":"WagoHotSpotPopupItem","slots":[],"itemtype":"WagoHotSpotPopupItem","restricted":false,"name":"element_industries","x":50,"synchronizationBlocked":false,"y":84,"containers":[],"creationtime":"2025-01-03T11:22:15+0000","actions":[],"contentVersion":1,"parents":[]},{"container":false,"catalogVersion":"gb-wagoContentCatalog/Online","contentAlignment":"AUTO","paragraph":"<p>Our tailored software solutions enable early detection of cyber threats and help minimize them, for instance, through network segmentation.</p>","components":["eyJpdGVtSWQiOiJjb21wX2RlXzAwMDBMREFVIiwiY2F0YWxvZ0lkIjoiZ2Itd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ=="],"imageZoomable":false,"lastExportedVersion":1,"type":"Hot Spot Popup Item","dynamicVisibility":true,"uuid":"eyJpdGVtSWQiOiJpdGVtX2RlXzAwMDBMR0VSIiwiY2F0YWxvZ0lkIjoiZ2Itd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","callToAction":{"container":false,"catalogVersion":"gb-wagoContentCatalog/Online","type":"Link Component","dynamicVisibility":false,"uuid":"eyJpdGVtSWQiOiJpdGVtX2RlXzAwMDBMVTlXIiwiY2F0YWxvZ0lkIjoiZ2Itd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","footersSocial":[],"linkName":null,"footers":[],"ignoreOnTransfer":false,"uid":"item_de_0000LU9W","modifiedtime":"2025-07-23T10:11:33+0000","children":[],"onlyOneRestrictionMustApply":true,"selectedCmsFacets":[],"headers":[],"visible":true,"wagoColumnComponent":[],"passepartout":false,"restrictions":[],"footersPayment":[],"navigationNodes":[],"searchable":true,"url":null,"typeCode":"CMSLinkComponent","target":"SAMEWINDOW","renderWithEmptyTarget":false,"external":false,"slots":[],"itemtype":"CMSLinkComponent","restricted":false,"name":"Link-Komponente","synchronizationBlocked":false,"linkType":"SECONDARY","containers":[],"creationtime":"2025-07-23T10:11:33+0000","navigationList":[],"actions":[],"headersUserMenu":[],"parents":[]},"ignoreOnTransfer":false,"uid":"item_de_0000LGER","modifiedtime":"2025-07-23T10:11:34+0000","children":[],"onlyOneRestrictionMustApply":true,"headline":"<p>Products</p>","visible":true,"wagoColumnComponent":[],"availableLanguages":"AVAILABLE","passepartout":false,"restrictions":[],"searchable":true,"typeCode":"WagoHotSpotPopupItem","slots":[],"itemtype":"WagoHotSpotPopupItem","restricted":false,"name":"element_products","x":29,"synchronizationBlocked":false,"y":55,"containers":[],"creationtime":"2025-01-03T11:22:15+0000","actions":[],"contentVersion":1,"parents":[]},{"container":false,"catalogVersion":"gb-wagoContentCatalog/Online","contentAlignment":"AUTO","paragraph":"<p>To ensure maximum security, we provide consulting services in OT security, complemented by a combination of hardware and software solutions.</p>","components":["eyJpdGVtSWQiOiJjb21wX2RlXzAwMDBMREFVIiwiY2F0YWxvZ0lkIjoiZ2Itd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ=="],"imageZoomable":false,"lastExportedVersion":1,"type":"Hot Spot Popup Item","dynamicVisibility":true,"uuid":"eyJpdGVtSWQiOiJpdGVtX2RlXzAwMDBMR0VUIiwiY2F0YWxvZ0lkIjoiZ2Itd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","callToAction":{"container":false,"catalogVersion":"gb-wagoContentCatalog/Online","lastExportedVersion":1,"type":"Link Component","dynamicVisibility":true,"contentPageLabelOrId":"/cybersecurity-consulting","uuid":"eyJpdGVtSWQiOiJpdGVtX2RlXzAwMDBMR0VVIiwiY2F0YWxvZ0lkIjoiZ2Itd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","footersSocial":[],"linkName":"Go to Consulting","footers":[],"ignoreOnTransfer":false,"uid":"item_de_0000LGEU","modifiedtime":"2025-01-03T11:22:14+0000","children":[],"onlyOneRestrictionMustApply":true,"selectedCmsFacets":[],"headers":[],"visible":true,"contentPage":"eyJpdGVtSWQiOiJwYWdlX2RlXzAwMDBJVThSIiwiY2F0YWxvZ0lkIjoiZ2Itd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","wagoColumnComponent":[],"availableLanguages":"AVAILABLE","passepartout":false,"restrictions":[],"footersPayment":[],"navigationNodes":[],"searchable":true,"url":"/open-automation/cybersecurity/cybersecurity-consulting","typeCode":"CMSLinkComponent","target":"SAMEWINDOW","renderWithEmptyTarget":false,"external":false,"slots":[],"itemtype":"CMSLinkComponent","restricted":false,"name":"Link-Komponente","synchronizationBlocked":false,"linkType":"SECONDARY","containers":[],"creationtime":"2025-01-03T11:22:14+0000","navigationList":[],"actions":[],"contentVersion":1,"headersUserMenu":[],"parents":[]},"ignoreOnTransfer":false,"uid":"item_de_0000LGET","modifiedtime":"2025-01-03T11:22:15+0000","children":[],"onlyOneRestrictionMustApply":true,"headline":"<p>Consulting</p>","visible":true,"wagoColumnComponent":[],"availableLanguages":"AVAILABLE","passepartout":false,"restrictions":[],"searchable":true,"typeCode":"WagoHotSpotPopupItem","slots":[],"itemtype":"WagoHotSpotPopupItem","restricted":false,"name":"element_consulting","x":37,"synchronizationBlocked":false,"y":17,"containers":[],"creationtime":"2025-01-03T11:22:15+0000","actions":[],"contentVersion":1,"parents":[]}],"actions":[],"contentVersion":3,"parents":[]}