[{"term":"Libraries_BA","id":0,"type":"QUICKLINKS"},{"term":"Instructions","id":1,"type":"QUICKLINKS"},{"term":"WAGO-I/O-PRO","id":2,"type":"QUICKLINKS"},{"term":"Building","id":3,"type":"QUICKLINKS"},{"term":"221","id":4,"type":"QUICKLINKS"}]
{ "@context": "https://schema.org", "@type": "BreadcrumbList", "itemListElement": [ { "@type": "ListItem", "position": 1, "name": "Homepage", "item": "https://www.wago.com/tr-en" }, { "@type": "ListItem", "position": 2, "name": "Cybersecurity", "item": "https://www.wago.com/tr-en/cybersecurity" } ] } [{"url":"/cybersecurity","name":"Cybersecurity","linkClass":"active","categoryCode":null}]
{"container":false,"catalogVersion":"tr-wagoContentCatalog/Online","menuLinksOrdered":[],"type":"Category Stage","dynamicVisibility":true,"cloneable":true,"uuid":"eyJpdGVtSWQiOiJjb21wXzAwMDA3WjFJIiwiY2F0YWxvZ0lkIjoidHItd2Fnb0NvbnRlbnRDYXRhbG9nIiwiY2F0YWxvZ1ZlcnNpb24iOiJPbmxpbmUifQ==","ignoreOnTransfer":false,"uid":"comp_00007Z1I","modifiedtime":"2025-12-22T08:11:39+0000","children":[],"flat":false,"onlyOneRestrictionMustApply":true,"headline":"Cybersecurity ","image":{"code":"Loesungen_Cyber-Security_2000x1125.jpg","altText":"Loesungen_Cyber-Security_2000x1125.jpg","imageFormats":[{"imageType":null,"format":"2000","url":"/medias/2000-Loesungen-Cyber-Security-2000x1125.jpg?context=bWFzdGVyfGltYWdlc3w4MDE4MXxpbWFnZS9qcGVnfGFEZ3lMMmd6WlM4eE5ERTNOemc0TkRNd056UTROaTh5TURBd1gweHZaWE4xYm1kbGJsOURlV0psY2kxVFpXTjFjbWwwZVY4eU1EQXdlREV4TWpVdWFuQm58MGRmMTIyYTE1MjUxYWE4N2E0ODQ4MWU3N2VmZGVjNjMwMzkzOGViNmY2MDYyMDhhZTE4YWM0ZGRlYWQxOTMzYw","altText":null,"galleryIndex":null,"width":null,"description":null,"mediaType":null,"code":null},{"imageType":null,"format":"1600","url":"/medias/1600-Loesungen-Cyber-Security-2000x1125.jpg?context=bWFzdGVyfGltYWdlc3w1NjM0NnxpbWFnZS9qcGVnfGFEYzBMMmd5WXk4eE5ERTNOemc0TkRnNU56TXhNQzh4TmpBd1gweHZaWE4xYm1kbGJsOURlV0psY2kxVFpXTjFjbWwwZVY4eU1EQXdlREV4TWpVdWFuQm58MDgyNzIxNTIwMzk2NDAyNjc2MzAyOTliOGMzMjBhZGVhYjhlMDM3OGQ1MGQ1NmI2OWNkNjAyZTcyZjAyZDE0Yg","altText":null,"galleryIndex":null,"width":null,"description":null,"mediaType":null,"code":null},{"imageType":null,"format":"1280","url":"/medias/1280-Loesungen-Cyber-Security-2000x1125.jpg?context=bWFzdGVyfGltYWdlc3w0MDI1N3xpbWFnZS9qcGVnfGFHTXpMMmd6WVM4eE5ERTNOemc0TkRRek9EVTFPQzh4TWpnd1gweHZaWE4xYm1kbGJsOURlV0psY2kxVFpXTjFjbWwwZVY4eU1EQXdlREV4TWpVdWFuQm58ZGEyZDA2ZjM4ODg3ZjUyNjE3ZTRmZDVjMDY4N2MyMTk4MTMzMzQ5ODY3NThjMmQxZTBkOWMzOGVhNTM1NjgxMQ","altText":null,"galleryIndex":null,"width":null,"description":null,"mediaType":null,"code":null},{"imageType":null,"format":"1024","url":"/medias/1024-Loesungen-Cyber-Security-2000x1125.jpg?context=bWFzdGVyfGltYWdlc3wyODIwMHxpbWFnZS9qcGVnfGFHSXhMMmd6Tnk4eE5ERTNOemc0TkRVd05EQTVOQzh4TURJMFgweHZaWE4xYm1kbGJsOURlV0psY2kxVFpXTjFjbWwwZVY4eU1EQXdlREV4TWpVdWFuQm58YzYwMjJhOWFhZmRhZDM3ZjYwYWFlMGJjNTk2YjA3NGY0NWQ0ODAyMWI1YmViMDJiMjExYWNmMDFhNGJjMTAzZQ","altText":null,"galleryIndex":null,"width":null,"description":null,"mediaType":null,"code":null},{"imageType":null,"format":"768","url":"/medias/768-Loesungen-Cyber-Security-2000x1125.jpg?context=bWFzdGVyfGltYWdlc3wxODA4MXxpbWFnZS9qcGVnfGFEQTBMMmd6Tnk4eE5ERTNOemc0TkRVMk9UWXpNQzgzTmpoZlRHOWxjM1Z1WjJWdVgwTjVZbVZ5TFZObFkzVnlhWFI1WHpJd01EQjRNVEV5TlM1cWNHY3xiYWFlZmMxODdhNmM1MzdiYTBkYzQ2YzA2NDUyMGMxM2E1MDFkNjVlYTE5MmRiN2ViMTZhOGI2ZTJkYmIyM2Ji","altText":null,"galleryIndex":null,"width":null,"description":null,"mediaType":null,"code":null},{"imageType":null,"format":"480","url":"/medias/480-Loesungen-Cyber-Security-2000x1125.jpg?context=bWFzdGVyfGltYWdlc3w4NDE5fGltYWdlL2pwZWd8YUdZeUwyZ3pNeTh4TkRFM056ZzRORFl6TlRFMk5pODBPREJmVEc5bGMzVnVaMlZ1WDBONVltVnlMVk5sWTNWeWFYUjVYekl3TURCNE1URXlOUzVxY0djfDg0MjUzZTQ4N2E1NGMzOTk3OGRlNTA1YmM2ODM3MGMyNDkxNzkyZGM0NGJhYWUzNDJmOTJkYzRkMTQwN2QwOTQ","altText":null,"galleryIndex":null,"width":null,"description":null,"mediaType":null,"code":null},{"imageType":null,"format":"200","url":"/medias/200-Loesungen-Cyber-Security-2000x1125.jpg?context=bWFzdGVyfGltYWdlc3w4NzB8aW1hZ2UvanBlZ3xhREl5TDJneVpDOHhOREUzTnpnNE5EZ3pNVGMzTkM4eU1EQmZURzlsYzNWdVoyVnVYME41WW1WeUxWTmxZM1Z5YVhSNVh6SXdNREI0TVRFeU5TNXFjR2N8MWE2OWMxYTRhMWJiNzNmNzRjMGFmNWYyZjU4MGM2MjE5ZmE5NjAzNjJjZjU3ZjQxOTRmOTQ1ZDk4ZjhlM2EzMw","altText":null,"galleryIndex":null,"width":null,"description":null,"mediaType":null,"code":null}],"description":"Loesungen_Cyber-Security_2000x1125.jpg"},"lastLoad":1766391098926,"visible":true,"wagoColumnComponent":[],"availableLanguages":"AVAILABLE","productLinkOverrideType":"PRODUCT","passepartout":false,"restrictions":[],"contentLinkOverrideType":"CONTENT","searchable":true,"typeCode":"WagoCategoryStageComponent","slots":["eyJpdGVtSWQiOiJjc18wMDAwMURFOCIsImNhdGFsb2dJZCI6InRyLXdhZ29Db250ZW50Q2F0YWxvZyIsImNhdGFsb2dWZXJzaW9uIjoiT25saW5lIn0="],"textboxOpacity":0,"itemtype":"WagoCategoryStageComponent","restricted":false,"name":"Stage","synchronizationBlocked":false,"containers":[],"creationtime":"2020-07-29T14:35:39+0000","actions":[],"parents":[]}

Open Automation with WAGO

Are openness and security mutually exclusive?
Quite the contrary – see for yourself!

Digitalization makes your machine, system and building data available anywhere in the world. To ensure the integrity of your information during Web attacks and Web transfers, it is necessary to protect it.
With our PFC100 and PFC200 Controllers, you’ll always be on the safe side. Learn how the controllers encrypt information directly in the controller and then transmit it to the cloud via IPsec or OpenVPN.

Cybersecurity Made by WAGO

For many years, machine data was only evaluated and used in the manufacturing facility in which it was generated. Thus, the risk of unauthorized data access was relatively low. Use of classic defense-in-depth measures ensured that machine data was well protected.

WAGO’s PFC100 and PFC200 Controllers encrypt information directly in the controller and subsequently transmit the data to the cloud via IPsec or OpenVPN. This ensures that machine data is optimally protected against unauthorized access.

Step-by-step to the solution:

  • Previously: Data remained in the manufacturing hall.
  • Digitalization: Defense-in-depth carries risks.
  • The solution: Data encryption happens in the controller.
Loesungen_Cyber_Security_2000x2000.jpg