Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Service

OT SECURITY

Product Expert

south_east

Categories

Computer emergency response team (CERT) Business continuity

Key Facts

  • KRITIS
  • OT Security
  • NIS2

Product Description

Fend off attacks, protect production environments: The ever-increasing digitalization of production processes is tempting cybercriminals to target control systems, robots and similar systems. In addition, the pressure from the legislator (KRITIS/NIS2 etc.) is increasing, forcing operators of OT networks to use new technologies and methods for which neither competencies nor resources were previously planned. Therefore, cyber security is only effective in an overall view of IT and OT. Take advantage now of the expanded security portfolio from K-Businesscom to eliminate weaknesses and protect against new threats. It is well known that workstation computers and servers can become victims of cyber attacks. But what is the threat situation for production environments? Production systems today are networked and automated. Communication runs via LAN/WLAN and mobile radio. The processes work with digital sensors, the instructions come from computer-aided control systems. Raw materials are conveyed by intelligent transport solutions and processed by robots. The finished products are automatically quality controlled. And the entire production environment is usually completely or at least partially integrated into the ERP system. All of this makes manufacturing plants vulnerable to internal and external threats. In addition to a company's known attack targets, such as user terminals as the gateway and mail and file servers as the final target, production systems also come under attack. The costly effects range from industrial espionage to sabotage. Weak points are often only noticed after the damage has already occurred. To prevent these attacks, it is particularly important to take effective precautionary measures. The security specialists from KBC support you in securing your production environments over the long term.
... read more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.