{"id":24831,"date":"2022-10-19T11:57:51","date_gmt":"2022-10-19T09:57:51","guid":{"rendered":"https:\/\/www.ikarussecurity.com\/industrial-cyber-security\/"},"modified":"2025-11-21T13:30:59","modified_gmt":"2025-11-21T12:30:59","slug":"industrial-cyber-security","status":"publish","type":"page","link":"https:\/\/www.ikarussecurity.com\/en\/industrial-cyber-security\/","title":{"rendered":"Industrial Cyber Security"},"content":{"rendered":"<div id='av-layout-grid-1'  class='av-layout-grid-container av-m46uh1zu-ab10303755c84cd21f52a78a6aae35f1 entry-content-wrapper main_color av-flex-cells  avia-builder-el-0  el_before_av_layout_row  avia-builder-el-first   container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m46uhdsy-41cfb1e7fd9e4a8d7ac66529a4ca484f\">\n.flex_cell.av-m46uhdsy-41cfb1e7fd9e4a8d7ac66529a4ca484f{\nvertical-align:middle;\nheight:400px;\nmin-height:400px;\nbackground:url(https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/09\/IndustrialCyberSecurity-1200-2.jpg) 0% 0% no-repeat scroll #65b6cd;\n}\n.responsive #top #wrap_all .flex_cell.av-m46uhdsy-41cfb1e7fd9e4a8d7ac66529a4ca484f{\npadding:0px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-m46uhdsy-41cfb1e7fd9e4a8d7ac66529a4ca484f av-gridrow-cell av_one_half no_margin av-hide-on-mobile  avia-builder-el-1  el_before_av_cell_one_half  avia-builder-el-first  content-align-middle av-zero-padding avia-full-stretch'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m3yko7wj-0b0bb15cf7ca4441542b82224410f3c3\">\n.flex_cell.av-m3yko7wj-0b0bb15cf7ca4441542b82224410f3c3{\nvertical-align:top;\nheight:400px;\nmin-height:400px;\nbackground-color:#0993ba;\n}\n.responsive #top #wrap_all .flex_cell.av-m3yko7wj-0b0bb15cf7ca4441542b82224410f3c3{\npadding:60px 30px 60px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-m3yko7wj-0b0bb15cf7ca4441542b82224410f3c3 av-gridrow-cell av_one_half no_margin  avia-builder-el-2  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lna2nf3v-fd22351ef082f2c5c781ea456aa5953a\">\n#top .av-special-heading.av-lna2nf3v-fd22351ef082f2c5c781ea456aa5953a{\npadding-bottom:25px;\ncolor:#ffffff;\nfont-size:34px;\n}\nbody .av-special-heading.av-lna2nf3v-fd22351ef082f2c5c781ea456aa5953a .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n#top #wrap_all .av-special-heading.av-lna2nf3v-fd22351ef082f2c5c781ea456aa5953a .av-special-heading-tag{\nfont-size:34px;\n}\n.av-special-heading.av-lna2nf3v-fd22351ef082f2c5c781ea456aa5953a .special-heading-inner-border{\nborder-color:#ffffff;\n}\n.av-special-heading.av-lna2nf3v-fd22351ef082f2c5c781ea456aa5953a .av-subheading{\nfont-size:15px;\n}\n\n@media only screen and (min-width: 480px) and (max-width: 767px){ \n#top #wrap_all .av-special-heading.av-lna2nf3v-fd22351ef082f2c5c781ea456aa5953a .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n\n@media only screen and (max-width: 479px){ \n#top #wrap_all .av-special-heading.av-lna2nf3v-fd22351ef082f2c5c781ea456aa5953a .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n<\/style>\n<div  class='av-special-heading av-lna2nf3v-fd22351ef082f2c5c781ea456aa5953a av-special-heading-h1 custom-color-heading blockquote modern-quote  avia-builder-el-3  el_before_av_textblock  avia-builder-el-first  av-inherit-size av-linked-heading'><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Industrial Cyber Security and Operational Resilience &#8211; Protecting Industry and Critical Infrastructure<\/h1><div class='av_custom_color av-subheading av-subheading_below'><p>OT Security Technologies and Professional Services for Secure Industrial Networks<\/p>\n<\/div><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lna2nle8-0623f3bf6e381053f0b5fd2bc71672a2\">\n#top .av_textblock_section.av-lna2nle8-0623f3bf6e381053f0b5fd2bc71672a2 .avia_textblock{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='av_textblock_section av-lna2nle8-0623f3bf6e381053f0b5fd2bc71672a2 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><div class=\"avia-testimonial-meta-mini\">\n<p>The convergence of IT and OT (Operational Technology) is creating a new technological world: the Industrial Internet of Things (IIoT). IT and OT managers are faced with the challenge of correctly and safely addressing the opportunities and risks of digitalisation and networking.<\/p>\n<p>OT Security plays a crucial role in this. Effective OT Security measures not only ensure protection against cyber threats, but also strengthen operational resilience. Companies can adapt to changing conditions, overcome disruptions and ensure continuous business operations. With OT Security, a no-disruption, never-down mentality is possible to ensure smooth and secure operations.<\/p>\n<\/div>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-2'  class='av-layout-grid-container av-av_layout_row-245abc8a4e7d35cce528c7a9b934107f entry-content-wrapper main_color av-flex-cells  avia-builder-el-5  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m46uhoi1-d66587287a3f384b154d684d20e4c53d\">\n.flex_cell.av-m46uhoi1-d66587287a3f384b154d684d20e4c53d{\nvertical-align:top;\nbackground-color:#0993ba;\n}\n.responsive #top #wrap_all .flex_cell.av-m46uhoi1-d66587287a3f384b154d684d20e4c53d{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-m46uhoi1-d66587287a3f384b154d684d20e4c53d av-gridrow-cell av_one_half no_margin av-hide-on-mobile  avia-builder-el-6  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_cell_one_half-f4d418017c15f7ac2c9de0855a196d55\">\n.flex_cell.av-av_cell_one_half-f4d418017c15f7ac2c9de0855a196d55{\nvertical-align:top;\nbackground-color:#65b6cd;\n}\n.responsive #top #wrap_all .flex_cell.av-av_cell_one_half-f4d418017c15f7ac2c9de0855a196d55{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-av_cell_one_half-f4d418017c15f7ac2c9de0855a196d55 av-gridrow-cell av_one_half no_margin  avia-builder-el-7  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div>\n<\/div>\n<div id='av-layout-grid-3'  class='av-layout-grid-container av-av_layout_row-46d56c4f66cbc09d226fc8a5cde06bdd entry-content-wrapper main_color av-flex-cells  avia-builder-el-8  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_cell_one_half-60cc36e0349b2c4cb032d22c779b15bd\">\n.flex_cell.av-av_cell_one_half-60cc36e0349b2c4cb032d22c779b15bd{\nvertical-align:top;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-av_cell_one_half-60cc36e0349b2c4cb032d22c779b15bd{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-av_cell_one_half-60cc36e0349b2c4cb032d22c779b15bd av-gridrow-cell av_one_half no_margin  avia-builder-el-9  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-lna2qytr-214234c032cf9100ce3377a1983d0530 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>OT Security enables secure and resilient digitalisation, automation and IT-OT convergence<\/h2>\n<p>With the digitalisation and automation of critical infrastructure and industrial product environments, the points of attack have multiplied. Random or targeted attacks from IT, security vulnerabilities in software and hardware, attacks from the supply chain, insider threats, misconduct, industrial espionage and infrastructure failures demand adapted protection mechanisms.<\/p>\n<h3>Network virtualisation and holistic risk management<\/h3>\n<p>Transparency is the basis for secure industrial networks, infrastructure and production. Only complete knowledge of all assets and network communication enables the efficient selection of suitable security strategies, appropriate risk management and the early detection of threats and anomalies.<\/p>\n<h3>Real-time monitoring and proactive threat detection<\/h3>\n<p>By analysing network and telemetry data from various systems, devices and protocols in real time, new technologies such as <a href=\"https:\/\/www.ikarussecurity.com\/en\/industrial-cyber-security\/ikarus-ot-security-sensor-management\/\">Nozomi Networks&#8217; passive OT Security Sensors<\/a> help to generate valuable information and create new insights for decision-making without affecting ongoing operations. Pre-processed and aggregated data provides you with relevant information on the status of current cyber hygiene and the current threat situation. Using Threat Intelligence, threat data and behavioural patterns can be put into a broader context and security-relevant operations can be understood and prevented at an early stage<\/p>\n<\/div><\/section>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_cell_one_half-cabae9bdfb0e32d9e0addadb0685857c\">\n.flex_cell.av-av_cell_one_half-cabae9bdfb0e32d9e0addadb0685857c{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-av_cell_one_half-cabae9bdfb0e32d9e0addadb0685857c{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-av_cell_one_half-cabae9bdfb0e32d9e0addadb0685857c av-gridrow-cell av_one_half no_margin  avia-builder-el-11  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-4'  class='av-layout-grid-container av-av_layout_row-46d56c4f66cbc09d226fc8a5cde06bdd entry-content-wrapper main_color av-flex-cells  avia-builder-el-13  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_cell_one_full-88433d15013fb9142df74610e9fc0266\">\n.flex_cell.av-av_cell_one_full-88433d15013fb9142df74610e9fc0266{\nvertical-align:top;\nbackground-color:#0993ba;\n}\n.responsive #top #wrap_all .flex_cell.av-av_cell_one_full-88433d15013fb9142df74610e9fc0266{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-av_cell_one_full-88433d15013fb9142df74610e9fc0266 av-gridrow-cell av_one_full no_margin  avia-builder-el-14  avia-builder-el-no-sibling  content-align-top'  ><div class='flex_cell_inner'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lna2rrhr-8ef69640fe96fd9c80bb513645e846d5\">\n#top .av_textblock_section.av-lna2rrhr-8ef69640fe96fd9c80bb513645e846d5 .avia_textblock{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='av_textblock_section av-lna2rrhr-8ef69640fe96fd9c80bb513645e846d5 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><h2>IKARUS OT Security Solutions and Services<\/h2>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-av_button-e886ac75445d58cdd64dde216e7c7433-wrap avia-button-left  avia-builder-el-16  el_after_av_textblock  el_before_av_button '><a href='https:\/\/www.ikarussecurity.com\/?page_id=27848'  class='avia-button av-av_button-e886ac75445d58cdd64dde216e7c7433 av-link-btn avia-icon_select-no avia-size-small avia-position-left avia-color-light'   aria-label=\"OT Security Sensor Guardian\"><span class='avia_iconbox_title' >OT Security Sensor Guardian<\/span><\/a><\/div><br \/>\n<div  class='avia-button-wrap av-av_button-89138404482731dfa1f8c22151cff0d6-wrap avia-button-left  avia-builder-el-17  el_after_av_button  el_before_av_button '><a href='https:\/\/www.ikarussecurity.com\/?page_id=28828'  class='avia-button av-av_button-89138404482731dfa1f8c22151cff0d6 av-link-btn avia-icon_select-no avia-size-small avia-position-left avia-color-light'   aria-label=\"OT Security Sensor Management\"><span class='avia_iconbox_title' >OT Security Sensor Management<\/span><\/a><\/div><br \/>\n<div  class='avia-button-wrap av-av_button-b88e7eee349b99a508433c2b304b668c-wrap avia-button-left  avia-builder-el-18  el_after_av_button  el_before_av_button '><a href='https:\/\/www.ikarussecurity.com\/?page_id=28930'  class='avia-button av-av_button-b88e7eee349b99a508433c2b304b668c av-link-btn avia-icon_select-no avia-size-small avia-position-left avia-color-light'   aria-label=\"OT Security Professional Services\"><span class='avia_iconbox_title' >OT Security Professional Services<\/span><\/a><\/div><br \/>\n<div  class='avia-button-wrap av-av_button-a1b40e7a9fa75c85cdfd962ca3eaa695-wrap avia-button-left  avia-builder-el-19  el_after_av_button  el_before_av_button '><a href='https:\/\/www.ikarussecurity.com\/managed-it-ot-security-solutions\/ikarus-24-7-incident-response\/'  class='avia-button av-av_button-a1b40e7a9fa75c85cdfd962ca3eaa695 av-link-btn avia-icon_select-no avia-size-small avia-position-left avia-color-light'   aria-label=\"IKARUS 24\/7 incident.response\"><span class='avia_iconbox_title' >IKARUS 24\/7 incident.response<\/span><\/a><\/div><br \/>\n<div  class='avia-button-wrap av-lna2thf5-8088ef3900ba40f43d0d041a03a7c988-wrap avia-button-left  avia-builder-el-20  el_after_av_button  avia-builder-el-last '><a href='mailto:sales@ikarus.at?subject=IKARUS%20OT%20Security%20Solutions-demo%20request%20from%20www.ikarussecurity.com'  class='avia-button av-lna2thf5-8088ef3900ba40f43d0d041a03a7c988 av-link-btn avia-icon_select-no avia-size-medium avia-position-left avia-color-white'  target=\"_blank\"  rel=\"noopener noreferrer\"  aria-label=\"Request demo\"><span class='avia_iconbox_title' >Request demo<\/span><\/a><\/div><\/p>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-5'  class='av-layout-grid-container av-av_layout_row-46d56c4f66cbc09d226fc8a5cde06bdd entry-content-wrapper main_color av-flex-cells  avia-builder-el-21  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_cell_one_full-3c85613798b08cd0bc04ecad6d2b7195\">\n.flex_cell.av-av_cell_one_full-3c85613798b08cd0bc04ecad6d2b7195{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-av_cell_one_full-3c85613798b08cd0bc04ecad6d2b7195{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-av_cell_one_full-3c85613798b08cd0bc04ecad6d2b7195 av-gridrow-cell av_one_full no_margin  avia-builder-el-22  avia-builder-el-no-sibling  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-lna2zeou-571e1ac8a6ab8acab801e8ac72eaf241 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><div id=\"zitat\">\n<p style=\"text-align: center;\"><em>\u201eThe biggest mental challenge for IT and OT practitioners is not only a rethinking, <\/em><br \/>\n<em>but a <strong>new way of thinking<\/strong> about the entire task area. <\/em><\/p>\n<p style=\"text-align: center;\"><em>Interdisciplinary teams including new technical equipment are needed <\/em><br \/>\n<em>to jointly create a secure Industrial IoT Infrastructure in the companies. \u201c<\/em><\/p>\n<\/div>\n<p style=\"text-align: center;\"><em>Herbert Dirnberger, Industrial Cyber Security Expert, IKARUS Security Software<\/em><\/p>\n<\/div><\/section>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-6'  class='av-layout-grid-container av-av_layout_row-46d56c4f66cbc09d226fc8a5cde06bdd entry-content-wrapper main_color av-flex-cells  avia-builder-el-24  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_cell_one_half-60cc36e0349b2c4cb032d22c779b15bd\">\n.flex_cell.av-av_cell_one_half-60cc36e0349b2c4cb032d22c779b15bd{\nvertical-align:top;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-av_cell_one_half-60cc36e0349b2c4cb032d22c779b15bd{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-av_cell_one_half-60cc36e0349b2c4cb032d22c779b15bd av-gridrow-cell av_one_half no_margin  avia-builder-el-25  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-lna30ph1-399a6a40728499304dc4d959e954f293 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Cyber security and network visualisation for industrial production and critical infrastructure<\/h3>\n<p>The increasing threat of ransomware, supply chain attacks and phishing attacks pose a serious threat to your IT systems. Vulnerable OT\/IoT devices are also gateways for potential attacks. To effectively protect your business, you need an up-to-date view of assets, protocols, network traffic and vulnerabilities in critical infrastructure and production.<\/p>\n<p><a href=\"https:\/\/www.ikarussecurity.com\/en\/industrial-cyber-security\/ot-security-sensor-guardian-by-nozomi-networks\/\">Guardian\u2122 by Nozomi Networks<\/a> provides visibility of production networks and early detection of cyber threats, risks and anomalies. Intelligent notifications and the ability to monitor process variables enable a targeted response to security incidents. In addition, Nozomi Networks Threat Intelligence\u2122 provides global information and insights that are also of interest to IT, such as real-time detection of malware or vulnerabilities.<\/p>\n<p>In many OT security projects, the essential question of responsibility within the company arises. Who is responsible for OT security in production and critical infrastructure, especially the CISO and IT security experts? Often the role is delegated by the operations manager. IKARUS supports you in improving your IT\/OT security as well as in a Proof of Value and offers intelligent system integration into your existing Security Operations Centre. Our customers particularly appreciate our advisory calls and health checks.<\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-lna3b9e6-87f82375026c1342e844d6cacdfc7d63-wrap avia-button-left  avia-builder-el-27  el_after_av_textblock  el_before_av_button '><a href='\/wp-content\/downloads\/OT-Security_CISO-Checklist_EN.pdf'  class='avia-button av-lna3b9e6-87f82375026c1342e844d6cacdfc7d63 av-link-btn avia-icon_select-no avia-size-small avia-position-left avia-color-dark'  target=\"_blank\"  rel=\"noopener noreferrer\"  aria-label=\"CISO-Checklist OT Security\"><span class='avia_iconbox_title' >CISO-Checklist OT Security<\/span><\/a><\/div><br \/>\n<div  class='avia-button-wrap av-lna36s5z-5b1fd7cae3221f0e52d18c77b8a91e76-wrap avia-button-left  avia-builder-el-28  el_after_av_button  avia-builder-el-last '>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lna36s5z-5b1fd7cae3221f0e52d18c77b8a91e76\">\n#top #wrap_all .avia-button.av-lna36s5z-5b1fd7cae3221f0e52d18c77b8a91e76{\nbackground-color:#0993ba;\nborder-color:#0993ba;\ncolor:#ffffff;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-lna36s5z-5b1fd7cae3221f0e52d18c77b8a91e76 .avia-svg-icon svg:first-child{\nfill:#ffffff;\nstroke:#ffffff;\n}\n<\/style>\n<a href='mailto:sales@ikarus.at'  class='avia-button av-lna36s5z-5b1fd7cae3221f0e52d18c77b8a91e76 av-link-btn avia-icon_select-no avia-size-medium avia-position-left'  target=\"_blank\"  rel=\"noopener noreferrer\"  aria-label=\"Contact us\"><span class='avia_iconbox_title' >Contact us<\/span><\/a><\/div><\/p>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_cell_one_half-6c902beb08ce969d2989d63dd4696133\">\n.flex_cell.av-av_cell_one_half-6c902beb08ce969d2989d63dd4696133{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-av_cell_one_half-6c902beb08ce969d2989d63dd4696133{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-av_cell_one_half-6c902beb08ce969d2989d63dd4696133 av-gridrow-cell av_one_half no_margin  avia-builder-el-29  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-lna328wq-043ef7f43b637f4a1bfc77bb6d6bed77 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Cyber security and a highly available operation for energy suppliers and utilities<\/h3>\n<p>In today&#8217;s digital world, utilities face ever-increasing cyber security challenges. Threats are constantly increasing, and high-quality solutions are needed to protect critical infrastructure and its availability.<\/p>\n<p>The OT Security Sensor <a href=\"https:\/\/www.ikarussecurity.com\/en\/industrial-cyber-security\/ot-security-sensor-guardian-by-nozomi-networks\/\">Guardian\u2122 by Nozomi Networks<\/a> is a comprehensive solution tailored to the specific needs of utilities, supporting key protocols such as IEC 61870, IEC 61850 and many more, as well as the creation and maintenance of asset inventories. The security of your protocols and a detailed knowledge of the infrastructure and associated devices are essential to identify potential vulnerabilities and take targeted security measures.<\/p>\n<p>IKARUS helps you plan and implement your cybersecurity strategy and meet your EU NIS\/NIS2 compliance requirements with appropriate technologies and services. You gain real-time insights into your device and network communications, centrally monitor the behaviour of your global assets for threats or anomalies and receive alerts on changes that indicate potential problems. Our expertise in defending against attacks on electrical infrastructure makes us the ideal partner for your cybersecurity needs.<\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-mcnfk6ah-a794b4db858ee9264eb1249f6e626a8a-wrap avia-button-left  avia-builder-el-31  el_after_av_textblock  el_before_av_button '><a href='https:\/\/www.ikarussecurity.com\/wp-content\/downloads\/Nozomi-Networks-Protocol-Support-List-A4.pdf'  class='avia-button av-mcnfk6ah-a794b4db858ee9264eb1249f6e626a8a av-link-btn avia-icon_select-no avia-size-small avia-position-left avia-color-dark'  target=\"_blank\"  rel=\"noopener noreferrer\"  aria-label=\"Protocol Support List\"><span class='avia_iconbox_title' >Protocol Support List<\/span><\/a><\/div><br \/>\n<div  class='avia-button-wrap av-av_button-8c10a2073a0e1af609fa4433444792cc-wrap avia-button-left  avia-builder-el-32  el_after_av_button  el_before_av_button '><a href='https:\/\/assets-global.website-files.com\/645a4534705010e2cb244f50\/6494f33158d1eae5d362789e_Nozomi-Networks-Case-Study-ENEL-Securing-Global-Power-Generation-Network.pdf'  class='avia-button av-av_button-8c10a2073a0e1af609fa4433444792cc av-link-btn avia-icon_select-no avia-size-small avia-position-left avia-color-dark'  target=\"_blank\"  rel=\"noopener noreferrer\"  aria-label=\"Case Study ENEL\"><span class='avia_iconbox_title' >Case Study ENEL<\/span><\/a><\/div><br \/>\n<div  class='avia-button-wrap av-av_button-d0f8a57a54b1c830642020fd6c91f842-wrap avia-button-left  avia-builder-el-33  el_after_av_button  el_before_av_button '><a href='https:\/\/www.ikarussecurity.com\/ressourcen\/mehr-cybersicherheit-fuer-die-energieversorgung\/'  class='avia-button av-av_button-d0f8a57a54b1c830642020fd6c91f842 av-link-btn avia-icon_select-no avia-size-small avia-position-left avia-color-dark'   aria-label=\"Whitepaper Energieversorgung\"><span class='avia_iconbox_title' >Whitepaper Energieversorgung<\/span><\/a><\/div><br \/>\n<div  class='avia-button-wrap av-lna36wwv-2bc1c2b935f47d19fa8bc23ccf0385ad-wrap avia-button-left  avia-builder-el-34  el_after_av_button  avia-builder-el-last '>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lna36wwv-2bc1c2b935f47d19fa8bc23ccf0385ad\">\n#top #wrap_all .avia-button.av-lna36wwv-2bc1c2b935f47d19fa8bc23ccf0385ad{\nbackground-color:#0993ba;\nborder-color:#0993ba;\ncolor:#ffffff;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-lna36wwv-2bc1c2b935f47d19fa8bc23ccf0385ad .avia-svg-icon svg:first-child{\nfill:#ffffff;\nstroke:#ffffff;\n}\n<\/style>\n<a href='mailto:sales@ikarus.at'  class='avia-button av-lna36wwv-2bc1c2b935f47d19fa8bc23ccf0385ad av-link-btn avia-icon_select-no avia-size-medium avia-position-left'  target=\"_blank\"  rel=\"noopener noreferrer\"  aria-label=\"Contact us\"><span class='avia_iconbox_title' >Contact us<\/span><\/a><\/div><\/p>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-7'  class='av-layout-grid-container av-av_layout_row-46d56c4f66cbc09d226fc8a5cde06bdd entry-content-wrapper main_color av-flex-cells  avia-builder-el-35  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_cell_one_half-6c902beb08ce969d2989d63dd4696133\">\n.flex_cell.av-av_cell_one_half-6c902beb08ce969d2989d63dd4696133{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-av_cell_one_half-6c902beb08ce969d2989d63dd4696133{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-av_cell_one_half-6c902beb08ce969d2989d63dd4696133 av-gridrow-cell av_one_half no_margin  avia-builder-el-36  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-lna3ddfh-2ede078d17facc40a87eccac06ba82f0 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>NIS2 cyber security requirements<\/h3>\n<p>The EU Network and Information Systems Regulations require comprehensive cyber security measures for essential and critical services and infrastructure. The updated NIS2 directive aims to improve the resilience and responsiveness of critical infrastructure in the face of increasing threats. Nozomi Networks and IKARUS jointly offer a solution to meet the requirements for optimised cyber security.<\/p>\n<p>Nozomi Networks&#8217; technologies help organisations manage security risk, protect against cyber-attacks, detect security-related incidents and minimise the impact of security incidents. Together with IKARUS&#8217; services, this results in a comprehensive solution for cyber security in industrial networks and critical infrastructure.<\/p>\n<p>IKARUS Advisory Meetings and regular IKARUS Health Checks for the OT Security Sensor Guardian\u2122 by Nozomi Networks enable tailored support by certified Industrial Security Experts and ensure optimal operation. In addition, IKARUS supports you in creating and maintaining up-to-date asset inventories to meet the requirements of the NIS2 directive. You benefit from a holistic solution to protect against cyber attacks, detect vulnerabilities and security incidents, and improve the cyber resilience of critical infrastructure.<\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-lna3habz-091554447090e25bb08056aa2fc3a088-wrap avia-button-left  avia-builder-el-38  el_after_av_textblock  el_before_av_button '><a href='\/wp-content\/downloads\/Whitepaper_Resilienz_und_Cybersicherheit_nach_NIS2.pdf'  class='avia-button av-lna3habz-091554447090e25bb08056aa2fc3a088 av-link-btn avia-icon_select-no avia-size-small avia-position-left avia-color-dark'  target=\"_blank\"  rel=\"noopener noreferrer\"  aria-label=\"NIS2 Whitepaper (German only)\"><span class='avia_iconbox_title' >NIS2 Whitepaper (German only)<\/span><\/a><\/div><br \/>\n<div  class='avia-button-wrap av-lna372s6-5ddda529315582e014e2a0aa3d3335b3-wrap avia-button-left  avia-builder-el-39  el_after_av_button  avia-builder-el-last '>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lna372s6-5ddda529315582e014e2a0aa3d3335b3\">\n#top #wrap_all .avia-button.av-lna372s6-5ddda529315582e014e2a0aa3d3335b3{\nbackground-color:#0993ba;\nborder-color:#0993ba;\ncolor:#ffffff;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-lna372s6-5ddda529315582e014e2a0aa3d3335b3 .avia-svg-icon svg:first-child{\nfill:#ffffff;\nstroke:#ffffff;\n}\n<\/style>\n<a href='mailto:sales@ikarus.at'  class='avia-button av-lna372s6-5ddda529315582e014e2a0aa3d3335b3 av-link-btn avia-icon_select-no avia-size-medium avia-position-left'  target=\"_blank\"  rel=\"noopener noreferrer\"  aria-label=\"Contact us\"><span class='avia_iconbox_title' >Contact us<\/span><\/a><\/div><\/p>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_cell_one_half-49d1684939453a7e09a8c7a07b5d0793\">\n.flex_cell.av-av_cell_one_half-49d1684939453a7e09a8c7a07b5d0793{\nvertical-align:top;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-av_cell_one_half-49d1684939453a7e09a8c7a07b5d0793{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-av_cell_one_half-49d1684939453a7e09a8c7a07b5d0793 av-gridrow-cell av_one_half no_margin  avia-builder-el-40  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-lna3gkcx-042b8b475d7bc188f7698e4e404bf0b4 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>TISAX Standards: Cyber Security in the automotive industry<\/h3>\n<p>TISAX (Trusted Information Security Assessment Exchange) is a standard designed to ensure the security of sensitive information and data in the automotive industry. The standard supplements the requirements of ISO 27001 with industry-specific aspects and defines a comprehensive test catalogue for all companies that are active in the automotive industry or as suppliers or partners for car manufacturers.<\/p>\n<p>IKARUS and Nozomi Networks offer companies in the automotive supply industry effective support in meeting their compliance requirements according to TISAX, ISO 27001, IEC 62443, NIS2 and the Machinery Regulation. With state-of-the-art <a href=\"https:\/\/www.ikarussecurity.com\/en\/industrial-cyber-security\/ikarus-ot-security-sensor-management\/\">OT sensor technology<\/a> and <a href=\"https:\/\/www.ikarussecurity.com\/en\/industrial-cyber-security\/ikarus-ot-security-professional-services\/\">professional services<\/a>, companies can make their IT and OT assets fully visible and monitorable and optimise their security strategy.<\/p>\n<p>The fundamental goal of the various regulations and certifications for industrial companies is to establish a holistic strong cyber security strategy and cyber resilience. With OT Security solutions from IKARUS and Nozomi Networks, you get the tools and capabilities to build a sustainable cyber defence strategy that can meet future security, visibility and cyber resilience requirements. Experienced experts for IT and OT security offer customised consulting and active support from proof of value to ongoing operation.<\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-lna377rr-25a1cf4220881edd90e6f2b24d8934fe-wrap avia-button-left  avia-builder-el-42  el_after_av_textblock  avia-builder-el-last '>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lna377rr-25a1cf4220881edd90e6f2b24d8934fe\">\n#top #wrap_all .avia-button.av-lna377rr-25a1cf4220881edd90e6f2b24d8934fe{\nbackground-color:#0993ba;\nborder-color:#0993ba;\ncolor:#ffffff;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-lna377rr-25a1cf4220881edd90e6f2b24d8934fe .avia-svg-icon svg:first-child{\nfill:#ffffff;\nstroke:#ffffff;\n}\n<\/style>\n<a href='mailto:sales@ikarus.at'  class='avia-button av-lna377rr-25a1cf4220881edd90e6f2b24d8934fe av-link-btn avia-icon_select-no avia-size-medium avia-position-left'  target=\"_blank\"  rel=\"noopener noreferrer\"  aria-label=\"Contact us\"><span class='avia_iconbox_title' >Contact us<\/span><\/a><\/div><\/p>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-8'  class='av-layout-grid-container av-av_layout_row-46d56c4f66cbc09d226fc8a5cde06bdd entry-content-wrapper main_color av-flex-cells  avia-builder-el-43  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_cell_one_full-e7d34a546d617a56df3002fa6f00f69d\">\n.flex_cell.av-av_cell_one_full-e7d34a546d617a56df3002fa6f00f69d{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-av_cell_one_full-e7d34a546d617a56df3002fa6f00f69d{\npadding:30px 30px 0px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-av_cell_one_full-e7d34a546d617a56df3002fa6f00f69d av-gridrow-cell av_one_full no_margin  avia-builder-el-44  avia-builder-el-no-sibling  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-lna2w3pp-84deeb785dc0dee3a1686ac73559f037 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 style=\"text-align: center;\">Customer testimonials<\/h3>\n<\/div><\/section>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-9'  class='av-layout-grid-container av-av_layout_row-46d56c4f66cbc09d226fc8a5cde06bdd entry-content-wrapper main_color av-flex-cells  avia-builder-el-46  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_cell_one_half-e265ca1a50d00963fedc5297e4a1b7aa\">\n.flex_cell.av-av_cell_one_half-e265ca1a50d00963fedc5297e4a1b7aa{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-av_cell_one_half-e265ca1a50d00963fedc5297e4a1b7aa{\npadding:0px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-av_cell_one_half-e265ca1a50d00963fedc5297e4a1b7aa av-gridrow-cell av_one_half no_margin  avia-builder-el-47  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-lna2xoxq-f96a3d54b9eeafa2ab026873fa411a0b '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><div id=\"zitat\">\n<p style=\"text-align: center;\"><em>&#8220;IKARUS&#8217; expertise in IT, IoT and OT security is impressive. Their tailored advice and support in a proof of concept and in the commissioning of the technologies have helped us to optimise and identify our security solutions. The regular comprehensive advisory calls and health checks have taken our security technology and processes to a new level. \u201c<\/em><\/p>\n<\/div>\n<p style=\"text-align: center;\"><em>International manufacturing company<\/em><\/p>\n<\/div><\/section>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_cell_one_half-e265ca1a50d00963fedc5297e4a1b7aa\">\n.flex_cell.av-av_cell_one_half-e265ca1a50d00963fedc5297e4a1b7aa{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-av_cell_one_half-e265ca1a50d00963fedc5297e4a1b7aa{\npadding:0px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-av_cell_one_half-e265ca1a50d00963fedc5297e4a1b7aa av-gridrow-cell av_one_half no_margin  avia-builder-el-49  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-lna2yams-8572df792f11aaed5aca697ba283f4a9 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><div id=\"zitat\">\n<p style=\"text-align: center;\"><em>&#8220;With Nozomi Networks, we got a highly scalable full-stack solution specifically for use in critical infrastructure. The asset discovery and visibility technology was our key selling point. The seamless integration with our infrastructure allows us to detect threats and anomalies in real-time with integrated threat intelligence. Our security and monitoring has improved significantly.\u201d<\/em><\/p>\n<\/div>\n<p style=\"text-align: center;\"><em>European energy supplier<\/em><\/p>\n<\/div><\/section>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-10'  class='av-layout-grid-container av-av_layout_row-46d56c4f66cbc09d226fc8a5cde06bdd entry-content-wrapper main_color av-flex-cells  avia-builder-el-51  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_cell_one_full-60cc36e0349b2c4cb032d22c779b15bd\">\n.flex_cell.av-av_cell_one_full-60cc36e0349b2c4cb032d22c779b15bd{\nvertical-align:top;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-av_cell_one_full-60cc36e0349b2c4cb032d22c779b15bd{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-av_cell_one_full-60cc36e0349b2c4cb032d22c779b15bd av-gridrow-cell av_one_full no_margin  avia-builder-el-52  avia-builder-el-no-sibling  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-lna3jb7x-6aa4070134216d14aa8d885301a6be14 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 style=\"text-align: center;\">IKARUS Industrial Cyber Security Expert Team<\/h3>\n<p style=\"text-align: center;\">IKARUS Security Software supports companies of all sizes in making their IT and OT networks secure and resilient against cyber threats.<br \/>\nIn the area of industrial security, we rely on the technologies of Nozomi Networks.<\/p>\n<p style=\"text-align: center;\">As an MSSP and Platinum Partner, we enable you to have customised licence packages and are your local contact<br \/>\nfor all questions and concerns regarding your OT security measures.<\/p>\n<p style=\"text-align: center;\"><b><br \/>\n<\/b><strong>Contact us for a personal consultation!<\/strong><\/p>\n<p style=\"text-align: center;\">Phone: +43 1 58995-500: email : <a href=\"mailto:sales@ikarus.at\">sales@ikarus.at<\/a><\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-lna2uyxs-14603290b961d5f07123697e670ba19e-wrap avia-button-center  avia-builder-el-54  el_after_av_textblock  avia-builder-el-last '>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lna2uyxs-14603290b961d5f07123697e670ba19e\">\n#top #wrap_all .avia-button.av-lna2uyxs-14603290b961d5f07123697e670ba19e{\nbackground-color:#0993ba;\nborder-color:#0993ba;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-lna2uyxs-14603290b961d5f07123697e670ba19e:hover{\nbackground-color:#0993ba;\ncolor:white;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-lna2uyxs-14603290b961d5f07123697e670ba19e:hover .avia-svg-icon svg:first-child{\nfill:white;\nstroke:white;\n}\n<\/style>\n<a href='mailto:sales@ikarus.at?subject=IKARUS%20OT%20Security%20Solutions-demo%20request%20from%20www.ikarussecurity.com'  class='avia-button av-lna2uyxs-14603290b961d5f07123697e670ba19e av-link-btn avia-icon_select-no avia-size-medium avia-position-center avia-font-color-theme-color'  target=\"_blank\"  rel=\"noopener noreferrer\"  aria-label=\"Contact us now\"><span class='avia_iconbox_title' >Contact us now<\/span><\/a><\/div><\/p>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-11'  class='av-layout-grid-container av-av_layout_row-46d56c4f66cbc09d226fc8a5cde06bdd entry-content-wrapper main_color av-flex-cells  avia-builder-el-55  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_cell_one_full-a1409352c557afa33e54287e42fa42cb\">\n.flex_cell.av-av_cell_one_full-a1409352c557afa33e54287e42fa42cb{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-av_cell_one_full-a1409352c557afa33e54287e42fa42cb{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-av_cell_one_full-a1409352c557afa33e54287e42fa42cb av-gridrow-cell av_one_full no_margin  avia-builder-el-56  avia-builder-el-no-sibling  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-lna3jszw-eef62fc6d51c183d2ea6ee59e5773484 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 style=\"text-align: center;\">Strong partnership<\/h3>\n<\/div><\/section>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-12'  class='av-layout-grid-container av-av_layout_row-46d56c4f66cbc09d226fc8a5cde06bdd entry-content-wrapper main_color av-flex-cells  avia-builder-el-58  el_after_av_layout_row  avia-builder-el-last  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_cell_one_fourth-e265ca1a50d00963fedc5297e4a1b7aa\">\n.flex_cell.av-av_cell_one_fourth-e265ca1a50d00963fedc5297e4a1b7aa{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-av_cell_one_fourth-e265ca1a50d00963fedc5297e4a1b7aa{\npadding:0px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-av_cell_one_fourth-e265ca1a50d00963fedc5297e4a1b7aa av-gridrow-cell av_one_fourth no_margin  avia-builder-el-59  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_cell_one_half-d4ab7628f60940d5191b91d41dede32d\">\n.flex_cell.av-av_cell_one_half-d4ab7628f60940d5191b91d41dede32d{\nvertical-align:middle;\n}\n.responsive #top #wrap_all .flex_cell.av-av_cell_one_half-d4ab7628f60940d5191b91d41dede32d{\npadding:0px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-av_cell_one_half-d4ab7628f60940d5191b91d41dede32d av-gridrow-cell av_one_half no_margin  avia-builder-el-60  el_after_av_cell_one_fourth  el_before_av_cell_one_fourth  content-align-middle'  ><div class='flex_cell_inner'><p><section  class='av_textblock_section av-lu6t3fi5-3f7dcb4ba7141bfdd2af75fe06cd9cb7 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-43850\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web-300x212.png\" alt=\"NOZOMI EMEA MSSP Award 2025\" width=\"300\" height=\"212\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web-300x212.png 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web-260x185.png 260w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web.png 595w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-m0f22fxj-afb0f38dc53ac41d488eead0d890701f '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-36153\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/11\/Nozomi-Certified-Platinum-Partner-Logo-300.png\" alt=\"Certified-Elite-Partner-Logo-300.png\" width=\"298\" height=\"82\" \/><\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-av_textblock-92ab5b4c5448b40ef3b82fb3d397e98e '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-34666\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/08\/Nozomi-Certified-Elite-Partner-Logo-300.png\" alt=\"Certiefied Nozomi MSSP Elite Partner\" width=\"298\" height=\"82\" \/><\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-m3n6so4i-044d719e5d678e2b75c848bfb55da8b9 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-36090\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/11\/Nozomi-MSSP-Partnersiegel-2024-800-300x261.png\" alt=\"MMSP of the Year 2024\" width=\"300\" height=\"261\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/11\/Nozomi-MSSP-Partnersiegel-2024-800-300x261.png 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/11\/Nozomi-MSSP-Partnersiegel-2024-800-768x669.png 768w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/11\/Nozomi-MSSP-Partnersiegel-2024-800-705x614.png 705w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/11\/Nozomi-MSSP-Partnersiegel-2024-800.png 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_cell_one_fourth-d4ab7628f60940d5191b91d41dede32d\">\n.flex_cell.av-av_cell_one_fourth-d4ab7628f60940d5191b91d41dede32d{\nvertical-align:middle;\n}\n.responsive #top #wrap_all .flex_cell.av-av_cell_one_fourth-d4ab7628f60940d5191b91d41dede32d{\npadding:0px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-av_cell_one_fourth-d4ab7628f60940d5191b91d41dede32d av-gridrow-cell av_one_fourth no_margin  avia-builder-el-65  el_after_av_cell_one_half  avia-builder-el-last  content-align-middle'  ><div class='flex_cell_inner'><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"tags":[],"class_list":["post-24831","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Industrial Cyber Security - IKARUS Security<\/title>\n<meta name=\"description\" content=\"Cyber security for industry and critical infrastructure: Risk minimization through real-time detection of threats, vulnerabilities, anomalies\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ikarussecurity.com\/en\/industrial-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Industrial Cyber Security - IKARUS Security\" \/>\n<meta property=\"og:description\" content=\"Cyber security for industry and critical infrastructure: Risk minimization through real-time detection of threats, vulnerabilities, anomalies\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ikarussecurity.com\/en\/industrial-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"IKARUS Security\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ikarusantivirussoftware\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-21T12:30:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/09\/icon1-ot-tabelle-80.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ikarusantivirus\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/industrial-cyber-security\\\/\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/industrial-cyber-security\\\/\",\"name\":\"Industrial Cyber Security - IKARUS Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/industrial-cyber-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/industrial-cyber-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/icon1-ot-tabelle-80.png\",\"datePublished\":\"2022-10-19T09:57:51+00:00\",\"dateModified\":\"2025-11-21T12:30:59+00:00\",\"description\":\"Cyber security for industry and critical infrastructure: Risk minimization through real-time detection of threats, vulnerabilities, anomalies\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/industrial-cyber-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/industrial-cyber-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/industrial-cyber-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/icon1-ot-tabelle-80.png\",\"contentUrl\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/icon1-ot-tabelle-80.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/industrial-cyber-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Industrial Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/\",\"name\":\"IKARUS Security\",\"description\":\"Sovereign Cybersecurity\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#organization\",\"name\":\"IKARUS Security Software\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/ikarus-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/ikarus-logo.png\",\"width\":1805,\"height\":448,\"caption\":\"IKARUS Security Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ikarusantivirussoftware\",\"https:\\\/\\\/x.com\\\/ikarusantivirus\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/ikarus-security-software-gmbh\",\"https:\\\/\\\/www.xing.com\\\/pages\\\/ikarussecuritysoftwaregmbh\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRRsH3IwUJQqwtBYpNp0Tuw\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Industrial Cyber Security - IKARUS Security","description":"Cyber security for industry and critical infrastructure: Risk minimization through real-time detection of threats, vulnerabilities, anomalies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ikarussecurity.com\/en\/industrial-cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"Industrial Cyber Security - IKARUS Security","og_description":"Cyber security for industry and critical infrastructure: Risk minimization through real-time detection of threats, vulnerabilities, anomalies","og_url":"https:\/\/www.ikarussecurity.com\/en\/industrial-cyber-security\/","og_site_name":"IKARUS Security","article_publisher":"https:\/\/www.facebook.com\/ikarusantivirussoftware","article_modified_time":"2025-11-21T12:30:59+00:00","og_image":[{"url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/09\/icon1-ot-tabelle-80.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@ikarusantivirus","twitter_misc":{"Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ikarussecurity.com\/en\/industrial-cyber-security\/","url":"https:\/\/www.ikarussecurity.com\/en\/industrial-cyber-security\/","name":"Industrial Cyber Security - IKARUS Security","isPartOf":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ikarussecurity.com\/en\/industrial-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/www.ikarussecurity.com\/en\/industrial-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/09\/icon1-ot-tabelle-80.png","datePublished":"2022-10-19T09:57:51+00:00","dateModified":"2025-11-21T12:30:59+00:00","description":"Cyber security for industry and critical infrastructure: Risk minimization through real-time detection of threats, vulnerabilities, anomalies","breadcrumb":{"@id":"https:\/\/www.ikarussecurity.com\/en\/industrial-cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ikarussecurity.com\/en\/industrial-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikarussecurity.com\/en\/industrial-cyber-security\/#primaryimage","url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/09\/icon1-ot-tabelle-80.png","contentUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/09\/icon1-ot-tabelle-80.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ikarussecurity.com\/en\/industrial-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ikarussecurity.com\/en\/"},{"@type":"ListItem","position":2,"name":"Industrial Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/www.ikarussecurity.com\/en\/#website","url":"https:\/\/www.ikarussecurity.com\/en\/","name":"IKARUS Security","description":"Sovereign Cybersecurity","publisher":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ikarussecurity.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ikarussecurity.com\/en\/#organization","name":"IKARUS Security Software","url":"https:\/\/www.ikarussecurity.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","contentUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","width":1805,"height":448,"caption":"IKARUS Security Software"},"image":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ikarusantivirussoftware","https:\/\/x.com\/ikarusantivirus","https:\/\/www.linkedin.com\/company\/ikarus-security-software-gmbh","https:\/\/www.xing.com\/pages\/ikarussecuritysoftwaregmbh","https:\/\/www.youtube.com\/channel\/UCRRsH3IwUJQqwtBYpNp0Tuw"]}]}},"_links":{"self":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/24831","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/comments?post=24831"}],"version-history":[{"count":102,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/24831\/revisions"}],"predecessor-version":[{"id":43856,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/24831\/revisions\/43856"}],"wp:attachment":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/media?parent=24831"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/tags?post=24831"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}