{"id":32707,"date":"2023-08-14T09:33:39","date_gmt":"2023-08-14T09:33:39","guid":{"rendered":"https:\/\/waterfall-security.com\/solutions\/by-industry\/fertigung\/"},"modified":"2025-07-21T17:58:32","modified_gmt":"2025-07-21T17:58:32","slug":"fertigung","status":"publish","type":"industry","link":"https:\/\/waterfall-security.com\/de\/solutions\/by-industry\/fertigung\/","title":{"rendered":"Fertigung"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"32707\" class=\"elementor elementor-32707 elementor-2997\" data-elementor-post-type=\"industry\">\n\t\t\t\t<div class=\"elementor-element elementor-element-21b44c87 e-flex e-con-boxed e-con e-parent\" data-id=\"21b44c87\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6c102682 e-con-full e-flex e-con e-child\" data-id=\"6c102682\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-600c9bf8 e-con-full e-flex e-con e-child\" data-id=\"600c9bf8\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-418b119f elementor-widget elementor-widget-heading\" data-id=\"418b119f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Fertigung<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9597589 elementor-widget elementor-widget-text-editor\" data-id=\"9597589\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Cyberattacken, insbesondere Ransomware, stellen eine zunehmende Bedrohung f\u00fcr die Fertigung dar und legen jedes Jahr Hunderte von Produktionsst\u00e4tten lahm. Es sind auch schlimmere Folgen m\u00f6glich, etwa die St\u00f6rung von Sicherheitssystemen oder die Beeintr\u00e4chtigung der Produktqualit\u00e4t.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Die unidirektionale Technologie von Waterfall sch\u00fctzt die Pharma-, Lebensmittel- und Getr\u00e4nkeindustrie sowie die Automobil-, Flugzeug- und andere Fertigungsindustrien.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-451630ea e-con-full e-flex e-con e-child\" data-id=\"451630ea\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7cd7900 elementor-align-center elementor-widget elementor-widget-lottie\" data-id=\"7cd7900\" data-element_type=\"widget\" data-settings=\"{&quot;source_json&quot;:{&quot;url&quot;:&quot;https:\\\/\\\/waterfall-security.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Manufacturing.json&quot;,&quot;id&quot;:9839,&quot;size&quot;:&quot;&quot;,&quot;alt&quot;:&quot;&quot;,&quot;source&quot;:&quot;library&quot;},&quot;loop&quot;:&quot;yes&quot;,&quot;source&quot;:&quot;media_file&quot;,&quot;caption_source&quot;:&quot;none&quot;,&quot;link_to&quot;:&quot;none&quot;,&quot;trigger&quot;:&quot;arriving_to_viewport&quot;,&quot;viewport&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;play_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1,&quot;sizes&quot;:[]},&quot;start_point&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;end_point&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:100,&quot;sizes&quot;:[]},&quot;renderer&quot;:&quot;svg&quot;}\" data-widget_type=\"lottie.default\">\n\t\t\t\t\t<div class=\"e-lottie__container\"><div class=\"e-lottie__animation\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6aa5eb83 e-flex e-con-boxed e-con e-child\" data-id=\"6aa5eb83\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-93d67a8 elementor-widget elementor-widget-custom-tab-block-right-image\" data-id=\"93d67a8\" data-element_type=\"widget\" data-widget_type=\"custom-tab-block-right-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"custom-carousel-block-image_right\">\n            <div class=\"carousel-navigation-image_right\">\n                                    <span class=\"carousel-nav-item-image_right\">Arzneimittel<\/span>\n                                    <span class=\"carousel-nav-item-image_right\">Lebensmittel und Getr\u00e4nke<\/span>\n                                    <span class=\"carousel-nav-item-image_right\">Diskrete Fertigung<\/span>\n                            <\/div>\n            <div class=\"carousel-slides-image_right\">\n                                    <div class=\"carousel-slide-image_right\">\n                        <div class=\"wrap-image_right\">\n                            <div class=\"slide-content-image_right\">\n                                <h2 class=\"slide-title-image_right\">Arzneimittel<\/h2>\n                                <div class=\"slide-text-image_right\"><p><span class=\"NormalTextRun SCXW77779131 BCX8\">Cybersecurity-Systeme m\u00fcssen die ordnungsgem\u00e4\u00dfe Herstellung von Generika und speziellen Arzneimitteln sch\u00fctzen. <\/span><span class=\"NormalTextRun AdvancedProofingIssueV2Themed SCXW77779131 BCX8\">Auch die Chargenprotokolle bed\u00fcrfen eines besonders strengen Schutzes, <\/span><span class=\"NormalTextRun AdvancedProofingIssueV2Themed SCXW77779131 BCX8\">um gegen\u00fcber<\/span><span class=\"NormalTextRun AdvancedProofingIssueV2Themed SCXW77779131 BCX8\"> Aufsichtsbeh\u00f6rden eine ordnungsgem\u00e4\u00dfe Herstellung der Produkte nachzuweisen.<\/span><\/p><\/div>\n                            <\/div>\n                            <div class=\"slide-image-image_right\">\n                                <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/Pharmaceuticals.png\" alt=\"slide_1\">\n                            <\/div>\n                        <\/div>\n                    <\/div>\n                                    <div class=\"carousel-slide-image_right\">\n                        <div class=\"wrap-image_right\">\n                            <div class=\"slide-content-image_right\">\n                                <h2 class=\"slide-title-image_right\">Lebensmittel und Getr\u00e4nke<\/h2>\n                                <div class=\"slide-text-image_right\"><p><span class=\"NormalTextRun SCXW21683765 BCX8\">Cybersecurity-Systeme sind aus der Lebensmittel- und Getr\u00e4nkeherstellung nicht wegzudenken. <\/span><span class=\"NormalTextRun AdvancedProofingIssueV2Themed SCXW21683765 BCX8\">Sie verhindern kostspielige ungeplante Ausf\u00e4lle, sch\u00fctzen Sterilisationsanlagen, kritische Automatisierungsanlagen <\/span><span class=\"NormalTextRun AdvancedProofingIssueV2Themed SCXW21683765 BCX8\"><\/span><span class=\"NormalTextRun AdvancedProofingIssueV2Themed SCXW21683765 BCX8\"><\/span><span class=\"NormalTextRun AdvancedProofingIssueV2Themed SCXW21683765 BCX8\">und<\/span><span class=\"NormalTextRun AdvancedProofingIssueV2Themed SCXW21683765 BCX8\"> sch\u00fctzen die f\u00fcr den Produktvertrieb in dieser stark regulierten Branche notwendigen Chargenprotokolle.<\/span><\/p><\/div>\n                            <\/div>\n                            <div class=\"slide-image-image_right\">\n                                <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/Food-and-Beverage.png\" alt=\"slide_2\">\n                            <\/div>\n                        <\/div>\n                    <\/div>\n                                    <div class=\"carousel-slide-image_right\">\n                        <div class=\"wrap-image_right\">\n                            <div class=\"slide-content-image_right\">\n                                <h2 class=\"slide-title-image_right\">Diskrete Fertigung<\/h2>\n                                <div class=\"slide-text-image_right\"><p><span class=\"NormalTextRun SCXW212309867 BCX8\">Von der Herstellung von Konsumg\u00fctern und <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW212309867 BCX8\">Autos<\/span><span class=\"NormalTextRun SCXW212309867 BCX8\"> bis hin zu schweren Maschinen und sogar Luft- und Raumfahrt sind Cybersecurity-Systeme unerl\u00e4sslich, um kostspielige Ausf\u00e4lle zu verhindern, die <\/span><span class=\"NormalTextRun SCXW212309867 BCX8\">Sicherheit<\/span><span class=\"NormalTextRun SCXW212309867 BCX8\"> der Besch\u00e4ftigten zu gew\u00e4hrleisten und die Qualit\u00e4t der Endprodukte zu gew\u00e4hrleisten.<\/span><\/p><\/div>\n                            <\/div>\n                            <div class=\"slide-image-image_right\">\n                                <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/Discrete-Manufacturing.png\" alt=\"slide_3\">\n                            <\/div>\n                        <\/div>\n                    <\/div>\n                            <\/div>\n        <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-36504889 e-con-full e-flex e-con e-parent\" data-id=\"36504889\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-323a1d5e elementor-widget-mobile__width-initial h2_with_svg elementor-widget elementor-widget-heading\" data-id=\"323a1d5e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ihre Vorteile mit Waterfall<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-768be690 e-flex e-con-boxed e-con e-child\" data-id=\"768be690\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-26c08d35 waterfall_get_block e-flex e-con-boxed e-con e-child\" data-id=\"26c08d35\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4e27f508 elementor-widget elementor-widget-image\" data-id=\"4e27f508\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/elementor\/thumbs\/Integration-qcqblswrl3ikpa3riqmstf07ajrzfztfiepoegikg0.png\" title=\"Integration\" alt=\"Integration\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c69d501 elementor-widget elementor-widget-heading\" data-id=\"1c69d501\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Sicherer Fernzugriff  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-46535410 elementor-widget elementor-widget-text-editor\" data-id=\"46535410\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW228296463 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW228296463 BCX8\">HERA\u00ae (Hardware-Enforced Remote Access) von Waterfall erm\u00f6glicht einen sicheren Fernzugriff, ohne die Risiken und Gefahren, die typischerweise mit Netzwerkverbindungen einhergehen.<\/span><\/span><span class=\"EOP SCXW228296463 BCX8\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b1f0fc1 waterfall_get_block e-flex e-con-boxed e-con e-child\" data-id=\"b1f0fc1\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-56c3197e elementor-widget elementor-widget-image\" data-id=\"56c3197e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/elementor\/thumbs\/Monitoring-qcqbn136ib71uyblcrq9kluv7nq8hrotchdhygp2bk.png\" title=\"Monitoring\" alt=\"Monitoring\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59f400f3 elementor-widget elementor-widget-heading\" data-id=\"59f400f3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Echtzeit-Sicherheits\u00fcberwachung<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-86de1a3 elementor-widget elementor-widget-text-editor\" data-id=\"86de1a3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Unidirectional Gateways erm\u00f6glichen Unternehmens- und ausgelagerten Sicherheitsleitstellen (SOCs) einen sicheren Zugriff auf industrielle Netzwerkdaten, sodass Fertigungsunternehmen von spezialisiertem Fachwissen und Skaleneffekten profitieren k\u00f6nnen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2986a594 waterfall_get_block e-flex e-con-boxed e-con e-child\" data-id=\"2986a594\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-527d0cd1 elementor-widget elementor-widget-image\" data-id=\"527d0cd1\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/elementor\/thumbs\/Unbreachable-Cloud-qcqbpn31hqrq3yj23wcyhy4ym6uxvi1z1em1y4tp1c.png\" title=\"Unbreachable Cloud\" alt=\"Unbreachable Cloud\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1cc2c6ee elementor-widget elementor-widget-heading\" data-id=\"1cc2c6ee\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Un\u00fcberwindbare Cloud-Konnektivit\u00e4t<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e553454 elementor-widget elementor-widget-text-editor\" data-id=\"1e553454\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Unidirectional Gateways bieten die Vorteile von Cloud- und Internet-Konnektivit\u00e4t, nur ohne Risiken.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3feb5bcb e-flex e-con-boxed e-con e-parent\" data-id=\"3feb5bcb\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-41ccaf05 h2_with_svg elementor-widget elementor-widget-heading\" data-id=\"41ccaf05\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Anwendungsf\u00e4lle<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9dcecf9 e-flex e-con-boxed e-con e-child\" data-id=\"9dcecf9\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1f2f6c11 e-flex e-con-boxed e-con e-child\" data-id=\"1f2f6c11\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-53edc8de elementor-widget elementor-widget-heading\" data-id=\"53edc8de\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Betriebsautomatisierung<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3376fa07 elementor-widget elementor-widget-text-editor\" data-id=\"3376fa07\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Unidirektionale Gateways replizieren Historian-Datenbanken, OPC-Server und andere Systeme in Unternehmensnetzwerken. Gesch\u00e4ftsanwender und Anwendungen greifen wie gewohnt auf die Replikate zu, da alle Daten, die f\u00fcr IT-Netzwerke freigegeben werden d\u00fcrfen, bereits auf den Replikatservern verf\u00fcgbar sind.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4bafa1f7 e-flex e-con-boxed e-con e-child\" data-id=\"4bafa1f7\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2efc3b8c elementor-widget elementor-widget-heading\" data-id=\"2efc3b8c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Fernzugriff  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2aa8a6f8 elementor-widget elementor-widget-text-editor\" data-id=\"2aa8a6f8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW114159818 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW114159818 BCX8\">Hardware Enforced Remote Access (HERA\u00ae) erm\u00f6glicht die sichere Fernverwaltung von OT-Netzwerken, wozu auch Aktualisierungen und Fehlerbehebungen aus der Ferne z\u00e4hlen. F\u00fcr F\u00e4lle, in denen ein softwarebasierter Fernzugriff zu riskant ist, bietet die HERA\u00ae-Hardware Fernzugriffsfunktionen, die keine der \u00fcblichen Risiken einer Netzwerkverbindung bergen.<\/span><\/span><span class=\"EOP SCXW114159818 BCX8\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-37d18dd0 e-flex e-con-boxed e-con e-child\" data-id=\"37d18dd0\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3473be7a elementor-widget elementor-widget-heading\" data-id=\"3473be7a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Remote-Lieferanten<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1212b5fd elementor-widget elementor-widget-text-editor\" data-id=\"1212b5fd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Unidirectional Gateways replizieren OPC- und andere Server in IT-Netzwerken und in Cloud-Systemen von Lieferanten, damit diese Probleme diagnostizieren und kompetente Unterst\u00fctzung leisten k\u00f6nnen. Lieferanten verwenden Unidirectional Remote Screen View und Secure Bypass, wenn sie Produktionsanlagen per Fernzugriff einstellen m\u00fcssen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-42747fed e-flex e-con-boxed e-con e-child\" data-id=\"42747fed\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1fb8ff1b e-flex e-con-boxed e-con e-child\" data-id=\"1fb8ff1b\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-778a508d elementor-widget elementor-widget-heading\" data-id=\"778a508d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Sichere Cloud-Konnektivit\u00e4t<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-48fe4347 elementor-widget elementor-widget-text-editor\" data-id=\"48fe4347\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Unidirectional Gateways bieten die Vorteile von Cloud- und Internet-Konnektivit\u00e4t, nur ohne Risiken.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-27bb5a2b e-flex e-con-boxed e-con e-child\" data-id=\"27bb5a2b\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-48ce0b5f elementor-widget elementor-widget-heading\" data-id=\"48ce0b5f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Effektivit\u00e4t der Betriebsmittel<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3fa2bd2f elementor-widget elementor-widget-text-editor\" data-id=\"3fa2bd2f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Unidirectional Gateways replizieren OEE-Server und -Informationen sicher und un\u00fcberwindbar in cloudbasierten Systemen, so dass Hersteller die Produktionslasten neu anordnen k\u00f6nnen, um kostspielige Fertigungsanlagen m\u00f6glichst effizient zu nutzen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1c83635a e-flex e-con-boxed e-con e-child\" data-id=\"1c83635a\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d844d5c e-con-full e-flex e-con e-parent\" data-id=\"4d844d5c\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-409ea68a h2_with_svg elementor-widget elementor-widget-heading\" data-id=\"409ea68a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Funktionsweise<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-334a8dcf e-flex e-con-boxed e-con e-child\" data-id=\"334a8dcf\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-589516d3 e-flex e-con-boxed e-con e-child\" data-id=\"589516d3\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b92f900 elementor-widget elementor-widget-image\" data-id=\"1b92f900\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/elementor\/thumbs\/Group-1117-qcqbkytxiedgff1vtzhzgc6gblqnq9p4zmdx8wensw.png\" title=\"Group 1117\" alt=\"Group 1117\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2aa577e e-flex e-con-boxed e-con e-child\" data-id=\"2aa577e\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-57158a63 elementor-widget elementor-widget-heading\" data-id=\"57158a63\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Verbindung<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-222aafe7 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"222aafe7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>von industriellen Netzwerken mit IT-Netzwerken \u2013 auf sichere Weise<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2cc79161 e-flex e-con-boxed e-con e-child\" data-id=\"2cc79161\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-48905c7e elementor-widget elementor-widget-image\" data-id=\"48905c7e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/elementor\/thumbs\/Group-1117-1-qcqbpemhs8g794lrwwkk87utb3v22tbi9lagtxtqf4.png\" title=\"Group 1117-1\" alt=\"Group 1117-1\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5c52b7f1 e-flex e-con-boxed e-con e-child\" data-id=\"5c52b7f1\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-10fbf7e9 elementor-widget elementor-widget-heading\" data-id=\"10fbf7e9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Schutz<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a5fa328 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"a5fa328\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>von Industrienetzen mit Hardware-gest\u00fctzten Technologien<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4561eb31 e-flex e-con-boxed e-con e-child\" data-id=\"4561eb31\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2d4046b0 elementor-widget elementor-widget-image\" data-id=\"2d4046b0\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/elementor\/thumbs\/Group-1117-2-qcqbqj1jy3zj4cz2cw1ipfnmuobu9sryr5ccgu5szk.png\" title=\"Group 1117-2\" alt=\"Group 1117-2\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-67f91b29 e-flex e-con-boxed e-con e-child\" data-id=\"67f91b29\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-479057c2 elementor-widget elementor-widget-heading\" data-id=\"479057c2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Replikation<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68d0c7a3 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"68d0c7a3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>von Echtzeit-Betriebsservern im IT-Netzwerk eines Unternehmens<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-37707aaf e-flex e-con-boxed e-con e-child\" data-id=\"37707aaf\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6208c1a7 elementor-widget elementor-widget-image\" data-id=\"6208c1a7\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/diagrams-for-webpage-wf-all-products-wf500.png\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"diagrams for webpage wf all products wf500\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MzMwNzYsInVybCI6Imh0dHBzOlwvXC93YXRlcmZhbGwtc2VjdXJpdHkuY29tXC93cC1jb250ZW50XC91cGxvYWRzXC8yMDIzXC8wOFwvZGlhZ3JhbXMtZm9yLXdlYnBhZ2Utd2YtYWxsLXByb2R1Y3RzLXdmNTAwLnBuZyJ9\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" loading=\"lazy\" width=\"2440\" height=\"545\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/diagrams-for-webpage-wf-all-products-wf500.png\" class=\"attachment-full size-full wp-image-33076\" alt=\"\" srcset=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/diagrams-for-webpage-wf-all-products-wf500.png 2440w, https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/diagrams-for-webpage-wf-all-products-wf500-300x67.png 300w, https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/diagrams-for-webpage-wf-all-products-wf500-1024x229.png 1024w, https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/diagrams-for-webpage-wf-all-products-wf500-768x172.png 768w, https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/diagrams-for-webpage-wf-all-products-wf500-1536x343.png 1536w, https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/diagrams-for-webpage-wf-all-products-wf500-2048x457.png 2048w\" sizes=\"auto, (max-width: 2440px) 100vw, 2440px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5665d982 e-flex e-con-boxed e-con e-parent\" data-id=\"5665d982\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-141d9ead elementor-widget-mobile__width-initial h2_with_svg elementor-widget elementor-widget-heading\" data-id=\"141d9ead\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Verwandte Ressourcen<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a8ced1 elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-widget elementor-widget-loop-grid\" data-id=\"2a8ced1\" data-element_type=\"widget\" data-settings=\"{&quot;template_id&quot;:18975,&quot;_skin&quot;:&quot;post&quot;,&quot;columns&quot;:&quot;3&quot;,&quot;columns_tablet&quot;:&quot;2&quot;,&quot;columns_mobile&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;[data-elementor-type=\\&quot;loop-item\\&quot;]&quot;,&quot;row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-grid.post\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-loop-nothing-found-message\">\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3168263e elementor-align-center elementor-widget elementor-widget-button\" data-id=\"3168263e\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/ot-insights-center\/manufacturing\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mehr anzeigen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b7ea23e elementor-widget elementor-widget-template\" data-id=\"5b7ea23e\" data-element_type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"container\" data-elementor-id=\"32670\" class=\"elementor elementor-32670 elementor-738\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3f365520 cta_block e-flex e-con-boxed e-con e-parent\" data-id=\"3f365520\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;position&quot;:&quot;absolute&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-46f2ba25 elementor-widget elementor-widget-heading\" data-id=\"46f2ba25\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Beraten Sie sich mit einem unidirektionalen<br> L\u00f6sungsarchitekten<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-560f6104 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"560f6104\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/Kontakt\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Kostenlose Beratung<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"featured_media":0,"template":"","class_list":["post-32707","industry","type-industry","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/waterfall-security.com\/de\/wp-json\/wp\/v2\/industry\/32707","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/waterfall-security.com\/de\/wp-json\/wp\/v2\/industry"}],"about":[{"href":"https:\/\/waterfall-security.com\/de\/wp-json\/wp\/v2\/types\/industry"}],"version-history":[{"count":0,"href":"https:\/\/waterfall-security.com\/de\/wp-json\/wp\/v2\/industry\/32707\/revisions"}],"wp:attachment":[{"href":"https:\/\/waterfall-security.com\/de\/wp-json\/wp\/v2\/media?parent=32707"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}