{"id":32904,"date":"2023-08-17T16:33:10","date_gmt":"2023-08-17T16:33:10","guid":{"rendered":"https:\/\/waterfall-security.com\/solutions\/by-need\/schuetzen-sie-ihre-ot-netzwerke-vor-ransomware\/"},"modified":"2025-08-12T09:16:12","modified_gmt":"2025-08-12T09:16:12","slug":"schuetzen-sie-ihre-ot-netzwerke-vor-ransomware","status":"publish","type":"need","link":"https:\/\/waterfall-security.com\/de\/solutions\/by-need\/schuetzen-sie-ihre-ot-netzwerke-vor-ransomware\/","title":{"rendered":"Sch\u00fctzen Sie Ihre OT-Netzwerke vor Ransomware"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"32904\" class=\"elementor elementor-32904 elementor-3284\" data-elementor-post-type=\"need\">\n\t\t\t\t<div class=\"elementor-element elementor-element-350704ab e-flex e-con-boxed e-con e-parent\" data-id=\"350704ab\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3f746517 e-con-full e-flex e-con e-child\" data-id=\"3f746517\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-e21665f e-con-full e-flex e-con e-child\" data-id=\"e21665f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1abae7cf elementor-widget elementor-widget-heading\" data-id=\"1abae7cf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Sch\u00fctzen Sie Ihre OT-Netzwerke vor Ransomware<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-705e110e elementor-widget elementor-widget-text-editor\" data-id=\"705e110e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>In den letzten f\u00fcnf Jahren handelte es sich bei \u00fcber 90 % der Cyberangriffe, die zum Stillstand von Industriebetrieben f\u00fchrten, um Ransomware. Die heutigen Tools und Techniken von Ransomware-Angriffen sind gegen\u00fcber Werkzeugen und Methoden von Nationalstaaten weniger als 5 Jahre im R\u00fcckstand.<\/p><p>Waterfall sch\u00fctzt vor OT-Ransomware-Angriffen, indem es die Netzwerkeinstiegspunkte f\u00fcr solche Angriffe eliminiert.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-97db8a0 e-flex e-con-boxed e-con e-child\" data-id=\"97db8a0\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-001406a elementor-widget elementor-widget-button\" data-id=\"001406a\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/contact-us\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mit einem Experten sprechen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-72cda4ad e-con-full e-flex e-con e-child\" data-id=\"72cda4ad\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9a368d7 elementor-align-center elementor-widget elementor-widget-lottie\" data-id=\"9a368d7\" data-element_type=\"widget\" data-settings=\"{&quot;source_json&quot;:{&quot;url&quot;:&quot;https:\\\/\\\/waterfall-security.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Hard-Drive-Security-Updated.json&quot;,&quot;id&quot;:11349,&quot;size&quot;:&quot;&quot;,&quot;alt&quot;:&quot;&quot;,&quot;source&quot;:&quot;library&quot;},&quot;loop&quot;:&quot;yes&quot;,&quot;source&quot;:&quot;media_file&quot;,&quot;caption_source&quot;:&quot;none&quot;,&quot;link_to&quot;:&quot;none&quot;,&quot;trigger&quot;:&quot;arriving_to_viewport&quot;,&quot;viewport&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;play_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1,&quot;sizes&quot;:[]},&quot;start_point&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;end_point&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:100,&quot;sizes&quot;:[]},&quot;renderer&quot;:&quot;svg&quot;}\" data-widget_type=\"lottie.default\">\n\t\t\t\t\t<div class=\"e-lottie__container\"><div class=\"e-lottie__animation\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5528a525 e-flex e-con-boxed e-con e-parent\" data-id=\"5528a525\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-67774d8a h2_with_svg elementor-widget-mobile__width-initial elementor-widget elementor-widget-heading\" data-id=\"67774d8a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ihre Vorteile mit Waterfall<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4cf345f4 elementor-widget elementor-widget-cust-tab-r-men\" data-id=\"4cf345f4\" data-element_type=\"widget\" data-widget_type=\"cust-tab-r-men.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"custom-tabs-widget right_menu desc_v\">\n            <div class=\"custom-tabs-nav\">\n                                    <div class=\"custom-tabs-nav-item active\">\n                                                    <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/No-OT-targeting.png\" alt=\"Kein OT-Targeting\">\n                                                <span class=\"tab-title\">Kein OT-Targeting<\/span>\n                    <\/div>\n                                    <div class=\"custom-tabs-nav-item \">\n                                                    <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/No-_Abundance-of-Caution_.png\" alt=\"Keine \u201eAbundance of Caution\u201c-Ausf\u00e4lle\">\n                                                <span class=\"tab-title\">Keine \u201eAbundance of Caution\u201c-Ausf\u00e4lle<\/span>\n                    <\/div>\n                                    <div class=\"custom-tabs-nav-item \">\n                                                    <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/No-IT-dependencies.png\" alt=\"Keine IT-Abh\u00e4ngigkeiten\">\n                                                <span class=\"tab-title\">Keine IT-Abh\u00e4ngigkeiten<\/span>\n                    <\/div>\n                            <\/div>\n            <div class=\"custom-tabs-content\">\n                                    <div class=\"custom-tabs-content-item active\">\n                                                    <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/No-OT-targeting.png\" alt=\"Kein OT-Targeting\">\n                                                <span class=\"tab-title\">Kein OT-Targeting<\/span>\n                        <div class=\"tab_content_acs\">\n                            <p>Die strengsten internationalen Standards und Vorschriften verlangen oder empfehlen Schutz durch Unidirectional Gateways f\u00fcr industrielle Netzwerke. Unidirectional Gateways sind st\u00e4rker als Firewalls und erf\u00fcllen alle industriellen Sicherheitsstandards, Vorschriften und Best Practices.<\/p>                        <\/div>\n                    <\/div>\n                                    <div class=\"custom-tabs-content-item \">\n                                                    <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/No-_Abundance-of-Caution_.png\" alt=\"Keine \u201eAbundance of Caution\u201c-Ausf\u00e4lle\">\n                                                <span class=\"tab-title\">Keine \u201eAbundance of Caution\u201c-Ausf\u00e4lle<\/span>\n                        <div class=\"tab_content_acs\">\n                            <p><span class=\"TextRun SCXW105420028 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW105420028 BCX0\">Unidirectional Gateways <\/span><span class=\"NormalTextRun SCXW105420028 BCX0\">bieten<\/span><span class=\"NormalTextRun SCXW105420028 BCX0\"> einen so starken Schutz f\u00fcr OT-Netzwerke, dass unidirektional gesch\u00fctzte Unternehmen OT-Systeme nicht wegen \u201eAbundance of Caution\u201c herunterfahren m\u00fcssen, wenn IT-Netzwerke durch Ransomware kompromittiert werden.<\/span><\/span><span class=\"EOP SCXW105420028 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>                        <\/div>\n                    <\/div>\n                                    <div class=\"custom-tabs-content-item \">\n                                                    <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/No-IT-dependencies.png\" alt=\"Keine IT-Abh\u00e4ngigkeiten\">\n                                                <span class=\"tab-title\">Keine IT-Abh\u00e4ngigkeiten<\/span>\n                        <div class=\"tab_content_acs\">\n                            Ein <p><span class=\"TextRun SCXW191242204 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW191242204 BCX0\"><\/span><span class=\"NormalTextRun SCXW191242204 BCX0\">unidirektionales Netzwerkkonzept zeigt OT-Abh\u00e4ngigkeiten von IT-Netzwerken auf und helfen, diese Abh\u00e4ngigkeiten zu <\/span><span class=\"NormalTextRun SCXW191242204 BCX0\">beseitigen<\/span><span class=\"NormalTextRun SCXW191242204 BCX0\">. Ohne IT-Abh\u00e4ngigkeiten k\u00f6nnen OT-Systeme normal weiterarbeiten, wenn IT-Netzwerke und Server durch Ransomware beeintr\u00e4chtigt sind.<\/span><\/span><span class=\"EOP SCXW191242204 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>                        <\/div>\n                    <\/div>\n                            <\/div>\n        <\/div>\n        <div class=\"custom-accordion-widget custom-tabs-widget-mob right_menu mob_v\">\n            <div class=\"accordion-container\">\n                <div class=\"accordion-tabs\">\n                    <div class=\"accordion-tabs_wrapper\">\n                                                    <div class=\"accordion-tab\">\n\n                                <h3 class=\"accordion-title\">                                         <span><img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/No-OT-targeting.png\" alt=\"Kein OT-Targeting\">\n                                            Kein OT-Targeting<\/span> <svg width=\"16\" height=\"10\" viewBox=\"0 0 16 10\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <path d=\"M15.1749 0.950854L8.08744 9.05078L1 0.950854\" stroke=\"white\" \/>\n                                        <\/svg>\n                                <\/h3>\n                                <div class=\"accordion-content\">\n                                    <p>Die strengsten internationalen Standards und Vorschriften verlangen oder empfehlen Schutz durch Unidirectional Gateways f\u00fcr industrielle Netzwerke. Unidirectional Gateways sind st\u00e4rker als Firewalls und erf\u00fcllen alle industriellen Sicherheitsstandards, Vorschriften und Best Practices.<\/p>                                <\/div>\n                            <\/div>\n                                                    <div class=\"accordion-tab\">\n\n                                <h3 class=\"accordion-title\">                                         <span><img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/No-_Abundance-of-Caution_.png\" alt=\"Keine \u201eAbundance of Caution\u201c-Ausf\u00e4lle\">\n                                            Keine \u201eAbundance of Caution\u201c-Ausf\u00e4lle<\/span> <svg width=\"16\" height=\"10\" viewBox=\"0 0 16 10\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <path d=\"M15.1749 0.950854L8.08744 9.05078L1 0.950854\" stroke=\"white\" \/>\n                                        <\/svg>\n                                <\/h3>\n                                <div class=\"accordion-content\">\n                                    <p><span class=\"TextRun SCXW105420028 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW105420028 BCX0\">Unidirectional Gateways <\/span><span class=\"NormalTextRun SCXW105420028 BCX0\">bieten<\/span><span class=\"NormalTextRun SCXW105420028 BCX0\"> einen so starken Schutz f\u00fcr OT-Netzwerke, dass unidirektional gesch\u00fctzte Unternehmen OT-Systeme nicht wegen \u201eAbundance of Caution\u201c herunterfahren m\u00fcssen, wenn IT-Netzwerke durch Ransomware kompromittiert werden.<\/span><\/span><span class=\"EOP SCXW105420028 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>                                <\/div>\n                            <\/div>\n                                                    <div class=\"accordion-tab\">\n\n                                <h3 class=\"accordion-title\">                                         <span><img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/No-IT-dependencies.png\" alt=\"Keine IT-Abh\u00e4ngigkeiten\">\n                                            Keine IT-Abh\u00e4ngigkeiten<\/span> <svg width=\"16\" height=\"10\" viewBox=\"0 0 16 10\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <path d=\"M15.1749 0.950854L8.08744 9.05078L1 0.950854\" stroke=\"white\" \/>\n                                        <\/svg>\n                                <\/h3>\n                                <div class=\"accordion-content\">\n                                    Ein <p><span class=\"TextRun SCXW191242204 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW191242204 BCX0\"><\/span><span class=\"NormalTextRun SCXW191242204 BCX0\">unidirektionales Netzwerkkonzept zeigt OT-Abh\u00e4ngigkeiten von IT-Netzwerken auf und helfen, diese Abh\u00e4ngigkeiten zu <\/span><span class=\"NormalTextRun SCXW191242204 BCX0\">beseitigen<\/span><span class=\"NormalTextRun SCXW191242204 BCX0\">. Ohne IT-Abh\u00e4ngigkeiten k\u00f6nnen OT-Systeme normal weiterarbeiten, wenn IT-Netzwerke und Server durch Ransomware beeintr\u00e4chtigt sind.<\/span><\/span><span class=\"EOP SCXW191242204 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>                                <\/div>\n                            <\/div>\n                                            <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1305ee25 e-con-full e-flex e-con e-parent\" data-id=\"1305ee25\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-13553943 h2_with_svg elementor-widget elementor-widget-heading\" data-id=\"13553943\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Funktionsweise<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-22442278 e-flex e-con-boxed e-con e-child\" data-id=\"22442278\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-66dbfc76 e-flex e-con-boxed e-con e-child\" data-id=\"66dbfc76\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4dee0137 elementor-widget elementor-widget-image\" data-id=\"4dee0137\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/elementor\/thumbs\/Group-1117-qcqbkytxiedgff1vtzhzgc6gblqnq9p4zmdx8wensw.png\" title=\"Group 1117\" alt=\"Group 1117\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1dd12d7a e-flex e-con-boxed e-con e-child\" data-id=\"1dd12d7a\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3adbc1ac elementor-widget elementor-widget-heading\" data-id=\"3adbc1ac\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Verbindung<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c8f5025 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"5c8f5025\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>von industriellen Netzwerken mit IT-Netzwerken \u2013 auf sichere Weise<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-165f7bf3 e-flex e-con-boxed e-con e-child\" data-id=\"165f7bf3\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2e8d8b3f elementor-widget elementor-widget-image\" data-id=\"2e8d8b3f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/elementor\/thumbs\/Group-1117-1-qcqbpemhs8g794lrwwkk87utb3v22tbi9lagtxtqf4.png\" title=\"Group 1117-1\" alt=\"Group 1117-1\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-54c049e7 e-flex e-con-boxed e-con e-child\" data-id=\"54c049e7\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7c9d3024 elementor-widget elementor-widget-heading\" data-id=\"7c9d3024\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Schutz<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-36c266e4 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"36c266e4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>von Industrienetzen mit Hardware-gest\u00fctzten Technologien<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-413866ce e-flex e-con-boxed e-con e-child\" data-id=\"413866ce\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b4779c9 elementor-widget elementor-widget-image\" data-id=\"1b4779c9\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/elementor\/thumbs\/Group-1117-2-qcqbqj1jy3zj4cz2cw1ipfnmuobu9sryr5ccgu5szk.png\" title=\"Group 1117-2\" alt=\"Group 1117-2\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-420eaf3e e-flex e-con-boxed e-con e-child\" data-id=\"420eaf3e\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-591232b elementor-widget elementor-widget-heading\" data-id=\"591232b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Replikation<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10773e93 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"10773e93\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>von Echtzeit-Betriebsservern im IT-Netzwerk eines Unternehmens<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-742e2b6 e-flex e-con-boxed e-con e-child\" data-id=\"742e2b6\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-31fb8ec5 elementor-widget elementor-widget-image\" data-id=\"31fb8ec5\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/diagrams-for-webpage-wf-all-products-wf500.png\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"diagrams for webpage wf all products wf500\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MzMwNzYsInVybCI6Imh0dHBzOlwvXC93YXRlcmZhbGwtc2VjdXJpdHkuY29tXC93cC1jb250ZW50XC91cGxvYWRzXC8yMDIzXC8wOFwvZGlhZ3JhbXMtZm9yLXdlYnBhZ2Utd2YtYWxsLXByb2R1Y3RzLXdmNTAwLnBuZyJ9\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" loading=\"lazy\" width=\"2440\" height=\"545\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/diagrams-for-webpage-wf-all-products-wf500.png\" class=\"attachment-full size-full wp-image-33076\" alt=\"\" srcset=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/diagrams-for-webpage-wf-all-products-wf500.png 2440w, https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/diagrams-for-webpage-wf-all-products-wf500-300x67.png 300w, https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/diagrams-for-webpage-wf-all-products-wf500-1024x229.png 1024w, https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/diagrams-for-webpage-wf-all-products-wf500-768x172.png 768w, https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/diagrams-for-webpage-wf-all-products-wf500-1536x343.png 1536w, https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/diagrams-for-webpage-wf-all-products-wf500-2048x457.png 2048w\" sizes=\"auto, (max-width: 2440px) 100vw, 2440px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e116d6c e-flex e-con-boxed e-con e-parent\" data-id=\"e116d6c\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3d6d6aa1 elementor-widget__width-initial h2_with_svg elementor-widget elementor-widget-heading\" data-id=\"3d6d6aa1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Die branchenspezifischen L\u00f6sungen von Waterfall<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2cab01ed custom_tab_widget elementor-widget elementor-widget-custom-carousel-block\" data-id=\"2cab01ed\" data-element_type=\"widget\" data-widget_type=\"custom-carousel-block.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"custom-carousel-block\">\n            <div class=\"carousel-navigation\">\n                                    <span class=\"carousel-nav-item\">Energie<\/span>\n                                    <span class=\"carousel-nav-item\">\u00d6l und Gas<\/span>\n                                    <span class=\"carousel-nav-item\">Bahnverkehr<\/span>\n                                    <span class=\"carousel-nav-item\">Anlagen<\/span>\n                                    <span class=\"carousel-nav-item\">Wasser<\/span>\n                                    <span class=\"carousel-nav-item\">Fertigung<\/span>\n                            <\/div>\n            <div class=\"carousel-slides\">\n                                    <div class=\"carousel-slide\">\n                        <div class=\"wrap\">\n                            <div class=\"slide-image\">\n                                <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/aSub-Industry-Visual.png\" alt=\"slide_1\">\n                            <\/div>\n                            <div class=\"slide-content\">\n                                <h2 class=\"slide-title\">Cybersicherheit f\u00fcr Kraftwerke<\/h2>\n                                <div class=\"slide-text\"><p>Energieversorger k\u00f6nnen beruhigt sein, denn sie wissen, dass Cyberangriffe aus der Ferne nicht \u00fcber ihre Unidirectional Gateways eindringen k\u00f6nnen, um Kontrollsysteme zu manipulieren, die f\u00fcr die Sicherheit der Besch\u00e4ftigten und der \u00d6ffentlichkeit, f\u00fcr die Verhinderung von Sch\u00e4den an langlebigen Turbinen und anderen Anlagen oder f\u00fcr die Sicherstellung einer kontinuierlichen und effizienten Stromproduktion verantwortlich sind.<\/p><\/div>\n                                                                    <a class=\"learn-more-link\" href=\"\/solutions\/by-industry\/electric-power\/\">\n                                        Learn more <svg width=\"11\" height=\"8\" viewBox=\"0 0 11 8\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <path d=\"M10.3536 4.35355C10.5488 4.15829 10.5488 3.84171 10.3536 3.64645L7.17157 0.464466C6.97631 0.269204 6.65973 0.269204 6.46447 0.464466C6.2692 0.659728 6.2692 0.976311 6.46447 1.17157L9.29289 4L6.46447 6.82843C6.2692 7.02369 6.2692 7.34027 6.46447 7.53553C6.65973 7.7308 6.97631 7.7308 7.17157 7.53553L10.3536 4.35355ZM0 4.5H10V3.5H0V4.5Z\" fill=\"#FF9900\" \/>\n                                        <\/svg>\n\n                                    <\/a>\n                                                            <\/div>\n                        <\/div>\n                    <\/div>\n                                    <div class=\"carousel-slide\">\n                        <div class=\"wrap\">\n                            <div class=\"slide-image\">\n                                <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Sub-Industry-Visualas.png\" alt=\"slide_2\">\n                            <\/div>\n                            <div class=\"slide-content\">\n                                <h2 class=\"slide-title\">Cybersicherheit f\u00fcr \u00d6l und Gas<\/h2>\n                                <div class=\"slide-text\"><p>Eigent\u00fcmer und Betreiber von Offshore-Plattformen, Pipelines und Raffinerien k\u00f6nnen beruhigt sein, denn sie wissen, dass kein Cyber-Sabotageangriff in die unidirektionale Gateway-Hardware eindringen kann und weder die Sicherheit der Besch\u00e4ftigten oder der \u00d6ffentlichkeit, die Umwelt, langlebige Anlagen oder die zuverl\u00e4ssige Produktion und den Betrieb gef\u00e4hrden noch ungeplante Abschaltungen herbeif\u00fchren kann.<\/p><\/div>\n                                                                    <a class=\"learn-more-link\" href=\"\/solutions\/by-industry\/oil-gas\/\">\n                                        Learn more <svg width=\"11\" height=\"8\" viewBox=\"0 0 11 8\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <path d=\"M10.3536 4.35355C10.5488 4.15829 10.5488 3.84171 10.3536 3.64645L7.17157 0.464466C6.97631 0.269204 6.65973 0.269204 6.46447 0.464466C6.2692 0.659728 6.2692 0.976311 6.46447 1.17157L9.29289 4L6.46447 6.82843C6.2692 7.02369 6.2692 7.34027 6.46447 7.53553C6.65973 7.7308 6.97631 7.7308 7.17157 7.53553L10.3536 4.35355ZM0 4.5H10V3.5H0V4.5Z\" fill=\"#FF9900\" \/>\n                                        <\/svg>\n\n                                    <\/a>\n                                                            <\/div>\n                        <\/div>\n                    <\/div>\n                                    <div class=\"carousel-slide\">\n                        <div class=\"wrap\">\n                            <div class=\"slide-image\">\n                                <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Sub-Industry-Visualf.png\" alt=\"slide_3\">\n                            <\/div>\n                            <div class=\"slide-content\">\n                                <h2 class=\"slide-title\">Cybersicherheit f\u00fcr den Bahnverkehr<\/h2>\n                                <div class=\"slide-text\"><p>Betreiber von Bahn- und U-Bahn-Systemen k\u00f6nnen sich sicher sein, dass wichtige Netzwerke wie Umschaltsysteme, Stromversorgungssysteme und Betriebskontrollzentren vor Cyberangriffen aus IT- oder Internetnetzwerken durch Unidirectional Gateways gesch\u00fctzt sind, ganz gleich, wie ausgekl\u00fcgelt solche Angriffe heute sind oder in Zukunft sein k\u00f6nnten.<\/p><\/div>\n                                                                    <a class=\"learn-more-link\" href=\"\/solutions\/by-industry\/rail-industry\/\">\n                                        Learn more <svg width=\"11\" height=\"8\" viewBox=\"0 0 11 8\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <path d=\"M10.3536 4.35355C10.5488 4.15829 10.5488 3.84171 10.3536 3.64645L7.17157 0.464466C6.97631 0.269204 6.65973 0.269204 6.46447 0.464466C6.2692 0.659728 6.2692 0.976311 6.46447 1.17157L9.29289 4L6.46447 6.82843C6.2692 7.02369 6.2692 7.34027 6.46447 7.53553C6.65973 7.7308 6.97631 7.7308 7.17157 7.53553L10.3536 4.35355ZM0 4.5H10V3.5H0V4.5Z\" fill=\"#FF9900\" \/>\n                                        <\/svg>\n\n                                    <\/a>\n                                                            <\/div>\n                        <\/div>\n                    <\/div>\n                                    <div class=\"carousel-slide\">\n                        <div class=\"wrap\">\n                            <div class=\"slide-image\">\n                                <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Sub-Industry-Visual-1.png\" alt=\"slide_4\">\n                            <\/div>\n                            <div class=\"slide-content\">\n                                <h2 class=\"slide-title\">Cybersicherheit f\u00fcr Anlagen<\/h2>\n                                <div class=\"slide-text\"><p>Die Betreiber von Rechenzentren, Flugh\u00e4fen, Regierungs- und milit\u00e4rischen Einrichtungen und anderen wichtigen Anlagen k\u00f6nnen ruhig schlafen, da sie wissen, dass Unidirectional Gateways un\u00fcberwindbar sind, wenn Angreifer \u00fcber das Internet exponierte IT-Netzwerke durchdringen und die \u00f6ffentliche Sicherheit, wichtige Ger\u00e4te und den laufenden und korrekten Betrieb gef\u00e4hrden<\/p><\/div>\n                                                                    <a class=\"learn-more-link\" href=\"\/solutions\/by-industry\/facilities\/\">\n                                        Learn more <svg width=\"11\" height=\"8\" viewBox=\"0 0 11 8\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <path d=\"M10.3536 4.35355C10.5488 4.15829 10.5488 3.84171 10.3536 3.64645L7.17157 0.464466C6.97631 0.269204 6.65973 0.269204 6.46447 0.464466C6.2692 0.659728 6.2692 0.976311 6.46447 1.17157L9.29289 4L6.46447 6.82843C6.2692 7.02369 6.2692 7.34027 6.46447 7.53553C6.65973 7.7308 6.97631 7.7308 7.17157 7.53553L10.3536 4.35355ZM0 4.5H10V3.5H0V4.5Z\" fill=\"#FF9900\" \/>\n                                        <\/svg>\n\n                                    <\/a>\n                                                            <\/div>\n                        <\/div>\n                    <\/div>\n                                    <div class=\"carousel-slide\">\n                        <div class=\"wrap\">\n                            <div class=\"slide-image\">\n                                <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Sub-Industry-Visual-2.png\" alt=\"slide_5\">\n                            <\/div>\n                            <div class=\"slide-content\">\n                                <h2 class=\"slide-title\">Cybersicherheit f\u00fcr die Wasseraufbereitung<\/h2>\n                                <div class=\"slide-text\"><p>Mit dem Einsatz von Unidirectional Gateways k\u00f6nnen sich die Verantwortlichen in den Kommunen darauf verlassen, dass ihre Automatisierungssysteme und die Wasseraufbereitungsinfrastruktur auch bei den raffiniertesten Angriffen aus dem Internet kontinuierlich und korrekt funktionieren \u2013 heute und in Zukunft.<\/p><\/div>\n                                                                    <a class=\"learn-more-link\" href=\"\/solutions\/by-industry\/water-treatment\/\">\n                                        Learn more <svg width=\"11\" height=\"8\" viewBox=\"0 0 11 8\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <path d=\"M10.3536 4.35355C10.5488 4.15829 10.5488 3.84171 10.3536 3.64645L7.17157 0.464466C6.97631 0.269204 6.65973 0.269204 6.46447 0.464466C6.2692 0.659728 6.2692 0.976311 6.46447 1.17157L9.29289 4L6.46447 6.82843C6.2692 7.02369 6.2692 7.34027 6.46447 7.53553C6.65973 7.7308 6.97631 7.7308 7.17157 7.53553L10.3536 4.35355ZM0 4.5H10V3.5H0V4.5Z\" fill=\"#FF9900\" \/>\n                                        <\/svg>\n\n                                    <\/a>\n                                                            <\/div>\n                        <\/div>\n                    <\/div>\n                                    <div class=\"carousel-slide\">\n                        <div class=\"wrap\">\n                            <div class=\"slide-image\">\n                                <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Sub-Industry-Visual-3.png\" alt=\"slide_6\">\n                            <\/div>\n                            <div class=\"slide-content\">\n                                <h2 class=\"slide-title\">Cybersicherheit f\u00fcr die Fertigung<\/h2>\n                                <div class=\"slide-text\"><p>Niemand will n\u00e4chste Woche in den Schlagzeilen stehen und erkl\u00e4ren, dass ein weiteres Dutzend Anlagen durch Ransomware oder andere Cyberangriffe lahmgelegt wurde. Weder Ransomware noch die raffiniertesten Angriffe aus dem Internet k\u00f6nnen Unidirectional Gateways von Waterfall durchbrechen und so eine Bedrohung f\u00fcr die Produktqualit\u00e4t oder kontinuierliche und korrekte Fertigungsprozesse darstellen.<\/p><\/div>\n                                                                    <a class=\"learn-more-link\" href=\"\/solutions\/by-industry\/manufacturing\/\">\n                                        Learn more <svg width=\"11\" height=\"8\" viewBox=\"0 0 11 8\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <path d=\"M10.3536 4.35355C10.5488 4.15829 10.5488 3.84171 10.3536 3.64645L7.17157 0.464466C6.97631 0.269204 6.65973 0.269204 6.46447 0.464466C6.2692 0.659728 6.2692 0.976311 6.46447 1.17157L9.29289 4L6.46447 6.82843C6.2692 7.02369 6.2692 7.34027 6.46447 7.53553C6.65973 7.7308 6.97631 7.7308 7.17157 7.53553L10.3536 4.35355ZM0 4.5H10V3.5H0V4.5Z\" fill=\"#FF9900\" \/>\n                                        <\/svg>\n\n                                    <\/a>\n                                                            <\/div>\n                        <\/div>\n                    <\/div>\n                            <\/div>\n        <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5a2feea e-flex e-con-boxed e-con e-parent\" data-id=\"5a2feea\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1ffa2d8 elementor-widget elementor-widget-template\" data-id=\"1ffa2d8\" data-element_type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"container\" data-elementor-id=\"5488\" class=\"elementor elementor-5488\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b26e79f cta_block e-flex e-con-boxed e-con e-parent\" data-id=\"b26e79f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;position&quot;:&quot;absolute&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2697fb2 elementor-widget elementor-widget-heading\" data-id=\"2697fb2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">One way for data. <br>\nZero entry for attackers.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ac59687 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"ac59687\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/contact-us\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Free consultation<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"featured_media":0,"template":"","class_list":["post-32904","need","type-need","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/waterfall-security.com\/de\/wp-json\/wp\/v2\/need\/32904","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/waterfall-security.com\/de\/wp-json\/wp\/v2\/need"}],"about":[{"href":"https:\/\/waterfall-security.com\/de\/wp-json\/wp\/v2\/types\/need"}],"version-history":[{"count":2,"href":"https:\/\/waterfall-security.com\/de\/wp-json\/wp\/v2\/need\/32904\/revisions"}],"predecessor-version":[{"id":35621,"href":"https:\/\/waterfall-security.com\/de\/wp-json\/wp\/v2\/need\/32904\/revisions\/35621"}],"wp:attachment":[{"href":"https:\/\/waterfall-security.com\/de\/wp-json\/wp\/v2\/media?parent=32904"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}