{"id":32918,"date":"2023-08-14T10:23:13","date_gmt":"2023-08-14T10:23:13","guid":{"rendered":"https:\/\/waterfall-security.com\/solutions\/by-need\/erfuellen-sie-ot-industrielle-sicherheitsstandards-und-vorschriften\/"},"modified":"2025-08-12T09:15:59","modified_gmt":"2025-08-12T09:15:59","slug":"erfuellen-sie-ot-industrielle-sicherheitsstandards-und-vorschriften","status":"publish","type":"need","link":"https:\/\/waterfall-security.com\/de\/solutions\/by-need\/erfuellen-sie-ot-industrielle-sicherheitsstandards-und-vorschriften\/","title":{"rendered":"Erf\u00fcllen Sie OT-\/industrielle Sicherheitsstandards und -vorschriften"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"32918\" class=\"elementor elementor-32918 elementor-3039\" data-elementor-post-type=\"need\">\n\t\t\t\t<div class=\"elementor-element elementor-element-17c233be e-flex e-con-boxed e-con e-parent\" data-id=\"17c233be\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5b6f8e20 e-con-full e-flex e-con e-child\" data-id=\"5b6f8e20\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-4982d205 e-con-full e-flex e-con e-child\" data-id=\"4982d205\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-65683d2a elementor-widget elementor-widget-heading\" data-id=\"65683d2a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Erf\u00fcllen Sie OT-\/industrielle Sicherheitsstandards und -vorschriften<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5bb8ecce elementor-widget elementor-widget-text-editor\" data-id=\"5bb8ecce\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Regierungen, Kunden und Anteilseigner verlangen zunehmend die Einhaltung von Vorschriften, Standards und Best Practices. Strafen und andere Folgen der Nichteinhaltung k\u00f6nnen erheblich sein und schlecht konzipierte Compliance-Programme k\u00f6nnen sehr teuer werden.<\/p><p>Die Unidirectional Security Gateways von Waterfall bieten ein Ma\u00df an Cybersicherheit, das geltende Vorschriften und Standards erf\u00fcllt \u2013 und \u00fcbertrifft. Die Sicherheit von Waterfall ist so robust, dass sie sogar zuk\u00fcnftige, noch nicht eingef\u00fchrte Vorschriften erf\u00fcllt.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-06645a3 e-flex e-con-boxed e-con e-child\" data-id=\"06645a3\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-705b036 elementor-widget elementor-widget-button\" data-id=\"705b036\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/contact-us\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mit einem Experten sprechen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-50cfb27b e-con-full e-flex e-con e-child\" data-id=\"50cfb27b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e16aac8 elementor-align-center elementor-widget elementor-widget-lottie\" data-id=\"e16aac8\" data-element_type=\"widget\" data-settings=\"{&quot;source_json&quot;:{&quot;url&quot;:&quot;https:\\\/\\\/waterfall-security.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/File-1-Updated-1.json&quot;,&quot;id&quot;:11274,&quot;size&quot;:&quot;&quot;,&quot;alt&quot;:&quot;&quot;,&quot;source&quot;:&quot;library&quot;},&quot;loop&quot;:&quot;yes&quot;,&quot;source&quot;:&quot;media_file&quot;,&quot;caption_source&quot;:&quot;none&quot;,&quot;link_to&quot;:&quot;none&quot;,&quot;trigger&quot;:&quot;arriving_to_viewport&quot;,&quot;viewport&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;play_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1,&quot;sizes&quot;:[]},&quot;start_point&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;end_point&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:100,&quot;sizes&quot;:[]},&quot;renderer&quot;:&quot;svg&quot;}\" data-widget_type=\"lottie.default\">\n\t\t\t\t\t<div class=\"e-lottie__container\"><div class=\"e-lottie__animation\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-18e871f1 e-flex e-con-boxed e-con e-parent\" data-id=\"18e871f1\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-69b1073b h2_with_svg elementor-widget-mobile__width-initial elementor-widget elementor-widget-heading\" data-id=\"69b1073b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ihre Vorteile mit Waterfall<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5589f740 elementor-widget elementor-widget-cust-tab-r-men\" data-id=\"5589f740\" data-element_type=\"widget\" data-widget_type=\"cust-tab-r-men.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"custom-tabs-widget right_menu desc_v\">\n            <div class=\"custom-tabs-nav\">\n                                    <div class=\"custom-tabs-nav-item active\">\n                                                    <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/Compliance-1.png\" alt=\"Einhaltung\">\n                                                <span class=\"tab-title\">Einhaltung<\/span>\n                    <\/div>\n                                    <div class=\"custom-tabs-nav-item \">\n                                                    <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/Peace-of-mind.png\" alt=\"Entlastung\">\n                                                <span class=\"tab-title\">Entlastung<\/span>\n                    <\/div>\n                                    <div class=\"custom-tabs-nav-item \">\n                                                    <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/Safely-network.png\" alt=\"Sicherheit\">\n                                                <span class=\"tab-title\">Sicherheit<\/span>\n                    <\/div>\n                                    <div class=\"custom-tabs-nav-item \">\n                                                    <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/Savings-1.png\" alt=\"Ersparnis\">\n                                                <span class=\"tab-title\">Ersparnis<\/span>\n                    <\/div>\n                                    <div class=\"custom-tabs-nav-item \">\n                                                    <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/Protection.png\" alt=\"Zukunftssicher\">\n                                                <span class=\"tab-title\">Zukunftssicher<\/span>\n                    <\/div>\n                            <\/div>\n            <div class=\"custom-tabs-content\">\n                                    <div class=\"custom-tabs-content-item active\">\n                                                    <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/Compliance-1.png\" alt=\"Einhaltung\">\n                                                <span class=\"tab-title\">Einhaltung<\/span>\n                        <div class=\"tab_content_acs\">\n                            <p><span class=\"TextRun SCXW237962470 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW237962470 BCX0\">Die strengsten internationalen Standards und Vorschriften verlangen oder empfehlen Schutz durch Unidirectional Gateways f\u00fcr industrielle Netzwerke. Unidirectional Gateways sind st\u00e4rker als Firewalls und erf\u00fcllen alle industriellen Sicherheitsstandards, <\/span><span class=\"NormalTextRun SCXW237962470 BCX0\">Vorschriften<\/span><span class=\"NormalTextRun SCXW237962470 BCX0\"> und Best Practices.<\/span><\/span><span class=\"EOP SCXW237962470 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>                        <\/div>\n                    <\/div>\n                                    <div class=\"custom-tabs-content-item \">\n                                                    <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/Peace-of-mind.png\" alt=\"Entlastung\">\n                                                <span class=\"tab-title\">Entlastung<\/span>\n                        <div class=\"tab_content_acs\">\n                            <p><span class=\"TextRun SCXW213531728 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW213531728 BCX0\">Unidirectional Gateways <\/span><span class=\"NormalTextRun SCXW213531728 BCX0\">bieten<\/span><span class=\"NormalTextRun SCXW213531728 BCX0\"> einen so starken Schutz f\u00fcr industrielle Netzwerke, dass viele Standards andere Schutzanforderungen f\u00fcr unidirektional gesch\u00fctzte Netzwerke lockern. In den nordamerikanischen NERC CIP-Vorschriften zum Beispiel gelten 37 der 125 Sicherheitsanforderungen f\u00fcr Netzwerke, die mit Firewalls gesch\u00fctzt sind, aber nicht f\u00fcr unidirektional gesch\u00fctzte Netzwerke. <\/span> <span class=\"NormalTextRun SCXW213531728 BCX0\"> <\/span> <span class=\"NormalTextRun SCXW213531728 BCX0\"><\/span><\/span><span class=\"EOP SCXW213531728 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>                        <\/div>\n                    <\/div>\n                                    <div class=\"custom-tabs-content-item \">\n                                                    <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/Safely-network.png\" alt=\"Sicherheit\">\n                                                <span class=\"tab-title\">Sicherheit<\/span>\n                        <div class=\"tab_content_acs\">\n                            <p><span class=\"TextRun SCXW95731830 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW95731830 BCX0\">Standards und Compliance konzentrieren sich oft auf die minimale Sicherheit \u2013 das Minimum, das alle Standorte <\/span><span class=\"NormalTextRun SCXW95731830 BCX0\">einhalten<\/span><span class=\"NormalTextRun SCXW95731830 BCX0\"> <\/span><span class=\"NormalTextRun SCXW95731830 BCX0\">m\u00fcssen<\/span><span class=\"NormalTextRun SCXW95731830 BCX0\">, unabh\u00e4ngig davon, wie wichtig oder unwichtig der jeweilige Standort ist. Ja, Unidirectional Gateways sorgen f\u00fcr die Einhaltung von Standards und Best Practices UND die Gateways <\/span><span class=\"NormalTextRun SCXW95731830 BCX0\">bieten<\/span><span class=\"NormalTextRun SCXW95731830 BCX0\"> die st\u00e4rkste Netzwerksicherheit f\u00fcr industrielle Netzwerke.<\/span><\/span><span class=\"EOP SCXW95731830 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>                        <\/div>\n                    <\/div>\n                                    <div class=\"custom-tabs-content-item \">\n                                                    <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/Savings-1.png\" alt=\"Ersparnis\">\n                                                <span class=\"tab-title\">Ersparnis<\/span>\n                        <div class=\"tab_content_acs\">\n                            <p><span class=\"TextRun SCXW109648339 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW109648339 BCX0\">Unidirectional Gateways vereinfachen die Einhaltung der Vorschriften. Mit diesen Gateways gibt es keine <\/span><span class=\"NormalTextRun SCXW109648339 BCX0\">Firewall-Protokolle<\/span><span class=\"NormalTextRun SCXW109648339 BCX0\">, die untersucht werden m\u00fcssen, und keine Netzwerkeinbr\u00fcche, bei denen die Gateway-Hardware <\/span><span class=\"NormalTextRun SCXW109648339 BCX0\">m\u00f6glicherweise<\/span><span class=\"NormalTextRun SCXW109648339 BCX0\"> infiltriert werden k\u00f6nnte. Unidirectional Gateways vereinfachen Compliance-Programme und senken dadurch die Kosten.<\/span><\/span><span class=\"EOP SCXW109648339 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>                        <\/div>\n                    <\/div>\n                                    <div class=\"custom-tabs-content-item \">\n                                                    <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/Protection.png\" alt=\"Zukunftssicher\">\n                                                <span class=\"tab-title\">Zukunftssicher<\/span>\n                        <div class=\"tab_content_acs\">\n                            <p><span class=\"TextRun SCXW143975954 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW143975954 BCX0\">Bei allen Cyber-Sabotage-Angriffen handelt es sich um Informationen - die einzige M\u00f6glichkeit, wie ein Automatisierungsnetzwerk von einem unkompromittierten in einen kompromittierten Zustand \u00fcbergehen kann, ist, wenn Angriffsinformationen irgendwie in das Netzwerk gelangen. Aber - egal wie sich die Angriffe in Zukunft entwickeln, keine Angriffsinformationen k\u00f6nnen in die Gateway-Hardware eindringen. Unidirectional Gateways sorgen f\u00fcr zukunftssichere Sicherheits- und Standardkonformit\u00e4tsprogramme.<\/span><\/span><span class=\"EOP SCXW143975954 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>                        <\/div>\n                    <\/div>\n                            <\/div>\n        <\/div>\n        <div class=\"custom-accordion-widget custom-tabs-widget-mob right_menu mob_v\">\n            <div class=\"accordion-container\">\n                <div class=\"accordion-tabs\">\n                    <div class=\"accordion-tabs_wrapper\">\n                                                    <div class=\"accordion-tab\">\n\n                                <h3 class=\"accordion-title\">                                         <span><img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/Compliance-1.png\" alt=\"Einhaltung\">\n                                            Einhaltung<\/span> <svg width=\"16\" height=\"10\" viewBox=\"0 0 16 10\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <path d=\"M15.1749 0.950854L8.08744 9.05078L1 0.950854\" stroke=\"white\" \/>\n                                        <\/svg>\n                                <\/h3>\n                                <div class=\"accordion-content\">\n                                    <p><span class=\"TextRun SCXW237962470 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW237962470 BCX0\">Die strengsten internationalen Standards und Vorschriften verlangen oder empfehlen Schutz durch Unidirectional Gateways f\u00fcr industrielle Netzwerke. Unidirectional Gateways sind st\u00e4rker als Firewalls und erf\u00fcllen alle industriellen Sicherheitsstandards, <\/span><span class=\"NormalTextRun SCXW237962470 BCX0\">Vorschriften<\/span><span class=\"NormalTextRun SCXW237962470 BCX0\"> und Best Practices.<\/span><\/span><span class=\"EOP SCXW237962470 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>                                <\/div>\n                            <\/div>\n                                                    <div class=\"accordion-tab\">\n\n                                <h3 class=\"accordion-title\">                                         <span><img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/Peace-of-mind.png\" alt=\"Entlastung\">\n                                            Entlastung<\/span> <svg width=\"16\" height=\"10\" viewBox=\"0 0 16 10\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <path d=\"M15.1749 0.950854L8.08744 9.05078L1 0.950854\" stroke=\"white\" \/>\n                                        <\/svg>\n                                <\/h3>\n                                <div class=\"accordion-content\">\n                                    <p><span class=\"TextRun SCXW213531728 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW213531728 BCX0\">Unidirectional Gateways <\/span><span class=\"NormalTextRun SCXW213531728 BCX0\">bieten<\/span><span class=\"NormalTextRun SCXW213531728 BCX0\"> einen so starken Schutz f\u00fcr industrielle Netzwerke, dass viele Standards andere Schutzanforderungen f\u00fcr unidirektional gesch\u00fctzte Netzwerke lockern. In den nordamerikanischen NERC CIP-Vorschriften zum Beispiel gelten 37 der 125 Sicherheitsanforderungen f\u00fcr Netzwerke, die mit Firewalls gesch\u00fctzt sind, aber nicht f\u00fcr unidirektional gesch\u00fctzte Netzwerke. <\/span> <span class=\"NormalTextRun SCXW213531728 BCX0\"> <\/span> <span class=\"NormalTextRun SCXW213531728 BCX0\"><\/span><\/span><span class=\"EOP SCXW213531728 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>                                <\/div>\n                            <\/div>\n                                                    <div class=\"accordion-tab\">\n\n                                <h3 class=\"accordion-title\">                                         <span><img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/Safely-network.png\" alt=\"Sicherheit\">\n                                            Sicherheit<\/span> <svg width=\"16\" height=\"10\" viewBox=\"0 0 16 10\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <path d=\"M15.1749 0.950854L8.08744 9.05078L1 0.950854\" stroke=\"white\" \/>\n                                        <\/svg>\n                                <\/h3>\n                                <div class=\"accordion-content\">\n                                    <p><span class=\"TextRun SCXW95731830 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW95731830 BCX0\">Standards und Compliance konzentrieren sich oft auf die minimale Sicherheit \u2013 das Minimum, das alle Standorte <\/span><span class=\"NormalTextRun SCXW95731830 BCX0\">einhalten<\/span><span class=\"NormalTextRun SCXW95731830 BCX0\"> <\/span><span class=\"NormalTextRun SCXW95731830 BCX0\">m\u00fcssen<\/span><span class=\"NormalTextRun SCXW95731830 BCX0\">, unabh\u00e4ngig davon, wie wichtig oder unwichtig der jeweilige Standort ist. Ja, Unidirectional Gateways sorgen f\u00fcr die Einhaltung von Standards und Best Practices UND die Gateways <\/span><span class=\"NormalTextRun SCXW95731830 BCX0\">bieten<\/span><span class=\"NormalTextRun SCXW95731830 BCX0\"> die st\u00e4rkste Netzwerksicherheit f\u00fcr industrielle Netzwerke.<\/span><\/span><span class=\"EOP SCXW95731830 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>                                <\/div>\n                            <\/div>\n                                                    <div class=\"accordion-tab\">\n\n                                <h3 class=\"accordion-title\">                                         <span><img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/Savings-1.png\" alt=\"Ersparnis\">\n                                            Ersparnis<\/span> <svg width=\"16\" height=\"10\" viewBox=\"0 0 16 10\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <path d=\"M15.1749 0.950854L8.08744 9.05078L1 0.950854\" stroke=\"white\" \/>\n                                        <\/svg>\n                                <\/h3>\n                                <div class=\"accordion-content\">\n                                    <p><span class=\"TextRun SCXW109648339 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW109648339 BCX0\">Unidirectional Gateways vereinfachen die Einhaltung der Vorschriften. Mit diesen Gateways gibt es keine <\/span><span class=\"NormalTextRun SCXW109648339 BCX0\">Firewall-Protokolle<\/span><span class=\"NormalTextRun SCXW109648339 BCX0\">, die untersucht werden m\u00fcssen, und keine Netzwerkeinbr\u00fcche, bei denen die Gateway-Hardware <\/span><span class=\"NormalTextRun SCXW109648339 BCX0\">m\u00f6glicherweise<\/span><span class=\"NormalTextRun SCXW109648339 BCX0\"> infiltriert werden k\u00f6nnte. Unidirectional Gateways vereinfachen Compliance-Programme und senken dadurch die Kosten.<\/span><\/span><span class=\"EOP SCXW109648339 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>                                <\/div>\n                            <\/div>\n                                                    <div class=\"accordion-tab\">\n\n                                <h3 class=\"accordion-title\">                                         <span><img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/Protection.png\" alt=\"Zukunftssicher\">\n                                            Zukunftssicher<\/span> <svg width=\"16\" height=\"10\" viewBox=\"0 0 16 10\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <path d=\"M15.1749 0.950854L8.08744 9.05078L1 0.950854\" stroke=\"white\" \/>\n                                        <\/svg>\n                                <\/h3>\n                                <div class=\"accordion-content\">\n                                    <p><span class=\"TextRun SCXW143975954 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW143975954 BCX0\">Bei allen Cyber-Sabotage-Angriffen handelt es sich um Informationen - die einzige M\u00f6glichkeit, wie ein Automatisierungsnetzwerk von einem unkompromittierten in einen kompromittierten Zustand \u00fcbergehen kann, ist, wenn Angriffsinformationen irgendwie in das Netzwerk gelangen. Aber - egal wie sich die Angriffe in Zukunft entwickeln, keine Angriffsinformationen k\u00f6nnen in die Gateway-Hardware eindringen. Unidirectional Gateways sorgen f\u00fcr zukunftssichere Sicherheits- und Standardkonformit\u00e4tsprogramme.<\/span><\/span><span class=\"EOP SCXW143975954 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>                                <\/div>\n                            <\/div>\n                                            <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-278ed331 clients_one_line elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"278ed331\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4492b50c\" data-id=\"4492b50c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-67fff664 h2_with_svg elementor-widget elementor-widget-heading\" data-id=\"67fff664\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Unterst\u00fctzte Regulierung<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-427ec777 elementor-hidden-tablet elementor-hidden-mobile elementor-arrows-position-inside elementor-pagination-position-outside elementor-widget elementor-widget-image-carousel\" data-id=\"427ec777\" data-element_type=\"widget\" data-settings=\"{&quot;slides_to_show&quot;:&quot;5&quot;,&quot;slides_to_scroll&quot;:&quot;1&quot;,&quot;slides_to_show_mobile&quot;:&quot;2&quot;,&quot;slides_to_scroll_mobile&quot;:&quot;1&quot;,&quot;navigation&quot;:&quot;both&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 von 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Gartner-logo-1.png\" alt=\"Gartner logo\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 von 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Frame-1141.png\" alt=\"IEC standards for OT security for cyber operations\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 von 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Frame-1142.png\" alt=\"ANSII - cybersecurity compliance for OT operations\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 von 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Frame-1143.png\" alt=\"NERC and NERC CIP for OT security for power generation\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 von 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Frame-1145.png\" alt=\"OT Security regulation and compliance with Industry IoT Consortium\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 von 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Frame-1144-1.png\" alt=\"Frame 1144\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 von 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Gartner-logo-1.png\" alt=\"Gartner logo\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\"><path d=\"M31.5 15.6361C31.5 7.28737 24.5713 0.499831 16 0.499829C7.42869 0.499828 0.500004 7.28736 0.500003 15.6361C0.500001 23.9849 7.42869 30.7725 16 30.7725C24.5713 30.7725 31.5 23.9849 31.5 15.6361Z\" stroke=\"#251E47\"><\/path><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M10.9238 15.6363L18.0873 21.7619L18.7897 20.9774L12.5437 15.6363L18.7897 10.2952L18.0873 9.51074L10.9238 15.6363Z\" fill=\"#251E47\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\"><path d=\"M0.5 15.6363C0.5 23.9851 7.42869 30.7726 16 30.7726C24.5713 30.7726 31.5 23.9851 31.5 15.6363C31.5 7.28754 24.5713 0.5 16 0.5C7.42869 0.5 0.5 7.28754 0.5 15.6363Z\" stroke=\"#251E47\"><\/path><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M21.0762 15.6362L13.9127 9.51058L13.2103 10.2951L19.4563 15.6362L13.2103 20.9772L13.9127 21.7617L21.0762 15.6362Z\" fill=\"#251E47\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30b89c66 elementor-hidden-desktop elementor-widget elementor-widget-image-carousel\" data-id=\"30b89c66\" data-element_type=\"widget\" data-settings=\"{&quot;slides_to_show&quot;:&quot;5&quot;,&quot;slides_to_scroll&quot;:&quot;1&quot;,&quot;slides_to_show_mobile&quot;:&quot;2&quot;,&quot;slides_to_scroll_mobile&quot;:&quot;1&quot;,&quot;slides_to_show_tablet&quot;:&quot;5&quot;,&quot;navigation&quot;:&quot;none&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 von 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Gartner-logo-1.png\" alt=\"Gartner logo\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 von 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Frame-1141.png\" alt=\"IEC standards for OT security for cyber operations\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 von 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Frame-1142.png\" alt=\"ANSII - cybersecurity compliance for OT operations\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 von 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Frame-1143.png\" alt=\"NERC and NERC CIP for OT security for power generation\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 von 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Frame-1145.png\" alt=\"OT Security regulation and compliance with Industry IoT Consortium\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 von 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Frame-1144-1.png\" alt=\"Frame 1144\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 von 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Gartner-logo-1.png\" alt=\"Gartner logo\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-f94fe8a e-flex e-con-boxed e-con e-parent\" data-id=\"f94fe8a\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ed9563d elementor-widget__width-initial h2_with_svg elementor-widget elementor-widget-heading\" data-id=\"5ed9563d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Die branchenspezifischen L\u00f6sungen von Waterfall<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b1f2a12 custom_tab_widget elementor-widget elementor-widget-custom-carousel-block\" data-id=\"3b1f2a12\" data-element_type=\"widget\" data-widget_type=\"custom-carousel-block.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"custom-carousel-block\">\n            <div class=\"carousel-navigation\">\n                                    <span class=\"carousel-nav-item\">Energie<\/span>\n                                    <span class=\"carousel-nav-item\">\u00d6l und Gas<\/span>\n                                    <span class=\"carousel-nav-item\">Bahnverkehr<\/span>\n                                    <span class=\"carousel-nav-item\">Anlagen<\/span>\n                                    <span class=\"carousel-nav-item\">Wasser<\/span>\n                                    <span class=\"carousel-nav-item\">Fertigung<\/span>\n                            <\/div>\n            <div class=\"carousel-slides\">\n                                    <div class=\"carousel-slide\">\n                        <div class=\"wrap\">\n                            <div class=\"slide-image\">\n                                <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/aSub-Industry-Visual.png\" alt=\"slide_1\">\n                            <\/div>\n                            <div class=\"slide-content\">\n                                <h2 class=\"slide-title\">Cybersicherheit f\u00fcr Kraftwerke<\/h2>\n                                <div class=\"slide-text\"><p>Energieversorger k\u00f6nnen beruhigt sein, denn sie wissen, dass Cyberangriffe aus der Ferne nicht \u00fcber ihre Unidirectional Gateways eindringen k\u00f6nnen, um Kontrollsysteme zu manipulieren, die f\u00fcr die Sicherheit der Besch\u00e4ftigten und der \u00d6ffentlichkeit, f\u00fcr die Verhinderung von Sch\u00e4den an langlebigen Turbinen und anderen Anlagen oder f\u00fcr die Sicherstellung einer kontinuierlichen und effizienten Stromproduktion verantwortlich sind.<\/p><\/div>\n                                                                    <a class=\"learn-more-link\" href=\"https:\/\/waterfall-security.com\/solutions\/by-industry\/electric-power\/\">\n                                        Learn more <svg width=\"11\" height=\"8\" viewBox=\"0 0 11 8\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <path d=\"M10.3536 4.35355C10.5488 4.15829 10.5488 3.84171 10.3536 3.64645L7.17157 0.464466C6.97631 0.269204 6.65973 0.269204 6.46447 0.464466C6.2692 0.659728 6.2692 0.976311 6.46447 1.17157L9.29289 4L6.46447 6.82843C6.2692 7.02369 6.2692 7.34027 6.46447 7.53553C6.65973 7.7308 6.97631 7.7308 7.17157 7.53553L10.3536 4.35355ZM0 4.5H10V3.5H0V4.5Z\" fill=\"#FF9900\" \/>\n                                        <\/svg>\n\n                                    <\/a>\n                                                            <\/div>\n                        <\/div>\n                    <\/div>\n                                    <div class=\"carousel-slide\">\n                        <div class=\"wrap\">\n                            <div class=\"slide-image\">\n                                <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Sub-Industry-Visualas.png\" alt=\"slide_2\">\n                            <\/div>\n                            <div class=\"slide-content\">\n                                <h2 class=\"slide-title\">IT-Sicherheit f\u00fcr \u00d6l und Gas<\/h2>\n                                <div class=\"slide-text\"><p>Eigent\u00fcmer und Betreiber von Offshore-Plattformen, Pipelines und Raffinerien k\u00f6nnen beruhigt sein, denn sie wissen, dass kein Cyber-Sabotageangriff in die unidirektionale Gateway-Hardware eindringen kann und weder die Sicherheit der Besch\u00e4ftigten oder der \u00d6ffentlichkeit, die Umwelt, langlebige Anlagen oder die zuverl\u00e4ssige Produktion und den Betrieb gef\u00e4hrden noch ungeplante Abschaltungen herbeif\u00fchren kann.<\/p><\/div>\n                                                                    <a class=\"learn-more-link\" href=\"\/solutions\/by-industry\/oil-gas\">\n                                        Learn more <svg width=\"11\" height=\"8\" viewBox=\"0 0 11 8\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <path d=\"M10.3536 4.35355C10.5488 4.15829 10.5488 3.84171 10.3536 3.64645L7.17157 0.464466C6.97631 0.269204 6.65973 0.269204 6.46447 0.464466C6.2692 0.659728 6.2692 0.976311 6.46447 1.17157L9.29289 4L6.46447 6.82843C6.2692 7.02369 6.2692 7.34027 6.46447 7.53553C6.65973 7.7308 6.97631 7.7308 7.17157 7.53553L10.3536 4.35355ZM0 4.5H10V3.5H0V4.5Z\" fill=\"#FF9900\" \/>\n                                        <\/svg>\n\n                                    <\/a>\n                                                            <\/div>\n                        <\/div>\n                    <\/div>\n                                    <div class=\"carousel-slide\">\n                        <div class=\"wrap\">\n                            <div class=\"slide-image\">\n                                <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Sub-Industry-Visualf.png\" alt=\"slide_3\">\n                            <\/div>\n                            <div class=\"slide-content\">\n                                <h2 class=\"slide-title\">IT-Sicherheit f\u00fcr den Bahnverkehr<\/h2>\n                                <div class=\"slide-text\"><p>Betreiber von Bahn- und U-Bahn-Systemen k\u00f6nnen sich sicher sein, dass wichtige Netzwerke wie Umschaltsysteme, Stromversorgungssysteme und Betriebskontrollzentren vor Cyberangriffen aus IT- oder Internetnetzwerken durch Unidirectional Gateways gesch\u00fctzt sind, ganz gleich, wie ausgekl\u00fcgelt solche Angriffe heute sind oder in Zukunft sein k\u00f6nnten.<\/p><\/div>\n                                                                    <a class=\"learn-more-link\" href=\"\/solutions\/by-industry\/rail-industry\">\n                                        Learn more <svg width=\"11\" height=\"8\" viewBox=\"0 0 11 8\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <path d=\"M10.3536 4.35355C10.5488 4.15829 10.5488 3.84171 10.3536 3.64645L7.17157 0.464466C6.97631 0.269204 6.65973 0.269204 6.46447 0.464466C6.2692 0.659728 6.2692 0.976311 6.46447 1.17157L9.29289 4L6.46447 6.82843C6.2692 7.02369 6.2692 7.34027 6.46447 7.53553C6.65973 7.7308 6.97631 7.7308 7.17157 7.53553L10.3536 4.35355ZM0 4.5H10V3.5H0V4.5Z\" fill=\"#FF9900\" \/>\n                                        <\/svg>\n\n                                    <\/a>\n                                                            <\/div>\n                        <\/div>\n                    <\/div>\n                                    <div class=\"carousel-slide\">\n                        <div class=\"wrap\">\n                            <div class=\"slide-image\">\n                                <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Sub-Industry-Visual-1.png\" alt=\"slide_4\">\n                            <\/div>\n                            <div class=\"slide-content\">\n                                <h2 class=\"slide-title\">Cybersicherheit f\u00fcr Anlagen<\/h2>\n                                <div class=\"slide-text\"><p>Die Betreiber von Rechenzentren, Flugh\u00e4fen, Regierungs- und milit\u00e4rischen Einrichtungen und anderen wichtigen Anlagen k\u00f6nnen ruhig schlafen, da sie wissen, dass Unidirectional Gateways un\u00fcberwindbar sind, wenn Angreifer \u00fcber das Internet exponierte IT-Netzwerke durchdringen und die \u00f6ffentliche Sicherheit, wichtige Ger\u00e4te und den laufenden und korrekten Betrieb gef\u00e4hrden<\/p><\/div>\n                                                                    <a class=\"learn-more-link\" href=\"\/solutions\/by-industry\/facilities\">\n                                        Learn more <svg width=\"11\" height=\"8\" viewBox=\"0 0 11 8\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <path d=\"M10.3536 4.35355C10.5488 4.15829 10.5488 3.84171 10.3536 3.64645L7.17157 0.464466C6.97631 0.269204 6.65973 0.269204 6.46447 0.464466C6.2692 0.659728 6.2692 0.976311 6.46447 1.17157L9.29289 4L6.46447 6.82843C6.2692 7.02369 6.2692 7.34027 6.46447 7.53553C6.65973 7.7308 6.97631 7.7308 7.17157 7.53553L10.3536 4.35355ZM0 4.5H10V3.5H0V4.5Z\" fill=\"#FF9900\" \/>\n                                        <\/svg>\n\n                                    <\/a>\n                                                            <\/div>\n                        <\/div>\n                    <\/div>\n                                    <div class=\"carousel-slide\">\n                        <div class=\"wrap\">\n                            <div class=\"slide-image\">\n                                <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Sub-Industry-Visual-2.png\" alt=\"slide_5\">\n                            <\/div>\n                            <div class=\"slide-content\">\n                                <h2 class=\"slide-title\">Cybersecurity f\u00fcr die Wasseraufbereitung<\/h2>\n                                <div class=\"slide-text\"><p>Mit dem Einsatz von Unidirectional Gateways k\u00f6nnen sich die Verantwortlichen in den Kommunen darauf verlassen, dass ihre Automatisierungssysteme und die Wasseraufbereitungsinfrastruktur auch bei den raffiniertesten Angriffen aus dem Internet kontinuierlich und korrekt funktionieren \u2013 heute und in Zukunft.<\/p><\/div>\n                                                                    <a class=\"learn-more-link\" href=\"\/solutions\/by-industry\/water-treatment\">\n                                        Learn more <svg width=\"11\" height=\"8\" viewBox=\"0 0 11 8\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <path d=\"M10.3536 4.35355C10.5488 4.15829 10.5488 3.84171 10.3536 3.64645L7.17157 0.464466C6.97631 0.269204 6.65973 0.269204 6.46447 0.464466C6.2692 0.659728 6.2692 0.976311 6.46447 1.17157L9.29289 4L6.46447 6.82843C6.2692 7.02369 6.2692 7.34027 6.46447 7.53553C6.65973 7.7308 6.97631 7.7308 7.17157 7.53553L10.3536 4.35355ZM0 4.5H10V3.5H0V4.5Z\" fill=\"#FF9900\" \/>\n                                        <\/svg>\n\n                                    <\/a>\n                                                            <\/div>\n                        <\/div>\n                    <\/div>\n                                    <div class=\"carousel-slide\">\n                        <div class=\"wrap\">\n                            <div class=\"slide-image\">\n                                <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Sub-Industry-Visual-3.png\" alt=\"slide_6\">\n                            <\/div>\n                            <div class=\"slide-content\">\n                                <h2 class=\"slide-title\">Cybersicherheit f\u00fcr die Fertigung<\/h2>\n                                <div class=\"slide-text\"><p>Niemand will n\u00e4chste Woche in den Schlagzeilen stehen und erkl\u00e4ren, dass ein weiteres Dutzend Anlagen durch Ransomware oder andere Cyberangriffe lahmgelegt wurde. Weder Ransomware noch die raffiniertesten Angriffe aus dem Internet k\u00f6nnen Unidirectional Gateways von Waterfall durchbrechen und so eine Bedrohung f\u00fcr die Produktqualit\u00e4t oder kontinuierliche und korrekte Fertigungsprozesse darstellen.<\/p><\/div>\n                                                                    <a class=\"learn-more-link\" href=\"\/solutions\/by-industry\/manufacturing\">\n                                        Learn more <svg width=\"11\" height=\"8\" viewBox=\"0 0 11 8\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <path d=\"M10.3536 4.35355C10.5488 4.15829 10.5488 3.84171 10.3536 3.64645L7.17157 0.464466C6.97631 0.269204 6.65973 0.269204 6.46447 0.464466C6.2692 0.659728 6.2692 0.976311 6.46447 1.17157L9.29289 4L6.46447 6.82843C6.2692 7.02369 6.2692 7.34027 6.46447 7.53553C6.65973 7.7308 6.97631 7.7308 7.17157 7.53553L10.3536 4.35355ZM0 4.5H10V3.5H0V4.5Z\" fill=\"#FF9900\" \/>\n                                        <\/svg>\n\n                                    <\/a>\n                                                            <\/div>\n                        <\/div>\n                    <\/div>\n                            <\/div>\n        <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cc4b39c e-flex e-con-boxed e-con e-parent\" data-id=\"cc4b39c\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f1f7fd4 elementor-widget elementor-widget-template\" data-id=\"f1f7fd4\" data-element_type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"container\" data-elementor-id=\"5488\" class=\"elementor elementor-5488\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b26e79f cta_block e-flex e-con-boxed e-con e-parent\" data-id=\"b26e79f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;position&quot;:&quot;absolute&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2697fb2 elementor-widget elementor-widget-heading\" data-id=\"2697fb2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">One way for data. <br>\nZero entry for attackers.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ac59687 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"ac59687\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/contact-us\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Free consultation<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"featured_media":0,"template":"","class_list":["post-32918","need","type-need","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/waterfall-security.com\/de\/wp-json\/wp\/v2\/need\/32918","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/waterfall-security.com\/de\/wp-json\/wp\/v2\/need"}],"about":[{"href":"https:\/\/waterfall-security.com\/de\/wp-json\/wp\/v2\/types\/need"}],"version-history":[{"count":1,"href":"https:\/\/waterfall-security.com\/de\/wp-json\/wp\/v2\/need\/32918\/revisions"}],"predecessor-version":[{"id":35610,"href":"https:\/\/waterfall-security.com\/de\/wp-json\/wp\/v2\/need\/32918\/revisions\/35610"}],"wp:attachment":[{"href":"https:\/\/waterfall-security.com\/de\/wp-json\/wp\/v2\/media?parent=32918"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}