Tackling cyber security attacks proactively

Back

Tackling cyber security attacks proactively

Interview with Michael Huser, Executive Vice President Software & Services Business Unit Solutions.

Why should cyber security be more of a focus for medium-sized production companies?

Industrial systems and controls (OT) are increasingly being connected to corporate IT. As a result, OT is adopting these common IT technologies for operating systems, virtualization and networks where hackers feel right at home. This collateral threat should be actively countered by intelligent segmentation of OT networks, thus significantly reducing the attack surface. Reliable cyber security technologies can be used to create effective automated barriers against attacks. This prevents malfunctions in systems and processes, cost-intensive downtime, loss of sales, delivery problems and reputational damage.
Increasingly, insurance companies are also demanding certified cyber security solutions to improve the risk situation and compliance.

What cyber security solutions does Stöcklin Logistik AG specifically offer?

Our solutions include holistic 5-step cyber security management, with the following five steps: Network Segmentation, Patching, Hardening, IT Endpoint Security/ OT Endpoint Security, XDR Detection and Response or proactively through additional vulnerability scanners.

With our IT endpoint security / OT endpoint solutions, we limit the potential impact of unknown attacks. Risks and vulnerabilities are quickly identified and minimized. Vulnerable PLCs and sensors are shielded. This enables us to effectively stop targeted attacks and malware.

Our innovative XDR-24x7 monitoring detects, intervenes and analyzes proactively around the clock. For systems for which no patches are available, a secure solution is provided via virtual patching. This means that ongoing operations can be maintained without interruption in all cases.

As a certified IT and OT cyber security partner, our customers and new customers are increasingly requesting our best-practice cyber security approach.

Kontaktieren Sie unser Team