Wago and Radiflow Partner on Industrial Security – Automation World

1 minute, 18 seconds Read

@import url(‘/fonts/open_sans.css’);
.web-body-blocks a { color: #c60000; }
.web-body-blocks h1, .web-body-blocks h2, .web-body-blocks h3, .web-body-blocks h4,
.web-body-blocks h5, .web-body-blocks h6 {
font-family: “Open Sans”, sans-serif;
}
button, .ebm-button-wrapper { font-family: “Open Sans”, sans-serif; }

Wago, a supplier of electrical interconnection and automation technologies, and Radiflow, a supplier of operations technology (OT) cybersecurity software, have partnered to create what the companies are calling “comprehensive OT security solutions tailored to the individual needs of specific markets, such as smart factory, smart building or smart energy.”

Following is a list of the new technologies built on the integration of Radiflow’s cybersecurity software into Wago’s products and services:

  • Wago Cyber Security Network Sight—software based on iSID from Radiflow, which enables real-time monitoring and detection of anomalous network behavior. Continuous monitoring helps companies identify cyber threats at an early stage and respond to them as quickly as possible.
  • Wago Cyber Security Analysis—software based on Radiflow’s CIARA, an automated risk assessment and management platform for companies from the industrial, energy and building sectors. Based on the analysis results, users can implement network segmentation strategies to significantly minimize the risk of unauthorized access.
  • Wago Cyber Security Analysis—software to create an up-to-date inventory of the OT measures implemented, proactively identify vulnerabilities and measure the effectiveness of risk reduction strategies.

“We are convinced that protecting digital and electrical systems goes beyond physical components,” said Thomas Burklé, vice president of automation sales and industry management for EMEA at Wago. “It requires a comprehensive approach to cybersecurity. We want to help our customers effectively protect their systems from ever-new cyber threats.” 

This post was originally published on the 3rd party site mentioned in the title of this this site

Similar Posts