{"id":48092,"date":"2024-08-12T13:49:55","date_gmt":"2024-08-12T11:49:55","guid":{"rendered":"https:\/\/www.prosoft.de\/blog\/?page_id=48092"},"modified":"2024-11-26T15:34:56","modified_gmt":"2024-11-26T14:34:56","slug":"ot-sicherheit","status":"publish","type":"page","link":"https:\/\/www.prosoft.de\/blog\/ot-sicherheit\/","title":{"rendered":"OT-Sicherheit"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.27.0&#8243; background_image=&#8220;https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2024\/07\/ot-security-prosoft.jpg&#8220; border_width_bottom=&#8220;2px&#8220; border_color_bottom=&#8220;#e4e4e4&#8243; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row _builder_version=&#8220;4.26.1&#8243; background_color=&#8220;RGBA(255,255,255,0)&#8220; background_size=&#8220;initial&#8220; background_position=&#8220;top_left&#8220; background_repeat=&#8220;repeat&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; custom_padding=&#8220;|||&#8220; global_colors_info=&#8220;{}&#8220; custom_padding__hover=&#8220;|||&#8220;][et_pb_text admin_label=&#8220;OT Security&#8220; _builder_version=&#8220;4.27.0&#8243; header_text_align=&#8220;center&#8220; header_2_font_size=&#8220;18px&#8220; header_5_font_size=&#8220;15px&#8220; header_5_letter_spacing=&#8220;1px&#8220; text_orientation=&#8220;center&#8220; background_layout=&#8220;dark&#8220; custom_margin=&#8220;0px||||false|false&#8220; custom_padding=&#8220;10px||8px||false|false&#8220; custom_css_main_element=&#8220; width: max-content;||margin-left: auto;||margin-right: auto;||padding:10px;&#8220; box_shadow_style=&#8220;preset3&#8243; global_colors_info=&#8220;{}&#8220; background_color=&#8220;#000000&#8243; background_size=&#8220;initial&#8220; background_position=&#8220;top_left&#8220; background_repeat=&#8220;repeat&#8220; header_font_size_phone=&#8220;24px&#8220; header_font_size_last_edited=&#8220;on|phone&#8220;]<\/p>\n<h2 style=\"text-align: center;\">Aktuelle Beitr\u00e4ge zum Thema:<\/h2>\n<h1 style=\"text-align: center;\">OT Sicherheit<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.27.0&#8243; custom_padding=&#8220;1px|0px|0|0px|false|false&#8220; border_color_bottom=&#8220;#e4e4e4&#8243; global_colors_info=&#8220;{}&#8220;][et_pb_row use_custom_gutter=&#8220;on&#8220; gutter_width=&#8220;1&#8243; make_equal=&#8220;on&#8220; _builder_version=&#8220;4.27.0&#8243; background_color=&#8220;#FFFFFF&#8220; background_size=&#8220;initial&#8220; background_position=&#8220;top_left&#8220; background_repeat=&#8220;repeat&#8220; vertical_offset=&#8220;-30px&#8220; custom_margin=&#8220;||&#8220; custom_padding=&#8220;||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; custom_padding=&#8220;||25px|&#8220; global_colors_info=&#8220;{}&#8220; custom_padding__hover=&#8220;|||&#8220;][et_pb_text admin_label=&#8220;OT-Sicherheit &#8220; _builder_version=&#8220;4.27.2&#8243; text_font=&#8220;|300|||||||&#8220; header_text_align=&#8220;center&#8220; header_4_font=&#8220;Lato light|300|||||||&#8220; header_4_line_height=&#8220;1.2em&#8220; background_size=&#8220;initial&#8220; background_position=&#8220;top_left&#8220; background_repeat=&#8220;repeat&#8220; transform_scale_tablet=&#8220;&#8220; transform_scale_phone=&#8220;&#8220; transform_scale_last_edited=&#8220;on|phone&#8220; transform_translate_tablet=&#8220;&#8220; transform_translate_phone=&#8220;0px|-16px&#8220; transform_translate_last_edited=&#8220;on|phone&#8220; transform_translate_linked_phone=&#8220;off&#8220; transform_rotate_tablet=&#8220;&#8220; transform_rotate_phone=&#8220;&#8220; transform_rotate_last_edited=&#8220;on|phone&#8220; transform_skew_tablet=&#8220;&#8220; transform_skew_phone=&#8220;&#8220; transform_skew_last_edited=&#8220;on|phone&#8220; transform_origin_tablet=&#8220;&#8220; transform_origin_phone=&#8220;&#8220; transform_origin_last_edited=&#8220;on|phone&#8220; transform_styles_last_edited=&#8220;on|phone&#8220; custom_padding=&#8220;|10px||10px|false|false&#8220; header_4_font_size_tablet=&#8220;&#8220; header_4_font_size_phone=&#8220;18px&#8220; header_4_font_size_last_edited=&#8220;on|phone&#8220; transform_styles_tablet=&#8220;&#8220; transform_styles_phone=&#8220;&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h4>OT-Sicherheit ist f\u00fcr Produktionsumgebungen von zentraler Bedeutung: Sie gew\u00e4hrleistet den Schutz von meist ungesch\u00fctzten Produktionslandschaften und kritischer Infrastrukturen. Deren Ausf\u00e4lle oder Kompromittierung k\u00f6nnten gravierende Folgen haben, f\u00fcr die \u00f6ffentliche Sicherheit und den Alltag aller; oder Produktionsausf\u00e4lle in der Wirtschaft. In unseren Beitr\u00e4gen beleuchten wir dieses wesentliche Thema.<\/h4>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.27.0&#8243; background_color=&#8220;rgba(12,113,195,0.08)&#8220; custom_padding=&#8220;1px|0px|0|0px|false|false&#8220; border_color_bottom=&#8220;#e4e4e4&#8243; global_colors_info=&#8220;{}&#8220;][et_pb_row use_custom_gutter=&#8220;on&#8220; gutter_width=&#8220;1&#8243; make_equal=&#8220;on&#8220; _builder_version=&#8220;4.27.0&#8243; background_size=&#8220;initial&#8220; background_position=&#8220;top_left&#8220; background_repeat=&#8220;repeat&#8220; custom_margin=&#8220;||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; custom_padding=&#8220;||25px|&#8220; global_colors_info=&#8220;{}&#8220; custom_padding__hover=&#8220;|||&#8220;][et_pb_blog_extras include_categories=&#8220;477&#8243; blog_layout=&#8220;masonry&#8220; meta_date=&#8220;j. M Y&#8220; featured_image_size=&#8220;full&#8220; excerpt_length=&#8220;66&#8243; read_more_text=&#8220;Beitrag lesen&#8220; show_author=&#8220;off&#8220; show_date=&#8220;off&#8220; show_categories=&#8220;off&#8220; show_comments=&#8220;off&#8220; show_read_time=&#8220;on&#8220; read_time_text=&#8220;Lesezeit&#8220; show_load_more=&#8220;on&#8220; load_more_text=&#8220;Weitere Beitr\u00e4ge&#8220; masonry_columns_tablet=&#8220;&#8220; masonry_columns_phone=&#8220;1&#8243; masonry_columns_last_edited=&#8220;on|desktop&#8220; _builder_version=&#8220;4.27.0&#8243; _module_preset=&#8220;default&#8220; header_font_size=&#8220;24px&#8220; meta_font_size=&#8220;12px&#8220; background_color=&#8220;#FFFFFF&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_blog_extras][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; admin_label=&#8220;Weitere Themen&#8220; _builder_version=&#8220;4.27.0&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#000000&#8243; global_module=&#8220;47895&#8243; saved_tabs=&#8220;all&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row _builder_version=&#8220;4.27.0&#8243; _module_preset=&#8220;default&#8220; collapsed=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.27.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text admin_label=&#8220;Weitere Themen&#8220; _builder_version=&#8220;4.27.0&#8243; _module_preset=&#8220;default&#8220; header_text_color=&#8220;#FFFFFF&#8220; header_2_text_color=&#8220;#FFFFFF&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h2>Weitere Themen<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8220;4.27.0&#8243; _module_preset=&#8220;default&#8220; collapsed=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;4.27.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2024\/07\/verschluesslung-prosoft.jpg&#8220; title_text=&#8220;Aktuelles zum Thema&#8220; url=&#8220;\/blog\/kryptografie&#8220; _builder_version=&#8220;4.27.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220; transform_styles__hover_enabled=&#8220;on|hover&#8220; transform_scale__hover_enabled=&#8220;on|hover&#8220; transform_translate__hover_enabled=&#8220;on|desktop&#8220; transform_rotate__hover_enabled=&#8220;on|desktop&#8220; transform_skew__hover_enabled=&#8220;on|desktop&#8220; transform_origin__hover_enabled=&#8220;on|desktop&#8220; transform_scale__hover=&#8220;115%|115%&#8220;][\/et_pb_image][et_pb_text admin_label=&#8220;Versch\u00fcsselung&#8220; _builder_version=&#8220;4.27.0&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;|||on|||||&#8220; text_text_color=&#8220;#FFFFFF&#8220; text_font_size=&#8220;14px&#8220; background_layout=&#8220;dark&#8220; custom_css_main_element=&#8220;||||||&#8220; custom_css_free_form=&#8220;.selector a {||  color: #ffffff;||}||||.selector a:hover {||  color: #f99000;||}&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p><a href=\"\/blog\/kryptografie\">\u203a Kryptografie<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;4.27.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2024\/07\/sichere-authentifizierung-prosoft-1.jpg&#8220; title_text=&#8220;Aktuelles zum Thema&#8220; url=&#8220;\/blog\/authentifizierungsmethoden&#8220; _builder_version=&#8220;4.27.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220; filter_opacity__hover_enabled=&#8220;on|hover&#8220; filter_opacity__hover=&#8220;100%&#8220; transform_styles__hover_enabled=&#8220;on|hover&#8220; transform_scale__hover=&#8220;115%|115%&#8220; transform_scale__hover_enabled=&#8220;on|hover&#8220; transform_translate__hover_enabled=&#8220;on|desktop&#8220; transform_rotate__hover_enabled=&#8220;on|desktop&#8220; transform_skew__hover_enabled=&#8220;on|desktop&#8220; transform_origin__hover_enabled=&#8220;on|desktop&#8220;][\/et_pb_image][et_pb_text admin_label=&#8220;Sichere Authentifizierung&#8220; _builder_version=&#8220;4.27.0&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;|||on|||||&#8220; text_text_color=&#8220;#FFFFFF&#8220; text_font_size=&#8220;14px&#8220; text_line_height=&#8220;0.9em&#8220; background_layout=&#8220;dark&#8220; custom_css_main_element=&#8220;||||||&#8220; custom_css_free_form=&#8220;.selector a {||  color: #ffffff;||}||||.selector a:hover {||  color: #f99000;||}&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p><a href=\"\/blog\/authentifizierungsmethoden\">\u203a Authentifizierungs-<br \/><\/a><a href=\"\/blog\/schwachstellen-beheben\"> \u00a0 <\/a><a href=\"\/blog\/authentifizierungsmethoden\">methoden<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;4.27.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2024\/07\/it-management-prosoft-1.jpg&#8220; title_text=&#8220;Aktuelles zum Thema&#8220; url=&#8220;\/blog\/it-organisation&#8220; _builder_version=&#8220;4.27.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220; filter_opacity__hover=&#8220;100%&#8220; filter_opacity__hover_enabled=&#8220;on|hover&#8220; transform_styles__hover_enabled=&#8220;on|hover&#8220; transform_scale__hover=&#8220;115%|115%&#8220; transform_scale__hover_enabled=&#8220;on|hover&#8220; transform_translate__hover_enabled=&#8220;on|desktop&#8220; transform_rotate__hover_enabled=&#8220;on|desktop&#8220; transform_skew__hover_enabled=&#8220;on|desktop&#8220; transform_origin__hover_enabled=&#8220;on|desktop&#8220;][\/et_pb_image][et_pb_text admin_label=&#8220;IT Management&#8220; _builder_version=&#8220;4.27.0&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;|||on|||||&#8220; text_text_color=&#8220;#FFFFFF&#8220; text_font_size=&#8220;14px&#8220; background_layout=&#8220;dark&#8220; custom_css_main_element=&#8220;||||||&#8220; custom_css_free_form=&#8220;.selector a {||  color: #ffffff;||}||||.selector a:hover {||  color: #f99000;||}&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p><a href=\"\/blog\/it-organisation\">\u203a IT Organisation<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;4.27.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2024\/07\/schulsoftware-prosoft-1.jpg&#8220; title_text=&#8220;Aktuelles zum Thema&#8220; url=&#8220;\/blog\/digitaler-unterricht&#8220; _builder_version=&#8220;4.27.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220; filter_opacity__hover=&#8220;100%&#8220; filter_opacity__hover_enabled=&#8220;on|hover&#8220; transform_styles__hover_enabled=&#8220;on|hover&#8220; transform_scale__hover=&#8220;115%|115%&#8220; transform_scale__hover_enabled=&#8220;on|hover&#8220; transform_translate__hover_enabled=&#8220;on|desktop&#8220; transform_rotate__hover_enabled=&#8220;on|desktop&#8220; transform_skew__hover_enabled=&#8220;on|desktop&#8220; transform_origin__hover_enabled=&#8220;on|desktop&#8220;][\/et_pb_image][et_pb_text admin_label=&#8220;Schulsoftware&#8220; _builder_version=&#8220;4.27.0&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;|||on|||||&#8220; text_text_color=&#8220;#FFFFFF&#8220; text_font_size=&#8220;14px&#8220; background_layout=&#8220;dark&#8220; custom_css_main_element=&#8220;||||||&#8220; custom_css_free_form=&#8220;.selector a {||  color: #ffffff;||}||||.selector a:hover {||  color: #f99000;||}&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p><a href=\"\/blog\/digitaler-unterricht\">\u203a Digitaler Unterricht<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8220;4.27.0&#8243; _module_preset=&#8220;default&#8220; collapsed=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;4.27.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2024\/07\/ot-security-prosoft.jpg&#8220; title_text=&#8220;Aktuelles zum Thema&#8220; url=&#8220;\/blog\/ot-sicherheit&#8220; _builder_version=&#8220;4.27.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220; filter_opacity__hover=&#8220;100%&#8220; filter_opacity__hover_enabled=&#8220;on|hover&#8220; transform_styles__hover_enabled=&#8220;on|hover&#8220; transform_scale__hover=&#8220;115%|115%&#8220; transform_scale__hover_enabled=&#8220;on|hover&#8220; transform_translate__hover_enabled=&#8220;on|desktop&#8220; transform_rotate__hover_enabled=&#8220;on|desktop&#8220; transform_skew__hover_enabled=&#8220;on|desktop&#8220; transform_origin__hover_enabled=&#8220;on|desktop&#8220;][\/et_pb_image][et_pb_text admin_label=&#8220;OT Security&#8220; _builder_version=&#8220;4.27.0&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;|||on|||||&#8220; text_text_color=&#8220;#FFFFFF&#8220; text_font_size=&#8220;14px&#8220; background_layout=&#8220;dark&#8220; custom_css_main_element=&#8220;||||||&#8220; custom_css_free_form=&#8220;.selector a {||  color: #ffffff;||}||||.selector a:hover {||  color: #f99000;||}&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p><a href=\"\/blog\/ot-sicherheit\">\u203a OT-Sicherheit<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;4.27.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2024\/07\/cybersecurity2-prosoft.jpg&#8220; title_text=&#8220;Aktuelles zum Thema&#8220; url=&#8220;\/blog\/cyber-sicherheit&#8220; _builder_version=&#8220;4.27.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220; filter_opacity__hover=&#8220;100%&#8220; filter_opacity__hover_enabled=&#8220;on|hover&#8220; transform_styles__hover_enabled=&#8220;on|hover&#8220; transform_scale__hover=&#8220;115%|115%&#8220; transform_scale__hover_enabled=&#8220;on|hover&#8220; transform_translate__hover_enabled=&#8220;on|desktop&#8220; transform_rotate__hover_enabled=&#8220;on|desktop&#8220; transform_skew__hover_enabled=&#8220;on|desktop&#8220; transform_origin__hover_enabled=&#8220;on|desktop&#8220;][\/et_pb_image][et_pb_text admin_label=&#8220;Cybersecurity&#8220; _builder_version=&#8220;4.27.0&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;|||on|||||&#8220; text_text_color=&#8220;#FFFFFF&#8220; text_font_size=&#8220;14px&#8220; background_layout=&#8220;dark&#8220; custom_css_main_element=&#8220;||||||&#8220; custom_css_free_form=&#8220;.selector a {||  color: #ffffff;||}||||.selector a:hover {||  color: #f99000;||}&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p><a href=\"\/blog\/cyber-sicherheit\">\u203a Cyber-Sicherheit<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;4.27.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2024\/07\/schwachstellen-management2-prosoft.jpg&#8220; title_text=&#8220;Aktuelles zum Thema&#8220; url=&#8220;\/blog\/schwachstellen-beheben&#8220; _builder_version=&#8220;4.27.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220; filter_opacity__hover=&#8220;100%&#8220; filter_opacity__hover_enabled=&#8220;on|hover&#8220; transform_styles__hover_enabled=&#8220;on|hover&#8220; transform_scale__hover=&#8220;115%|115%&#8220; transform_scale__hover_enabled=&#8220;on|hover&#8220; transform_translate__hover_enabled=&#8220;on|desktop&#8220; transform_rotate__hover_enabled=&#8220;on|desktop&#8220; transform_skew__hover_enabled=&#8220;on|desktop&#8220; transform_origin__hover_enabled=&#8220;on|desktop&#8220;][\/et_pb_image][et_pb_text admin_label=&#8220;Schwachstellen Management&#8220; _builder_version=&#8220;4.27.0&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;|||on|||||&#8220; text_text_color=&#8220;#FFFFFF&#8220; text_font_size=&#8220;14px&#8220; text_line_height=&#8220;0.9em&#8220; background_layout=&#8220;dark&#8220; custom_css_main_element=&#8220;||||||&#8220; custom_css_free_form=&#8220;.selector a {||  color: #ffffff;||}||||.selector a:hover {||  color: #f99000;||}&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p><a href=\"\/blog\/schwachstellen-beheben\">\u203a Schwachstellen<br \/>\u00ad \u00a0 beheben<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;4.27.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2024\/07\/itms-prosoft.jpg&#8220; title_text=&#8220;Aktuelles zum Thema&#8220; url=&#8220;\/blog\/managed-security-services\/&#8220; _builder_version=&#8220;4.27.2&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220; filter_opacity__hover=&#8220;100%&#8220; filter_opacity__hover_enabled=&#8220;on|hover&#8220; transform_styles__hover_enabled=&#8220;on|hover&#8220; transform_scale__hover=&#8220;115%|115%&#8220; transform_scale__hover_enabled=&#8220;on|hover&#8220; transform_translate__hover_enabled=&#8220;on|desktop&#8220; transform_rotate__hover_enabled=&#8220;on|desktop&#8220; transform_skew__hover_enabled=&#8220;on|desktop&#8220; transform_origin__hover_enabled=&#8220;on|desktop&#8220;][\/et_pb_image][et_pb_text admin_label=&#8220;Managed Services&#8220; _builder_version=&#8220;4.27.2&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;|||on|||||&#8220; text_text_color=&#8220;#FFFFFF&#8220; text_font_size=&#8220;14px&#8220; background_layout=&#8220;dark&#8220; custom_css_main_element=&#8220;||||||&#8220; custom_css_free_form=&#8220;.selector a {||  color: #ffffff;||}||||.selector a:hover {||  color: #f99000;||}&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p><a href=\"https:\/\/www.prosoft.de\/blog\/managed-security-services\/\">\u203a Managed Security Services<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; admin_label=&#8220;FOOTER GLOBAL&#8220; _builder_version=&#8220;4.16&#8243; background_color=&#8220;#a7b7c7&#8243; custom_padding=&#8220;0|0px|0|0px|false|false&#8220; collapsed=&#8220;on&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row column_structure=&#8220;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8220;4.16&#8243; background_size=&#8220;initial&#8220; background_position=&#8220;top_left&#8220; background_repeat=&#8220;repeat&#8220; custom_padding=&#8220;24px|0px|40px|0px|false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;4.16&#8243; custom_padding=&#8220;|||&#8220; global_colors_info=&#8220;{}&#8220; custom_padding__hover=&#8220;|||&#8220;][et_pb_text admin_label=&#8220;Der ProBlog&#8220; _builder_version=&#8220;4.16&#8243; background_layout=&#8220;dark&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h3>ProBlog<\/h3>\n<p>[\/et_pb_text][et_pb_divider color=&#8220;#ffffff&#8220; _builder_version=&#8220;4.16&#8243; height=&#8220;10px&#8220; custom_margin=&#8220;-10px||&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][et_pb_text admin_label=&#8220;Links Impressum etc&#8220; _builder_version=&#8220;4.16&#8243; text_font_size=&#8220;12px&#8220; text_line_height=&#8220;1.2em&#8220; background_layout=&#8220;dark&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p><a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/blog\/\"><span style=\"color: #ffffff;\">\u279d<\/span> Willkommen bei ProBlog<\/a><\/p>\n<p><a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/blog\/die-redaktion\/\"><span style=\"color: #ffffff;\">\u279d<\/span> Redaktion<\/a><\/p>\n<p><a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/blog\/ueber-uns-prosoft\/\">\u279d \u00dcber uns<\/a><\/span><\/p>\n<p><a style=\"color: #ffffff;\" href=\"#\" onClick=\"UC_UI.showSecondLayer();\">\u279d Cookie-Einstellungen<\/a><\/span><\/p>\n<p>[\/et_pb_text][et_pb_social_media_follow _builder_version=&#8220;4.16&#8243; custom_margin=&#8220;|0px||&#8220; custom_padding=&#8220;|0px||0px&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_social_media_follow_network social_network=&#8220;facebook&#8220; url=&#8220;https:\/\/www.facebook.com\/prosoft.de\/&#8220; _builder_version=&#8220;4.16&#8243; background_color=&#8220;#3b5998&#8243; global_colors_info=&#8220;{}&#8220;]Facebook[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=&#8220;twitter&#8220; url=&#8220;https:\/\/twitter.com\/prosoft_de\/&#8220; _builder_version=&#8220;4.22.2&#8243; background_color=&#8220;#000000&#8243; global_colors_info=&#8220;{}&#8220;]twitter[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=&#8220;youtube&#8220; url=&#8220;https:\/\/www.youtube.com\/user\/Prosoft&#8220; _builder_version=&#8220;4.16&#8243; background_color=&#8220;#a82400&#8243; global_colors_info=&#8220;{}&#8220;]youtube[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=&#8220;linkedin&#8220; url=&#8220;https:\/\/www.linkedin.com\/company\/643675\/admin\/&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#007bb6&#8243; global_colors_info=&#8220;{}&#8220;]linkedin[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=&#8220;xing&#8220; url=&#8220;https:\/\/www.xing.com\/pages\/prosoftgmbh&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#026466&#8243; global_colors_info=&#8220;{}&#8220;]xing[\/et_pb_social_media_follow_network][\/et_pb_social_media_follow][\/et_pb_column][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;4.16&#8243; custom_padding=&#8220;|||&#8220; global_colors_info=&#8220;{}&#8220; custom_padding__hover=&#8220;|||&#8220;][et_pb_text admin_label=&#8220;Kontakt&#8220; _builder_version=&#8220;4.16&#8243; background_layout=&#8220;dark&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h3>L\u00f6sungen<\/h3>\n<p>[\/et_pb_text][et_pb_divider color=&#8220;#ffffff&#8220; _builder_version=&#8220;4.16&#8243; height=&#8220;10px&#8220; custom_margin=&#8220;-10px||&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][et_pb_text admin_label=&#8220;Telefon +49 (0) 8171\/405-0&#8243; _builder_version=&#8220;4.17.4&#8243; text_text_color=&#8220;#ffffff&#8220; text_font_size=&#8220;12px&#8220; text_line_height=&#8220;1.2em&#8220; background_layout=&#8220;dark&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/loesungen\/it-management\/pc-fernwartung\/\">PC Fernwartung<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/loesungen\/it-management\/it-asset-management\/\">IT Asset Management<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/loesungen\/verschluesselung\/hardwareverschluesselte-hdd-ssd\/\">Hardwareverschl\u00fcsselte  SSD \/ HDD<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/loesungen\/verschluesselung\/verschluesselte-usb-sticks\/\">Verschl\u00fcsselte USB Sticks<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/loesungen\/sichere-authentifizierung\/zwei-faktor-authentifizierung\/\">Zwei Faktor Authentifizierung<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/loesungen\/verschluesselung\/sichere-e-mail-verschluesselung\/\">E-Mail Verschl\u00fcsselung<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/loesungen\/cybersecurity\/datenschleuse\/\">Datenschleuse<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/loesungen\/verschluesselung\/bitlocker-management\/\">BitLocker Management<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/loesungen\/cybersecurity\/anti-malware-multiscanner\/\">Anti-Malware Multiscanner<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/loesungen\/schwachstellen-management\/data-loss-prevention\/\">Data Loss Prevention<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/loesungen\/schwachstellen-management\/log-management-siem\/\">Log-Management SIEM<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;4.16&#8243; custom_padding=&#8220;|||&#8220; global_colors_info=&#8220;{}&#8220; custom_padding__hover=&#8220;|||&#8220;][et_pb_text admin_label=&#8220;Sitemap &#038; Links&#8220; _builder_version=&#8220;4.16&#8243; background_layout=&#8220;dark&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h3>Shop<\/h3>\n<p>[\/et_pb_text][et_pb_divider color=&#8220;#ffffff&#8220; _builder_version=&#8220;4.16&#8243; height=&#8220;10px&#8220; custom_margin=&#8220;-10px||&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][et_pb_text admin_label=&#8220;Links Impressum etc&#8220; _builder_version=&#8220;4.20.0&#8243; text_font_size=&#8220;12px&#8220; text_line_height=&#8220;1.2em&#8220; background_layout=&#8220;dark&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/shop\/hardware\/security-token\/\">Security Token<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/shop\/hardware\/security-token\/yubikey\/\">YubiKey<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/shop\/produkt\/gatekeeper\/\">Gatekeeper<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/shop\/hardware\/security-token\/yubikey\/#yubikeyvergleich\" data-et-has-event-already=\"true\">YubiKey 5<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/shop\/produkt\/yubikey-bio-online-bestellen\/\">YubiKey Bio<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/shop\/produkt\/safetogo-online-bestellen\/\">SafeToGo USB 3.1 Stick<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/shop\/hardware\/verschluesselte-usb-sticks\/\">Verschl\u00fcsselte USB-Sticks<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/shop\/hardware\/verschluesselte-festplatten\/\">Verschl\u00fcsselte Festplatten<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/shop\/produkt\/digittrade-rs256-rfid-ssd-online-bestellen\/\">Digittrade RS256 RFID<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/shop\/software\/remote-it-service\/\">Remote IT-Service Software<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/shop\/software\/security-loesungen\/\">Security Software L\u00f6sungen<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;4.16&#8243; custom_padding=&#8220;|||&#8220; global_colors_info=&#8220;{}&#8220; custom_padding__hover=&#8220;|||&#8220;][et_pb_text admin_label=&#8220;Sitemap &#038; Links&#8220; _builder_version=&#8220;4.16&#8243; background_layout=&#8220;dark&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h3>ProSoft<\/h3>\n<p>[\/et_pb_text][et_pb_divider color=&#8220;#ffffff&#8220; _builder_version=&#8220;4.16&#8243; height=&#8220;10px&#8220; custom_margin=&#8220;-10px||&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][et_pb_text admin_label=&#8220;Links Impressum etc&#8220; _builder_version=&#8220;4.24.0&#8243; text_font_size=&#8220;12px&#8220; text_line_height=&#8220;1.2em&#8220; background_layout=&#8220;dark&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/\">ProSoft<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/shop\/\">Shop ProSecurity<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/service\/veranstaltungen\/\">Veranstaltungen<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/service\/webinar\/\">Webcast<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/service\/#support\">Support<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/service\/#knowledgebase\">KnowledgeBase<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/impressum\/\">Impressum<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/datenschutzerklaerung\/\">Datenschutzerkl\u00e4rung<\/a><\/p>\n<p>[\/et_pb_text][et_pb_divider show_divider=&#8220;off&#8220; _builder_version=&#8220;4.16&#8243; height=&#8220;10px&#8220; custom_margin=&#8220;-10px||&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][et_pb_text admin_label=&#8220;ist ein Angebot der&#8220; _builder_version=&#8220;4.16&#8243; text_font_size=&#8220;12px&#8220; text_line_height=&#8220;1.2em&#8220; background_layout=&#8220;dark&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p>ProBlog ist ein Angebot der<\/p>\n<p>ProSoft GmbH<br \/>B\u00fcrgermeister-Graf-Ring 10<br \/>82538 Geretsried<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>OT-Sicherheit ist von zentraler Bedeutung: Sie gew\u00e4hrleistet den Schutz von Produktionslandschaften und kritischer Infrastrukturen.<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"Dies ist eine Beispiel-Seite. Sie unterscheidet sich von Beitr\u00e4gen, da sie stets an der selben Stelle bleibt und (bei den meisten Themes) in der Navigation angezeigt wird. Die meisten Leute starten mit einem Impressum, der Datenschutzerkl\u00e4rung oder einer \u201e\u00dcber uns\u201c-Seite mit einer Vorstellung f\u00fcr m\u00f6gliche Besucher der Website. Dort k\u00f6nnte zum Beispiel stehen:\r\n<blockquote>Hallo! Tags\u00fcber arbeite ich als Fahrradkurier, nachts bin ich ein aufstrebender Schauspieler und dies hier ist meine Website. Ich lebe in Berlin, habe einen gro\u00dfen Hund namens Jack, mag Pi\u00f1a Coladas, jedoch weniger (ohne Schirm) im Regen stehen gelassen zu werden.<\/blockquote>\r\n...oder sowas wie:\r\n<blockquote>Unsere Firma XYZ wurde 1971 gegr\u00fcndet und hat seither eine Menge hochqualitativen ABC f\u00fcr die \u00d6ffentlichkeit produziert. Ans\u00e4ssig in Gotham City, hat XYZ mittlerweile \u00fcber 2.000 Mitarbeiter und entwickelt immer wieder gro\u00dfartige Dinge f\u00fcr die ganze Gotham-Gemeinschaft.<\/blockquote>\r\nAls neuer WordPress-Benutzer solltest du das <a href=\"https:\/\/wordpress.p123456.webspaceconfig.de\/wp-admin\/\">Dashboard<\/a> aufrufen, um diese Seite zu l\u00f6schen und statt dessen eine neue Seite mit deinen eigenen Inhalten erstellen. Viel Spa\u00df!","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-48092","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>OT-Sicherheit - ProSoft Blog<\/title>\n<meta name=\"description\" content=\"OT-Sicherheit ist von zentraler Bedeutung: Sie gew\u00e4hrleistet den Schutz von Produktionslandschaften und kritischer Infrastrukturen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.prosoft.de\/blog\/ot-sicherheit\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OT-Sicherheit\" \/>\n<meta property=\"og:description\" content=\"OT-Sicherheit ist von zentraler Bedeutung: Sie gew\u00e4hrleistet den Schutz von Produktionslandschaften und kritischer Infrastrukturen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.prosoft.de\/blog\/ot-sicherheit\/\" \/>\n<meta property=\"og:site_name\" content=\"ProSoft Blog\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-26T14:34:56+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@prosoft_de\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"13\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/ot-sicherheit\\\/\",\"url\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/ot-sicherheit\\\/\",\"name\":\"OT-Sicherheit - ProSoft Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/#website\"},\"datePublished\":\"2024-08-12T11:49:55+00:00\",\"dateModified\":\"2024-11-26T14:34:56+00:00\",\"description\":\"OT-Sicherheit ist von zentraler Bedeutung: Sie gew\u00e4hrleistet den Schutz von Produktionslandschaften und kritischer Infrastrukturen.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/ot-sicherheit\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/ot-sicherheit\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/ot-sicherheit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"OT-Sicherheit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/\",\"name\":\"ProSoft Blog\",\"description\":\"ProSoft GmbH | Manage, Secure, Optimise IT\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/#organization\",\"name\":\"ProSoft Blog\",\"url\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Logo-schwarz-orange-slogan.jpg\",\"contentUrl\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Logo-schwarz-orange-slogan.jpg\",\"width\":1200,\"height\":344,\"caption\":\"ProSoft Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/prosoft_de\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/prosoft-security-gmbh\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/Prosoft\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"OT-Sicherheit - ProSoft Blog","description":"OT-Sicherheit ist von zentraler Bedeutung: Sie gew\u00e4hrleistet den Schutz von Produktionslandschaften und kritischer Infrastrukturen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.prosoft.de\/blog\/ot-sicherheit\/","og_locale":"de_DE","og_type":"article","og_title":"OT-Sicherheit","og_description":"OT-Sicherheit ist von zentraler Bedeutung: Sie gew\u00e4hrleistet den Schutz von Produktionslandschaften und kritischer Infrastrukturen.","og_url":"https:\/\/www.prosoft.de\/blog\/ot-sicherheit\/","og_site_name":"ProSoft Blog","article_modified_time":"2024-11-26T14:34:56+00:00","twitter_card":"summary_large_image","twitter_site":"@prosoft_de","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"13\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.prosoft.de\/blog\/ot-sicherheit\/","url":"https:\/\/www.prosoft.de\/blog\/ot-sicherheit\/","name":"OT-Sicherheit - ProSoft Blog","isPartOf":{"@id":"https:\/\/www.prosoft.de\/blog\/#website"},"datePublished":"2024-08-12T11:49:55+00:00","dateModified":"2024-11-26T14:34:56+00:00","description":"OT-Sicherheit ist von zentraler Bedeutung: Sie gew\u00e4hrleistet den Schutz von Produktionslandschaften und kritischer Infrastrukturen.","breadcrumb":{"@id":"https:\/\/www.prosoft.de\/blog\/ot-sicherheit\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.prosoft.de\/blog\/ot-sicherheit\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.prosoft.de\/blog\/ot-sicherheit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.prosoft.de\/blog\/"},{"@type":"ListItem","position":2,"name":"OT-Sicherheit"}]},{"@type":"WebSite","@id":"https:\/\/www.prosoft.de\/blog\/#website","url":"https:\/\/www.prosoft.de\/blog\/","name":"ProSoft Blog","description":"ProSoft GmbH | Manage, Secure, Optimise IT","publisher":{"@id":"https:\/\/www.prosoft.de\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.prosoft.de\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.prosoft.de\/blog\/#organization","name":"ProSoft Blog","url":"https:\/\/www.prosoft.de\/blog\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.prosoft.de\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2023\/10\/Logo-schwarz-orange-slogan.jpg","contentUrl":"https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2023\/10\/Logo-schwarz-orange-slogan.jpg","width":1200,"height":344,"caption":"ProSoft Blog"},"image":{"@id":"https:\/\/www.prosoft.de\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/prosoft_de","https:\/\/www.linkedin.com\/company\/prosoft-security-gmbh\/","https:\/\/www.youtube.com\/user\/Prosoft"]}]}},"_links":{"self":[{"href":"https:\/\/www.prosoft.de\/blog\/wp-json\/wp\/v2\/pages\/48092","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.prosoft.de\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.prosoft.de\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.prosoft.de\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.prosoft.de\/blog\/wp-json\/wp\/v2\/comments?post=48092"}],"version-history":[{"count":5,"href":"https:\/\/www.prosoft.de\/blog\/wp-json\/wp\/v2\/pages\/48092\/revisions"}],"predecessor-version":[{"id":48981,"href":"https:\/\/www.prosoft.de\/blog\/wp-json\/wp\/v2\/pages\/48092\/revisions\/48981"}],"wp:attachment":[{"href":"https:\/\/www.prosoft.de\/blog\/wp-json\/wp\/v2\/media?parent=48092"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}