
{"id":3489,"date":"2025-06-12T11:40:41","date_gmt":"2025-06-12T07:40:41","guid":{"rendered":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/?p=3489"},"modified":"2025-06-12T11:40:44","modified_gmt":"2025-06-12T07:40:44","slug":"managing-and-securing-assets-in-automation","status":"publish","type":"post","link":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/managing-and-securing-assets-in-automation\/","title":{"rendered":"Managing and securing assets in automation"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>DaUM Service as a block of a security strategy<\/strong><\/h2>\n\n\n\n<p>In today\u2019s fast-paced industrial environment, smooth and efficient production is vital\u2014yet PLC backup and restore procedures, a critical component, are often overlooked.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/06\/00199516_full_b1000.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"503\" src=\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/06\/00199516_full_b1000.jpg\" alt=\"PLC backup-and-restore \" class=\"wp-image-3490\" srcset=\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/06\/00199516_full_b1000.jpg 1000w, https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/06\/00199516_full_b1000-300x151.jpg 300w, https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/06\/00199516_full_b1000-768x386.jpg 768w, https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/06\/00199516_full_b1000-624x314.jpg 624w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<p>PLC backup-and-restore procedures are vital for maintaining manufacturing system integrity. In addition, they ensure that the latest software is used, and preventing costly downtime. With cybersecurity in mind, asset management forms a key foundation, while device and update management\u2014enhanced by backup and restore capabilities\u2014is essential to a proactive, consistent security strategy.<\/p>\n\n\n\n<!--more-->\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Resetting an automation device due to a cyberattack<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"418\" src=\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/06\/1.png\" alt=\"Device management software\" class=\"wp-image-3491 size-full\" srcset=\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/06\/1.png 805w, https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/06\/1-300x156.png 300w, https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/06\/1-768x399.png 768w, https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/06\/1-624x324.png 624w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>To ensure top cybersecurity and reliable system performance, it\u2019s essential to standardize, automate, and securely install software and security updates. The OPC UA-based Device and Update Management Service offers a manufacturer-independent solution to manage this process.<\/p>\n<\/div><\/div>\n\n\n\n<p>Creating backups is always a smart move\u2014not just for automation devices, but also in everyday life. We back up personal files like photos to avoid data loss, and similarly, industrial systems require backups in case a device fails or needs to be reset after a cyberattack.<\/p>\n\n\n\n<p>The following discussion examines the second scenario, which is especially relevant to certifying the PLCnext Control product family, in the context of automation devices.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Free app for generating a backup of a PLCnext&nbsp;Control<\/strong><\/h2>\n\n\n\n<p>PLC backups are essential to prevent loss of program and configuration data during hardware or power failures. Without a backup, restoring from scratch can cause extended downtime, productivity loss, and high costs. The Device and Update Management S<\/p>\n\n\n\n<p>ervice enables fast system recovery by restoring the previous state. In security emergencies, it allows quick data reloading to a new or repaired controller, minimizing disruption.<\/p>\n\n\n\n<p>Backup-and-restore mechanisms enable quick system recovery after failures or resets by restoring previously saved data to the same PLCnext Control device. In the current version of Device and Update Management, the \u201c<a href=\"https:\/\/www.phoenixcontact.com\/en-ae\/products\/software-daum-windows-service-1542953\">DaUM <\/a>Backup and Restore\u201d app handles backup creation and restoration. <a href=\"https:\/\/www.phoenixcontact.com\/en-ae\/products\/software-daum-windows-service-1542953#downloads-link-target\">It\u2019s available for free download<\/a> from the PLCnext Store.<\/p>\n\n\n\n<p>To back up a PLCnext Control, the user sets up and authenticates the OPC UA connection. Once the system detects the \u201cDaUM Backup and Restore\u201d app and confirms the file transfer settings, the user can start a manual or scheduled backup. Backups run during live production without disrupting PLC operations, with data sent directly to the management service.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Protecting the integrity and confidentiality of every backup<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-media-text has-media-on-the-right is-stacked-on-mobile\"><div class=\"wp-block-media-text__content\">\n<p>The Device and Update Management Service with the \u201cDaUM Backup and Restore\u201d app creates backups for restoring to the same asset, including hardware-specific data not transferable to other devices. Each backup lists key files such as the PLC project, network and user settings, logfiles, and installed apps.<\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"859\" height=\"580\" src=\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/06\/33.png\" alt=\"Managing and securing assets in automation\" class=\"wp-image-3493 size-full\" srcset=\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/06\/33.png 859w, https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/06\/33-300x203.png 300w, https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/06\/33-768x519.png 768w, https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/06\/33-624x421.png 624w\" sizes=\"auto, (max-width: 859px) 100vw, 859px\" \/><\/figure><\/div>\n\n\n\n<p>In line with IEC 62443, backups are treated as \u201cinformation at rest\u201d and are encrypted, signed, and embedded with integrity data to detect tampering or corruption\u2014preventing restoration of compromised files. The service also logs the creation time, contents, and device identity.<\/p>\n\n\n\n<p>On the \u201cBackups\u201d page, users can view archived backups per asset, listed in protocol files. Clicking \u201cRestore\u201d verifies the signature and restores the device to its previous state.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Updating software with OPC&nbsp;UA<\/strong><\/h2>\n\n\n\n<p>Phoenix Contact\u2019s OPC UA-based Device and Update Management Service enables vendor-independent updates of automation devices using the OPC UA 10000-100 standard. It now supports a broad range of components\u2014from controllers to power supplies. Security is enforced system-wide, with all actions authenticated and authorized per IEC 62443. The service is also flexible, running on an edge PC, central server, or automation device based on system size and needs.<\/p>\n\n\n\n<p>Read more about <a href=\"https:\/\/www.plcnext-community.net\/infocenter\/functions_and_applications\/device_and_update_management\/daum_backups\/\">PLCnext technology<\/a>, and <a href=\"https:\/\/www.phoenixcontact.com\/en-ae\/products\/software-daum-windows-service-1542953\">DaUM<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DaUM Service as a block of a security strategy In today\u2019s fast-paced industrial environment, smooth and efficient production is vital\u2014yet PLC backup and restore procedures, a critical component, are often overlooked. PLC backup-and-restore procedures are vital for maintaining manufacturing system integrity. In addition, they ensure that the latest software is used, and preventing costly downtime. [&hellip;]<\/p>\n","protected":false},"author":357,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3489","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Managing and securing assets in automation | Middle East<\/title>\n<meta name=\"description\" content=\"Backups General information Backup and restore mechanisms are used for fast recommissioning after a possible system failure or device reset.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/managing-and-securing-assets-in-automation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Managing and securing assets in automation | Middle East\" \/>\n<meta property=\"og:description\" content=\"Backups General information Backup and restore mechanisms are used for fast recommissioning after a possible system failure or device reset.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/managing-and-securing-assets-in-automation\/\" \/>\n<meta property=\"og:site_name\" content=\"Middle East\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-12T07:40:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-12T07:40:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/06\/00199516_full_b1000.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"503\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rehab Saleh\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rehab Saleh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/managing-and-securing-assets-in-automation\/\",\"url\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/managing-and-securing-assets-in-automation\/\",\"name\":\"Managing and securing assets in automation | Middle East\",\"isPartOf\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/managing-and-securing-assets-in-automation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/managing-and-securing-assets-in-automation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/06\/00199516_full_b1000.jpg\",\"datePublished\":\"2025-06-12T07:40:41+00:00\",\"dateModified\":\"2025-06-12T07:40:44+00:00\",\"author\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/#\/schema\/person\/f082d19c085d32a2ba4d429127104281\"},\"description\":\"Backups General information Backup and restore mechanisms are used for fast recommissioning after a possible system failure or device reset.\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/managing-and-securing-assets-in-automation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/managing-and-securing-assets-in-automation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/managing-and-securing-assets-in-automation\/#primaryimage\",\"url\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/06\/00199516_full_b1000.jpg\",\"contentUrl\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/06\/00199516_full_b1000.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/managing-and-securing-assets-in-automation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Managing and securing assets in automation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/#website\",\"url\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/\",\"name\":\"Middle East\",\"description\":\"PHOENIX CONTACT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/#\/schema\/person\/f082d19c085d32a2ba4d429127104281\",\"name\":\"Rehab Saleh\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/50c529c9e01c93ce87ad2a7073c25b0fe60586e0be6673ecb4fafb48b3acc8ca?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/50c529c9e01c93ce87ad2a7073c25b0fe60586e0be6673ecb4fafb48b3acc8ca?s=96&d=mm&r=g\",\"caption\":\"Rehab Saleh\"},\"url\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/author\/vml9bt\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Managing and securing assets in automation | Middle East","description":"Backups General information Backup and restore mechanisms are used for fast recommissioning after a possible system failure or device reset.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/managing-and-securing-assets-in-automation\/","og_locale":"en_US","og_type":"article","og_title":"Managing and securing assets in automation | Middle East","og_description":"Backups General information Backup and restore mechanisms are used for fast recommissioning after a possible system failure or device reset.","og_url":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/managing-and-securing-assets-in-automation\/","og_site_name":"Middle East","article_published_time":"2025-06-12T07:40:41+00:00","article_modified_time":"2025-06-12T07:40:44+00:00","og_image":[{"width":1000,"height":503,"url":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/06\/00199516_full_b1000.jpg","type":"image\/jpeg"}],"author":"Rehab Saleh","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rehab Saleh","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/managing-and-securing-assets-in-automation\/","url":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/managing-and-securing-assets-in-automation\/","name":"Managing and securing assets in automation | Middle East","isPartOf":{"@id":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/managing-and-securing-assets-in-automation\/#primaryimage"},"image":{"@id":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/managing-and-securing-assets-in-automation\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/06\/00199516_full_b1000.jpg","datePublished":"2025-06-12T07:40:41+00:00","dateModified":"2025-06-12T07:40:44+00:00","author":{"@id":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/#\/schema\/person\/f082d19c085d32a2ba4d429127104281"},"description":"Backups General information Backup and restore mechanisms are used for fast recommissioning after a possible system failure or device reset.","breadcrumb":{"@id":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/managing-and-securing-assets-in-automation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.phoenixcontact.com\/marketing-ae\/managing-and-securing-assets-in-automation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/managing-and-securing-assets-in-automation\/#primaryimage","url":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/06\/00199516_full_b1000.jpg","contentUrl":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/06\/00199516_full_b1000.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/managing-and-securing-assets-in-automation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/"},{"@type":"ListItem","position":2,"name":"Managing and securing assets in automation"}]},{"@type":"WebSite","@id":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/#website","url":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/","name":"Middle East","description":"PHOENIX CONTACT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/#\/schema\/person\/f082d19c085d32a2ba4d429127104281","name":"Rehab Saleh","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/50c529c9e01c93ce87ad2a7073c25b0fe60586e0be6673ecb4fafb48b3acc8ca?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/50c529c9e01c93ce87ad2a7073c25b0fe60586e0be6673ecb4fafb48b3acc8ca?s=96&d=mm&r=g","caption":"Rehab Saleh"},"url":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/author\/vml9bt\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-json\/wp\/v2\/posts\/3489","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-json\/wp\/v2\/users\/357"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-json\/wp\/v2\/comments?post=3489"}],"version-history":[{"count":2,"href":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-json\/wp\/v2\/posts\/3489\/revisions"}],"predecessor-version":[{"id":3494,"href":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-json\/wp\/v2\/posts\/3489\/revisions\/3494"}],"wp:attachment":[{"href":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-json\/wp\/v2\/media?parent=3489"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-json\/wp\/v2\/categories?post=3489"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-json\/wp\/v2\/tags?post=3489"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}