{"id":6332,"date":"2020-09-01T17:31:56","date_gmt":"2020-09-01T15:31:56","guid":{"rendered":"http:\/\/blog-dev.europe.phoenixcontact.com\/services\/?page_id=6332"},"modified":"2021-05-04T18:18:00","modified_gmt":"2021-05-04T16:18:00","slug":"sichere-fernwartung-service","status":"publish","type":"page","link":"https:\/\/blog.phoenixcontact.com\/services\/industrial-security\/sichere-fernwartung-service","title":{"rendered":"Sichere Fernwartung | Service"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-image is-style-default\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blog.phoenixcontact.com\/wp-content\/uploads\/sites\/23\/2020\/09\/Security-3.png\" alt=\"\" class=\"wp-image-6334\" width=\"559\" height=\"145\" \/><\/figure><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-image is-style-default\"><figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blog.phoenixcontact.com\/wp-content\/uploads\/sites\/23\/2020\/08\/Industrial-Security-Consulting-3.png\" alt=\"\" class=\"wp-image-6033\" width=\"560\" height=\"142\" \/><\/figure><\/div>\n<\/div>\n<\/div>\n\n\n\n<p class=\"has-text-align-left has-small-font-size\"><strong><em>ZIELE UND INHALTE UNSERES EINZELPAKETS<\/em><\/strong><\/p>\n\n\n\n<h2 class=\"has-text-align-left wp-block-heading\">Implementieren Sie einen sicheren Remote Zugriffe f\u00fcr Sie und Ihre Lieferanten<\/h2>\n\n\n\n<p class=\"has-medium-font-size\">Die Fernwartung hat ohne Frage gro\u00dfe wirtschaftliche Vorteile. Doch mit jeder Implementation einer Fernwartungsl\u00f6sung kommt die Frage nach der Sicherheit der L\u00f6sung. Diese Frage ist berechtigt, denn bei der Fernwartung m\u00fcssen Sie neben den technischen Komponenten auch organisatorische Ma\u00dfnahmen ber\u00fccksichtigen.<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-image is-style-default\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blog.phoenixcontact.com\/wp-content\/uploads\/sites\/23\/2020\/08\/Pfeil-Down-2.png\" alt=\"\" class=\"wp-image-6147\" width=\"67\" height=\"27\" \/><\/figure><\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-top is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-very-light-gray-color has-text-color has-background has-medium-font-size\" style=\"background-color:#0099a1\"><strong>0. Anlageninformationen &#8211; Schwerpunkt Fernwartung<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.3%\">\n<div class=\"wp-block-image is-style-default\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blog.phoenixcontact.com\/wp-content\/uploads\/sites\/23\/2020\/08\/a_0084058_int.png\" alt=\"\" class=\"wp-image-6083\" width=\"300\" height=\"225\" \/><\/figure><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p class=\"has-text-align-left has-medium-font-size\">Die Ausgangsbasis ist immer Ihre individuelle Infrastruktur mit der Bestimmung der Einsatzumgebung und Abl\u00e4ufe mit dem Fokus auf die Fernwartung<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Identifikation der Systeme und Ger\u00e4te, inkl. aller Ger\u00e4te und deren Kommunikationsbeziehungen zu intern sowie extern<\/li><li>Festlegung der Netzwerkinfrastruktur<\/li><li>Identifikation Ihrer wesentlichen Prozesse<\/li><\/ul>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-very-light-gray-background-color has-background has-medium-font-size\"><strong>1. Basisabsicherung &#8211; Schwerpunkt Fernwartung<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.3%\">\n<div class=\"wp-block-image is-style-default\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blog.phoenixcontact.com\/wp-content\/uploads\/sites\/23\/2020\/08\/ren-ran-vulGK2GkhAs-unsplash-1.jpg\" alt=\"\" class=\"wp-image-6059\" width=\"540\" height=\"360\" \/><\/figure><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p class=\"has-text-align-left has-medium-font-size\">Spezifikation von bedeutenden Basisanforderungen f\u00fcr Ihr Security Konzept mit dem Fokus auf die Fernwartung<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Netzwerkarchitektur<\/li><li>Wireless Kommunikation<\/li><li>Remote Zug\u00e4nge<\/li><li>Zugriffsberechtigung<\/li><li>Schadsoftware Abwehr<\/li><li>Patch Management<\/li><li>Back Up Management<\/li><\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-top is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-very-light-gray-color has-text-color has-background has-medium-font-size\" style=\"background-color:#0099a1\"><strong><strong>2. Asset Liste<\/strong> &#8211; Schwerpunkt Fernwartung<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<div class=\"wp-block-image is-style-default\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1240\" height=\"1240\" src=\"http:\/\/blog.phoenixcontact.com\/wp-content\/uploads\/sites\/23\/2020\/09\/00023477.png\" alt=\"\" class=\"wp-image-6328\" \/><\/figure><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p class=\"has-text-align-left has-medium-font-size\">Basierend auf den erfassten Kommunikationsbeziehungen zwischen den Systemen und Ger\u00e4ten wird eine vollumf\u00e4ngliche Asset Liste mit folgenden Security relevanten Informationen entwickelt:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Funktionen (z.B. Hauptprozess, Unterprozess, usw.) <\/li><li>Definition und Klassifizierung der Daten<\/li><li>Inventarisierung der Ger\u00e4te<\/li><li>Kommunikationsbeziehungen und Netzwerkinformationen<\/li><li>Konfigurationsparameter<\/li><li>Backup und Restore<\/li><li>Benutzer und Rollen<\/li><\/ul>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-very-light-gray-background-color has-background has-medium-font-size\"><strong>3. Security Konzept &#8211; Schwerpunkt Fernwartung<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<div class=\"wp-block-image is-style-default\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"751\" height=\"643\" src=\"http:\/\/blog.phoenixcontact.com\/wp-content\/uploads\/sites\/23\/2020\/09\/a_0089902-Kopie.png\" alt=\"\" class=\"wp-image-6338\" \/><\/figure><\/div>\n\n\n\n<p><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p class=\"has-medium-font-size\">Erg\u00e4nzung der Security Basisabsicherung um individuelle Ma\u00dfnahmen, auf Grundlage einer Schutzbedarfs-, Bedrohungs- und Risikoanalyse mit dem Fokus auf die Fernwartung<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Erstellung einer generischen Security Test Spezifikation<\/li><li>\u00dcberpr\u00fcfung der Implementierung<\/li><li>Alle Aktivit\u00e4ten basieren auf dem aktuellen Stand der Technik<\/li><li>Ergebnisse sind dokumentiert<\/li><\/ul>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons aligncenter is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-fill\"><a class=\"wp-block-button__link has-text-color has-background broken_link\" href=\"\/services\/kontakt\" style=\"border-radius:17px;background:linear-gradient(45deg,rgb(0,153,161) 0%,rgb(0,91,96) 100%);color:#ffffff\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>\u203a Kostenlose Erstberatung anfordern<\/strong><\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-background is-style-wide\" style=\"background-color:#dadada;color:#dadada\" \/>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-small-font-size\"><strong><em>INTERESSANT F\u00dcR<\/em><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Industrial Security von PHOENIX CONTACT bietet f\u00fcr Industrieunternehmen den besten Schutz<\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-gallery aligncenter columns-0 is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex\"><ul class=\"blocks-gallery-grid\"><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"1078\" height=\"764\" src=\"http:\/\/blog.phoenixcontact.com\/wp-content\/uploads\/sites\/23\/2020\/09\/00002671_LARGE_FORMAT_PICTURE_CMYK-Kopie.png\" alt=\"\" data-id=\"6310\" data-link=\"http:\/\/blog.phoenixcontact.com\/servicesnew\/?attachment_id=6310\" class=\"wp-image-6310\" \/><figcaption class=\"blocks-gallery-item__caption\">Maschinenbau<\/figcaption><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"600\" src=\"http:\/\/blog.phoenixcontact.com\/wp-content\/uploads\/sites\/23\/2020\/09\/00004379_LARGE_FORMAT_PICTURE_RGB-Kopie.png\" alt=\"\" data-id=\"6311\" data-link=\"http:\/\/blog.phoenixcontact.com\/servicesnew\/?attachment_id=6311\" class=\"wp-image-6311\" \/><figcaption class=\"blocks-gallery-item__caption\">Automatisierung<\/figcaption><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"1080\" height=\"720\" src=\"http:\/\/blog.phoenixcontact.com\/wp-content\/uploads\/sites\/23\/2020\/09\/00004419_LARGE_FORMAT_PICTURE_RGB-Kopie.png\" alt=\"\" data-id=\"6312\" data-link=\"http:\/\/blog.phoenixcontact.com\/servicesnew\/?attachment_id=6312\" class=\"wp-image-6312\" \/><figcaption class=\"blocks-gallery-item__caption\">Maschinenbetreiber<\/figcaption><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"1122\" height=\"635\" src=\"http:\/\/blog.phoenixcontact.com\/wp-content\/uploads\/sites\/23\/2020\/09\/00020292_LARGE_FORMAT_PICTURE_RGB-Kopie.png\" alt=\"\" data-id=\"6313\" data-link=\"http:\/\/blog.phoenixcontact.com\/servicesnew\/?attachment_id=6313\" class=\"wp-image-6313\" \/><figcaption class=\"blocks-gallery-item__caption\">Prozess- und Chemieindustrie<\/figcaption><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"1383\" height=\"778\" src=\"http:\/\/blog.phoenixcontact.com\/wp-content\/uploads\/sites\/23\/2020\/09\/00020660_LARGE_FORMAT_PICTURE_RGB-Kopie.png\" alt=\"\" data-id=\"6314\" data-link=\"http:\/\/blog.phoenixcontact.com\/servicesnew\/?attachment_id=6314\" class=\"wp-image-6314\" \/><figcaption class=\"blocks-gallery-item__caption\">Energieversorgung<\/figcaption><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"1108\" height=\"763\" src=\"http:\/\/blog.phoenixcontact.com\/wp-content\/uploads\/sites\/23\/2020\/09\/00022279_LARGE_FORMAT_PICTURE_RGB-Kopie.png\" alt=\"\" data-id=\"6315\" data-link=\"http:\/\/blog.phoenixcontact.com\/servicesnew\/?attachment_id=6315\" class=\"wp-image-6315\" \/><figcaption class=\"blocks-gallery-item__caption\">Geb\u00e4udeautomation<\/figcaption><\/figure><\/li><\/ul><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-small-font-size\"><strong><em>IHRE VORTEILE<\/em><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Die sicherere Digitalisierung der Industrie 4.0 gelingt nur \u00fcber eine moderne Cyber-Security<\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\">\n<div class=\"wp-block-image is-style-default\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blog.phoenixcontact.com\/wp-content\/uploads\/sites\/23\/2020\/08\/Check-Icon-3.png\" alt=\"\" class=\"wp-image-6183\" width=\"35\" height=\"40\" \/><\/figure><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p class=\"has-text-align-left has-medium-font-size\"><strong>Sicherstellung Ihrer Anlagenverf\u00fcgbarkeit<\/strong><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\">\n<div class=\"wp-block-image is-style-default\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blog.phoenixcontact.com\/wp-content\/uploads\/sites\/23\/2020\/08\/Check-Icon-3.png\" alt=\"\" class=\"wp-image-6183\" width=\"35\" height=\"40\" \/><\/figure><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p class=\"has-text-align-left has-medium-font-size\"><strong>Exzellente Kompetenz &#8211; IEC 62443&nbsp;Zertifizierung&nbsp;(T\u00dcV)<\/strong><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\">\n<div class=\"wp-block-image is-style-default\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blog.phoenixcontact.com\/wp-content\/uploads\/sites\/23\/2020\/08\/Check-Icon-3.png\" alt=\"\" class=\"wp-image-6183\" width=\"35\" height=\"40\" \/><\/figure><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p class=\"has-text-align-left has-medium-font-size\"><strong>Kosteneffizienz durch unseren modularen Blueprint<\/strong><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-buttons aligncenter is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-fill\"><a class=\"wp-block-button__link has-text-color has-background broken_link\" href=\"\/services\/kontakt\" style=\"border-radius:17px;background:linear-gradient(45deg,rgb(0,153,161) 0%,rgb(0,91,96) 100%);color:#ffffff\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>\u203a Kostenlose Erstberatung anfordern<\/strong><\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>ZIELE UND INHALTE UNSERES EINZELPAKETS Implementieren Sie einen sicheren Remote Zugriffe f\u00fcr Sie und Ihre Lieferanten Die Fernwartung hat ohne Frage gro\u00dfe wirtschaftliche Vorteile. Doch mit jeder Implementation einer Fernwartungsl\u00f6sung kommt die Frage nach der Sicherheit der L\u00f6sung. Diese Frage ist berechtigt, denn bei der Fernwartung m\u00fcssen Sie neben den technischen Komponenten auch organisatorische Ma\u00dfnahmen [&hellip;]<\/p>\n","protected":false},"author":195,"featured_media":0,"parent":5627,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-6332","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Sichere Fernwartung | Service | Industrial Services von Phoenix Contact<\/title>\n<meta name=\"description\" content=\"Dienstleistung Implementierung eins sicheren Fernwartungszugriffs | Wir minimieren f\u00fcr Sie die Risiken, die sich aus Fernwartungszugriffen ergeben\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.phoenixcontact.com\/services\/industrial-security\/sichere-fernwartung-service\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sichere Fernwartung | Service | Industrial Services von Phoenix Contact\" \/>\n<meta property=\"og:description\" content=\"Dienstleistung Implementierung eins sicheren Fernwartungszugriffs | Wir minimieren f\u00fcr Sie die Risiken, die sich aus Fernwartungszugriffen ergeben\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.phoenixcontact.com\/services\/industrial-security\/sichere-fernwartung-service\" \/>\n<meta property=\"og:site_name\" content=\"Industrial Services von Phoenix Contact\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-04T16:18:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.phoenixcontact.com\/wp-content\/uploads\/sites\/23\/2020\/09\/Security-3.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/services\/industrial-security\/sichere-fernwartung-service\",\"url\":\"https:\/\/blog.phoenixcontact.com\/services\/industrial-security\/sichere-fernwartung-service\",\"name\":\"Sichere Fernwartung | Service | Industrial Services von Phoenix Contact\",\"isPartOf\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/services\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/services\/industrial-security\/sichere-fernwartung-service#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/services\/industrial-security\/sichere-fernwartung-service#primaryimage\"},\"thumbnailUrl\":\"http:\/\/blog.phoenixcontact.com\/wp-content\/uploads\/sites\/23\/2020\/09\/Security-3.png\",\"datePublished\":\"2020-09-01T15:31:56+00:00\",\"dateModified\":\"2021-05-04T16:18:00+00:00\",\"description\":\"Dienstleistung Implementierung eins sicheren Fernwartungszugriffs | Wir minimieren f\u00fcr Sie die Risiken, die sich aus Fernwartungszugriffen ergeben\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/services\/industrial-security\/sichere-fernwartung-service#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.phoenixcontact.com\/services\/industrial-security\/sichere-fernwartung-service\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/services\/industrial-security\/sichere-fernwartung-service#primaryimage\",\"url\":\"http:\/\/blog.phoenixcontact.com\/wp-content\/uploads\/sites\/23\/2020\/09\/Security-3.png\",\"contentUrl\":\"http:\/\/blog.phoenixcontact.com\/wp-content\/uploads\/sites\/23\/2020\/09\/Security-3.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/services\/industrial-security\/sichere-fernwartung-service#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/blog.phoenixcontact.com\/services\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Industrial Security\",\"item\":\"https:\/\/blog.phoenixcontact.com\/services\/industrial-security\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Sichere Fernwartung | Service\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/services\/#website\",\"url\":\"https:\/\/blog.phoenixcontact.com\/services\/\",\"name\":\"PHOENIX CONTACT\",\"description\":\"Security -  Safety - CE\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.phoenixcontact.com\/services\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sichere Fernwartung | Service | Industrial Services von Phoenix Contact","description":"Dienstleistung Implementierung eins sicheren Fernwartungszugriffs | Wir minimieren f\u00fcr Sie die Risiken, die sich aus Fernwartungszugriffen ergeben","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.phoenixcontact.com\/services\/industrial-security\/sichere-fernwartung-service","og_locale":"de_DE","og_type":"article","og_title":"Sichere Fernwartung | Service | Industrial Services von Phoenix Contact","og_description":"Dienstleistung Implementierung eins sicheren Fernwartungszugriffs | Wir minimieren f\u00fcr Sie die Risiken, die sich aus Fernwartungszugriffen ergeben","og_url":"https:\/\/blog.phoenixcontact.com\/services\/industrial-security\/sichere-fernwartung-service","og_site_name":"Industrial Services von Phoenix Contact","article_modified_time":"2021-05-04T16:18:00+00:00","og_image":[{"url":"https:\/\/blog.phoenixcontact.com\/wp-content\/uploads\/sites\/23\/2020\/09\/Security-3.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blog.phoenixcontact.com\/services\/industrial-security\/sichere-fernwartung-service","url":"https:\/\/blog.phoenixcontact.com\/services\/industrial-security\/sichere-fernwartung-service","name":"Sichere Fernwartung | Service | Industrial Services von Phoenix Contact","isPartOf":{"@id":"https:\/\/blog.phoenixcontact.com\/services\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.phoenixcontact.com\/services\/industrial-security\/sichere-fernwartung-service#primaryimage"},"image":{"@id":"https:\/\/blog.phoenixcontact.com\/services\/industrial-security\/sichere-fernwartung-service#primaryimage"},"thumbnailUrl":"http:\/\/blog.phoenixcontact.com\/wp-content\/uploads\/sites\/23\/2020\/09\/Security-3.png","datePublished":"2020-09-01T15:31:56+00:00","dateModified":"2021-05-04T16:18:00+00:00","description":"Dienstleistung Implementierung eins sicheren Fernwartungszugriffs | Wir minimieren f\u00fcr Sie die Risiken, die sich aus Fernwartungszugriffen ergeben","breadcrumb":{"@id":"https:\/\/blog.phoenixcontact.com\/services\/industrial-security\/sichere-fernwartung-service#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.phoenixcontact.com\/services\/industrial-security\/sichere-fernwartung-service"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/blog.phoenixcontact.com\/services\/industrial-security\/sichere-fernwartung-service#primaryimage","url":"http:\/\/blog.phoenixcontact.com\/wp-content\/uploads\/sites\/23\/2020\/09\/Security-3.png","contentUrl":"http:\/\/blog.phoenixcontact.com\/wp-content\/uploads\/sites\/23\/2020\/09\/Security-3.png"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.phoenixcontact.com\/services\/industrial-security\/sichere-fernwartung-service#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/blog.phoenixcontact.com\/services"},{"@type":"ListItem","position":2,"name":"Industrial Security","item":"https:\/\/blog.phoenixcontact.com\/services\/industrial-security"},{"@type":"ListItem","position":3,"name":"Sichere Fernwartung | Service"}]},{"@type":"WebSite","@id":"https:\/\/blog.phoenixcontact.com\/services\/#website","url":"https:\/\/blog.phoenixcontact.com\/services\/","name":"PHOENIX CONTACT","description":"Security -  Safety - CE","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.phoenixcontact.com\/services\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"}]}},"_links":{"self":[{"href":"https:\/\/blog.phoenixcontact.com\/services\/wp-json\/wp\/v2\/pages\/6332","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.phoenixcontact.com\/services\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blog.phoenixcontact.com\/services\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blog.phoenixcontact.com\/services\/wp-json\/wp\/v2\/users\/195"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.phoenixcontact.com\/services\/wp-json\/wp\/v2\/comments?post=6332"}],"version-history":[{"count":5,"href":"https:\/\/blog.phoenixcontact.com\/services\/wp-json\/wp\/v2\/pages\/6332\/revisions"}],"predecessor-version":[{"id":6776,"href":"https:\/\/blog.phoenixcontact.com\/services\/wp-json\/wp\/v2\/pages\/6332\/revisions\/6776"}],"up":[{"embeddable":true,"href":"https:\/\/blog.phoenixcontact.com\/services\/wp-json\/wp\/v2\/pages\/5627"}],"wp:attachment":[{"href":"https:\/\/blog.phoenixcontact.com\/services\/wp-json\/wp\/v2\/media?parent=6332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}