{"id":8610,"date":"2021-08-27T12:16:36","date_gmt":"2021-08-27T10:16:36","guid":{"rendered":"http:\/\/blog.phoenixcontact.com\/services\/?p=8610"},"modified":"2023-10-26T09:51:28","modified_gmt":"2023-10-26T07:51:28","slug":"knowledge-kompakt-360-industrial-security","status":"publish","type":"post","link":"https:\/\/blog.phoenixcontact.com\/services\/knowledge-kompakt-360-industrial-security","title":{"rendered":"Knowledge kompakt &#8211; 360\u00b0-Industrial-Security"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><a href=\"http:\/\/blog.phoenixcontact.com\/services\/individuelle-beratung-360-industrial-security\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"385\" src=\"http:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Header_Knowmore-1024x385.jpg\" alt=\"\" class=\"wp-image-8611\" srcset=\"https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Header_Knowmore-1024x385.jpg 1024w, https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Header_Knowmore-300x113.jpg 300w, https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Header_Knowmore-768x289.jpg 768w, https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Header_Knowmore-1536x578.jpg 1536w, https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Header_Knowmore-2048x771.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Zentrales Security-Wissen f\u00fcr jedes Level &#8211; bleiben Sie up-to-date!<\/h2>\n\n\n\n<p>Das Thema Industrial Security ist sehr komplex und vielschichtig. Erhalten Sie einen schnellen \u00dcberblick, welche Aspekte f\u00fcr Sie zentral sind, um Ihre Anlage ganzheitlich zu sch\u00fctzen. 360\u00b0-Industrial-Security-Wissen kompakt &#8211; direkt von unseren Expertinnen und Experten.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image is-style-default\">\n<figure class=\"alignleft size-large\"><a href=\"https:\/\/event.phoenixcontact.com\/Kompaktseminar-360-Industrial-Security\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"261\" src=\"http:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_Online-Seminar-2-1024x261.jpg\" alt=\"\" class=\"wp-image-8667\" srcset=\"https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_Online-Seminar-2-1024x261.jpg 1024w, https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_Online-Seminar-2-300x77.jpg 300w, https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_Online-Seminar-2-768x196.jpg 768w, https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_Online-Seminar-2-1536x392.jpg 1536w, https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_Online-Seminar-2-2048x523.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption><strong>Kompaktseminar 360\u00b0-Industrial-Security &#8211; jetzt online ansehen<\/strong>: Holen Sie sich zentrales Wissen direkt von unseren Expertinnen und Experten wie Sie Ihre Anlage umfassend sch\u00fctzen &#8211; kompakt, top aktuell und verst\u00e4ndlich zusammengefasst. <br><br><a href=\"http:\/\/blog.phoenixcontact.com\/services\/kompaktseminar-360-industrial-security-direkt-online-ansehen\">&gt; Zur Seminar-Aufzeichnung<\/a><br><\/figcaption><\/figure><\/div>\n\n\n<p><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image is-style-default\">\n<figure class=\"alignleft size-large\"><a href=\"http:\/\/blog.phoenixcontact.com\/services\/top-security-risiken-bedrohungen-und-anforderungen-im-industrieumfeld\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"261\" src=\"http:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_Top-Bedrohungen-1024x261.jpg\" alt=\"\" class=\"wp-image-8622\" srcset=\"https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_Top-Bedrohungen-1024x261.jpg 1024w, https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_Top-Bedrohungen-300x77.jpg 300w, https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_Top-Bedrohungen-768x196.jpg 768w, https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_Top-Bedrohungen-1536x392.jpg 1536w, https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_Top-Bedrohungen-2048x523.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption><strong>Top Security-Risiken, -Bedrohungen, und -Anforderungen im Industrieumfeld<\/strong>: Cyber-Attacken sind in der Realit\u00e4t angekommen. Was bedeutet das f\u00fcr Unternehmen? Welche Anforderungen ergeben sich daraus, um Ihre Anlage ganzheitlich zu sichern?<br><br><a href=\"http:\/\/blog.phoenixcontact.com\/services\/top-security-risiken-bedrohungen-und-anforderungen-im-industrieumfeld\">&gt; Jetzt mehr erfahren<\/a><\/figcaption><\/figure><\/div>\n\n\n<p> <\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image is-style-default\">\n<figure class=\"alignleft size-large\"><a href=\"http:\/\/blog.phoenixcontact.com\/services\/unabdingbar-ein-ganzheitlicher-360-industrial-security-ansatz\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"261\" src=\"http:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_360Grad-1-1024x261.jpg\" alt=\"\" class=\"wp-image-8748\" srcset=\"https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_360Grad-1-1024x261.jpg 1024w, https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_360Grad-1-300x77.jpg 300w, https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_360Grad-1-768x196.jpg 768w, https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_360Grad-1-1536x392.jpg 1536w, https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_360Grad-1-2048x523.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption><strong>Unabdingbar: ein ganzheitlicher 360\u00b0-Industrial-Security-Ansatz<\/strong>: Technologie ist wertvoll \u2013 umfassende Sicherheit erfordert jedoch mehr. Security Management wird in der Praxis h\u00e4ufig leider noch sehr einseitig betrachtet, was zu enormen Security-Risiken und Folgesch\u00e4den f\u00fchrt, da Cyber-Vorf\u00e4lle dann ein leichtes Spiel haben.<br><br><a href=\"http:\/\/blog.phoenixcontact.com\/services\/unabdingbar-ein-ganzheitlicher-360-industrial-security-ansatz\">&gt; Jetzt mehr erfahren<\/a><\/figcaption><\/figure><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image is-style-default\">\n<figure class=\"alignleft size-large\"><a href=\"http:\/\/blog.phoenixcontact.com\/services\/schutz-vor-cyber-angriffen-ist-keine-kuer-das-it-sicherheitsgesetz\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"261\" src=\"http:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_IT-Sicherheitsgesetz-1-1024x261.jpg\" alt=\"\" class=\"wp-image-8674\" srcset=\"https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_IT-Sicherheitsgesetz-1-1024x261.jpg 1024w, https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_IT-Sicherheitsgesetz-1-300x77.jpg 300w, https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_IT-Sicherheitsgesetz-1-768x196.jpg 768w, https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_IT-Sicherheitsgesetz-1-1536x392.jpg 1536w, https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_IT-Sicherheitsgesetz-1-2048x523.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption><strong>Achtung: Gesetzes\u00e4nderung &#8211; das IT-Sicherheitsgesetz 2.0 wurde verabschiedet<\/strong>: Schutz vor Cyber-Angriffen ist keine K\u00fcr. Erfahren Sie, welche neuen Pflichten auf Betreibende kritischer Infrastrukturen zukommen und welche es bisher schon zu erf\u00fcllen gab.<br><br><a href=\"http:\/\/blog.phoenixcontact.com\/services\/schutz-vor-cyber-angriffen-ist-keine-kuer-das-it-sicherheitsgesetz\">&gt; Jetzt lesen: Das IT-Sicherheitsgesetz 2.0 \u2013 Schutz vor Cyber- Angriffen ist keine K\u00fcr<\/a><\/figcaption><\/figure><\/div>\n\n\n<p> <\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image is-style-default\">\n<figure class=\"alignleft size-large\"><a href=\"http:\/\/blog.phoenixcontact.com\/services\/steigern-sie-ihr-security-level\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"261\" src=\"http:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_Normen-Zertifikate-1024x261.jpg\" alt=\"\" class=\"wp-image-8633\" srcset=\"https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_Normen-Zertifikate-1024x261.jpg 1024w, https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_Normen-Zertifikate-300x77.jpg 300w, https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_Normen-Zertifikate-768x196.jpg 768w, https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_Normen-Zertifikate-1536x392.jpg 1536w, https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_Normen-Zertifikate-2048x523.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption><strong>IEC 62443 &#8211; die zukunftsorientierteste Norm f\u00fcr Cyber Security im \u00dcberblick: <\/strong>Warum ist dieser Standard so zentral, wenn Sie Ihre Anlage umfassend sch\u00fctzen wollen? Was verbirgt sich dahinter? F\u00fcr wen ist diese Norm relevant?<br><br><a href=\"http:\/\/blog.phoenixcontact.com\/services\/steigern-sie-ihr-security-level\">&gt; Jetzt mehr erfahren.<\/a><\/figcaption><\/figure><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image is-style-default\">\n<figure class=\"alignleft size-large\"><a href=\"http:\/\/blog.phoenixcontact.com\/services\/9-zentrale-steps-zur-sicheren-anlage\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"261\" src=\"http:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/10\/00000000_Teaser_9Steps-1024x261.jpg\" alt=\"\" class=\"wp-image-9117\" srcset=\"https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/10\/00000000_Teaser_9Steps-1024x261.jpg 1024w, https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/10\/00000000_Teaser_9Steps-300x77.jpg 300w, https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/10\/00000000_Teaser_9Steps-768x196.jpg 768w, https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/10\/00000000_Teaser_9Steps-1536x392.jpg 1536w, https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/10\/00000000_Teaser_9Steps-2048x523.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption><strong>9 zentrale Steps zur sicheren Anlage<\/strong><br> Kompakt erkl\u00e4rt: So gelangen Sie zu umfassender Cyber Security bei Ihren Automatisierungsl\u00f6sungen <br><br><a href=\"http:\/\/blog.phoenixcontact.com\/services\/9-zentrale-steps-zur-sicheren-anlage\">&gt; Jetzt mehr erfahren<\/a><\/figcaption><\/figure><\/div>\n\n\n<p> <\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image is-style-default\">\n<figure class=\"alignleft size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"261\" src=\"http:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_Newsletter-LinkedIn-1024x261.jpg\" alt=\"\" class=\"wp-image-8694\" srcset=\"https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_Newsletter-LinkedIn-1024x261.jpg 1024w, https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_Newsletter-LinkedIn-300x77.jpg 300w, https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_Newsletter-LinkedIn-768x196.jpg 768w, https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_Newsletter-LinkedIn-1536x392.jpg 1536w, https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Teaser_Newsletter-LinkedIn-2048x523.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption><strong>Bleiben Sie up-to-date:<\/strong><br><a href=\"https:\/\/www.phoenixcontact.com\/online\/portal\/de?1dmy&amp;urile=wcm:path:\/dede\/web\/corporate\/press\/subcategory_pages\/Newsletter\/e94bbda0-9734-4c0b-b7db-92b57c6db338\">&gt; Jetzt registrieren:  Newsletter 360\u00b0-Industrial-Security und Netzwerktechnik<\/a><br><a href=\"https:\/\/www.linkedin.com\/showcase\/-industrial-services---security-safety-ce-kennzeichnung\/?viewAsMember=true\">&gt; Jetzt folgen: LinkedIn 360\u00b0-Industrial-Security<\/a><\/figcaption><\/figure><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p> <\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Zentrales Security-Wissen f\u00fcr jedes Level &#8211; bleiben Sie up-to-date! Das Thema Industrial Security ist sehr komplex und vielschichtig. Erhalten Sie einen schnellen \u00dcberblick, welche Aspekte f\u00fcr Sie zentral sind, um Ihre Anlage ganzheitlich zu sch\u00fctzen. 360\u00b0-Industrial-Security-Wissen kompakt &#8211; direkt von unseren Expertinnen und Experten.<\/p>\n","protected":false},"author":331,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[920],"tags":[],"class_list":["post-8610","post","type-post","status-publish","format-standard","hentry","category-security-seite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Knowledge kompakt - 360\u00b0-Industrial-Security | Industrial Services von Phoenix Contact<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.phoenixcontact.com\/services\/knowledge-kompakt-360-industrial-security\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Knowledge kompakt - 360\u00b0-Industrial-Security | Industrial Services von Phoenix Contact\" \/>\n<meta property=\"og:description\" content=\"Zentrales Security-Wissen f\u00fcr jedes Level &#8211; bleiben Sie up-to-date! Das Thema Industrial Security ist sehr komplex und vielschichtig. Erhalten Sie einen schnellen \u00dcberblick, welche Aspekte f\u00fcr Sie zentral sind, um Ihre Anlage ganzheitlich zu sch\u00fctzen. 360\u00b0-Industrial-Security-Wissen kompakt &#8211; direkt von unseren Expertinnen und Experten.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.phoenixcontact.com\/services\/knowledge-kompakt-360-industrial-security\" \/>\n<meta property=\"og:site_name\" content=\"Industrial Services von Phoenix Contact\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-27T10:16:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-26T07:51:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Header_Knowmore-1024x385.jpg\" \/>\n<meta name=\"author\" content=\"Kathrin Robert\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kathrin Robert\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"4\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/services\/knowledge-kompakt-360-industrial-security\",\"url\":\"https:\/\/blog.phoenixcontact.com\/services\/knowledge-kompakt-360-industrial-security\",\"name\":\"Knowledge kompakt - 360\u00b0-Industrial-Security | Industrial Services von Phoenix Contact\",\"isPartOf\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/services\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/services\/knowledge-kompakt-360-industrial-security#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/services\/knowledge-kompakt-360-industrial-security#primaryimage\"},\"thumbnailUrl\":\"http:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Header_Knowmore-1024x385.jpg\",\"datePublished\":\"2021-08-27T10:16:36+00:00\",\"dateModified\":\"2023-10-26T07:51:28+00:00\",\"author\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/services\/#\/schema\/person\/6baca1dc5c13612d848e41fcf56a1aa4\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/services\/knowledge-kompakt-360-industrial-security#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.phoenixcontact.com\/services\/knowledge-kompakt-360-industrial-security\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/services\/knowledge-kompakt-360-industrial-security#primaryimage\",\"url\":\"https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Header_Knowmore.jpg\",\"contentUrl\":\"https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Header_Knowmore.jpg\",\"width\":2126,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/services\/knowledge-kompakt-360-industrial-security#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/blog.phoenixcontact.com\/services\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Knowledge kompakt &#8211; 360\u00b0-Industrial-Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/services\/#website\",\"url\":\"https:\/\/blog.phoenixcontact.com\/services\/\",\"name\":\"PHOENIX CONTACT\",\"description\":\"Security -  Safety - CE\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.phoenixcontact.com\/services\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/services\/#\/schema\/person\/6baca1dc5c13612d848e41fcf56a1aa4\",\"name\":\"Kathrin Robert\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/services\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ad516503a11cd5ca435acc9bb6523536?s=96\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ad516503a11cd5ca435acc9bb6523536?s=96\",\"caption\":\"Kathrin Robert\"},\"url\":\"https:\/\/blog.phoenixcontact.com\/services\/author\/c5trzl\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Knowledge kompakt - 360\u00b0-Industrial-Security | Industrial Services von Phoenix Contact","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.phoenixcontact.com\/services\/knowledge-kompakt-360-industrial-security","og_locale":"de_DE","og_type":"article","og_title":"Knowledge kompakt - 360\u00b0-Industrial-Security | Industrial Services von Phoenix Contact","og_description":"Zentrales Security-Wissen f\u00fcr jedes Level &#8211; bleiben Sie up-to-date! Das Thema Industrial Security ist sehr komplex und vielschichtig. Erhalten Sie einen schnellen \u00dcberblick, welche Aspekte f\u00fcr Sie zentral sind, um Ihre Anlage ganzheitlich zu sch\u00fctzen. 360\u00b0-Industrial-Security-Wissen kompakt &#8211; direkt von unseren Expertinnen und Experten.","og_url":"https:\/\/blog.phoenixcontact.com\/services\/knowledge-kompakt-360-industrial-security","og_site_name":"Industrial Services von Phoenix Contact","article_published_time":"2021-08-27T10:16:36+00:00","article_modified_time":"2023-10-26T07:51:28+00:00","og_image":[{"url":"https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Header_Knowmore-1024x385.jpg","type":"","width":"","height":""}],"author":"Kathrin Robert","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Kathrin Robert","Gesch\u00e4tzte Lesezeit":"4\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blog.phoenixcontact.com\/services\/knowledge-kompakt-360-industrial-security","url":"https:\/\/blog.phoenixcontact.com\/services\/knowledge-kompakt-360-industrial-security","name":"Knowledge kompakt - 360\u00b0-Industrial-Security | Industrial Services von Phoenix Contact","isPartOf":{"@id":"https:\/\/blog.phoenixcontact.com\/services\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.phoenixcontact.com\/services\/knowledge-kompakt-360-industrial-security#primaryimage"},"image":{"@id":"https:\/\/blog.phoenixcontact.com\/services\/knowledge-kompakt-360-industrial-security#primaryimage"},"thumbnailUrl":"http:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Header_Knowmore-1024x385.jpg","datePublished":"2021-08-27T10:16:36+00:00","dateModified":"2023-10-26T07:51:28+00:00","author":{"@id":"https:\/\/blog.phoenixcontact.com\/services\/#\/schema\/person\/6baca1dc5c13612d848e41fcf56a1aa4"},"breadcrumb":{"@id":"https:\/\/blog.phoenixcontact.com\/services\/knowledge-kompakt-360-industrial-security#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.phoenixcontact.com\/services\/knowledge-kompakt-360-industrial-security"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/blog.phoenixcontact.com\/services\/knowledge-kompakt-360-industrial-security#primaryimage","url":"https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Header_Knowmore.jpg","contentUrl":"https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2021\/08\/00000000_Header_Knowmore.jpg","width":2126,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/blog.phoenixcontact.com\/services\/knowledge-kompakt-360-industrial-security#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/blog.phoenixcontact.com\/services"},{"@type":"ListItem","position":2,"name":"Knowledge kompakt &#8211; 360\u00b0-Industrial-Security"}]},{"@type":"WebSite","@id":"https:\/\/blog.phoenixcontact.com\/services\/#website","url":"https:\/\/blog.phoenixcontact.com\/services\/","name":"PHOENIX CONTACT","description":"Security -  Safety - CE","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.phoenixcontact.com\/services\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Person","@id":"https:\/\/blog.phoenixcontact.com\/services\/#\/schema\/person\/6baca1dc5c13612d848e41fcf56a1aa4","name":"Kathrin Robert","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/blog.phoenixcontact.com\/services\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ad516503a11cd5ca435acc9bb6523536?s=96","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad516503a11cd5ca435acc9bb6523536?s=96","caption":"Kathrin Robert"},"url":"https:\/\/blog.phoenixcontact.com\/services\/author\/c5trzl"}]}},"_links":{"self":[{"href":"https:\/\/blog.phoenixcontact.com\/services\/wp-json\/wp\/v2\/posts\/8610","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.phoenixcontact.com\/services\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.phoenixcontact.com\/services\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.phoenixcontact.com\/services\/wp-json\/wp\/v2\/users\/331"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.phoenixcontact.com\/services\/wp-json\/wp\/v2\/comments?post=8610"}],"version-history":[{"count":5,"href":"https:\/\/blog.phoenixcontact.com\/services\/wp-json\/wp\/v2\/posts\/8610\/revisions"}],"predecessor-version":[{"id":9852,"href":"https:\/\/blog.phoenixcontact.com\/services\/wp-json\/wp\/v2\/posts\/8610\/revisions\/9852"}],"wp:attachment":[{"href":"https:\/\/blog.phoenixcontact.com\/services\/wp-json\/wp\/v2\/media?parent=8610"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.phoenixcontact.com\/services\/wp-json\/wp\/v2\/categories?post=8610"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.phoenixcontact.com\/services\/wp-json\/wp\/v2\/tags?post=8610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}