{"id":9389,"date":"2025-10-22T10:26:37","date_gmt":"2025-10-22T10:26:37","guid":{"rendered":"https:\/\/partnerinfo.siemens.at\/sicher-ist-das-neue-smart\/"},"modified":"2025-12-03T12:17:49","modified_gmt":"2025-12-03T12:17:49","slug":"safe-is-the-new-smart","status":"publish","type":"post","link":"https:\/\/partnerinfo.siemens.at\/en\/safe-is-the-new-smart\/","title":{"rendered":"Safe is the new smart"},"content":{"rendered":"\n<p>In an era in which digitization, connectivity and automation form the cornerstones of modern industries, the requirements for protecting critical infrastructures are constantly increasing. Companies are increasingly faced with the challenge of designing and operating their IT and OT landscapes (including building and security technology) not only in a high-performance manner, but also in a cyber secure manner. Asset and Vulnerability Management (AVM) is becoming an indispensable discipline for gaining transparency with regard to existing investments, systematically identifying weak points and establishing preventive measures.&nbsp;<\/p>\n\n\n\n<p>The aim is not only to minimize known risks, but also to meet regulatory requirements and best practices required by national and international institutions. The corporate landscape is changing \u2014 and with it, the methods to ensure sustainable security, compliance, and resilience.&nbsp;<\/p>\n\n\n\n<p><strong>NIS and NIS-2: regulatory requirements and challenges The <\/strong><br>\u201cNIS\u201d Directive (\u201cNetwork and Information Security Directive\u201d) was introduced by the European Union in 2016 to create a common level of security for network and information systems in the member states. NIS-2, the revised version of the Directive, further tightens these requirements and extends them to additional sectors and companies. The aim is to avoid supply security disruptions and significantly increase the reliability of critical infrastructures.&nbsp;<\/p>\n\n\n\n<p>Companies that fall under the scope of NIS\/NIS-2 are required to take appropriate technical and organizational measures to minimize risks to the security of their systems and data. In particular, this includes the complete inventory of all assets, continuous vulnerability analysis and the timely elimination of identified risks. In the event of security incidents, there is an obligation to report them to the competent authorities within defined time limits.&nbsp;<\/p>\n\n\n\n<p>With the implementation of the NIS 2 Directive, there is growing pressure on companies to professionalize their cybersecurity structures and gain a comprehensive overview of the entire IT and OT landscape. Asset and vulnerability management is thus becoming an operational and strategic necessity.&nbsp;<\/p>\n\n\n\n<p><strong>Why is asset and vulnerability management so important?<\/strong><br> Building or security technology consists primarily of mature systems with an age of up to 20 years or more. With these \u201cold\u201d systems, the focus was on building automation and stable operation. Cyber attacks were not an issue back then, but they are currently becoming ever more sophisticated, attack points more diverse and the attack surface is exponentially larger as a result of increasing networking. In this context, knowledge of a company&#8217;s own hardware and software components and their weak points is the cornerstone of any effective security strategy. Asset management lays the foundation by recording, categorizing and evaluating all systems, devices, and applications. Only then can priorities be set and resources used efficiently.<\/p>\n\n\n\n<p>Vulnerability Management complements this approach by continuously identifying vulnerabilities, evaluating their criticality and recommending countermeasures. This is the only way to proactively close potential attack routes before they can be exploited by cyber criminals. An effective AVM strategy therefore forms the backbone of holistic risk management. It maximizes the resilience of the company, improves compliance with regulatory requirements and provides a clear competitive advantage through increased security and trustworthiness.<\/p>\n\n\n \n <div class=\"ste-brightcove-video-block\" data-ste-video-title=\"Smart Building Cybersecurity\">\n      \n         <video-js\n             data-account=\"1813624294001\"\n             data-player=\"VMi7Ptd8P\"\n             data-embed=\"default\"\n             controls\n             data-video-id=\"6371915416112\"\n             width=\"1400\"\n             height=\"600\"\n             title=\"Smart Building Cybersecurity\"\n         ><\/video-js>\n \n         <script src=\"https:\/\/players.brightcove.net\/1813624294001\/VMi7Ptd8P_default\/index.min.js\"><\/script>\n \n          \n      <\/div>\n\n\n\n\n<div class=\"wp-block-acf-highlights\" >\n  \n      <div class=\"highlights-content\">\n      <h3><b>The Siemens AVR\/AVM Solution: A Comprehensive Approach to OT Cybersecurity<\/b><\/h3>\n<p><strong>\u00a0Siemens offers a modular and scalable Asset and Vulnerability Reporting (AVR) and Management (AVM) service, providing a practical approach to cybersecurity in IT and OT environments, especially in building and security technology.<\/strong><\/p>\n<p>\u2022 <strong>\u00a0Transparency and Clarity:<\/strong> Automated detection of all relevant IT and OT assets across network segments. Integration with existing IT systems (CMDBs, AD, NAC) provides a consolidated, up-to-date asset overview and informed risk assessments.<\/p>\n<p>\u2022 \u00a0<strong>Continuous Vulnerability Analysis:<\/strong> Customized scanning technologies for OT environments and a constantly updated vulnerability database enable rapid identification and remediation of critical security gaps.<\/p>\n<p>\u2022 \u00a0<strong>Compliance Reporting and Dashboards:<\/strong> Flexible creation of compliance reports and customizable dashboards provide KPIs for straightforward, audit-proof fulfillment of regulatory requirements.<\/p>\n<p>\u2022 \u00a0<strong>Scalability and Integration:<\/strong> Flexible deployment for organizations of any size. Open architecture allows seamless integration into existing security and management systems, minimizing effort while maximizing value.<\/p>\n<p>\u2022 \u00a0<strong>Practical Added Value:<\/strong> High degree of automation and focus on critical assets\/vulnerabilities allow for targeted resource use, shorter response times, and increased overall security. The solution measurably improves compliance and operational resilience, ensures business continuity, and strengthens trust.<b>\u00a0<\/b><\/p>\n    <\/div>\n  \n<\/div><style class=\"advgb-styles-renderer\">\n  \n  .wp-block-acf-highlights {\n    padding: 2.5%;\n    background: #1d91be;\n  }\n  \n  .highlights-content, .highlights-content p, .highlights-content p strong, .highlights-content b  {\n    color: white !important;\n  }\n  \n  .highlights-content {\n    font-family: \"Siemens Serif\";\n    font-size: 22px;\n    line-height: 36px;\n    font-weight: 400;\n    margin-bottom: 45px;\n  }\n  \n  .highlights-content h1, .highlights-content h2, .highlights-content h3 {\n    font-weight: bold;\n  }\n  \n  .highlights-content p:last-of-type {\n    margin-bottom: 0;\n  }\n  \n<\/style>","protected":false},"excerpt":{"rendered":"<p>In an era in which digitization, connectivity and automation form the cornerstones of modern industries, the requirements for protecting critical infrastructures are constantly increasing. Companies are increasingly faced with the challenge of designing and operating their IT and OT landscapes (including building and security technology) not only in a high-performance manner, but also in a cyber secure manner. Asset and Vulnerability Management (AVM) is becoming an indispensable discipline for gaining transparency with regard to existing investments, systematically identifying weak points and establishing preventive measures.&nbsp; The aim is not only to minimize known risks, but also to meet regulatory requirements and\u2026<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":""},"categories":[164],"tags":[162,163],"class_list":["post-9389","post","type-post","status-publish","format-standard","hentry","category-herbst-2025","tag-digitale-transformation","tag-nachhaltigkeit"],"acf":{"meta_description":""},"author_meta":{"display_name":"Siemens","author_link":"https:\/\/partnerinfo.siemens.at\/en\/author\/siemens\/"},"featured_img":null,"coauthors":[],"tax_additional":{"categories":{"linked":["<a href=\"https:\/\/partnerinfo.siemens.at\/en\/category\/herbst-2025\/\" class=\"advgb-post-tax-term\">Herbst 2025<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">Herbst 2025<\/span>"]},"tags":{"linked":["<a href=\"https:\/\/partnerinfo.siemens.at\/en\/category\/herbst-2025\/\" class=\"advgb-post-tax-term\">Digitale Transformation<\/a>","<a href=\"https:\/\/partnerinfo.siemens.at\/en\/category\/herbst-2025\/\" class=\"advgb-post-tax-term\">Nachhaltigkeit<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">Digitale Transformation<\/span>","<span class=\"advgb-post-tax-term\">Nachhaltigkeit<\/span>"]}},"comment_count":0,"relative_dates":{"created":"Posted 6 months ago","modified":"Updated 5 months ago"},"absolute_dates":{"created":"Posted on 22\/10\/2025","modified":"Updated on 03\/12\/2025"},"absolute_dates_time":{"created":"Posted on 22\/10\/2025 10:26","modified":"Updated on 03\/12\/2025 12:17"},"featured_img_caption":"","series_order":"","_links":{"self":[{"href":"https:\/\/partnerinfo.siemens.at\/en\/wp-json\/wp\/v2\/posts\/9389","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/partnerinfo.siemens.at\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/partnerinfo.siemens.at\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/partnerinfo.siemens.at\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/partnerinfo.siemens.at\/en\/wp-json\/wp\/v2\/comments?post=9389"}],"version-history":[{"count":0,"href":"https:\/\/partnerinfo.siemens.at\/en\/wp-json\/wp\/v2\/posts\/9389\/revisions"}],"wp:attachment":[{"href":"https:\/\/partnerinfo.siemens.at\/en\/wp-json\/wp\/v2\/media?parent=9389"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/partnerinfo.siemens.at\/en\/wp-json\/wp\/v2\/categories?post=9389"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/partnerinfo.siemens.at\/en\/wp-json\/wp\/v2\/tags?post=9389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}