{"id":93115,"date":"2018-02-15T12:00:00","date_gmt":"2018-02-15T12:00:00","guid":{"rendered":"https:\/\/industry-science.com\/artikel\/toolbox-evolution-the-maturity-of-industrial-security-methods\/"},"modified":"2018-02-15T12:00:00","modified_gmt":"2018-02-15T12:00:00","slug":"toolbox-evolution-the-maturity-of-industrial-security-methods","status":"publish","type":"article","link":"https:\/\/industry-science.com\/en\/articles\/toolbox-evolution-the-maturity-of-industrial-security-methods\/","title":{"rendered":"Toolbox Evolution &#8211; The Maturity of Industrial Security Methods"},"content":{"rendered":"<p><!-- GITO PUB shortened content start --><\/p>\n<div class=\"gito-pub-frontend-post-protected\"><\/div>\n<p><!-- GITO PUB shortened content end --><\/p>\n<div style=\"display:block;text-align:center !important;margin:30px 0;\">\n<div style=\"display:inline-block;border:1px solid #555;padding:10px;max-width:600px;text-align:left;\">\n<h2 class=\"gito-pub-download-section\"><center>Access limited<\/center><\/h2>\n<p>You are currently <strong>not logged in \/ not yet registered<\/strong>.<\/p>\n<p>In order to download the desired file(s), you must be logged in and have an appropriate inclusive subscription. Alternatively, you can also obtain access by paying a one-off fee.<\/p>\n<div style=\"text-align:center;\">\n<table style=\"width:90% !important;margin-left:5% !important;\">\n<thead>\n<tr>\n<th>Subscription<\/th>\n<th style=\"text-align:center !important;\">included<\/th>\n<th style=\"text-align:right;\">Purchase<\/th>\n<tr><\/thead>\n<tbody>\n<tr>\n<td>without<\/td>\n<td style=\"text-align:center !important;\">&#8722;<\/td>\n<td style=\"text-align:right;\">29,00 \u20ac<\/td>\n<tr>\n<tr>\n<td>Digital<\/td>\n<td style=\"text-align:center !important;\">&#8722;<\/td>\n<td style=\"text-align:right;\">27,55 \u20ac<\/td>\n<tr>\n<tr>\n<td>Expert<\/td>\n<td style=\"text-align:center !important;\">&#8722;<\/td>\n<td style=\"text-align:right;\">26,10 \u20ac<\/td>\n<tr>\n<tr>\n<td>Professional<\/td>\n<td style=\"text-align:center !important;\"><span style=\"color:var(--company-color);font-weight:bold;font-size:16px;\">&#10003;<\/span><\/td>\n<td style=\"text-align:right;\">0,00 \u20ac<\/td>\n<tr><\/tbody>\n<\/table>\n<p><button style=\"font-size:14px;margin:10px;\" class=\"button gito-pub-login-register-link gito-pub-reporting-abo-button\" data-targetabo=\"professional\" data-targeturl=\"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/article\/93115\/\" data-type=\"abo-button-login\">Register \/ book subscription<\/button><a href=\"https:\/\/industry-science.com\/en\/checkout\/?add-to-cart=93115&#038;quantity=1\" style=\"font-size:14px;margin:10px;\" class=\"button gito-pub-reporting-abo-button\" data-type=\"abo-button-onetime\">Download for one time 29,00 \u20ac<\/a><\/p>\n<p><small>All prices include 7% VAT<\/small><\/p>\n<p><small>After purchasing access rights, you will automatically be redirected back to this page.<\/small><\/p>\n<\/div>\n<\/div>\n<\/div>\n<br>Potentials: <span class=\"gito-pub-tag-element\"><a href=\"\/potentials\/profitability\/\">Profitability<\/a><\/span> <div class=\"gito-pub-tags-social-share\" style=\"display:flex;justify-content:space-between;\"><div>Tags: <span class=\"gito-pub-tag-element\"><a href=\"\/tag\/fractalization\/\">fractalization<\/a><\/span> <span class=\"gito-pub-tag-element\"><a href=\"\/tag\/ics\/\">ICS<\/a><\/span> <span class=\"gito-pub-tag-element\"><a href=\"\/tag\/iec-62443\/\">IEC 62443<\/a><\/span> <span class=\"gito-pub-tag-element\"><a href=\"\/tag\/maturity-level\/\">maturity level<\/a><\/span> <span class=\"gito-pub-tag-element\"><a href=\"\/tag\/security-level\/\">Security-Level<\/a><\/span> <span class=\"gito-pub-tag-element\"><a href=\"\/tag\/security-standards\/\">Security-Standards<\/a><\/span> <\/div><div><div class=\"social-icons share-icons share-row relative\" ><a href=\"whatsapp:\/\/send?text=Toolbox%20Evolution%20%26%238211%3B%20The%20Maturity%20of%20Industrial%20Security%20Methods - https:\/\/industry-science.com\/en\/articles\/toolbox-evolution-the-maturity-of-industrial-security-methods\/\" data-action=\"share\/whatsapp\/share\" class=\"icon button circle is-outline tooltip whatsapp show-for-medium\" title=\"Share on WhatsApp\" aria-label=\"Share on WhatsApp\"><i class=\"icon-whatsapp\" aria-hidden=\"true\"><\/i><\/a><a href=\"https:\/\/www.facebook.com\/sharer.php?u=https:\/\/industry-science.com\/en\/articles\/toolbox-evolution-the-maturity-of-industrial-security-methods\/\" data-label=\"Facebook\" onclick=\"window.open(this.href,this.title,'width=500,height=500,top=300px,left=300px'); return false;\" target=\"_blank\" class=\"icon button circle is-outline tooltip facebook\" title=\"Share on Facebook\" aria-label=\"Share on Facebook\" rel=\"noopener nofollow\"><i class=\"icon-facebook\" aria-hidden=\"true\"><\/i><\/a><a href=\"https:\/\/x.com\/share?url=https:\/\/industry-science.com\/en\/articles\/toolbox-evolution-the-maturity-of-industrial-security-methods\/\" onclick=\"window.open(this.href,this.title,'width=500,height=500,top=300px,left=300px'); return false;\" target=\"_blank\" class=\"icon button circle is-outline tooltip x\" title=\"Share on X\" aria-label=\"Share on X\" rel=\"noopener nofollow\"><i class=\"icon-x\" aria-hidden=\"true\"><\/i><\/a><a href=\"mailto:?subject=Toolbox%20Evolution%20%26%238211%3B%20The%20Maturity%20of%20Industrial%20Security%20Methods&body=Check%20this%20out%3A%20https%3A%2F%2Findustry-science.com%2Fen%2Farticles%2Ftoolbox-evolution-the-maturity-of-industrial-security-methods%2F\" class=\"icon button circle is-outline tooltip email\" title=\"Email to a Friend\" aria-label=\"Email to a Friend\" rel=\"nofollow\"><i class=\"icon-envelop\" aria-hidden=\"true\"><\/i><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&url=https:\/\/industry-science.com\/en\/articles\/toolbox-evolution-the-maturity-of-industrial-security-methods\/&title=Toolbox%20Evolution%20%26%238211%3B%20The%20Maturity%20of%20Industrial%20Security%20Methods\" onclick=\"window.open(this.href,this.title,'width=500,height=500,top=300px,left=300px'); return false;\" target=\"_blank\" class=\"icon button circle is-outline tooltip linkedin\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" rel=\"noopener nofollow\"><i class=\"icon-linkedin\" aria-hidden=\"true\"><\/i><\/a><\/div><\/div><\/div><hr style=\"margin-top:0px;\">\n","protected":false},"excerpt":{"rendered":"<p>After a delayed start, in the last years OT security has substantially caught up with IT security. Many technical IT security controls are also available for machines and plants. But the maturity distribution in the field of OT is more complex and fragmented, as shown in the present article. Certain fundamental issues and contradictions of IT security become particularly obvious here and might need to be solved within OT security.<\/p>\n","protected":false},"featured_media":96479,"menu_order":0,"template":"","categories":[],"tags":[76286,76281,76283,72908,76284,76282],"product_cat":[3300],"topic":[],"technology":[],"knowhow":[],"industry":[],"writer":[82804,82803],"content-type":[],"potential":[67658],"solution":[],"glossary":[],"class_list":{"0":"post-93115","1":"article","2":"type-article","3":"status-publish","4":"has-post-thumbnail","6":"tag-fractalization","7":"tag-ics","8":"tag-iec-62443","9":"tag-maturity-level","10":"tag-security-level","11":"tag-security-standards","12":"product_cat-article","13":"writer-david-fuhr-en","14":"writer-timo-kob-en","15":"potential-profitability","16":"product","17":"first","18":"instock","19":"downloadable","20":"virtual","21":"sold-individually","22":"taxable","23":"purchasable","24":"product-type-article"},"uagb_featured_image_src":{"full":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/kob-Evolution-derWerkzeugkiste_IM_2018-1-1400x788.jpg",1400,788,false],"thumbnail":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/kob-Evolution-derWerkzeugkiste_IM_2018-1-1400x788-150x150.jpg",150,150,true],"medium":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/kob-Evolution-derWerkzeugkiste_IM_2018-1-1400x788-666x375.jpg",666,375,true],"medium_large":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/kob-Evolution-derWerkzeugkiste_IM_2018-1-1400x788-768x432.jpg",768,432,true],"large":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/kob-Evolution-derWerkzeugkiste_IM_2018-1-1400x788-1024x576.jpg",1020,574,true],"front-page-entry":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/kob-Evolution-derWerkzeugkiste_IM_2018-1-1400x788-1032x320.jpg",1032,320,true],"post-entry":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/kob-Evolution-derWerkzeugkiste_IM_2018-1-1400x788-764x376.jpg",764,376,true],"post-teaser":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/kob-Evolution-derWerkzeugkiste_IM_2018-1-1400x788-392x320.jpg",392,320,true],"post-teaser-mobile":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/kob-Evolution-derWerkzeugkiste_IM_2018-1-1400x788-608x496.jpg",608,496,true],"post-custom-size":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/kob-Evolution-derWerkzeugkiste_IM_2018-1-1400x788-640x325.jpg",640,325,true],"whitepaper-teaser":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/kob-Evolution-derWerkzeugkiste_IM_2018-1-1400x788-274x376.jpg",274,376,true],"card-big":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/kob-Evolution-derWerkzeugkiste_IM_2018-1-1400x788-514x292.jpg",514,292,true],"card-portrait":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/kob-Evolution-derWerkzeugkiste_IM_2018-1-1400x788-320x440.jpg",320,440,true],"card-big-company":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/kob-Evolution-derWerkzeugkiste_IM_2018-1-1400x788-514x289.jpg",514,289,true],"gp-listing":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/kob-Evolution-derWerkzeugkiste_IM_2018-1-1400x788-196x180.jpg",196,180,true],"1536x1536":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/kob-Evolution-derWerkzeugkiste_IM_2018-1-1400x788.jpg",1400,788,false],"2048x2048":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/kob-Evolution-derWerkzeugkiste_IM_2018-1-1400x788.jpg",1400,788,false],"woocommerce_thumbnail":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/kob-Evolution-derWerkzeugkiste_IM_2018-1-1400x788-510x510.jpg",510,510,true],"woocommerce_single":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/kob-Evolution-derWerkzeugkiste_IM_2018-1-1400x788-510x287.jpg",510,287,true],"woocommerce_gallery_thumbnail":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/kob-Evolution-derWerkzeugkiste_IM_2018-1-1400x788-100x100.jpg",100,100,true],"dgwt-wcas-product-suggestion":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/kob-Evolution-derWerkzeugkiste_IM_2018-1-1400x788-64x36.jpg",64,36,true]},"uagb_author_info":{"display_name":"Christoph Brocks","author_link":"https:\/\/industry-science.com\/en\/author\/"},"uagb_comment_info":0,"uagb_excerpt":"After a delayed start, in the last years OT security has substantially caught up with IT security. Many technical IT security controls are also available for machines and plants. But the maturity distribution in the field of OT is more complex and fragmented, as shown in the present article. Certain fundamental issues and contradictions of&hellip;","_links":{"self":[{"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/article\/93115","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/article"}],"about":[{"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/types\/article"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/media\/96479"}],"wp:attachment":[{"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/media?parent=93115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/categories?post=93115"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/tags?post=93115"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/product_cat?post=93115"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/topic?post=93115"},{"taxonomy":"technology","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/technology?post=93115"},{"taxonomy":"knowhow","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/knowhow?post=93115"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/industry?post=93115"},{"taxonomy":"writer","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/writer?post=93115"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/content-type?post=93115"},{"taxonomy":"potential","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/potential?post=93115"},{"taxonomy":"solution","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/solution?post=93115"},{"taxonomy":"glossary","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/glossary?post=93115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}