{"id":93127,"date":"2018-02-15T12:00:00","date_gmt":"2018-02-15T12:00:00","guid":{"rendered":"https:\/\/industry-science.com\/artikel\/separate-networks-for-greater-information-security\/"},"modified":"2018-02-15T12:00:00","modified_gmt":"2018-02-15T12:00:00","slug":"separate-networks-for-greater-information-security","status":"publish","type":"article","link":"https:\/\/industry-science.com\/en\/articles\/separate-networks-for-greater-information-security\/","title":{"rendered":"Separate Networks for Greater Information Security"},"content":{"rendered":"<p><!-- GITO PUB shortened content start --><\/p>\n<div class=\"gito-pub-frontend-post-protected\"><\/div>\n<p><!-- GITO PUB shortened content end --><\/p>\n<div style=\"display:block;text-align:center !important;margin:30px 0;\">\n<div style=\"display:inline-block;border:1px solid #555;padding:10px;max-width:600px;text-align:left;\">\n<h2 class=\"gito-pub-download-section\"><center>Access limited<\/center><\/h2>\n<p>You are currently <strong>not logged in \/ not yet registered<\/strong>.<\/p>\n<p>In order to download the desired file(s), you must be logged in and have an appropriate inclusive subscription. Alternatively, you can also obtain access by paying a one-off fee.<\/p>\n<div style=\"text-align:center;\">\n<table style=\"width:90% !important;margin-left:5% !important;\">\n<thead>\n<tr>\n<th>Subscription<\/th>\n<th style=\"text-align:center !important;\">included<\/th>\n<th style=\"text-align:right;\">Purchase<\/th>\n<tr><\/thead>\n<tbody>\n<tr>\n<td>without<\/td>\n<td style=\"text-align:center !important;\">&#8722;<\/td>\n<td style=\"text-align:right;\">29,00 \u20ac<\/td>\n<tr>\n<tr>\n<td>Digital<\/td>\n<td style=\"text-align:center !important;\">&#8722;<\/td>\n<td style=\"text-align:right;\">27,55 \u20ac<\/td>\n<tr>\n<tr>\n<td>Expert<\/td>\n<td style=\"text-align:center !important;\">&#8722;<\/td>\n<td style=\"text-align:right;\">26,10 \u20ac<\/td>\n<tr>\n<tr>\n<td>Professional<\/td>\n<td style=\"text-align:center !important;\"><span style=\"color:var(--company-color);font-weight:bold;font-size:16px;\">&#10003;<\/span><\/td>\n<td style=\"text-align:right;\">0,00 \u20ac<\/td>\n<tr><\/tbody>\n<\/table>\n<p><button style=\"font-size:14px;margin:10px;\" class=\"button gito-pub-login-register-link gito-pub-reporting-abo-button\" data-targetabo=\"professional\" data-targeturl=\"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/article\/93127\/\" data-type=\"abo-button-login\">Register \/ book subscription<\/button><a href=\"https:\/\/industry-science.com\/en\/checkout\/?add-to-cart=93127&#038;quantity=1\" style=\"font-size:14px;margin:10px;\" class=\"button gito-pub-reporting-abo-button\" data-type=\"abo-button-onetime\">Download for one time 29,00 \u20ac<\/a><\/p>\n<p><small>All prices include 7% VAT<\/small><\/p>\n<p><small>After purchasing access rights, you will automatically be redirected back to this page.<\/small><\/p>\n<\/div>\n<\/div>\n<\/div>\n<br>Potentials: <span class=\"gito-pub-tag-element\"><a href=\"\/potentials\/leadership\/\">Leadership<\/a><\/span> <div class=\"gito-pub-tags-social-share\" style=\"display:flex;justify-content:space-between;\"><div>Tags: <span class=\"gito-pub-tag-element\"><a href=\"\/tag\/information-security\/\">information security<\/a><\/span> <span class=\"gito-pub-tag-element\"><a href=\"\/tag\/iot-connection\/\">IoT connection<\/a><\/span> <span class=\"gito-pub-tag-element\"><a href=\"\/tag\/protective-layer\/\">protective layer<\/a><\/span> <span class=\"gito-pub-tag-element\"><a href=\"\/tag\/sigfox\/\">Sigfox<\/a><\/span> <span class=\"gito-pub-tag-element\"><a href=\"\/tag\/system-intrinsic-security\/\">system intrinsic security<\/a><\/span> <\/div><div><div class=\"social-icons share-icons share-row relative\" ><a href=\"whatsapp:\/\/send?text=Separate%20Networks%20for%20Greater%20Information%20Security - https:\/\/industry-science.com\/en\/articles\/separate-networks-for-greater-information-security\/\" data-action=\"share\/whatsapp\/share\" class=\"icon button circle is-outline tooltip whatsapp show-for-medium\" title=\"Share on WhatsApp\" aria-label=\"Share on WhatsApp\"><i class=\"icon-whatsapp\" aria-hidden=\"true\"><\/i><\/a><a href=\"https:\/\/www.facebook.com\/sharer.php?u=https:\/\/industry-science.com\/en\/articles\/separate-networks-for-greater-information-security\/\" data-label=\"Facebook\" onclick=\"window.open(this.href,this.title,'width=500,height=500,top=300px,left=300px'); return false;\" target=\"_blank\" class=\"icon button circle is-outline tooltip facebook\" title=\"Share on Facebook\" aria-label=\"Share on Facebook\" rel=\"noopener nofollow\"><i class=\"icon-facebook\" aria-hidden=\"true\"><\/i><\/a><a href=\"https:\/\/x.com\/share?url=https:\/\/industry-science.com\/en\/articles\/separate-networks-for-greater-information-security\/\" onclick=\"window.open(this.href,this.title,'width=500,height=500,top=300px,left=300px'); return false;\" target=\"_blank\" class=\"icon button circle is-outline tooltip x\" title=\"Share on X\" aria-label=\"Share on X\" rel=\"noopener nofollow\"><i class=\"icon-x\" aria-hidden=\"true\"><\/i><\/a><a href=\"mailto:?subject=Separate%20Networks%20for%20Greater%20Information%20Security&body=Check%20this%20out%3A%20https%3A%2F%2Findustry-science.com%2Fen%2Farticles%2Fseparate-networks-for-greater-information-security%2F\" class=\"icon button circle is-outline tooltip email\" title=\"Email to a Friend\" aria-label=\"Email to a Friend\" rel=\"nofollow\"><i class=\"icon-envelop\" aria-hidden=\"true\"><\/i><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&url=https:\/\/industry-science.com\/en\/articles\/separate-networks-for-greater-information-security\/&title=Separate%20Networks%20for%20Greater%20Information%20Security\" onclick=\"window.open(this.href,this.title,'width=500,height=500,top=300px,left=300px'); return false;\" target=\"_blank\" class=\"icon button circle is-outline tooltip linkedin\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" rel=\"noopener nofollow\"><i class=\"icon-linkedin\" aria-hidden=\"true\"><\/i><\/a><\/div><\/div><\/div><hr style=\"margin-top:0px;\">\n","protected":false},"excerpt":{"rendered":"<p>Information security on the Internet is a key challenge. Each IoT connected device is exposed to potential manipulation and interference. Therefore, companies are looking for solutions to minimize their data risks. Sigfox offers a dedicated network for data collection and transfer that serves as a protective layer between the devices and the cloud app. Sigfox devices do not communicate over the Internet and yet their big data reaches the cloud. The network ensures very high system-intrinsic security, which is ideal for industrial application scenarios.<\/p>\n","protected":false},"featured_media":96485,"menu_order":0,"template":"","categories":[],"tags":[76098,76298,76299,76295,76300],"product_cat":[3300],"topic":[],"technology":[],"knowhow":[],"industry":[],"writer":[82807],"content-type":[],"potential":[67877],"solution":[],"glossary":[],"class_list":{"0":"post-93127","1":"article","2":"type-article","3":"status-publish","4":"has-post-thumbnail","6":"tag-information-security","7":"tag-iot-connection","8":"tag-protective-layer","9":"tag-sigfox","10":"tag-system-intrinsic-security","11":"product_cat-article","12":"writer-aurelius-wosylus-en","13":"potential-leadership","14":"product","15":"first","16":"instock","17":"downloadable","18":"virtual","19":"sold-individually","20":"taxable","21":"purchasable","22":"product-type-article"},"uagb_featured_image_src":{"full":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/wosylus-Informationssicherheit-durch-eigenes-Funknetz_IM_2018-1-1400x788.jpg",1400,788,false],"thumbnail":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/wosylus-Informationssicherheit-durch-eigenes-Funknetz_IM_2018-1-1400x788-150x150.jpg",150,150,true],"medium":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/wosylus-Informationssicherheit-durch-eigenes-Funknetz_IM_2018-1-1400x788-666x375.jpg",666,375,true],"medium_large":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/wosylus-Informationssicherheit-durch-eigenes-Funknetz_IM_2018-1-1400x788-768x432.jpg",768,432,true],"large":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/wosylus-Informationssicherheit-durch-eigenes-Funknetz_IM_2018-1-1400x788-1024x576.jpg",1020,574,true],"front-page-entry":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/wosylus-Informationssicherheit-durch-eigenes-Funknetz_IM_2018-1-1400x788-1032x320.jpg",1032,320,true],"post-entry":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/wosylus-Informationssicherheit-durch-eigenes-Funknetz_IM_2018-1-1400x788-764x376.jpg",764,376,true],"post-teaser":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/wosylus-Informationssicherheit-durch-eigenes-Funknetz_IM_2018-1-1400x788-392x320.jpg",392,320,true],"post-teaser-mobile":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/wosylus-Informationssicherheit-durch-eigenes-Funknetz_IM_2018-1-1400x788-608x496.jpg",608,496,true],"post-custom-size":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/wosylus-Informationssicherheit-durch-eigenes-Funknetz_IM_2018-1-1400x788-640x325.jpg",640,325,true],"whitepaper-teaser":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/wosylus-Informationssicherheit-durch-eigenes-Funknetz_IM_2018-1-1400x788-274x376.jpg",274,376,true],"card-big":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/wosylus-Informationssicherheit-durch-eigenes-Funknetz_IM_2018-1-1400x788-514x292.jpg",514,292,true],"card-portrait":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/wosylus-Informationssicherheit-durch-eigenes-Funknetz_IM_2018-1-1400x788-320x440.jpg",320,440,true],"card-big-company":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/wosylus-Informationssicherheit-durch-eigenes-Funknetz_IM_2018-1-1400x788-514x289.jpg",514,289,true],"gp-listing":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/wosylus-Informationssicherheit-durch-eigenes-Funknetz_IM_2018-1-1400x788-196x180.jpg",196,180,true],"1536x1536":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/wosylus-Informationssicherheit-durch-eigenes-Funknetz_IM_2018-1-1400x788.jpg",1400,788,false],"2048x2048":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/wosylus-Informationssicherheit-durch-eigenes-Funknetz_IM_2018-1-1400x788.jpg",1400,788,false],"woocommerce_thumbnail":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/wosylus-Informationssicherheit-durch-eigenes-Funknetz_IM_2018-1-1400x788-510x510.jpg",510,510,true],"woocommerce_single":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/wosylus-Informationssicherheit-durch-eigenes-Funknetz_IM_2018-1-1400x788-510x287.jpg",510,287,true],"woocommerce_gallery_thumbnail":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/wosylus-Informationssicherheit-durch-eigenes-Funknetz_IM_2018-1-1400x788-100x100.jpg",100,100,true],"dgwt-wcas-product-suggestion":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/wosylus-Informationssicherheit-durch-eigenes-Funknetz_IM_2018-1-1400x788-64x36.jpg",64,36,true]},"uagb_author_info":{"display_name":"Christoph Brocks","author_link":"https:\/\/industry-science.com\/en\/author\/"},"uagb_comment_info":0,"uagb_excerpt":"Information security on the Internet is a key challenge. Each IoT connected device is exposed to potential manipulation and interference. Therefore, companies are looking for solutions to minimize their data risks. Sigfox offers a dedicated network for data collection and transfer that serves as a protective layer between the devices and the cloud app. Sigfox&hellip;","_links":{"self":[{"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/article\/93127","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/article"}],"about":[{"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/types\/article"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/media\/96485"}],"wp:attachment":[{"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/media?parent=93127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/categories?post=93127"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/tags?post=93127"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/product_cat?post=93127"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/topic?post=93127"},{"taxonomy":"technology","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/technology?post=93127"},{"taxonomy":"knowhow","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/knowhow?post=93127"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/industry?post=93127"},{"taxonomy":"writer","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/writer?post=93127"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/content-type?post=93127"},{"taxonomy":"potential","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/potential?post=93127"},{"taxonomy":"solution","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/solution?post=93127"},{"taxonomy":"glossary","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/glossary?post=93127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}