- moneo IIoT platform
- Cyber security
Cyber security
Cyber security is critical to the secure digitalisation of industries, from on-premises machines to the cloud. The ifm group offers suitable products for the successful implementation of customer-specific digitalisation strategies. From sensors to the cloud. Always with the security of your sensitive data in mind!
In close collaboration with customers and partners, we develop problem-oriented solutions, taking basic security requirements into account to ensure seamless integration into security concepts.
For our cloud-based application, ifm relies on a strong cloud service provider. Here, relevant decisions are systematically oriented towards security, implemented, monitored and further developed. The security concept is based on established standards. In-house security measures are adapted from the provider’s basic functions to ensure a high level of security.
Your data – your property
Who owns the data?
In accordance with the conditions set out in the General Terms and Conditions for the use of the cloud software, the customer remains the owner of the data. If ifm needs to access or process the customer’s data, it does so as a processor and follows the customer’s instructions for handling the data. Although ifm can support the customer with regard to the data, the customer still retains ownership and responsibility for their data in the moneo Cloud.
Where is your data?
The data in the moneo Cloud is stored in data centres provided by Microsoft. Microsoft Azure is a global cloud infrastructure provider, and ifm uses the data centre services in Europe (Western Europe, Amsterdam) and the USA (East-US, Virginia) to ensure data storage and availability of the data stored in the moneo Cloud.
The customer decides where the data is stored and, therefore, which local regulatory and data protection requirements will apply.
ifm creates a secure connection
between the real and the digital worlds
Our edge devices enable fast response times thanks to direct transmission. However, their direct positioning in the network also entails increased security requirements.
ifm strives to find a balance between flexibility and security. Regardless of the application provided, the following security measures are implemented:
- Only essential IP ports are exposed
- Hardened operating system environment with dedicated management system
- TLS-secured communication
- Separate interfaces for IT and OT connectivity
- Standard security features including user rights management, backup and recovery
Certificates and reports
With our certified expertise, we not only offer you first-class products, but also the trust you deserve. Learn more about our certifications, sustainability efforts and social responsibility.