• Products
  • Markets
  • IIoT & Solutions
  • Company
  • Resources
  • Supply Chain Software
  • my ifm
  1. moneo IIoT platform
  2. Cyber security

Cybersecurity

Cybersecurity is critical to the secure digitalization of industries, from on-premises machines to the cloud. The ifm group offers suitable products for the successful implementation of customer-specific digitalization strategies from sensors to the cloud. The security of your sensitive data is always a top priority. 

In close collaboration with customers and partners, we develop problem-oriented solutions, taking basic security requirements into account to ensure seamless integration into security concepts.

For our cloud-based application, ifm relies on a strong cloud service provider. Here, relevant decisions are systematically oriented towards security, implemented, monitored, and further developed. The security concept is based on established standards. In-house security measures are adapted from the provider’s basic functions to ensure an increased level of security.

The ifm data security framework

(Click on the figures to find out more)


Your data – your property

Who owns the data?

In accordance with the conditions set out in the General Terms and Conditions for the use of the cloud software, the customer remains the owner of the data. If ifm needs to access or process the customer’s data, it does so as a processor and follows the customer’s instructions for handling the data. Although ifm can support the customer with regard to the data, the customer still retains ownership and responsibility for their data in the moneo Cloud.

Where is your data?

The data in the moneo Cloud is stored in data centers provided by Microsoft. Microsoft Azure is a global cloud infrastructure provider, and ifm uses the data center services in Europe (Western Europe, Amsterdam) and the USA (East-US, Virginia) to ensure data storage and availability of the data stored in the moneo Cloud.
The customer decides where the data is stored and, therefore, which local regulatory and data protection requirements will apply.

ifm creates a secure connection
between the real and digital world

Our edge devices enable fast response times thanks to direct transmission. However, their direct positioning in the network also entails increased security requirements.

ifm strives to find a balance between flexibility and security. Regardless of the application provided, the following security measures are implemented:

  • Only essential IP ports are exposed
  • Hardened operating system environment with dedicated management system
  • TLS-secured communication
  • Separate interfaces for IT and OT connectivity
  • Standard security features including user rights management, backup, and recovery

Certificates and reports

We not only offer you first-class products, but also the trust you deserve. Learn more about our governance, sustainability efforts, and social responsibility. Explore sustainability reports and other documentation. 

➜ Reports, certificates, and portals

Get advice from our experts

Together we will make your project successful.

Ready to take the next step? Reach out to us. We’re here to guide you every step of the way. To meet your requirements, our ifm system sales team will support you right from the start with: ✔ Initial consultation ✔Development of individual software and hardware solutions ✔Implementation and support Together, we will make your project successful.