Why finally safe? Requirements and Characteristics of Different Sectors



A breakdown can result in high costs and risks. The rising digitisation of industrial production leads to an increasing use of modern IT systems. This results in significant advantages for self-organized production, which enables not only the optimization of one production step but also entire value-added chains. Meanwhile, however, networking also increases the amount of attack vectors.

  • According to Bitkom, 69 percent of industrial companies in Germany were victims of data theft, espionage and sabotage in 2014 and 2015
  • According to VDMA, 70 percent of the companies are affected by product piracy

Water & Energy

The water and energy sectors are key components of the social order. Both areas combine conventional IT infrastructure with plant and process technology. Especially in the context of energy transition, innovative processes and technologies are increasingly being applied. These offer considerable opportunities for resource savings, but also lead to increased areas for attacks. The high number of decentralized and heterogeneous plants as well as their networking are particular challenges.



Digitalisation in public authorities is not only a future topic. Even today, IT systems are a central component of administration. This involves the treatment of citizen data, important government documents and sensitive health information. For public authorities, it is a particular challenge to ensure that they retain an overview of the complex and historically evolved structures. Despite existing security measures, even the smallest gaps can lead to successful attacks.

  • 58 percent of companies and agencies have been targeted by cyber attacks in the past two years

General Requirements

Successful attacks reduce productivity, violate corporate secrets and ultimately endanger the substance of the entire organization. Corresponding investments in IT security are a necessary condition for maintaining image, market position and competitiveness.

  • It takes an average of 243 days to detect targeted cyber espionage (Advanced Persistent Threats) (Source: BSI brochure 10/2016)

Receive self-learning and intelligent network-transparency