new.siemens.com Open in urlscan Pro
2600:9000:21f3:b800:0:f128:fd00:93a1  Public Scan

Submitted URL: https://app.response.siemens.com/e/er?s=2033604275&lid=27134&elqTrackId=ED3D0F9C80F18F47D3EABA75C5BC938C&elq=b471337282324c1abe45...
Effective URL: https://new.siemens.com/us/en/products/buildingtechnologies/automation/building-cybersecurity.html?stc=ussi100903
Submission: On October 13 via api from US — Scanned from NL

Form analysis 4 forms found in the DOM

GET

<form class="search__form" data-screen="desktop" method="get" autocomplete="off">
  <input id="search__input_desktop" class="search__input" type="text" name="q" placeholder="Search">
  <button class="search__reset icon-close" aria-label="Clear" type="reset" hidden=""></button>
  <button class="search__submit icon-search" type="submit">Search</button>
</form>

GET

<form class="search__form" data-screen="mobile" method="get" autocomplete="off">
  <input id="search__input_mobile" class="search__input" type="text" name="q" placeholder="Search">
  <button class="search__reset icon-close" aria-label="Clear" type="reset" hidden=""></button>
  <button class="search__submit" type="submit">Search</button>
</form>

GET

<form class="search__form" data-screen="desktop" method="get" autocomplete="off">
  <input id="search__input_desktop" class="search__input" type="text" name="q" placeholder="Search">
  <button class="search__reset icon-close" aria-label="Clear" type="reset" hidden=""></button>
  <button class="search__submit icon-search" type="submit">Search</button>
</form>

GET

<form class="search__form" data-screen="mobile" method="get" autocomplete="off">
  <input id="search__input_mobile" class="search__input" type="text" name="q" placeholder="Search">
  <button class="search__reset icon-close" aria-label="Clear" type="reset" hidden=""></button>
  <button class="search__submit" type="submit">Search</button>
</form>

Text Content

 * Skip to content
 * Skip to main navigation
 * Skip to global navigation (country selector, search)
 * Skip to footer

home
 * Products & Services
 * Market-specific Solutions
 * Company

Contact Us USA
USA


Go to Siemens Global Website

English


Siemens in your country/region

Search/Type country
 * Algeria
 * Angola
 * Argentina
 * Australia
 * Austria
 * Azerbaijan
 * Bahrain
 * Bangladesh
 * Belarus
 * Belgium
 * Bolivia
 * Bosnia and Herzegovina
 * Brasil
 * Bulgaria
 * Cambodia
 * Canada
 * Chile
 * China
 * Colombia
 * Costa Rica
 * Croatia
 * Cyprus
 * Czech Republic
 * Denmark
 * Dominican Republic
 * Ecuador
 * Egypt
 * El Salvador
 * Estonia
 * Ethiopia
 * Finland
 * France
 * Georgia
 * Germany
 * Ghana
 * Greece
 * Guatemala
 * Honduras
 * Hong Kong, China
 * Hungary
 * India
 * Indonesia
 * Intranet
 * Iran
 * Iraq
 * Ireland
 * Israel
 * Italy
 * Ivory Coast
 * Japan
 * Kazakhstan
 * Kenya
 * Korea
 * Kosovo
 * Kuwait
 * Latvia
 * Lesotho
 * Lithuania
 * Luxembourg
 * Malawi
 * Malaysia
 * MEA
 * Mexico
 * Montenegro
 * Morocco
 * Mozambique
 * Myanmar
 * Netherlands
 * New Zealand
 * Nicaragua
 * Nigeria
 * North Macedonia
 * Norway
 * Oman
 * Pakistan
 * Panama
 * Peru
 * Philippines
 * Poland
 * Portugal
 * Qatar
 * Romania
 * Russia
 * Saudi Arabia
 * Serbia
 * Singapore
 * Slovakia
 * Slovenia
 * South Africa
 * Spain
 * Sudan
 * Sweden
 * Switzerland
 * Taiwan, China
 * Tanzania
 * Thailand
 * Tunisia
 * Turkey
 * UAE
 * Uganda
 * Ukraine
 * United Kingdom
 * Uruguay
 * USA
 * Uzbekistan
 * Venezuela
 * Vietnam

Search


Search


Contact us

Siemens USA

 * Products & Services
 * Market-specific Solutions
 * Company



Search


Search

USA


Go to Siemens Global Website

English


Siemens in your country/region

Search/Type country
 * Algeria
 * Angola
 * Argentina
 * Australia
 * Austria
 * Azerbaijan
 * Bahrain
 * Bangladesh
 * Belarus
 * Belgium
 * Bolivia
 * Bosnia and Herzegovina
 * Brasil
 * Bulgaria
 * Cambodia
 * Canada
 * Chile
 * China
 * Colombia
 * Costa Rica
 * Croatia
 * Cyprus
 * Czech Republic
 * Denmark
 * Dominican Republic
 * Ecuador
 * Egypt
 * El Salvador
 * Estonia
 * Ethiopia
 * Finland
 * France
 * Georgia
 * Germany
 * Ghana
 * Greece
 * Guatemala
 * Honduras
 * Hong Kong, China
 * Hungary
 * India
 * Indonesia
 * Intranet
 * Iran
 * Iraq
 * Ireland
 * Israel
 * Italy
 * Ivory Coast
 * Japan
 * Kazakhstan
 * Kenya
 * Korea
 * Kosovo
 * Kuwait
 * Latvia
 * Lesotho
 * Lithuania
 * Luxembourg
 * Malawi
 * Malaysia
 * MEA
 * Mexico
 * Montenegro
 * Morocco
 * Mozambique
 * Myanmar
 * Netherlands
 * New Zealand
 * Nicaragua
 * Nigeria
 * North Macedonia
 * Norway
 * Oman
 * Pakistan
 * Panama
 * Peru
 * Philippines
 * Poland
 * Portugal
 * Qatar
 * Romania
 * Russia
 * Saudi Arabia
 * Serbia
 * Singapore
 * Slovakia
 * Slovenia
 * South Africa
 * Spain
 * Sudan
 * Sweden
 * Switzerland
 * Taiwan, China
 * Tanzania
 * Thailand
 * Tunisia
 * Turkey
 * UAE
 * Uganda
 * Ukraine
 * United Kingdom
 * Uruguay
 * USA
 * Uzbekistan
 * Venezuela
 * Vietnam

 1. home
    Products & Services
    Market-specific Solutions
    Company

 2. Products & Services
    Digital Business Platform
    Building Technologies
    Drive Technology
    Energy
    Financing
    Healthineers
    Automation
    Mobility
    Services
    Software

 3. Building Technologies
    About Us
    Building Automation and Control Systems
    Building X
    Energy and Sustainability
    Fire and Life Safety
    HVAC Products
    Market Focus
    Partners and Ecosystems
    Security
    Services
    SI Academy
    Smart Buildings
    Trends and Topics

 4. Building Automation and Control Systems
    Building Cybersecurity
    Building Operator
    Consulting Services
    ConnectX Cloud Gateways
    Controllers and Extension I/O
    Critical Environments
    Desigo CC
    Desigo Optic
    Desigo Control Point
    Desigo DXR
    Desigo Room Operation Units
    GAMMA Lighting
    Healthy & Productive Buildings

 5. Building Cybersecurity
    


BUILDING CYBERSECURITY

Enhance your building security and protect your infrastructure Operational
Technology (OT) with our holistic solutions and expertise.


Contact us






DON'T LET YOUR BUILDING GET HACKED

Cyber threats against smart buildings are on the rise. 38 percent of smart
buildings have been impacted by a cyberattack (source: Kaspersky report). In
most of these events, hackers gained access by taking advantage of
vulnerabilities in the building automation system. The adoption of smart
building technology that connects building Operational Technology to IT systems
and IoT devices has exponentially increased buildings’ exposure to cyber
criminals. It's time to get more security conscious. Building designers, owners,
and operators need to develop strategies that strengthen building automation
system security to avoid getting hacked. Siemens offers holistic solutions with
a key focus on closing gaps in building automation network protocols to
strengthen building cybersecurity.
Slide 1 of 6



STEPS TO REINFORCE YOUR BUILDING'S CYBERSECURITY

Understanding a smart building's management systems and security features is an
important step in preventing and mitigating the risks of cyberattacks. With the
proper cybersecurity strategy, products, as well as training you can impove your
building security and be more resilient in the growing landscape of cyber
threats. Flip through to review key steps you can take.



‹›
Slide 4 of 6



UNDERSTAND SYSTEM CONFIGURATION AND USAGE

Take a holistic approach that considers critical security controls like network
segmentation and segregation, boundary protections, remote access, least
privilege, accountability and firewall rules. Owners and operators should
understand how these security features are applied. Documentation from
integrators and other third-parties should also be required to show what they
have done to ensure systems are configured appropriately to support an overall
building cybersecurity strategy that is aligned with the enterprise architecture
and information security policy framework.



Slide 5 of 6



PROVIDE TRAINING

People are the first line of defense against cyberattacks. Continuous training
will help keep cybersecurity top of mind and prepare anyone who connects to the
building network to follow best practices for preventing malicious access.
Training is also essential to prevent unintentional damage caused by employees
who are unaware of the proper use and operation of systems and equipment.



Slide 6 of 6



IMPLEMENT A DISASTER RECOVERY PLAN

Organizations that have a strong backup process are able to mitigate damage and
recover from cyberattacks faster.  A strong plan should address roles and
responsibilities, list assigned personnel and their contact information, and
detail activities associated with responding to and restoring system operations
after a disruption or failure. A recovery plan is only effective if it is
operational, so organizations should periodically exercise these plans to ensure
the system can be recovered within the specified Recovery Time Objective and
Recovery Point Objective.



Slide 1 of 6



STEPS TO REINFORCE YOUR BUILDING'S CYBERSECURITY

Understanding a smart building's management systems and security features is an
important step in preventing and mitigating the risks of cyberattacks. With the
proper cybersecurity strategy, products, as well as training you can impove your
building security and be more resilient in the growing landscape of cyber
threats. Flip through to review key steps you can take.



CloseMore
Slide 2 of 6



CREATE A SECURITY CULTURE

Everyone connected to an organization should be accountable for keeping it
secure. Cybercriminals will find and exploit any potential attack point in a
building system’s defense. Companies that create a culture of cybersecurity
awareness, with strong policies that promote best practices and continual
security training, can effectively reduce their risk of a cyberattack.   




CloseMore
Slide 3 of 6



THINK LIKE A HACKER

The best defense against cyberattacks is a good offense. A threat and risk
assessment that approaches cybersecurity from a hacker’s perspective is a useful
tool to identify and resolve vulnerabilities, and help organizations stay one
step ahead of cybercriminals. Staging a mock attack against the building
security infrastructure, or partnering with Siemens to perform a cybersecurity
assessment, will uncover and verify potential access paths and provide proof
points to justify additional security infrastructure investments.



CloseMore
Slide 4 of 6



UNDERSTAND SYSTEM CONFIGURATION AND USAGE

Take a holistic approach that considers critical security controls like network
segmentation and segregation, boundary protections, remote access, least
privilege, accountability and firewall rules. Owners and operators should
understand how these security features are applied. Documentation from
integrators and other third-parties should also be required to show what they
have done to ensure systems are configured appropriately to support an overall
building cybersecurity strategy that is aligned with the enterprise architecture
and information security policy framework.



CloseMore
Slide 5 of 6



PROVIDE TRAINING

People are the first line of defense against cyberattacks. Continuous training
will help keep cybersecurity top of mind and prepare anyone who connects to the
building network to follow best practices for preventing malicious access.
Training is also essential to prevent unintentional damage caused by employees
who are unaware of the proper use and operation of systems and equipment.



CloseMore
Slide 6 of 6



IMPLEMENT A DISASTER RECOVERY PLAN

Organizations that have a strong backup process are able to mitigate damage and
recover from cyberattacks faster.  A strong plan should address roles and
responsibilities, list assigned personnel and their contact information, and
detail activities associated with responding to and restoring system operations
after a disruption or failure. A recovery plan is only effective if it is
operational, so organizations should periodically exercise these plans to ensure
the system can be recovered within the specified Recovery Time Objective and
Recovery Point Objective.



CloseMore
Slide 1 of 6



STEPS TO REINFORCE YOUR BUILDING'S CYBERSECURITY

Understanding a smart building's management systems and security features is an
important step in preventing and mitigating the risks of cyberattacks. With the
proper cybersecurity strategy, products, as well as training you can impove your
building security and be more resilient in the growing landscape of cyber
threats. Flip through to review key steps you can take.



Slide 2 of 6



CREATE A SECURITY CULTURE

Everyone connected to an organization should be accountable for keeping it
secure. Cybercriminals will find and exploit any potential attack point in a
building system’s defense. Companies that create a culture of cybersecurity
awareness, with strong policies that promote best practices and continual
security training, can effectively reduce their risk of a cyberattack.   




Slide 3 of 6



THINK LIKE A HACKER

The best defense against cyberattacks is a good offense. A threat and risk
assessment that approaches cybersecurity from a hacker’s perspective is a useful
tool to identify and resolve vulnerabilities, and help organizations stay one
step ahead of cybercriminals. Staging a mock attack against the building
security infrastructure, or partnering with Siemens to perform a cybersecurity
assessment, will uncover and verify potential access paths and provide proof
points to justify additional security infrastructure investments.






BRIDGING THE CYBERSECURITY GAP IN BUILDINGS

This e-book provides an overview of the key steps building stakeholders can
leverage to build a cybersecurity strategy. Each chapter includes important
considerations at various stages of implementation. Learn how you can improve
your smart building cybersecurity today.

Download e-book


CONVERGING IT AND OT FOR SMARTER BUILDINGS

Slide 1 of 1

‹›

Slide 1 of 1

Slide 1 of 1

Slide 1 of 1

Slide 1 of 1

Slide 1 of 1



The convergence of technologies is not a new concept, but it is evolving and
making its way through the technology stack. Advances in technology enable the
digital information environment to monitor, analyze, and influence the physical
operational environment. Historically, IT and OT have occupied entirely separate
domains and shared little or no meaningful data or control. Even though they
both use IP connected equipment, IT and OT devices do not behave exactly the
same on the network. More than ever before, successful business outcomes and
environmental objectives depend on the convergence of IT and OT, and the demand
for “smarter buildings” is bringing the two domains together

CloseMore
OT Network Security


THE NEW STANDARD IN CYBERSECURITY – BACNET SECURE CONNECT

BACnet, the leading building automation protocol, has released a new data link,
BACnet/SC, as part of the standard. BACnet/SC brings cybersecurity and IT
acceptance to Operational Technology (OT) networks. It adds an encryption layer
to communication and requires device authentication using certificates, which
makes OT networks less vulnerable to cyberattacks.

ARTICLES, BROCHURES AND WHITEPAPERS:

Click the list below to discover ways you can utilize BACnet/SC in your
building.

 * BACnet/SC Brochure
 * BACnet/SC Whitepaper
 * BACnet/SC e-book
 * BACnet/SC – making building technologies as secure as internet banking

CloseMore


SOLUTIONS TO STRENGTHEN YOUR BUILDING'S CYBERSECURITY

Siemens comprehensive building automation and control systems are the are the
benchmark for building cybersecurity. We provide an industry-first, complete
BACnet/SC solution to enhance your facility's cybersecurity.

BUILDING AUTOMATION CONTROLLERS

Our controllers are designed with              interoperability and adaptability
in mind. Siemens controller solutions grow with your needs and ensure your
building        remains secure with advanced                   cybersecurity
features like BACnet/SC.

DESIGO CC

Desigo CC sets industry standards for  building management systems and enables
facilities to be comfortable, safe efficient and cybersecure. With BACnet/SC   
      compliance, Desigo CC can securely     manage your building's critical
infrastructure.


SIEMENS CAN HELP SECURE YOUR BUILDING

We can help you conduct a cybersecurity assessment of your current
infrastructure, configuration and identify any security issues to address, and
provide suggestions to improve building cybersecurity. Learn more about how you
can leverage our expertise by scheduling your assessment today.

Request an Assessment


BUILDING CYBERSECURITY RESOURCES

Cybersecurity is a moving target. What is safe and secure today may not be
tomorrow. This is especially true for building technologies. Today’s building
market trends, such as IoT, cloud connection and IT/OT network convergence, put
the need for cybersecurity front and center. No longer just the concern of IT
professionals, cyber threats can impact anyone in the building automation
industry. Reference the quick list of resources below for further information.

BROCHURES AND WHITEPAPERS

 * BACnet/SC Brochure
 * BACnet/SC Whitepaper

ARTICLES

 * BACnet Secure Connect – making building technologies as secure as internet
   banking
 * Cybersecurity Blogs
 * Cybersecurity e-book
 * Siemens approach to cybersecurity
 * The top five trends shaping cybersecurity in smart buildings
 * 7 ways to boost cyber resilience in the smart building industry

VIDEOS

 * Cybersecurity: Areas of application
 * Cybersecurity challenges in buildings
 * Top 5 trends shaping cybersecurity in smart buildings
 * Webinar replay: Establish Cyber Resilience to Protect your Smart Buildings
   from Threats

PODCASTS

 * Episode 22. Reducing cyber risk in buildings
 * Episode 34. Cybersecurity guidelines and norms for buildings
 * Episode 75. The different features of BACnet Secure Connect





PAGE FOOTER


PRODUCTS & SERVICES

Digital Business Platform Building Technologies Drive Technology Energy
Financing Healthineers Automation Mobility Services Software
 * Digital Business Platform
 * Building Technologies
 * Drive Technology
 * Energy
 * Financing
 * Healthineers
 * Automation
 * Mobility
 * Services
 * Software

Market-specific Solutions


MARKET-SPECIFIC SOLUTIONS

Aerospace Airports Automotive Battery Manufacturing Cement Chemicals Commercial
Real Estate Cranes Data Centers Electronics industry Food and beverage industry
Glass industry Intralogistics Life Science Machine Building Mining industry
Municipalities and DSOs Oil and Gas Industry Panel Building Pulp & Paper
Pharmaceutical Industry Tire manufacturing Transportation and Logistics Water
Industry Wind Equipment
 * Aerospace
 * Airports
 * Automotive
 * Battery Manufacturing
 * Cement
 * Chemicals
 * Commercial Real Estate
 * Cranes
 * Data Centers
 * Electronics industry
 * Food and beverage industry
 * Glass industry
 * Intralogistics
 * Life Science
 * Machine Building
 * Mining industry
 * Municipalities and DSOs
 * Oil and Gas Industry
 * Panel Building
 * Pulp & Paper
 * Pharmaceutical Industry
 * Tire manufacturing
 * Transportation and Logistics
 * Water Industry
 * Wind Equipment


COMPANY

Acting on the Bipartisan Infrastructure Law Newsroom Jobs & Careers About us
Environmental, Social and Governance (ESG) Innovation Investor Relations Siemens
in the USA Topic Areas Sales & Distributor locator
 * Acting on the Bipartisan Infrastructure Law
 * Newsroom
 * Jobs & Careers
 * About us
 * Environmental, Social and Governance (ESG)
 * Innovation
 * Investor Relations
 * Siemens in the USA
 * Topic Areas
 * Sales & Distributor locator


CONTACT US

Contact Us


FOLLOW OUR GLOBAL CHANNELS

Siemens USA © Siemens 1996 - 2022


LEGAL NAVIGATION

 * Corporate Information
 * Privacy Notice
 * Cookie Notice
 * Terms of Use
 * Digital ID


 * 

PLEASE ALLOW JAVASCRIPT

This page requires JavaScript in order to be fully functional and displayed
correctly. Please enable JavaScript and reload the site.

How to enable JavaScript



PLEASE USE ANOTHER BROWSER

It looks like you are using a browser that is not fully supported. Please note
that there might be constraints on site display and usability. For the best
experience we suggest that you download the newest version of a supported
browser: