Skip to main content

Cybersecurity for your building infrastructure

Data-based solutions, cloud platforms, and IoT infrastructures are key to smart buildings. As building tech digitizes, cybersecurity becomes crucial. We offer diverse protection for your building technology, covering both OT and IT.

Taking effective cybersecurity measures

Many building operators underestimate the risk of a cyberattack on their building technology.
This is not just a matter of sensitive data being stolen. It is more about the loss of availability and the threat of manipulation of building technology systems, which can lead to significant economic damage or damage to reputation.

With the right security measures, it is possible to effectively protect vulnerable building technology.

Building Infrastructure Cybersecurity - Introduction - Cybersecurity

Our offer

Gap assessment in building technology

The increasing digitalization entails an elevated risk of cyberattacks on IT and OT systems.

Increased security for critical infrastructure

Building Infrastructure Cybersecurity - critical infrastructure - NIS2

Due to increasing cyberattacks, the EU has tightened two existing directives for the protection of critical infrastructure, obligating operators of critical infrastructure (KRITIS) to implement appropriate security measures for better protection of their digital systems.

In parallel with the "Resilience of Critical Facilities Act (RKEG)," which focuses on the physical security of critical infrastructure facilities and their supply chains and thus implements the EU CER Directive, the "Network and Information Systems Security Act 2024 (NISG 2024)" will implement the updated EU NIS 2 Directive for cybersecurity in Austria. The NIS 2 Directive is the most comprehensive European cybersecurity directive to date, affecting building technology and now extending to new critical infrastructure sectors, such as the food industry.

As one of the few providers, we offer solutions for both physical and cybersecurity that will help you meet the requirements of the NIS 2 Directive and the RKEG Directive.

It's not a question of when you'll be attacked, but when an attack will succeed. At Siemens, we have the corresponding know-how and potential to advise our customers individually and support them in the implementation.
Martin Krammer, Cybersecurity expert, Siemens Austria