…ask for a note. Upon notification of violations, we will remove such content immediately. The ondeso wordmark and the ondeso logo are registered for ondeso GmbH with the E.U. Intellectual Property Office (EUIPO). Other product and company names mentioned, as well as illustrations or methods are trademarks, registered trademarks or…
https://www.ondeso.com/en/imprint/
…after all it works and often performs its tasks reliably for decades. However, if a problem occurs, the entire production line is usually at a complete standstill for a long time, causing immense costs. So is the saying “Never change a running system” still relevant? Should the installed base be…
https://www.ondeso.com/en/article/podcast-patch-management/
…practically every production facility, these must also be maintained and updated. But who is actually responsible for this? In this video, ondeso COO Peter Lukesch explains that the interaction between OT and IT, i. e. between maintenance staff and IT administrators, is the key. Using the analog twins Karl and…
https://www.ondeso.com/en/article/maintainer-vs-admin/
…permitted remote connections or open USB ports, and verify those against compliance specifications and subsequently consolidate them. What’s needed is a consistent, industry and manufacturer independent management console as provided by ondeso SR. This solution not only allows you to recognize immediately deviations, but also to react quickly and above…
https://www.ondeso.com/en/solutions/by-challenge/client-status-security/
Each year we participate in numerous events and conferences. Whether on a trade fair or an online event – our experts will gladly introduce you to our products and answer your questions.  Overview of the current events of ondeso: October 08 – 11, 2024 – Motek, Stuttgart…
https://www.ondeso.com/en/article/experience-ondeso-live/
Indeed, backups and restores are crucial for ransomware protection, as they offer the possibility of restoring data after an infection. They serve as an effective countermeasure against blackmail attempts and help to get affected systems back up and running quickly. Implement regular backups and restores with ondeso SR according to…
https://www.ondeso.com/en/ot-security-tools/ot-cyber-security/ransomware-protection/
Nowadays, the tremendous significance of a secure IT operation in production, manufacturing and infrastructure systems cannot be denied – and the responsible managers increasingly adapt their actions to this necessity. This applies to facility operators as well as to machine and plant manufacturers. Different production processes, the exceedingly high heterogeneity…
https://www.ondeso.com/en/solutions/by-market/
In the case of a cyberattack, it is very important to know which parts of the network are affected. For this purpose, it is first of all necessary to know which systems are actually in use and to know the current version and configuration of all existing computer systems and…
https://www.ondeso.com/en/article/podcast-asset-management/
…ESU program) Close USB and RDP interfaces Capture installed software Distribute third-party software, e.g. whitelisting tools Implement hardening measures, e.g. adjust configurations, uninstall software or deactivate services  You can make statements about the status of the OT clients at any time and are able to analyse the utilization rate….
https://www.ondeso.com/en/ot-endpoint-management/industrial-it-workflow-automation/software-end-of-life-management/
…functionality, both regarding the high availability of the devices and also regarding compliance with security and safety guidelines, even after updates and of course in compliance with the manufacturer’s clearance. To achieve this, it is not only necessary to determine deviations from the specifications by the software or operating system…
https://www.ondeso.com/en/solutions/by-challenge/software-update-distribution/