You probably do not come from: United Kingdom. If necessary, change to: United States
Service hotline 0208 213 2222
  1. moneo IIoT platform
  2. Cyber security

Cyber security

Cyber security is critical to the secure digitalisation of industries, from on-premises machines to the cloud. The ifm group offers suitable products for the successful implementation of customer-specific digitalisation strategies. From sensors to the cloud. Always with the security of your sensitive data in mind!

In close collaboration with customers and partners, we develop problem-oriented solutions, taking basic security requirements into account to ensure seamless integration into security concepts.

For our cloud-based application, ifm relies on a strong cloud service provider. Here, relevant decisions are systematically oriented towards security, implemented, monitored and further developed. The security concept is based on established standards. In-house security measures are adapted from the provider’s basic functions to ensure a high level of security.

The ifm security concept for your data

(Click on the figures to find out more)


Your data – your property

Who owns the data?

In accordance with the conditions set out in the General Terms and Conditions for the use of the cloud software, the customer remains the owner of the data. If ifm needs to access or process the customer’s data, it does so as a processor and follows the customer’s instructions for handling the data. Although ifm can support the customer with regard to the data, the customer still retains ownership and responsibility for their data in the moneo Cloud.

Where is your data?

The data in the moneo Cloud is stored in data centres provided by Microsoft. Microsoft Azure is a global cloud infrastructure provider, and ifm uses the data centre services in Europe (Western Europe, Amsterdam) and the USA (East-US, Virginia) to ensure data storage and availability of the data stored in the moneo Cloud.
The customer decides where the data is stored and, therefore, which local regulatory and data protection requirements will apply.

ifm creates a secure connection
between the real and the digital worlds

Our edge devices enable fast response times thanks to direct transmission. However, their direct positioning in the network also entails increased security requirements.

ifm strives to find a balance between flexibility and security. Regardless of the application provided, the following security measures are implemented:

  • Only essential IP ports are exposed
  • Hardened operating system environment with dedicated management system
  • TLS-secured communication
  • Separate interfaces for IT and OT connectivity
  • Standard security features including user rights management, backup and recovery

Certificates and reports

With our certified expertise, we not only offer you first-class products, but also the trust you deserve. Learn more about our certifications, sustainability efforts and social responsibility.

➜ Reports, certificates and portals

Get advice from our experts

Together we will make your project successful.

Convinced? Just get in touch. We will accompany you on your way. To meet your requirements, our ifm system sales team will support you right from the start - ranging from strategic consulting to the development of individual software and hardware solutions and the corresponding implementation and further services.