{}

브랜드

Impact-Company-Logo-English Black-01-177x54

슈나이더 일렉트릭 코리아 웹사이트에 방문해 주셔서 감사합니다.

슈나이더 일렉트릭 코리아 웹사이트 방문자 분들 모두 환영합니다.

FAQ 검색

How to find information on malware targeting products and systems

Issue:
Industrial Control Systems (ICS's) in asset owner environment may get compromised by malware and their variants

Product Line:
Internet-connected, Windows-based Human Machine Interfaces (HMI's)

Environment:
Industrial Control System Security Vulnerabilities

Cause:
Potential vulnerabilities or cyber incidents that may compromise the security of Industrial Control Systems.

Resolution:
Schneider Electric’s vulnerability management policy is to address cybersecurity vulnerabilities affecting Schneider Electric products and systems in order to support the security and safety of our installed solutions, protecting our customers and the environment. This policy is located at the following URL:

https://www.se.com/ww/en/download/document/Vuln_Mgmt_Policy/

All public notifications and postings relating to vulnerability management released by Schneider Electric are located here:

http://www2.schneider-electric.com/sites/corporate/en/support/cybersecurity/cybersecurity.page

You may see these notifications for information regarding the security vulnerabilities, affected products, and steps to assess the current state of your system following such incidents.




슈나이더 일렉트릭 Korea

자세히 알아보기
제품군
자세히 알아보기
제품군