{"id":1954,"date":"2024-12-02T19:51:21","date_gmt":"2024-12-02T18:51:21","guid":{"rendered":"https:\/\/arcanix.at\/?page_id=1954"},"modified":"2024-12-04T14:44:57","modified_gmt":"2024-12-04T13:44:57","slug":"cyber-resilience-act","status":"publish","type":"page","link":"https:\/\/arcanix.at\/de\/cyber-resilience-act\/","title":{"rendered":"Cyber Resilience Act"},"content":{"rendered":"<div class=\"wp-block-uagb-container uagb-block-f3071285 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-4b802a1c uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-separator\"><\/div><div class=\"uagb-ifb-title-wrap\"><h1 class=\"uagb-ifb-title\">Cyber Resilience Act<\/h1><\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-b0bb5e83 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-layout-grid uagb-block-91379876\">\n<p>Der Cyber Resilience Act (CRA) bringt weitreichende \u00c4nderungen und Verpflichtungen f\u00fcr Unternehmen mit sich, insbesondere im Hinblick auf die Sicherheit ihrer digitalen Produkte und Dienstleistungen. Der CRA verlangt von Unternehmen nicht nur die Umsetzung von Sicherheitsstandards bei der Entwicklung ihrer IT-Produkte, sondern auch deren kontinuierliche Pflege und Sicherung durch regelm\u00e4\u00dfige Updates, die Sicherheitsl\u00fccken effizient schlie\u00dfen. ARCANIX hat speziell f\u00fcr Unternehmen eine passende Softwarel\u00f6sung, um die neuen gesetzlichen Anforderungen zu erf\u00fcllen.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Wer ist betroffen?<\/h2>\n\n\n\n<p>Der Cyber Resilience Act betrifft alle Unternehmen, die digitale Produkte, Software oder vernetzte Ger\u00e4te entwickeln, herstellen, importieren oder verkaufen. Dies schlie\u00dft Hersteller, Softwareentwickler, Importeure und H\u00e4ndler ein. Auch Dienstleister und Betreiber digitaler Plattformen sowie Unternehmen, die vernetzte Produkte nutzen, sind betroffen. Insbesondere f\u00fcr Hersteller von IoT-Ger\u00e4ten gelten strenge Anforderungen an die Sicherheit und regelm\u00e4\u00dfige Updates.<br>Die Nichteinhaltung dieser Vorgaben kann f\u00fcr Unternehmen gravierende Folgen haben \u2013 von Strafen \u00fcber Vertrauensverlust bei Kunden bis hin zu rechtlichen Konsequenzen bei Sicherheitsvorf\u00e4llen.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/digital-strategy.ec.europa.eu\/de\/policies\/cyber-resilience-act\">Weiter lesen<\/a><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Configuration Management als Schl\u00fcssel<\/h2>\n\n\n\n<p>Configuration Management ist ein zentraler Baustein f\u00fcr die erfolgreiche Umsetzung des Cyber Resilience Act, stellt Fabian Schopf von der Arcanix OG fest. Es erm\u00f6glicht Unternehmen, ihre IT-Infrastruktur und digitalen Produkte kontinuierlich zu \u00fcberwachen, zu steuern und sicherzustellen, dass jede \u00c4nderung kontrolliert und dokumentiert wird.<br><br>Durch ein solides Configuration Management k\u00f6nnen Unternehmen sicherstellen, dass alle eingesetzten Systeme und Software-Versionen stets konform mit den Sicherheitsanforderungen des CRA sind. Es reduziert Risiken, indem es erm\u00f6glicht, Schwachstellen schnell zu erkennen und gezielt zu beheben, und sorgt f\u00fcr die Nachverfolgbarkeit von \u00c4nderungen, was f\u00fcr Audits und Compliance unerl\u00e4sslich ist.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Over-the-Air-Updates: Ein Gamechanger f\u00fcr kontinuierliche Sicherheit<\/h2>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-d966b2df\">\n<p>Over-the-Air-Updates (OTA) revolutionieren die Art und Weise, wie digitale Produkte und Software sicher gehalten werden. Sie erm\u00f6glichen es Herstellern, Sicherheitsupdates und Fehlerbehebungen drahtlos und automatisch an Ger\u00e4te zu senden, ohne dass der Nutzer aktiv eingreifen muss. Im Kontext des Cyber Resilience Act sind OTA-Updates ein entscheidender Faktor, um die kontinuierliche Sicherheit von IT-Produkten zu gew\u00e4hrleisten.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-2 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/arcanix.at\/de\/over-the-air-updates\/\">Weiter lesen<\/a><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Vorteile und Herausforderungen von OTA-Updates<\/h2>\n\n\n\n<p>OTA-Updates erm\u00f6glichen eine kontinuierliche Sicherheit, indem Sicherheitsl\u00fccken schnell und automatisch geschlossen werden, ohne dass Nutzer aktiv eingreifen m\u00fcssen. Dabei wird auch die Wartung vereinfacht, da Updates zentral verwaltet werden k\u00f6nnen, was den Support f\u00fcr Hersteller und den Aufwand f\u00fcr Nutzer minimiert. Betreiber und Endkunden erh\u00f6hen damit ihre einer Kosteneffizienz, da physische Eingriffe oder manuelle Installationen entfallen.<\/p>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-2946d398 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-0427963c\">\n<p><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-a245855d\"><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-3e9f6878 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-1d303438\">\n<div class=\"wp-block-uagb-container uagb-block-780694b9\">\n<div class=\"wp-block-uagb-info-box uagb-block-606ceebc uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Haben wir Ihr Interesse geweckt?<\/h3><\/div><p class=\"uagb-ifb-desc\">Bitte kontaktieren Sie uns per Telefon oder E-Mail, wenn Sie mehr \u00fcber ARCANIX Configuration Management erfahren m\u00f6chten.<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-0ae8e13a\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-cb306a15 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/arcanix.at\/de\/contact\/\" rel=\"follow noopener\" target=\"_self\" role=\"button\"><div class=\"uagb-button__link\">Kontaktieren Sie uns<\/div><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-fa105855\">\n<div class=\"wp-block-uagb-image alignright uagb-block-cc81a440 wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-right\"><figure class=\"wp-block-uagb-image__figure\"><img loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/arcanix.at\/wp-content\/uploads\/2024\/07\/125032-1024x581.jpg ,https:\/\/arcanix.at\/wp-content\/uploads\/2024\/07\/125032.jpg 780w, https:\/\/arcanix.at\/wp-content\/uploads\/2024\/07\/125032.jpg 360w\" sizes=\"(max-width: 480px) 150px\" src=\"https:\/\/arcanix.at\/wp-content\/uploads\/2024\/07\/125032-1024x581.jpg\" alt=\"Contact us\" class=\"uag-image-1534\" width=\"1024\" height=\"581\" title=\"125032\" role=\"img\"\/><\/figure><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>The Cyber Resilience Act (CRA) entails far-reaching changes and obligations for companies, particularly with regard to the security of their digital products and services. The CRA requires companies not only to implement security standards when developing their IT products, but also to continuously maintain and secure them with regular updates that efficiently close security gaps. [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"unboxed","site-sidebar-style":"unboxed","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Resilience Act<\/title>\n<meta name=\"description\" content=\"ARCANIX Configuration Management ist ein moderner, graphenbasierter Ansatz f\u00fcr ein effizientes Configuration Management.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/arcanix.at\/de\/cyber-resilience-act\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Resilience Act\" \/>\n<meta property=\"og:description\" content=\"ARCANIX Configuration Management ist ein moderner, graphenbasierter Ansatz f\u00fcr ein effizientes Configuration Management.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/arcanix.at\/de\/cyber-resilience-act\/\" \/>\n<meta property=\"og:site_name\" content=\"ARCANIX\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-04T13:44:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/arcanix.at\/wp-content\/uploads\/2024\/07\/125032-1024x581.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/arcanix.at\/cyber-resilience-act\/\",\"url\":\"https:\/\/arcanix.at\/cyber-resilience-act\/\",\"name\":\"Cyber Resilience Act\",\"isPartOf\":{\"@id\":\"https:\/\/arcanix.at\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/arcanix.at\/cyber-resilience-act\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/arcanix.at\/cyber-resilience-act\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/arcanix.at\/wp-content\/uploads\/2024\/07\/125032-1024x581.jpg\",\"datePublished\":\"2024-12-02T18:51:21+00:00\",\"dateModified\":\"2024-12-04T13:44:57+00:00\",\"description\":\"ARCANIX Configuration Management ist ein moderner, graphenbasierter Ansatz f\u00fcr ein effizientes Configuration Management.\",\"breadcrumb\":{\"@id\":\"https:\/\/arcanix.at\/cyber-resilience-act\/#breadcrumb\"},\"inLanguage\":\"de-AT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/arcanix.at\/cyber-resilience-act\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-AT\",\"@id\":\"https:\/\/arcanix.at\/cyber-resilience-act\/#primaryimage\",\"url\":\"https:\/\/arcanix.at\/wp-content\/uploads\/2024\/07\/125032-1024x581.jpg\",\"contentUrl\":\"https:\/\/arcanix.at\/wp-content\/uploads\/2024\/07\/125032-1024x581.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/arcanix.at\/cyber-resilience-act\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/arcanix.at\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Resilience Act\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/arcanix.at\/#website\",\"url\":\"https:\/\/arcanix.at\/\",\"name\":\"ARCANIX\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/arcanix.at\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/arcanix.at\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-AT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/arcanix.at\/#organization\",\"name\":\"ARCANIX OG\",\"url\":\"https:\/\/arcanix.at\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-AT\",\"@id\":\"https:\/\/arcanix.at\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/arcanix.at\/wp-content\/uploads\/2024\/05\/Logo-2.png\",\"contentUrl\":\"https:\/\/arcanix.at\/wp-content\/uploads\/2024\/05\/Logo-2.png\",\"width\":297,\"height\":64,\"caption\":\"ARCANIX OG\"},\"image\":{\"@id\":\"https:\/\/arcanix.at\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Resilience Act","description":"ARCANIX Configuration Management ist ein moderner, graphenbasierter Ansatz f\u00fcr ein effizientes Configuration Management.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/arcanix.at\/de\/cyber-resilience-act\/","og_locale":"de_DE","og_type":"article","og_title":"Cyber Resilience Act","og_description":"ARCANIX Configuration Management ist ein moderner, graphenbasierter Ansatz f\u00fcr ein effizientes Configuration Management.","og_url":"https:\/\/arcanix.at\/de\/cyber-resilience-act\/","og_site_name":"ARCANIX","article_modified_time":"2024-12-04T13:44:57+00:00","og_image":[{"url":"https:\/\/arcanix.at\/wp-content\/uploads\/2024\/07\/125032-1024x581.jpg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/arcanix.at\/cyber-resilience-act\/","url":"https:\/\/arcanix.at\/cyber-resilience-act\/","name":"Cyber Resilience Act","isPartOf":{"@id":"https:\/\/arcanix.at\/#website"},"primaryImageOfPage":{"@id":"https:\/\/arcanix.at\/cyber-resilience-act\/#primaryimage"},"image":{"@id":"https:\/\/arcanix.at\/cyber-resilience-act\/#primaryimage"},"thumbnailUrl":"https:\/\/arcanix.at\/wp-content\/uploads\/2024\/07\/125032-1024x581.jpg","datePublished":"2024-12-02T18:51:21+00:00","dateModified":"2024-12-04T13:44:57+00:00","description":"ARCANIX Configuration Management ist ein moderner, graphenbasierter Ansatz f\u00fcr ein effizientes Configuration Management.","breadcrumb":{"@id":"https:\/\/arcanix.at\/cyber-resilience-act\/#breadcrumb"},"inLanguage":"de-AT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/arcanix.at\/cyber-resilience-act\/"]}]},{"@type":"ImageObject","inLanguage":"de-AT","@id":"https:\/\/arcanix.at\/cyber-resilience-act\/#primaryimage","url":"https:\/\/arcanix.at\/wp-content\/uploads\/2024\/07\/125032-1024x581.jpg","contentUrl":"https:\/\/arcanix.at\/wp-content\/uploads\/2024\/07\/125032-1024x581.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/arcanix.at\/cyber-resilience-act\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/arcanix.at\/"},{"@type":"ListItem","position":2,"name":"Cyber Resilience Act"}]},{"@type":"WebSite","@id":"https:\/\/arcanix.at\/#website","url":"https:\/\/arcanix.at\/","name":"ARCANIX","description":"","publisher":{"@id":"https:\/\/arcanix.at\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/arcanix.at\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-AT"},{"@type":"Organization","@id":"https:\/\/arcanix.at\/#organization","name":"ARCANIX OG","url":"https:\/\/arcanix.at\/","logo":{"@type":"ImageObject","inLanguage":"de-AT","@id":"https:\/\/arcanix.at\/#\/schema\/logo\/image\/","url":"https:\/\/arcanix.at\/wp-content\/uploads\/2024\/05\/Logo-2.png","contentUrl":"https:\/\/arcanix.at\/wp-content\/uploads\/2024\/05\/Logo-2.png","width":297,"height":64,"caption":"ARCANIX OG"},"image":{"@id":"https:\/\/arcanix.at\/#\/schema\/logo\/image\/"}}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"trp-custom-language-flag":false},"uagb_author_info":{"display_name":"admin","author_link":"https:\/\/arcanix.at\/de\/author\/admin\/"},"uagb_comment_info":0,"uagb_excerpt":"The Cyber Resilience Act (CRA) entails far-reaching changes and obligations for companies, particularly with regard to the security of their digital products and services. The CRA requires companies not only to implement security standards when developing their IT products, but also to continuously maintain and secure them with regular updates that efficiently close security gaps.&hellip;","_links":{"self":[{"href":"https:\/\/arcanix.at\/de\/wp-json\/wp\/v2\/pages\/1954"}],"collection":[{"href":"https:\/\/arcanix.at\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/arcanix.at\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/arcanix.at\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/arcanix.at\/de\/wp-json\/wp\/v2\/comments?post=1954"}],"version-history":[{"count":13,"href":"https:\/\/arcanix.at\/de\/wp-json\/wp\/v2\/pages\/1954\/revisions"}],"predecessor-version":[{"id":1975,"href":"https:\/\/arcanix.at\/de\/wp-json\/wp\/v2\/pages\/1954\/revisions\/1975"}],"wp:attachment":[{"href":"https:\/\/arcanix.at\/de\/wp-json\/wp\/v2\/media?parent=1954"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}