위치를 선택하십시오:

국가

Cybersecurity at KUKA 

At KUKA, we place great emphasis on cybersecurity, because protecting your systems is our top priority. IT security remains a continuous process that we drive forward for you.


Secure together: device security needs cybersecurity

At KUKA, we ensure the security of your devices, systems and information in two ways. On the one hand, our team of experts constantly investigates and addresses vulnerabilities to possible attacks and identifies potential threats.

On the other hand, we offer you the opportunity to protect yourself by providing you with security updates for the continuous maintenance of your digital system. In doing so, our team is always available to answer your questions and support you.

 

Do you have any concerns? We are always here to help.

Are you a KUKA customer with security concerns or questions about cybersecurity? Our Customer Service will be happy to help you. For particularly urgent questions, our technical telephone support is available 24/7.

Keep your IT security up to date

Our products are designed for a long life cycle. In order to keep them secure, it is important that you regularly inform yourself and apply updates.

Closing vulnerabilities: Get involved!

You are a security specialist yourself and have discovered a potential vulnerability in one of our systems? Then inform us about it as soon as possible. That way, we can initiate the necessary countermeasures quickly and in a targeted manner.


Use KUKA's vulnerability reporting process

In the event of a potential security vulnerability in one of our products or services, we ask you first to maintain absolute confidentiality. KUKA's Product Security Incidence Response Team (PSIRT) will deal with your report immediately. Here's how to proceed in the event of a security-related discovery:

  • Detect vulnerability

    • Do not download, modify or delete the third party data in case of vulnerability

    • Do not carry out any attacks

    • Do not gain access to other systems

  • Report via email

  • What we need

    • IP address/URL of the affected service or in the case of products
    • Product name and version
    • Detailed problem description for better reproducibility
    • In case of more complex problems we will contact you
  • During the test

    • Do not make the problem public until the vulnerability is fixed
    • Keep the discovery absolutely confidential

이 웹사이트에서는 온라인에서도 최고의 서비스를 제공하기 위해 쿠키(상세 정보)를 사용하고 있습니다. 이 웹사이트를 계속 이용하시는 경우 기술적으로 필요한 쿠키만이 사용됩니다. “OK 및 KUKA 알아보기”를 클릭하시면 귀하는 추가적으로 마케팅 쿠키의 사용에 동의하시게 됩니다. “쿠키 설정” 클릭 한 번으로 귀하가 허용하실 쿠키를 선택할 수 있습니다.

쿠키 설정