{"id":11198,"date":"2022-06-07T12:00:39","date_gmt":"2022-06-07T10:00:39","guid":{"rendered":"https:\/\/cosh.de\/?p=11198"},"modified":"2022-07-26T12:28:10","modified_gmt":"2022-07-26T10:28:10","slug":"network-security-network-segementation-for-securing-iot-devices","status":"publish","type":"post","link":"https:\/\/cosh.de\/en\/network-security-network-segementation-for-securing-iot-devices\/","title":{"rendered":"Network Security &#8211; Network Segementation for Securing IOT Devices"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p>&#8220;The Internet of Things&#8221; (IoT) is unstoppable. More and more devices are becoming packed with technology and smart. However, there are many security gaps, especially in the area of building technology. Due to poorly secured and structured networks, attacks on infrastructures are on the rise. Statista predicts more than 75 billion connected devices by 2025. A study by Paloalto Networks shows it: 98 percent of IoT data traffic is handled unencrypted, making it interesting for cyber attacks. Printers and surveillance cameras also count as IoT devices. The security vulnerabilities in such devices are the ideal gateway for cybercriminals. The devices themselves are usually of no interest to them &#8211; they serve as door openers to access other IT systems in the company. Basically, anything connected to the Internet is at risk. In particular, control and regulation systems of building technology systems are among the most popular targets of attack. In any case, one thing is (in)certain: the more the Internet of Things and its IoT devices gain importance in companies, the higher the risk that these devices will be misused for criminal actions. Unfortunately, search engines like shodan.io can be used to locate network devices and open ports worldwide.<\/p>\n<p><b>Network segments as secure separation between IoT and corporate network<\/b><\/p>\n<p>First, what is network segmentation anyway? Here, the corporate network is divided into individual areas to ensure greater IT security and better administration options. Consequently, IoT devices should definitely be outsourced to their own network. IT security experts recommend strict separation between the &#8220;normal&#8221; corporate network and that of the IoT devices. This way, employees&#8217; computers are isolated in a separate network and cannot be attacked via cameras, printers, doorbell systems, etc. Likewise, of course, the other way around: employee computers cannot be used as a springboard to attack IoT devices. The connection between the network segments is kept as low as possible. You probably know this from WLAN networks. Companies often have guest networks that are completely isolated from the internal network and are specially secured. As a rule, networks should be segmented according to the company&#8217;s criteria and security requirements. Particularly in industrial operations and Industry 4.0, entire production lines need to be safeguarded.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"1200\" height=\"600\" title=\"network\" src=\"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/network.png\" data-orig-src=\"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/network.png\" alt class=\"lazyload img-responsive wp-image-9182\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%271200%27%20height%3D%27600%27%20viewBox%3D%270%200%201200%20600%27%3E%3Crect%20width%3D%271200%27%20height%3D%27600%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/network-200x100.png 200w, https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/network-400x200.png 400w, https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/network-600x300.png 600w, https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/network-800x400.png 800w, https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/network.png 1200w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 1200px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2\"><p>However, network segmentation is not only useful when deploying IoT devices: clients should be separated from servers and, at the same time, externally accessible services such as e-mail or web servers should be operated in a so-called demilitarized zone (DMZ). This has the decisive advantage that if, for example, passwords fall into the hands of cybercriminals, <span style=\"background-color: rgba(255, 255, 255, 0); color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\">the damage is limited only to individual network segments and not to the entire corporate network<\/span>.<\/p>\n<p>Network segmentation is not a one-time task. Rather, it is an ongoing process to maintain steady IT security. We would like to point out here that these represent only one part of a holistic IT security concept.<\/p>\n<p>Conclusion: With the Internet of Things, more and more intelligent and networked devices are entering everyday business life. But the security risks should not be ignored.<\/p>\n<\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"https:\/\/outlook.office365.com\/owa\/calendar\/CosHConsultingGmbH@cosh.de\/bookings\/s\/YazmzqgMY0uPSQ2OuFzrnw2\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Arrange free consultation appointment<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":11199,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[398,411,399],"tags":[406,494,596,403,449,404],"class_list":["post-11198","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-posts","category-guidebook","category-news","tag-digital-en","tag-internet-of-things-en","tag-iot-en","tag-it-en","tag-security-en-2","tag-security-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Network Security - Network Segementation for Securing IOT Devices - CosH Information Technology<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cosh.de\/network-security-netzwerk-segementierung-zur-absicherung-von-iot-geraeten\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Network Security - Network Segementation for Securing IOT Devices - CosH Information Technology\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cosh.de\/network-security-netzwerk-segementierung-zur-absicherung-von-iot-geraeten\/\" \/>\n<meta property=\"og:site_name\" content=\"CosH Information Technology\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-07T10:00:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-26T10:28:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/internet_of_things.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Erik\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Erik\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cosh.de\\\/network-security-netzwerk-segementierung-zur-absicherung-von-iot-geraeten\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/network-security-netzwerk-segementierung-zur-absicherung-von-iot-geraeten\\\/\"},\"author\":{\"name\":\"Erik\",\"@id\":\"https:\\\/\\\/cosh.de\\\/#\\\/schema\\\/person\\\/a0bf426883c8134df8afaa886fd91e1d\"},\"headline\":\"Network Security &#8211; Network Segementation for Securing IOT Devices\",\"datePublished\":\"2022-06-07T10:00:39+00:00\",\"dateModified\":\"2022-07-26T10:28:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/network-security-netzwerk-segementierung-zur-absicherung-von-iot-geraeten\\\/\"},\"wordCount\":1682,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/network-security-netzwerk-segementierung-zur-absicherung-von-iot-geraeten\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cosh.de\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/internet_of_things.png\",\"keywords\":[\"digital\",\"Internet of things\",\"IoT\",\"IT\",\"Security\",\"Security\"],\"articleSection\":[\"Blog posts\",\"Guidebook\",\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/cosh.de\\\/network-security-netzwerk-segementierung-zur-absicherung-von-iot-geraeten\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cosh.de\\\/network-security-netzwerk-segementierung-zur-absicherung-von-iot-geraeten\\\/\",\"url\":\"https:\\\/\\\/cosh.de\\\/network-security-netzwerk-segementierung-zur-absicherung-von-iot-geraeten\\\/\",\"name\":\"Network Security - Network Segementation for Securing IOT Devices - CosH Information Technology\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/network-security-netzwerk-segementierung-zur-absicherung-von-iot-geraeten\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/network-security-netzwerk-segementierung-zur-absicherung-von-iot-geraeten\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cosh.de\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/internet_of_things.png\",\"datePublished\":\"2022-06-07T10:00:39+00:00\",\"dateModified\":\"2022-07-26T10:28:10+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/#\\\/schema\\\/person\\\/a0bf426883c8134df8afaa886fd91e1d\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/network-security-netzwerk-segementierung-zur-absicherung-von-iot-geraeten\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cosh.de\\\/network-security-netzwerk-segementierung-zur-absicherung-von-iot-geraeten\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cosh.de\\\/network-security-netzwerk-segementierung-zur-absicherung-von-iot-geraeten\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cosh.de\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/internet_of_things.png\",\"contentUrl\":\"https:\\\/\\\/cosh.de\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/internet_of_things.png\",\"width\":1200,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cosh.de\\\/network-security-netzwerk-segementierung-zur-absicherung-von-iot-geraeten\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/cosh.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Network Security &#8211; Network Segementation for Securing IOT Devices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cosh.de\\\/#website\",\"url\":\"https:\\\/\\\/cosh.de\\\/\",\"name\":\"CosH Information Technology\",\"description\":\"IT-Dienstleister &amp; Service Provider N\u00fcrnberg\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cosh.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cosh.de\\\/#\\\/schema\\\/person\\\/a0bf426883c8134df8afaa886fd91e1d\",\"name\":\"Erik\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a14a3fbf34ab6a1c50a52bbd767dca7a6892c30567cc97e95ae848947ed235aa?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a14a3fbf34ab6a1c50a52bbd767dca7a6892c30567cc97e95ae848947ed235aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a14a3fbf34ab6a1c50a52bbd767dca7a6892c30567cc97e95ae848947ed235aa?s=96&d=mm&r=g\",\"caption\":\"Erik\"},\"sameAs\":[\"https:\\\/\\\/cosh.de\"],\"url\":\"https:\\\/\\\/cosh.de\\\/en\\\/author\\\/e-kapfensteincosh-de\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Network Security - Network Segementation for Securing IOT Devices - CosH Information Technology","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cosh.de\/network-security-netzwerk-segementierung-zur-absicherung-von-iot-geraeten\/","og_locale":"en_US","og_type":"article","og_title":"Network Security - Network Segementation for Securing IOT Devices - CosH Information Technology","og_url":"https:\/\/cosh.de\/network-security-netzwerk-segementierung-zur-absicherung-von-iot-geraeten\/","og_site_name":"CosH Information Technology","article_published_time":"2022-06-07T10:00:39+00:00","article_modified_time":"2022-07-26T10:28:10+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/internet_of_things.png","type":"image\/png"}],"author":"Erik","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Erik","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cosh.de\/network-security-netzwerk-segementierung-zur-absicherung-von-iot-geraeten\/#article","isPartOf":{"@id":"https:\/\/cosh.de\/network-security-netzwerk-segementierung-zur-absicherung-von-iot-geraeten\/"},"author":{"name":"Erik","@id":"https:\/\/cosh.de\/#\/schema\/person\/a0bf426883c8134df8afaa886fd91e1d"},"headline":"Network Security &#8211; Network Segementation for Securing IOT Devices","datePublished":"2022-06-07T10:00:39+00:00","dateModified":"2022-07-26T10:28:10+00:00","mainEntityOfPage":{"@id":"https:\/\/cosh.de\/network-security-netzwerk-segementierung-zur-absicherung-von-iot-geraeten\/"},"wordCount":1682,"commentCount":0,"image":{"@id":"https:\/\/cosh.de\/network-security-netzwerk-segementierung-zur-absicherung-von-iot-geraeten\/#primaryimage"},"thumbnailUrl":"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/internet_of_things.png","keywords":["digital","Internet of things","IoT","IT","Security","Security"],"articleSection":["Blog posts","Guidebook","News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cosh.de\/network-security-netzwerk-segementierung-zur-absicherung-von-iot-geraeten\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cosh.de\/network-security-netzwerk-segementierung-zur-absicherung-von-iot-geraeten\/","url":"https:\/\/cosh.de\/network-security-netzwerk-segementierung-zur-absicherung-von-iot-geraeten\/","name":"Network Security - Network Segementation for Securing IOT Devices - CosH Information Technology","isPartOf":{"@id":"https:\/\/cosh.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cosh.de\/network-security-netzwerk-segementierung-zur-absicherung-von-iot-geraeten\/#primaryimage"},"image":{"@id":"https:\/\/cosh.de\/network-security-netzwerk-segementierung-zur-absicherung-von-iot-geraeten\/#primaryimage"},"thumbnailUrl":"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/internet_of_things.png","datePublished":"2022-06-07T10:00:39+00:00","dateModified":"2022-07-26T10:28:10+00:00","author":{"@id":"https:\/\/cosh.de\/#\/schema\/person\/a0bf426883c8134df8afaa886fd91e1d"},"breadcrumb":{"@id":"https:\/\/cosh.de\/network-security-netzwerk-segementierung-zur-absicherung-von-iot-geraeten\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cosh.de\/network-security-netzwerk-segementierung-zur-absicherung-von-iot-geraeten\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cosh.de\/network-security-netzwerk-segementierung-zur-absicherung-von-iot-geraeten\/#primaryimage","url":"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/internet_of_things.png","contentUrl":"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/internet_of_things.png","width":1200,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/cosh.de\/network-security-netzwerk-segementierung-zur-absicherung-von-iot-geraeten\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/cosh.de\/en\/"},{"@type":"ListItem","position":2,"name":"Network Security &#8211; Network Segementation for Securing IOT Devices"}]},{"@type":"WebSite","@id":"https:\/\/cosh.de\/#website","url":"https:\/\/cosh.de\/","name":"CosH Information Technology","description":"IT-Dienstleister &amp; Service Provider N\u00fcrnberg","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cosh.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cosh.de\/#\/schema\/person\/a0bf426883c8134df8afaa886fd91e1d","name":"Erik","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a14a3fbf34ab6a1c50a52bbd767dca7a6892c30567cc97e95ae848947ed235aa?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a14a3fbf34ab6a1c50a52bbd767dca7a6892c30567cc97e95ae848947ed235aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a14a3fbf34ab6a1c50a52bbd767dca7a6892c30567cc97e95ae848947ed235aa?s=96&d=mm&r=g","caption":"Erik"},"sameAs":["https:\/\/cosh.de"],"url":"https:\/\/cosh.de\/en\/author\/e-kapfensteincosh-de\/"}]}},"_links":{"self":[{"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/posts\/11198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/comments?post=11198"}],"version-history":[{"count":4,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/posts\/11198\/revisions"}],"predecessor-version":[{"id":11525,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/posts\/11198\/revisions\/11525"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/media\/11199"}],"wp:attachment":[{"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/media?parent=11198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/categories?post=11198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/tags?post=11198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}