
ISO/IEC 27001 certified
Standard for information security management systems (ISMS)
More about the IEC StandardWe recognize the transformative power of digitalization and the critical importance of securing it. That's why we're committed to help protect your industrial assets and the data they generate, enabling you to operate your power plants with high efficiency and peace of mind.
We see cybersecurity as a key enabler of your growth potential, and we are dedicated to help maintain a secure digital experience that empowers you to explore the vast possibilities of digitalization with confidence.
Find out more about how we help protect your data.
Only essential data is transferred. To give you the insights you need on your industrial assets' operation, we transfer operational data from control systems (such as voltages and engine state) and notification data (such as messages, warnings, and alarms).
Personal data is not transferred; however, your name and email are required to create the myplant user account that allows access to your engine data.
Yes, your data is secure. All transferred data is fully encrypted and protected. It is transmitted end-to-end using the Internet-standard HTTPS protocol, which provides encryption via Transport Layer Security (TLS).
INNIO Group security experts maintain and operate the security infrastructure with strict software standards and technologies that are implemented and enforced across the system.
Access to the myplant platform is strictly controlled and managed by selected technical support personnel or administrators.
We safeguard access with multiple security measures. For Jenbacher and Waukesha assets, additional credentials with independent restrictions are required when the DIA.NE or ESM control system is accessed remotely.
In general, any remote access activity is tracked to protect your control system from unauthorized access.
Our hosting infrastructure setup allows you to restrict connections to a minimum and implement modern traffic controls.
For even more protection against unauthorized access, we offer an optional two-factor authorization process. This means that any remote access attempt must be approved by on-site personnel before a connection can be established.
Here's how our security architecture supports your data protection needs.
Standard for information security management systems (ISMS)
More about the IEC StandardSecurity for industrial automation and control systems - Part 4-1: Secure product development lifecycle requirements
More about the IEC StandardHave a question regarding cybersecurity? Or do you want to report a vulnerability or security issue? Please send an email to productsecurity@innio.com to get in touch with our Product Cybersecurity Team.