Share via email
Some fields are missing
send eMail

Information and cyber security

We process information every day, whether it comes in a digital, physical or verbal format. Every process, our products and even our conversations are shaped by information, which means that we protect all these things. At Bürkert, we protect all sensitive information. In doing so, we safeguard our company’s success.

As the need for information security continues to grow due to increasing digitalisation and work taking place in different locations, Bürkert takes a comprehensive approach to information security. Accordingly, we have implemented a comprehensive, secure and effective information security management system (ISMS) that is based on best-practice standards. 

To increase the visibility of information security, here at Bürkert we have developed an internal logo, “B-Secure”, as part of a campaign of the same name. This logo can be found on all information published in relation to this subject, plus training materials and much more.

Georg Stawowy

“For us, cyber security is more than just technology – it is an integral part of our corporate culture. To ensure we are effectively countering threats, at Bürkert we rely on a combination of state-of-the-art tools, clearly structured processes and our employees being in a constant state of awareness. Bürkert’s information security and business continuity depend on us being in an ideal position both technologically and in terms of personnel.”

Georg Stawowy, CEO

Our information security is continuously being maintained and improved. As a global company, carving out a global focus is very important to us. The graphic below shows the topics we consider in the area of ISMS, such as IT security, physical security and awareness. Everyone in the company, from management to employee level, is obligated to protect information – from customers, from partners and their own data – as effectively as possible.

Our approach is to protect all sensitive information, such as strategic information, personal information and pricing information, regardless of its format (digital, physical or verbal). We protect this information from theft, unlawful access, misuse, unauthorised modifications or destruction.

We achieve this through the following three core values:

Confidentiality

Prevents or minimises unauthorised access to information

Handschlag Icon

Integrity

Ensures the reliability and accuracy of information

Availability

Ensures that authorised persons have access to information at all times

“As the member of the management team with responsibility for IT, information security is very important to me. For that reason, I support the constant efforts to keep our information security up to date and develop it further. To ensure our concepts are strong, we will provide the necessary resources for investing in technical and organisational solutions. We also ensure that Bürkert employees remain highly vigilant by providing regular training measures, protecting both our and their information.”

Dr. Udo Gais, CFO

The pillars of our information security

Factory Icon

OT security

Protecting production facilities against failures and cyber attacks

Product security

Protecting communication and control from manipulation

Supplier security

Minimising information risks in the supply chain

Compliance security

Implementing and complying with legal cyber requirements consistently

IT security

Protecting company data and systems from attacks

Emergency security

Business impact analyses & ensuring IT availability

CyberVadis third-party risk assessment

700–799 out of 1000 points

The CyberVadis rating supports our customers with third-party risk assessments and provides an independent evaluation of our cybersecurity practices.

Information systems & business continuityNetwork & endpoint securityAccess managementData protection & privacy

Information systems & business continuity | Network & endpoint security | Access management | Data protection & privacy

“In the digital age, companies cannot afford to wait for criminals to strike. The costs of this would be incalculable. Therefore, it is important to proactively develop a solid cyber resilience strategy that protects the business against attacks. At Bürkert, we have created an excellent working foundation with the established ISMS and the B_Secure framework developed for it.”

Felix Weber, CISO

Compliance & standards

ISO 27001:2022

Orientation (not certified)

Serves as the framework for our ISMS together with IT-Grundschutz from the BSI (German Federal Office for Information Security)

International guidelines and laws

Conformity

Particular emphasis is placed on compliance with regulatory requirements in Europe, the USA, India and China in the area of cybersecurity, such as the implementation of NIS-2, NIST and MLPS 2.0

Contact and reporting