{"id":11435,"date":"2019-01-09T14:15:16","date_gmt":"2019-01-09T13:15:16","guid":{"rendered":"https:\/\/timm-technology.com\/?p=11435"},"modified":"2025-06-26T11:25:54","modified_gmt":"2025-06-26T09:25:54","slug":"current-challenges-in-access-control-to-wind-turbines","status":"publish","type":"post","link":"https:\/\/timm-technology.com\/en\/current-challenges-in-access-control-to-wind-turbines\/","title":{"rendered":"Current challenges in access control to wind turbines"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"11435\" class=\"elementor elementor-11435\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6096f57 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6096f57\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d1368ad\" data-id=\"d1368ad\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-162c287 elementor-widget elementor-widget-text-editor\" data-id=\"162c287\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-63af388f elementor-widget elementor-widget-theme-post-content\" data-id=\"63af388f\" data-element_type=\"widget\" data-widget_type=\"theme-post-content.default\"><div class=\"elementor-widget-container\"><h2 class=\"wp-block-heading\">New white paper provides more information<\/h2><p>When you enter a wind turbine you quickly realize that those multi-million assets are insufficiently protected against unauthorized access, as only standard (tumbler) locks are used. Is this appropriate? Likely not, as reports on break-ins and resulting financial losses are a common sight in the media.<\/p><p>In addition, turbine manufacturers have been using the same master keys for a long time now. Inevitably, keys have been lost over time. A result is that today nobody can say with confidence who has a key and is able to enter a wind turbine. Proof that some keys have changed hands is publicly available on <a href=\"https:\/\/www.youtube.com\/watch?v=yJYUSNhFvjM\">YouTube<\/a>.<\/p><p>Wind farm operators are now faced with the problem that they are not able to effectively control and monitor access to their assets. At the same time, asset safety and security are main concerns to them as operators are the ones who are liable for secure and safe asset operation. In addition, steady cash flow requires smooth operation. Hence, asset security also is a hot topic for financial investors.<\/p><p>Access control to wind turbines provide another challenge if you look at underlying processes. Today\u2019s processes still show room for improvement as regards efficiency and cost.\u00a0<\/p><p>Our white paper \u201c5 reasons\u2026\u201d takes a closer look at the challenges in access control that wind farm operators are confronted with today. IntelliLock helps operators to solve these challenges efficiently.<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>New white paper provides more information When you enter a wind turbine you quickly realize that those multi-million assets are insufficiently protected against unauthorized access, as only standard (tumbler) locks are used. Is this appropriate? Likely not, as reports on break-ins and resulting financial losses are a common sight in the media. In addition, turbine [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":11431,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[233],"tags":[],"class_list":["post-11435","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-intellilock"],"jetpack_featured_media_url":"https:\/\/timm-technology.com\/wp-content\/uploads\/2023\/08\/Timm-News-2019-01-09.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/timm-technology.com\/en\/wp-json\/wp\/v2\/posts\/11435","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/timm-technology.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/timm-technology.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/timm-technology.com\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/timm-technology.com\/en\/wp-json\/wp\/v2\/comments?post=11435"}],"version-history":[{"count":4,"href":"https:\/\/timm-technology.com\/en\/wp-json\/wp\/v2\/posts\/11435\/revisions"}],"predecessor-version":[{"id":11439,"href":"https:\/\/timm-technology.com\/en\/wp-json\/wp\/v2\/posts\/11435\/revisions\/11439"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/timm-technology.com\/en\/wp-json\/wp\/v2\/media\/11431"}],"wp:attachment":[{"href":"https:\/\/timm-technology.com\/en\/wp-json\/wp\/v2\/media?parent=11435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/timm-technology.com\/en\/wp-json\/wp\/v2\/categories?post=11435"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/timm-technology.com\/en\/wp-json\/wp\/v2\/tags?post=11435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}