Ziehm Imaging GmbH Germany EN Ziehm Member Service Ziehm Academy

Cybersecurity

Cybersecurity

Shaping a secure future

Cybersecurity is the cornerstone of trust, innovation, and growth in today’s connected world. As cyber threats become more and more sophisticated, they pose serious risks to healthcare institutions and patient safety. Protecting sensitive data, ensuring uninterrupted operations, and meeting stringent legal requirements is critical.1

That is why security is an integral part of everything we do. Our products are built with cutting-edge technologies and advanced security measures to safeguard what matters most - our customers and their patients. We are committed to continuous investment in research, development, and training to ensure our solutions stay ahead of evolving threats.

Cybersecurity

Compliance

Our mobile C-arms are designed with security features that support your GDPR and HIPAA2 compliance, including multiple password levels for enhanced protection. User access is strictly controlled with administrators assigning permissions based on individual user needs.

How we secure our mobile C-arms

Linux-based embedded operating system

Our C-arms run on a hardened Linux-based embedded operating system with only essential components installed. Non-essential applications, including email clients and web browsers, are removed to minimize the attack surface.

Secure development & Supply chain

We follow a rigorous secure development lifecycle and closely monitor our security supply chain.

Monitoring & Updates

We continuously monitor and evaluate potential threats and implement preventive security patches. Critical vulnerabilities are fixed swiftly.

Regular vulnerability scans

Every month, we scan our mobile C-arms for vulnerabilities. Additionally, independent security experts perform regular comprehensive penetration tests to validate our defenses.

Proactive software hardening

When designing new features for our C-arm application software, we evaluate potential future weaknesses and threats and implement preventive measures. We continuously improve our cybersecurity to keep up with evolving risks.

Encryption

All patient data stored on the system is protected through encryption-at-rest. DICOM communications are secured with encryption-in-transit. These measures ensure the confidentiality and integrity of personal data, even in highly networked environments.

Network security

All unused network ports are disabled. A properly configured firewall controls inbound and outbound network traffic. Network communication may only take place via DICOM and proprietary navigation protocols.

Strict control of external media

Connected USB devices are restricted to their intended purpose through rigorous input validation. Starting our mobile C-arms from external media is impossible, ensuring robust protection against malware threats.

Cybersecurity

Benefits for our customers

Our security measures help prevent the leakage of sensitive data and costly operational downtimes. This provides peace of mind and uncompromising protection.

 

Reports & Updates

We continuously monitor all problem reports for the operating systems. Critical and urgent vulnerabilities are addressed promptly by our experts with short-term service packs. As the operating systems are embedded, identified issues are rarely relevant. Additionally, we perform monthly vulnerability scans.

Software Version 7.10.1 / 7.08.2 – Focus on Security

In these software versions for Ziehm Imaging mobile C-arms, we are placing a particular emphasis on data security and data protection:

Hard Disk Encryption

All patient images, patient data and user data are now encrypted by default. This meets the requirements of GDPR and HIPAA. For existing systems, encryption can be retrofitted via Ziehm Imaging Global Service.

 

DICOM Encryption

Our systems now support DICOM TLS 1.2 and 1.3 for both WLAN and LAN. This protects the transmission of patient data against unauthorized access, provides certificate-based authentication, and verifies data integrity.

 

Automatic Deletion

Images that have been successfully transmitted to the PACS and for which a DICOM Commitment is available can be deleted automatically when the system is restarted, increasing data protection and freeing up storage space.

 

Operating System Update

Migration from Ubuntu to Debian, including the latest cybersecurity patches to protect against current vulnerabilities.

 

In addition to these security functions, the versions provide numerous new features and optimizations. For details, please contact your sales or service partner.

Software Version 7.10.2 / 7.08.3 – Security Patches

With software versions 7.10.2 and 7.08.3 for Ziehm Imaging mobile C-arms, the cybersecurity of the system has been further enhanced.

Current cybersecurity patches

In addition, the new versions include the latest security updates for the operating system.
This keeps the mobile C-arms up-to-date in terms of cybersecurity.

Contact

If you have any questions about cybersecurity issues or would like to report a vulnerability in one of Ziehm Imaging's products, please find below the appropriate contact options.

Frequently Asked Questions

What happens if a vulnerability is discovered in the operating system of the C-arm?

Our products are continuously monitored for vulnerabilities. In addition, we conduct extensive market surveillance of the components in use.

 

As soon as a vulnerability, such as a security flaw in the software, is identified, it undergoes a standardized assessment process. The vulnerability is evaluated in terms of exploitability, severity and the risk to patient safety and cybersecurity. Depending on the outcome, appropriate measures are taken and product users are informed via security advisories in the Reports & Updates section on this page.

 

 

The remediation of identified vulnerabilities takes place as part of regular software releases or, if necessary, through ad-hoc security patches. Relevant information is also provided on our website.

 

How is a particularly critical vulnerability in the operating system handled?

For particularly critical vulnerabilities, an ad-hoc security patch is made available to minimize the associated risk as quickly as possible.

Product users are informed via security advisories in the Reports & Updates section on this page.

How should I respond if my network has been infected?

Disconnect the system from the data network and contact Ziehm Service or reach out directly to cybersecurity@ziehm.com to obtain information about possible risks and recommended actions.

What should I do if I suspect that my system is infected?

Disconnect the system from the data network and shut it down. Please contact Ziehm Service or reach out directly to cybersecurity@ziehm.com immediately.

How will I be informed if my system is affected by a critical vulnerability?

We publish relevant security advisories in the Reports & Updates section on this page.

Who can I contact if I have discovered or suspect a vulnerability in my system?

Please report vulnerabilities directly to cybersecurity@ziehm.com.

 

It is important to prevent widespread disclosure of the vulnerability before adequate countermeasures can be implemented (zero-day exploit). For this reason, we kindly ask that you only discuss the matter in coordination with our cybersecurity experts.
As part of our Coordinated Vulnerability Disclosure Process (CVDP), we ensure that analyses and measures are carried out and published in a timely manner.

 

  • 1

    Federal Office for Information Security (BSI) "eHealth - Cyber Security in Healthcare", Available at: https://www.bsi.bund.de/EN/Themen/Unternehmen-und-Organisationen/Standards-und-Zertifizierung/E-Health/e-health.html, Accessed 4 September 2025.

  • 2

    Health Insurance Portability and Accountability Act

  • 3

    Please note that customers are required to report incidents through the standard customer support channels.