Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Packagist supply chain attack infects packages via GitHub malware

May 23, 2026

LiteSpeed Plugin Vulnerability Enables Root-Level Script Execution

May 23, 2026

Hackers Breach 233 Laravel-Lang Packages in 700 GitHub Repos

May 23, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » Nozomi, Schneider Launch First Embedded RTU Securit
Uncategorized

Nozomi, Schneider Launch First Embedded RTU Securit

Staff WriterBy Staff WriterAugust 14, 2025Updated:August 17, 2025No Comments3 Mins Read10 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


Nozomi Networks Inc., a leader in OT, IoT, and CPS cybersecurity, has partnered with Schneider Electric, a global leader in energy management and automation, to unveil the world’s first embedded security sensor within Schneider Electric’s remote terminal units (RTUs). This groundbreaking innovation integrates Nozomi Arc Embedded directly into Schneider’s SCADAPack 47xi Smart RTUs, offering unprecedented visibility and protection at the control device level of industrial automation systems and field assets.

The embedded solution allows security and operations teams to detect, analyze, and address threats targeting control devices without straining existing resources or disrupting mission-critical operations. As a result, organizations can achieve stronger operational resilience, reduced cyber risk, improved compliance, and higher system uptime.

“With cyber threats against global energy resources on the rise, this collaboration with Nozomi Networks strengthens our customers’ defense strategies,” said Jay Abdallah, Vice President of Cybersecurity Solutions and Services at Schneider Electric. “Integrating Arc Embedded into our RTUs transforms them into secure operational assets, providing operators with the visibility needed to counter threats before they cause harm.”

Cyber Technology Insights : Atos named a Leader in ISG Provider Lens for Cybersecurity – Services and Solutions in Germany

Andrea Carcano, Co-founder and CPO of Nozomi Networks, highlighted the partnership’s longevity:

“Our collaboration with Schneider spans more than eight years, focused on safeguarding energy management and automation worldwide. Arc Embedded takes this protection deeper—securing even remote, often overlooked field assets that are most vulnerable to attacks.”

Enhancing Security Where It’s Needed Most

An RTU is a critical industrial device that gathers, processes, and transmits data from sensors and actuators in remote or distributed locations—such as rural water facilities or electrical substations in challenging terrains. Acting as a bridge between field equipment and central control systems, RTUs enable real-time monitoring and control of essential industrial processes.

Schneider Electric’s SCADAPack 47xi Smart RTUs are widely deployed in oil and gas, utilities, and other critical infrastructure sectors. They are known for their cost-effective design, robust performance, and built-in cybersecurity features, making them a preferred choice for organizations with demanding operational needs.

Cyber Technology Insights : Zero Trust Cyber Advisors and Carahsoft Partner to Bring Zero Trust Solutions to Government Agencies

By embedding Nozomi Arc Embedded within these RTUs, operators gain:

Enhanced endpoint insights – Real-time updates on RTU software and hardware inventory, vulnerability data, and system resource usage.

Level 0 visibility – Direct extraction of process variable data from the RTU, enabling unmatched insight into physical processes and device states without relying on external polling.

Threat and anomaly detection – Identification of suspicious activities such as unauthorized USB or SD card access, manipulation of time settings, changes in control logic or firmware, and mechanical tampering.

Security-by-Design for Industrial Systems

Arc Embedded converts existing industrial control systems into secure-by-design assets by providing a deeply integrated, vendor-independent security layer. This approach delivers robust protection for systems already in operation, addressing vulnerabilities without the need for extensive retrofits.

The Arc Embedded solution for Schneider’s SCADAPack 47xi Smart RTUs is now available through a subscription model from Schneider Electric, Nozomi Networks, and their global network of channel partners.

Cyber Technology Insights : KeyData Cyber Acquires BeyondID to Create a Powerhouse in Identity Security

To participate in our interviews, please write to our CyberTech Media Room at sudipto@intentamplify.com



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAkamai Teams with Aptum to Accelerate Cloud Migration
Next Article SonicWall Expands Next-Generation Firewall Portfolio
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Critical Breach: Internal Repositories Compromised via Malicious Nx Console Extension

May 21, 2026

Grafana GitHub Breach: TanStack npm Attack Exposes Source Code

May 20, 2026

Funnel Builder Flaw Lets Hackers Skim WooCommerce Checkouts

May 16, 2026

Comments are closed.

Latest Posts

Hackers Breach 233 Laravel-Lang Packages in 700 GitHub Repos

May 23, 2026

Unveiling 10,000+ Zero-Day Threats in Project Glasswing with Anthropic’s Claude Mythos Preview

May 23, 2026

Russian Threat Groups Exploit RDP, VPN, Supply Chains, and Social Engineering for Initial Access

May 22, 2026

Hackers Exploit Six-Layer Persistence to Maintain Access on Compromised FreePBX Systems

May 22, 2026
Don't Miss

Critical Breach: Internal Repositories Compromised via Malicious Nx Console Extension

By Staff WriterMay 21, 2026

Quick Takeaways GitHub confirmed a breach due to a compromised employee device that injected malicious…

Grafana GitHub Breach: TanStack npm Attack Exposes Source Code

May 20, 2026

Funnel Builder Flaw Lets Hackers Skim WooCommerce Checkouts

May 16, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • Packagist supply chain attack infects packages via GitHub malware
  • LiteSpeed Plugin Vulnerability Enables Root-Level Script Execution
  • Hackers Breach 233 Laravel-Lang Packages in 700 GitHub Repos
  • Stack Buffer Overflow Exploits via String Manipulation
  • Unveiling 10,000+ Zero-Day Threats in Project Glasswing with Anthropic’s Claude Mythos Preview
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Packagist supply chain attack infects packages via GitHub malware

May 23, 2026

LiteSpeed Plugin Vulnerability Enables Root-Level Script Execution

May 23, 2026

Hackers Breach 233 Laravel-Lang Packages in 700 GitHub Repos

May 23, 2026
Most Popular

Protecting MCP Security: Defeating Prompt Injection & Tool Poisoning

January 30, 202632 Views

Unlock the Power of Free WormGPT: Harnessing DeepSeek, Gemini, and Kimi-K2 AI Models

November 27, 202530 Views

The New Face of DDoS is Impacted by AI

August 4, 202528 Views

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Most Read
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.