Nozomi, Schneider develop security sensor embedded in RTUs
Nozomi Networks Inc. and Schneider Electric unveiled Aug. 13 what’s reported to be the first security sensor that runs embedded in Schneider’s remote terminal units (RTU). With Nozomi Arc embedded in Schneider’s SCADAPack 47xi RTUs, users gain previously unavailable visibility into their equipment’s control-device layer, as well as the ability to analyze and deter control device-level threats and malicious user activity without impacting current resources or disrupting mission-critical networks.
"As cyber-threats to the world’s energy resources increase, we’re working with Nozomi and our customers to double down on effective defenses,” says Jay Abdallah, president of cybersecurity solutions at Schneider. “Nozomi Arc embedded in Schneider’s RTUs transforms them into secure assets, giving operators the visibility they need to respond to threats before they can do harm.”
Andrea Carcano, cofounder and CPO at Nozomi Networks, adds, “We’re honored to team with Schneider Electric to bring Arc Embedded to its RTUs. For more than eight years, our partnership with Schneider has allowed us to collaborate to find better ways to protect energy management and automation processes worldwide. This latest effort with Arc Embedded extends security to and through industrial control systems, down to the highly remote field assets they manage, which are often left unmonitored and at greater risk.”
Integrating Arc Embedded directly into SCADAPack makes data visible from within RTUs and the field assets controlled them including:
- Updates to RTU endpoint status, including software and hardware inventory, vulnerability details and resource utilization.
- Level 0 visibility. Arc Embedded extracts process variable data directly from RTUs, enabling visibility into physical processes and device states without requiring external polling protocols.
- Threat and anomaly detection. Arc Embedded detects malicious and suspicious operational actions, such as USB or SD card connections/removals, time setting manipulation, changes to control logic and firmware and mechanical manipulations.
About the Author

Leaders relevant to this article:

