Nozomi Networks has major installations at critical infrastructure, process control and manufacturing organizations around the world.
VEC is a member-owned electric distribution utility serving 75 communities in Vermont, U.S.
Regional Power Operator
Improves ICS Cyber Security
“At Vermont Electric we need both operational visibility and cyber security protection for our critical operations systems. We’re working with Nozomi Networks because their deep industrial cyber security expertise is embedded in one clean, comprehensive solution.”KRIS SMITH
FireEye is a technology and services company that eliminates the burden and complexity of cyber security for over 6,300 customers across 67 countries.
“Adversaries are increasingly targeting critical infrastructure around the world and operators are prioritizing cyber security for industrial control systems and other types of operational technology. After extensive review, we chose Nozomi Networks because their platform provides industry-leading capabilities which allow us to detect anomalies and proactively hunt for threats within industrial environments.”GRADY SUMMERS
Enel is a multinational energy company and one of the world’s leading integrated electricity and gas operators.
“With Nozomi Networks SCADAguardian we can now detect and collect operational and cyber security issues in real-time, and take corrective actions before the threat can strike.”GIAN LUIGI PUGNI
“Nozomi Networks SCADAguardian is now a fundamental element of our network infrastructure and an essential tool for our daily activities.”FEDERICO BELLIO
Enel Secures Global
Power Generation Network
Improving ICS Cyber Security for
Substations and Power Grids
“When it came to cyber security protection for critical systems, we wanted the most advanced technology available. After extensive review, we chose Nozomi Networks. They brought superior know-how in ICS cyber security, and a proven track record with other industry leaders. We’re using SCADAguardian as the basis of our ICS cyber program from operational monitoring to ICS threat detection.”
Want to Know More?