Skip to main content

Schneider Electric and McAfee partner on cybersecurity

Schneider Electric and McAfee are to partner to provide cybersecurity solutions for the utility and critical infrastructure market. This collaboration will enable Schneider Electric customers to add tested and certified application white-listing capabilities in the management of core offerings of water, oil and gas, electric networks and transportation infrastructures. This will strengthen customers’ operations technology (OT) security and lower ownership costs without significantly impacting the perfor
March 24, 2014 Read time: 2 mins
729 Schneider Electric and McAfee are to partner to provide cybersecurity solutions for the utility and critical infrastructure market.

This collaboration will enable Schneider Electric customers to add tested and certified application white-listing capabilities in the management of core offerings of water, oil and gas, electric networks and transportation infrastructures. This will strengthen customers’ operations technology (OT) security and lower ownership costs without significantly impacting the performance of critical solutions.

This includes being able to monitor and manage changes to mitigate malicious or accidental system modifications, preventing execution of unauthorised code and many common malware on their systems. These capabilities protect critical systems from zero-day attacks, reduce in-field breakage, and keep systems and devices compliant with security standards through patch cycles. The supported portfolio of products includes leading SCADA and energy management solutions.

McAfee embedded control, integrity control and application control solutions will increase the safety, availability and reliability of critical infrastructure environments around the world.

The combination of both companies’ capabilities will enable customers to enforce change policy and provide comprehensive and automated audit capabilities for industrial control system environments.

Related Content

  • November 10, 2017
    Making connections without compromising security
    We listen in as global experts discuss connected vehicles and cybersecurity. By 2019 there will be almost 44 million connected cars globally and by 2022 that figure will be nearer 70 million; some 40% will be electric powered, according to market analyst Frost & Sullivan. But its report said the issue of end-to-end security for the new technology is still under debate, as vehicle OEMs engage with vendors to test specific security application areas for both over-the-air and vehicle-to-exterior services.
  • May 18, 2018
    Joining the dots: four ways to help cities make the connection
    Smoothing the path to connected transportation systems in urban areas all round the world takes a lot of planning: Cisco’s Kyle Connor lays out the four key areas on which he thinks cities should focus. Forward-thinking cities around the world are exploring innovative, new ways to leverage the Internet of Things (IoT) and related technologies to create more connected and efficient transportation systems. Through greater digitisation and connectivity, cities can optimise public transit routes, reduce
  • February 2, 2012
    Green requirements of traffic video systems
    Traficon's Head of Product and Application Management Robin Collaert offers up a discussion of the likely future green requirements of traffic video systems. At the most basic levels, ITS has the potential to significantly reduce the amounts of time which vehicles spend waiting at intersections, and less time spent waiting means less in the way of vehicular emissions. All of that will hardly come as news to most laypeople, let alone transport professionals. However, the reality is that even today too many r
  • August 10, 2016
    Technologies to protect connected cars ‘not being utilised’
    A three-year study by IOActive’s Cybersecurity Division has found half of vehicle vulnerabilities could allow cyber attackers to take control of a vehicle - and 71 per cent are ‘easy to exploit’. The research, detailed in a whitepaper, Commonalities in Vehicle Vulnerabilities, is based on real-world security assessments. Technologies which could be exploited include cellular radio, Bluetooth, wi-fi, companion apps, vehicle to vehicle (V2V) radio, onboard diagnostic equipment, infotainment media and Zigbe