Welcome to the Schneider Electric Website

Welcome to our website.

You can choose another country to view available products or go to our Global website for company information.

Choose another country or region

    • Default Alternative Text

      Cybersecurity Support

      Learn about securing your system environment; whether it is an industrial process, building management and access control system, data center, or electrical infrastructure control system.

    • Resources

      • Default Alternative Text

        Network Intrusion Detection Systems for Critical Infrastructure

        Assaults against critical infrastructure networks are growing in sophistication and are requiring stronger perimeter defenses. Network Intrusion Detection Systems (NIDS), provide an additional layer of depth to a defense strategy. Read white paper
      • Default Alternative Text

        Defending Against Cyber Threats to Building Management Systems

        With the threat of cyber attacks looming large, more attention must be paid to the integrity of the BMS. This paper describes the threats that exist and recommends approaches for deploying a “Defense in Depth” methodology specific to BMS. Read white paper
      • Default Alternative Text

        A Framework for Developing and Evaluating a Utility Substation's Cyber Security

        The energy industry is attracting the attention of hackers looking to cause widespread disruption. Find out how utilities can protect themselves against cyber attacks. Read our blog
      • Default Alternative Text

        SCADA Security: Challenges and Solutions

        This paper presents the case for improving security to SCADA systems. It examines the factors that have contributed to the growing vulnerability of control systems, and presents new standards designed to protect critical infrastructure including the use of encryption and authentication for SCADA systems. Read white paper
      • Default Alternative Text

        Best Practices for Securing an Intelligent Building Management System

        System integrators, network administrators, and facilities personnel need to apply best practices for securing an iBMS throughout its lifecycle. Read white paper
      • Default Alternative Text

        How Can I Reduce Vulnerability to Cyber Attacks in PlantStruxure Architectures

        This paper will help you understand what constitutes cybersecurity in the industrial market. You will become more familiar with the methods of malicious network penetration, the risks caused by system vulnerabilities, and Schneider Electric’s recommendations to mitigate those risks. Read
      • Default Alternative Text

        Frost & Sullivan: Cyber Security for Industrial Automation & Control Environments

        Learn about protection and prevention strategies in the face of growing threats in industrial automation and control environments. Read
    • Resources

      • Securing Your Industrial Assets

        Many industrial assets are at risk due to poor installation and management practices. Learn proper methods and behaviors to reduce the risk of cyber incidents in the industrial environment
      • Cyber Security Best Practices for Field Service Engineers

        Field Service Engineers working with industrial & commercial control systems could introduce security threats when interacting with customer systems. Follow these best practices to protect your client and your company