Schneider Electric USA Website

Welcome to our website.

To view product availability in a specific country, select from the country list below. For Investor Relations, please visit our global site.

Select your location
  • Default Alternative Text

    Cybersecurity Support

    Learn about securing your system environment; whether it is an industrial process, building management and access control system, data center, or electrical infrastructure control system.

  • Resources

    • Default Alternative Text

      Network Intrusion Detection Systems for Critical Infrastructure

      Assaults against critical infrastructure networks are growing in sophistication and are requiring stronger perimeter defenses. Network Intrusion Detection Systems (NIDS), provide an additional layer of depth to a defense strategy. Read white paper
    • Default Alternative Text

      Defending Against Cyber Threats to Building Management Systems

      With the threat of cyber attacks looming large, more attention must be paid to the integrity of the BMS. This paper describes the threats that exist and recommends approaches for deploying a “Defense in Depth” methodology specific to BMS. Read white paper
    • Default Alternative Text

      A Framework for Developing and Evaluating a Utility Substation's Cyber Security

      The energy industry is attracting the attention of hackers looking to cause widespread disruption. Find out how utilities can protect themselves against cyber attacks. Read our blog
    • Default Alternative Text

      SCADA Security: Challenges and Solutions

      This paper presents the case for improving security to SCADA systems. It examines the factors that have contributed to the growing vulnerability of control systems, and presents new standards designed to protect critical infrastructure including the use of encryption and authentication for SCADA systems. Read white paper
    • Default Alternative Text

      Best Practices for Securing an Intelligent Building Management System

      System integrators, network administrators, and facilities personnel need to apply best practices for securing an iBMS throughout its lifecycle. Read white paper
    • Default Alternative Text

      How Can I Reduce Vulnerability to Cyber Attacks in PlantStruxure Architectures

      This paper will help you understand what constitutes cybersecurity in the industrial market. You will become more familiar with the methods of malicious network penetration, the risks caused by system vulnerabilities, and Schneider Electric’s recommendations to mitigate those risks. Read
    • Default Alternative Text

      Frost & Sullivan: Cyber Security for Industrial Automation & Control Environments

      Learn about protection and prevention strategies in the face of growing threats in industrial automation and control environments. Read
  • Resources

    • Securing Your Industrial Assets

      Many industrial assets are at risk due to poor installation and management practices. Learn proper methods and behaviors to reduce the risk of cyber incidents in the industrial environment
    • Cyber Security Best Practices for Field Service Engineers

      Field Service Engineers working with industrial & commercial control systems could introduce security threats when interacting with customer systems. Follow these best practices to protect your client and your company