
Nozomi Networks
Founded Year
2013Stage
Series D - II | AliveTotal Raised
$152.5MAbout Nozomi Networks
Nozomi Networks develops an online cybersecurity platform. It provides superior operational visibility, advanced operational technology (OT), internet of things (IoT), threat detection, and more. It serves airports, building automation systems, electric utilities, healthcare, manufacturing, and mining industries. The company was founded in 2013 and is based in San Francisco, California.
Nozomi Networks's Product Videos

ESPs containing Nozomi Networks
The ESP matrix leverages data and analyst insight to identify and rank leading companies in a given technology landscape.
The operational technology (OT) security tools market offers a range of solutions designed to protect industrial control systems (ICS) and other OT assets from damaging and disruptive cyber threats, like malware and ransomware. These solutions help businesses ensure the integrity, availability, and confidentiality of their OT systems and prevent financial losses, reputational damage, and other neg…
Nozomi Networks named as Leader among 15 other companies, including ForeScout, Claroty, and Armis.
Nozomi Networks's Products & Differentiators
Vantage
A 2021 IoT Evolution IoT Excellence Award recipient, the Vantage platform is designed to meet the rapidly evolving requirements of IoT-enabled infrastructures. Vantage equips security professionals and industrial operators with actionable, AI-driven insights to identify and manage risks and speed precise remediation. Vantage delivers unmatched security and asset visibility with unlimited scalability through an industry-first cloud-based SaaS offering that consolidates data aggregation, analysis and operations across OT, IoT and IT assets.
Research containing Nozomi Networks
Get data-driven expert analysis from the CB Insights Intelligence Unit.
CB Insights Intelligence Analysts have mentioned Nozomi Networks in 6 CB Insights research briefs, most recently on Aug 16, 2023.

Aug 16, 2023
The industrial internet of things (IIoT) market map
Expert Collections containing Nozomi Networks
Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.
Nozomi Networks is included in 4 Expert Collections, including Grid and Utility.
Grid and Utility
1,675 items
Companies that are developing and implementing new technologies to optimize the grid and utility sector. This includes, but is not limited to, distributed energy resources, infrastructure security, utility asset management, grid inspection, energy efficiency, grid storage, etc.
Cybersecurity
6,702 items
These companies protect organizations from digital threats.
Advanced Manufacturing
4,336 items
Companies in the advanced manufacturing tech space, including companies focusing on technologies across R&D, mass production, or sustainability
Advanced Manufacturing 50
50 items
Nozomi Networks Patents
Nozomi Networks has filed 14 patents.
The 3 most popular patent topics include:
- Computer network security
- Computer security
- Machine learning

Application Date | Grant Date | Title | Related Topics | Status |
---|---|---|---|---|
12/26/2020 | 8/8/2023 | Domain name system, Network protocols, Computer network security, Virtual private networks, Machine learning | Grant |
Application Date | 12/26/2020 |
---|---|
Grant Date | 8/8/2023 |
Title | |
Related Topics | Domain name system, Network protocols, Computer network security, Virtual private networks, Machine learning |
Status | Grant |
Latest Nozomi Networks News
Sep 11, 2023
It could take decades to truly benefit from more secure by design hardware and software systems from original equipment manufacturers in control systems and medical devices arenas. Published Sept. 11, 2023 Danielle Jablanski is an OT cybersecurity strategist at Nozomi Networks. According to the 2021 ERO Reliability Risk report from the North American Electric Reliability Corporation, or NERC, electric power stakeholders listed the changing energy resource mix in the U.S. and cybersecurity as the most critical risks to their businesses and operations. The recently released U.S. Cybersecurity Strategy emphasizes the need to embrace security and resilience by design throughout, specifically highlighting the urgent requirement to secure our clean energy future. Unfortunately, the document does not directly outline a desire to shape market forces to drive security and resilience for the development and interconnection of distributed energy resources. DER technologies include solar, wind, combined heat and power, microgrids, energy storage, microturbines and diesel generators. Energy efficiency, demand response and electric vehicles (EVx) are also sometimes considered DERs. EV charging can both consume and generate power. Whereas DERs can sometimes be likened to existing IoT platforms and use-cases, inverter-based DER (solar, wind and battery storage) are increasingly directly connected to transmission and distribution systems on the electric grid. The energy transition is moving away from centralized generation and command and control to a new model of decentralization. It could take decades to truly benefit from more secure by design hardware and software systems from original equipment manufacturers in control systems and medical devices arenas. However, strategic imperatives for today’s DER ecosystem — vendors, operators, integrators and utilities — could introduce a more secure and resilient grid tomorrow. Responsibility for more secure infrastructure The push for a clean energy future is two-fold, partly to reduce carbon emissions and partly to build redundancy for the load and demand on our bulk power systems. According to NERC , the mix is “transforming from large, remotely-located coal-fired and nuclear power plants, towards natural gas-fired, renewable, and distributed energy resources … [introducing] micro- and smart-grids, demand response technologies as well as an increasing reliance on just-in-time delivery of natural gas to fuel new generating capacity.” The changing resource mix comes with a highly fragmented manufacturing ecosystem, and potential high consequence cyber events potentially impacting the bulk power system. Despite the infrastructure bill’s $65 billion projected for investment in renewable energy, there is no clear indication of who is responsible for securing the energy transformation by design. There are no specific cybersecurity requirements for the connectivity of DER. Further, there are no clear standards or mandates to incentivize the procurement of more secure by design technologies if developers and manufacturers are left to pursue the cause in good faith. Paul Stockton recently underscored in his Congressional testimony for the U.S. House of Representatives Subcommittee on Oversight and Investigations, “the very measures we take to enhance the reliability of an IBR-heavy grid may inadvertently jeopardize the grid’s cyber resilience.” As Stockton describes, inverter-based systems, which can trip offline or reduce output in response to changes in grid frequency, provide a new attack surface and have the potential to impact the bulk power system due to “systemic deficiencies.” While many entities have a stake in the cybersecurity of DER technologies (NERC, NIST, IEC, DOE, CISA, etc. ), there are no current cybersecurity requirements for vendors or asset owners. The IEEE DER communications standard 1547, last updated in 2018, decidedly states that cybersecurity is out of scope, though the National Renewable Energy Laboratory, or NREL, is working on optional recommendations . Instead, it reminds stakeholders that security requirements are based on “mutual agreements specific to deployments and subject to regulatory restrictions of the corresponding jurisdiction.” Potential for cyber manipulation and sabotage Today, the penetration of both inverter-based and non-inverter-based DER technologies is minimal, with solar technologies being the most prevalent. In 2022, there were approximately 90 gigawatts of installed DER in the U.S, projected to reach ~380 gigawatts by 2025. As researchers have previously articulated, some devices are easier than others to control at scale. More recently, the industry has contemplated the impacts of corrupting, destroying or hijacking public and home EV charging stations to degrade or invade electricity networks. The NERC 2023 State of Reliability Report outlines five main concerns: The need for standards to provide oversight for connected and distributed DER technologies The need for DER integration planning to be incorporated into broader cyber-informed engineering plans and strategies Supply chain risks are exacerbated with increased DER, and a more diversified future grid does not dispel supply chain security concerns Though no cyber incidents have caused grid disturbances, there were 8 CIP-008-06 reported incidents in 2022 The most common issue seen by NERC in 2022 continues to be the exploitation of known common vulnerabilities and exposures in vendor systems It is worth noting that utilities do have a robust and defined application and review process for interconnection, despite the absence of mandated cybersecurity considerations. Yet still, a number of legitimate ways to target and compromise DER technologies could produce scenarios with the potential to disrupt localized power generation or distribution. While the increased attack surface may lead to more access vectors across the grid, it could likewise yield more redundancy than our current reliance on a small number of critical bulk systems. The most overwhelmingly agreed upon risk by all stakeholders remains the potential compromise of utility-connected systems. NREL articulates additional cybersecurity concerns mainly focused on the heavy reliance of DER on ubiquitous, bi-directional communications for remote control and monitoring, sometimes leveraging internet connectivity. Their 2019 overview document on DER also describes how some DER metering technologies can be manipulated to impact pricing of energy for customers and consumers. Conclusion It is the dawn of the prosumer era. Prosumers are individuals, homes or businesses that both consume energy and produce it, providing surpluses back to connected distribution networks. One challenge for governing the future of the secure clean energy transformation is an economic one. There needs to be a way to incentivize more secure technology development that does not stifle the innovation of the DER start up communities, and also does not limit DER development to market monopolies. There is a strategic opportunity to proactively secure the energy transformation as it unfolds. Similar to recent efforts like the Cybersecurity and Infrastructure Security Agency Cyber Trust Mark and recent Food and Drug Administration cybersecurity requirements for medical device manufacturers, DER development and deployment will require cybersecurity standards that are not bolted on in five to ten years. The scrutiny for testing cannot be isolated to government labs, but instead should be consistently applied to those who develop, own and operate these technologies as a shared mission in securing precious and life altering resources. Some organizations like the Sunspec Alliance , the Center for Internet Security and UL Solutions have been developing cybersecurity standards and specifications for internet of things and DER devices. This fragmented ownership of standard and guidance is directly in conflict with the U.S. national cybersecurity strategy’s goal to harmonize and streamline new and existing regulations. The administration would be hard pressed to find another sector more in need of gap analysis to drive better cybersecurity requirements than the distributed energy future. Without a secure by design emphasis on the full ecosystem of emerging DER and clean energy technologies, there exists a future in which the mixed and distributed energy grid is just as, if not more, at risk for cyber manipulation than it is today. As the NREL report stipulated in 2019, “having uniform standards and enforcing them for vendors before connecting devices, rather than lowering requirements according to current vendor capabilities, is critical for minimizing cybersecurity risk.”
Nozomi Networks Frequently Asked Questions (FAQ)
When was Nozomi Networks founded?
Nozomi Networks was founded in 2013.
Where is Nozomi Networks's headquarters?
Nozomi Networks's headquarters is located at 575 Market Street, San Francisco.
What is Nozomi Networks's latest funding round?
Nozomi Networks's latest funding round is Series D - II.
How much did Nozomi Networks raise?
Nozomi Networks raised a total of $152.5M.
Who are the investors of Nozomi Networks?
Investors of Nozomi Networks include JCI Ventures, Telefonica Tech Ventures, Forward Investments, In-Q-Tel, Triangle Peak Partners and 10 more.
Who are Nozomi Networks's competitors?
Competitors of Nozomi Networks include Dragos, SCADAfence, Cyrebro, Microsec, Awen Collective and 9 more.
What products does Nozomi Networks offer?
Nozomi Networks's products include Vantage and 4 more.
Who are Nozomi Networks's customers?
Customers of Nozomi Networks include Enel, Trust Power and Vermont Electric.
Compare Nozomi Networks to Competitors

Claroty provides cybersecurity solutions. The company offers solutions such as asset management, asset discovery, network protection, threat detection, and more. It serves industries such as healthcare, government, and more. The company was founded in 2015 and is based in New York, New York.

Dragos offers industrial cybersecurity software. It develops an automation platform that provides visibility into assets, detection of threats through behavioral analytics, collection and correlation of various industrial control systems (ICS) and operational technology (OT) data sets. It was founded in 2016 and is based in Hanover, Maryland.

Mission Secure operates as a cyber security service provider. It provides cybersecurity to organizations in the defense, energy, and transportation industries. Its platform takes operational technology cybersecurity to control systems. It was founded in 2014 and is based in Charlottesville, Virginia.

Phosphorus provides xTended Security of Things™ platform designed to secure the growing and unmonitored things across the enterprise xIoT landscape. Its security platform delivers attack surface management, hardening and remediation, and detection and response to enterprise, retail, finance, defense, and intelligence industries. The company was founded in 2016 and is based in Nashville, Tennessee.

Forescout delivers automated cybersecurity solutions through an integrated platform. Its solutions include risk and exposure management, Internet of Things (IoT) security, asset inventory management, medical device security, and more. It serves financial services, government, healthcare, energy and utilities and education industries. The company was founded in 2000 and is based in San Jose, California.

Armis develops an asset intelligence and security platform. The platform helps protect devices such as laptops and smartphones, smart televisions (TVs), webcams, printers, industrial robots, medical devices, and more. It offers cyber asset attack surface management solutions, medical device security solutions, operational technology asset management solutions, and more. The company serves healthcare, manufacturing, retail, and other industries. It was founded in 2015 and is based in San Francisco, California.