Biggest OT Security Acquisition Ever & Market Shakeup Explained

[ST # 77] The Mitsubishi-Nozomi $1B Deal & Industry Future & Cyber attacks on the rise ✍️ [Securing Things by M. Yousuf Faisal]

In partnership with

Disclaimer: All views presented here, in this newsletter, are my own.

Author or the newsletter are not liable for any actions taken by any individual or any organization / business / entity. The information provided is for education and awareness purposes only and is not specific to any business and or situation.

M. Yousuf Faisal

Hey there,

These are some interesting times, when it comes to cybersecurity industry, e.g.: the Biggest OT Security Solution acquisition (focus of this newsletter) and also, multiple large scale cyber attacks and operational disruptions for businesses.

In this newsletter, What You’ll Learn:

🚨Large scale cyber attacks causing business disruption and impact.

🔥 Mitsubishi Electric’s acquisition of Nozomi Networks: Deal Breakdown

📜 Timeline of OT Security Acquisitions (2015–2025)

🔎 Key Takeaways from Mitsubishi’s Press Release (Sept 9, 2025)

📌 Expert Briefing (Analytical View) and🔮 Future Outlook (2025–2030)

📜 Vendor-Neutral Q&A Checklist for OT/ICS Buyers

🌟Recommendations — who should do what now & Vendor-Neutral Q&A Checklist for OT/ICS Buyers.

Please let us know by filling out the poll at the end of this edition and feel free to share your thoughts through comments, likes, or reshares. 🚨

♻️if you know someone in your professional circle who will benefit from this guidance and or are interested in learning. Thanks 🌟 

So let’s dig in.

Yours truly.

— Yousuf.

Notable Cybersecurity Activities

  • Large scale NPM / GitHub hack of all times with many companies impacted.

  • Possibly the Largest supply chain compromise in npm, Inc. history, debug and chalk packages with a total of 2 billion weekly downloads just got turned malicious.

  • CrowdStrike Falcon Prevents Supply Chain Attack Involving Compromised NPM Packages.

  • Global auto-manufacturers Jaguar Land Rover and Bridgestone faced significant cyber events, causing multi-plant shutdowns and production slowdowns. These incidents highlight that attackers now target operational continuity, not just data.

  • A cyberattack on a key passenger check-in and Kiosks systems provider caused chaos at major European airports on Saturday, leading to long queues, delays, and cancellations. Berlin-Brandenburg Airport confirmed the attack targeted an external technology provider, prompting a switch to manual procedures and system disconnections, which slowed down check-in and boarding. Passengers experienced long waits and multiple flight delays.

  • several other attacks on companies around the world.

🔥 Mitsubishi Electric’s acquisition of Nozomi Networks: Deal Breakdown and Timelines

🔥 Mitsubishi Electric’s landmark US$883M acquisition of Nozomi Networks is the largest deal in the history, to date, of the OT security tools sector, definitively shifting the industry landscape and sparking debate around the future of vendor-agnostic solutions in OT Cybersecurity.

  • Deal Announcement: Mitsubishi Electric’s intent to wholly acquire Nozomi Networks was made public in early September 2025, following a previous strategic investment as part of Nozomi’s $100M Series E round in March 2024.

  • Deal Value: The transaction is valued at approximately US$883M — by far the largest such acquisition in the OT/IoT security domain to date.

  • Closing Date: Finalization is expected in Q4 2025, with Nozomi to maintain headquarters in San Francisco and R&D in Switzerland.

  • Strategic Vision: Mitsubishi Electric plans to enhance its OT security and digital transformation services by integrating Nozomi's AI, asset visibility, and threat intelligence platforms. Utilizing secure data from both companies' customer bases, they aim to co-create global services to accelerate Serendie-related businesses, aligning with Mitsubishi's acquisition goals.

I see many of you visit the newsletter site, consume the content, however, a low percentage of you actually registers.

So before we begin, do me a favour and make sure you hit the “Subscribe” button to let me know that you care or liked what you’ve read and keep me motivated to publish more. Thanks!

Together with:

The Gold standard for AI news

AI keeps coming up at work, but you still don't get it?

That's exactly why 1M+ professionals working at Google, Meta, and OpenAI read Superhuman AI daily.

Here's what you get:

  • Daily AI news that matters for your career - Filtered from 1000s of sources so you know what affects your industry.

  • Step-by-step tutorials you can use immediately - Real prompts and workflows that solve actual business problems.

  • New AI tools tested and reviewed - We try everything to deliver tools that drive real results.

  • All in just 3 minutes a day

📜 Timeline of OT Security Acquisitions (2015–2025)

Here are the major OT security acquisitions from the last decade, with known deal sizes:

Acquirer

Target

Year

Deal Size (USD)

Notes

Mitsubishi Electric

Nozomi Networks

2025

$1 billion

Largest-ever OT security tool deal

Rockwell Automation

Verve

2023

~ 190 Million

OT agent based Risk Platform

Honeywell

SCADAfence

2023

Undisclosed

OT/IoT security portfolio expansion

Tenable

Indegy

2019

~$78 million

OT visibility, threat detection

Cisco

Sentryo

2019

Undisclosed

Industrial network security

Microsoft

CyberX

2020

~$165 million

IoT/ICS protection

Forescout

SecurityMatters

2018

$113 million

OT network monitoring

Accenture

Revolutionary Security

2020

Undisclosed

OT/IT critical infrastructure security

Palo Alto Networks

CyberArk

2025

Undisclosed (large-scale)

Identity/OT security

2016–2017: M&A / Early Strategic Moves

  • Honeywell acquires Nextnine (2017)

    • Focus: Remote industrial asset monitoring & security management.

    • Significance: One of the first major automation vendors to bring OT security in-house.

2018–2019: M&A / Wave of Consolidation

  • Tenable acquires Indegy (2019, ~$78M)

    • Focus: OT network visibility, asset discovery, anomaly detection.

    • Significance: Brought OT visibility into a mainstream IT vulnerability management platform.

  • Cisco acquires Sentryo (2019, undisclosed)

    • Focus: ICS/OT network monitoring and visibility.

    • Significance: Integrated OT threat detection into Cisco’s networking and security portfolio.

  • Forescout acquired SecurityMatters (2018, $113 million)

    • Focus: OT asset visibility and network monitoring

    • Significance: Brought OT visibility into its network access/monitoring platform.

2020–2021: M&A / Venture-Backed Expansion

  • Rockwell Automation invests in Claroty (2020)

    • Not an acquisition but a strategic partnership and equity investment.

    • Significance: Demonstrated the trend of industrial conglomerates aligning with OT security startups.

  • Microsoft acquired CyberX (2020, ~$165 million)

    • Focus: Strategic acquisition to acquire IP, resources & skills for OT.

    • Significance: technology later integrated into Azure IoT.

  • Schneider Electric & Johnson Controls join Claroty funding (2021)

    • Strengthened Claroty’s industrial alliances.

2022–2023: M&A / Security Cloud Platforms Take Interest

  • 2022: Claroty acquired Medigate (healthcare IoT security) claroty.com.

    • Strategic expansion and visibility into specialized healthcare sector.

  • Microsoft partners with Claroty / Dragos (2022)

    • Strategic alliances rather than acquisitions.

    • Significance: Big Tech testing the OT waters but hesitant to acquire.

  • Armis raises PE capital at >$3B valuation (2023)

    • Expansion into OT + IoT visibility space.

    • Significance: Showed massive investor interest, but still independent.

  • Honeywell acquired SCADAfence (2023, Undisclosed)

    • OT threat detection

  • Rockwell Automation acquired Verve Industrial (2023, $190 million)

    • OT risk platform portfolio expansion to OEMs offerings.

2024–2025: Mega Deals & Market Maturity

  • 2024: Dragos acquired Network Perception (2024, undisclosed)

    • Advance OT Network Visibility

    • combine the companies' complimentary cybersecurity products to enhance network security.

  • Mitsubishi Electric acquires Nozomi Networks (2025)

    • Largest OT security acquisition to date (Sep 2025, $883 Million).

    • Significance: First industrial automation giant to fully acquire a top-tier OT security vendor.

    • Impact: Potential end of “vendor-agnostic” OT tools; accelerates industry consolidation.

The Mitsubishi-Nozomi deal is the largest disclosed OT security acquisition, surpassing previous significant deals.

Notable but undisclosed investments have been made by Honeywell, Accenture, and Palo Alto Networks in OT and industrial cybersecurity.

Before this landmark deal, Forescout's acquisition of SecurityMatters and Tenable's of Indegy were the most prominent pure-play OT security transactions.

Microsoft, Cisco, and Accenture have also made significant investments, emphasizing the convergence of IT and OT security.

These transactions illustrate the accelerating pace, scale, and strategic imperative of OT security consolidation across the sector.

Each of these deals were large for its time, but the Mitsubishi–Nozomi transaction sets a new bar. By paying roughly $883 million for the remaining 93% of Nozomi (after its 7% stake purchased last year).

Mitsubishi has effectively created a $1B valuation benchmark in the OT cybersecurity market. This has prompted both investors and vendors to reassess valuations for other leaders like Dragos and Claroty.

📌 Earlier acquisitions deals, after this, seems were smaller tuck-ins.

Mitsubishi–Nozomi is order-of-magnitude larger, marking the transition of OT security from VC-driven growthindustrial conglomerate consolidation.

🔎 Key Takeaways from Mitsubishi’s Press Release (Sept 9, 2025)

  • Deal Structure:
    Mitsubishi Electric acquired Nozomi Networks as a wholly owned subsidiary. The brand “Nozomi Networks” will be retained for market continuity.

  • Strategic Rationale:
    Mitsubishi aims to combine its factory automation (FA), energy systems, and building solutions businesses with Nozomi’s cybersecurity and network monitoring platforms.
    The goal: deliver comprehensive IT + OT security solutions for critical infrastructure and smart factories.

  • Market Vision:
    The acquisition is positioned as part of Mitsubishi’s strategy to strengthen its “digital manufacturing” and “sustainable infrastructure” offerings under its “Mission Net Zero 2050” framework.

  • Financial Impact:
    Mitsubishi expects Nozomi’s recurring SaaS model and global client base to support both short-term revenue growth and long-term digital transformation leadership.

  • Technology & Product Synergy:

    • Nozomi brings ICS/OT anomaly detection, visibility, and AI-driven threat detection.

    • Mitsubishi brings a global installed base in manufacturing, power, and transportation systems.

    • Together, they can integrate security natively into industrial automation platforms—a step beyond “bolt-on” OT security.

📊 Analyst Commentary & Predictions

1. Why This Acquisition Matters

  • This is the largest OT security tools acquisition to date, surpassing earlier M&A moves by other OEM and large vendors.

  • It shows that industrial conglomerates (not just pure cybersecurity players) are now buying OT security companies to embed protection into automation stacks.

2. Short-Term Impact (1–2 years)

  • Nozomi will benefit from global scaling through Mitsubishi’s sales and distribution channels, especially in Asia-Pacific and Japan where Mitsubishi dominates factory automation.

  • Expect faster adoption in manufacturing verticals, with Mitsubishi using Nozomi as the “default security layer” for its industrial customers.

3. Medium-Term Impact (3–5 years)

  • Vendor-Agnostic Model at Risk:
    Nozomi, known for its vendor-neutral OT visibility solution, may face resistance from competitors like Siemens, Rockwell, and Schneider after Mitsubishi's acquisition. This could lead to ecosystem lock-ins, with major automation vendors providing their own security solutions.

  • Market Consolidation:
    The acquisition accelerates consolidation:

    • Claroty (backed by Rockwell, Schneider, Johnson Controls)

    • Dragos (still independent but potential acquisition target by Microsoft, IBM, or AWS)

    • Armis (private equity-backed, with crossover IT/OT play)

  • Shift Toward Convergence:
    Expect tighter integration of OT monitoring with IT/Cloud SOC platforms. Nozomi under Mitsubishi could push for a hybrid IT/OT SOC offering, aligned with XDR and ITDR trends.

4. Long-Term Outlook

  • By 2030, OT security tools will no longer be standalone. They’ll be embedded into:

    • Industrial automation systems

    • Cloud monitoring platforms

    • AI/ML-driven predictive maintenance systems

  • Mitsubishi’s move may set the precedent: in the future, vendor-agnostic OT tools could disappear, replaced by vendor-native security ecosystems.

📌 Expert Briefing (Analytical View)

General sentiment:

Mitsubishi's acquisition of Nozomi marks a shift in OT security, moving from standalone monitoring to integrated components in industrial automation and cloud ecosystems.

This could boost adoption, but may fragment the market and limit interoperability.

Security buyers will face a choice between ecosystem lock-in and best-of-breed independence over the next five years..

Some other key interesting articles on the topic:

  • Analysis: Mitsubishi Electric To Acquire Nozomi Networks by Dale Peterson - where Dale provides critical analysis on the deal, crunching some $$$ info and few predictions. From the same link above, from comments by Sinclair, its seems there were rumours earlier for Honeywell, interested in acquiring Nozomi.

  • Forge Global list out the Nozomi Networks IPO deal details.

Securing Things Offer:

OT/ICS Security Solutions Comparison Toolkit - provides the framework and evaluation criteria for comparing a suitable solution for your industrial environment.

👉 Toolkit provides a criteria around 10 Key Topic areas below with 60+ requirements, each with an adjustable weightage - add per your specific needs:

👉 Supported measuring scale for scoring each of the defined requirements.

👉 Saves several days to a week's worth of your security team's resource time for the related research and taking the guess work out of the equation.

👉 Tested in real-world? Yes, the comparison toolkit has been used by manufacturers to help make an informed decision on selecting the right tool.

OT/ICS Security Solutions Comparison Toolkit - A structured framework to make an informed decision for comparison and selection of an OT IDS/AD solution for your production environment.

🔮 Future Outlook (2025–2030)

  • By 2030, OT security tools will no longer be standalone. They’ll be embedded in automation systems, cloud monitoring platforms, and AI-driven predictive maintenance [Strategy of Security, 2025].

  • Mitsubishi’s acquisition of Nozomi is the first big signal: the market is heading toward vendor-native, ecosystem-integrated security.

  • The coming years will see continued consolidation, forcing CISOs to choose between ecosystem lock-in vs. independent best-of-breed tools.

Vendor-Neutral Q&A Checklist for OT/ICS Buyers

When evaluating Mitsubishi/Nozomi (or any vendor) post-acquisition—or when selecting an OT security vendor—ask these questions to assess vendor neutrality, interoperability, and long-term value:

Question

Why It Matters

1. What is your policy on device and vendor support?
Do you support heterogenous devices (PLCs, RTUs, sensors) from brands other than your own, and commit to continued support?

Ensures solution is not-vendor-locked and works in mixed environments; maintains flexibility.

2. Do you publish APIs, SDKs, or integration kits?
What is the openness for integration with third-party systems / inertial devices?

Openness → ability to integrate with existing tools & future-proofing.

3. What is your roadmap for embedding/hardware integration vs. standalone deployment?
Will embedded versions lock out non-OEM use or require proprietary formats?

To monitor risk of being tied to OEM product lines and losing neutrality.

4. What are your pricing model and contract terms concerning upgrades or feature locks?
Are there fees for interoperability or cross-vendor support?

Hidden pricing or restrictive licensing can erode value and freedom.

5. How is customer data handled?
Where is data stored (cloud region)? What are data sovereignty, privacy and export controls?

Critical in regulated sectors and for trust in cloud/SaaS models.

6. What SLAs, product update cadences, and vulnerability response practices do you maintain?
Post-acquisition, will teams continue running with same speed?

Speed of patching and feature development translates to security and competitiveness.

7. Do you support third-party audits / certifications / compliance?
E.g. IEC 62443, NERC CIP, ISO 27001 or equivalent.

Ensures independent validation, regulatory compliance, and trust.

8. What partner / OEM / reseller ecosystem exists?
Are there non-OEM partner integrations, or is ecosystem limited to own product line?

A wide partner network increases flexibility, mitigates lock-in.

9. How are you ensuring transparency in vendor ownership impact?
What guarantees exist that independence (brand, roadmap, neutrality) will be preserved?

After acquisitions, sometimes vision changes; asking now helps set expectations.

10. What is the upgrade/exit path?
If I adopt this solution and future needs change (e.g. shift to another OEM or want scale-up), how portable are configuration/data/investment?

Helps safeguard against future switching costs or stranded investments.

Recommendations — who should do what now?

For enterprise OT/ICS buyers

  • Demand explicit neutrality commitments and API / interop guarantees in procurement contracts when considering Mitsubishi-bundled Nozomi solutions. Ask for third-party attestations or multi-vendor test results.

  • Short term: leverage Mitsubishi/Nozomi bundled offers for rapid security posture improvements; medium term: maintain an architecture that can mix OEM-embedded features with neutral tooling to avoid lock-in.

Here’s a sound advice My OT Security Vendor Was Aquired ... What Should I Do? - by Dale Peterson.

For competing OT vendors / startups

  • Consider specialization (vertical focus like energy or pharma), deep API/partner programs, or MSSP partnerships to sustain growth.

  • Prepare for active M&A markets; strengthen recurring revenue profiles (SaaS/managed services) and evidence of large customer deployments.

For investors / VCs

  • Use Nozomi’s implied multiple as a new top-tier benchmark; expect higher prices for proven SaaS-based OT vendors. Assess target companies for ARR, gross margins (SaaS economics), growth rate, and strategic OEM partnerships.

For Mitsubishi & Nozomi leadership

  • Publicly document and operationalize neutrality & interoperability guarantees (technical and contractual).

  • Maintain Nozomi’s innovation cadence by preserving R&D autonomy, metrics, and incentives.

  • Execute go-to-market plays that show measurable ARR uplift within 18 months (joint pilots, conversions) to validate Serendie projections.

Conclusion: The Future of OT Security Tools

Mitsubishi's US$883M acquisition of Nozomi could trigger industry consolidation by aligning Mitsubishi's OT device scale and Serendie platform with Nozomi's SaaS and sensor portfolio. Success hinges on scaling Nozomi while preserving its vendor-neutral reputation. A successful integration could boost OT security adoption and meet Serendie revenue targets, while failure risks costly integration and weakened Nozomi leadership.

  1. This deal materially accelerates industrial OEMs’ role in OT security. Mitsubishi will integrate OT security into its Serendie data platform and automation portfolio, prompting other OEMs to consider strategic acquisitions or partnerships with OT security vendors.

  2. Vendor-agnostic solutions remain necessary — but their business model must adapt. Mitsubishi's commitment to Nozomi's neutrality reflects market diversity: some customers want integrated OEM bundles, others prefer vendor-neutral platforms to avoid lock-in. Neutral vendors can remain relevant through interoperability and multi-OEM certification, but scaling may need partnerships, white-labeling, or service specialization. Mitsubishi supports diverse environments but will integrate tech into components.

  3. Valuations and consolidation will rise; M&A heat will follow. Paying nearly US$883M for Nozomi sets a valuation benchmark, attracting buyers. Expect increased M&A interest in top OT security assets over the next 18–36 months, driven by the acquisition price and Mitsubishi’s growth-focused roadmap.

  4. If Mitsubishi preserves Nozomi’s autonomy and partner openness, the acquisition can increase choice overall by scaling a leading platform globally. The ideal outcome is for Nozomi's innovation to accelerate while remaining multi-vendor compatible, achievable through governance, partner policies, and integration discipline, as outlined in the PDF.

Some interesting Social posts 📜 

📜Here are some interesting posts to read✍

My Recent Most Viewed Social Posts

In case you’ve missed - here are some of my recent most viewed social posts.

How are we doing?

I invite you as part of #SecuringThings community to share your feedback.

Rate the newsletter content

Did you find the content valuable?

Login or Subscribe to participate in polls.

Your feedback and input is invaluable to me as we work together to strengthen our cybersecurity defenses and create a safer and smarter digital society.

Let us know how we can improve this and or what you’d like to see in future?

Thank you for your trust and continued support.

Do register, validate your email, and request login link to submit poll to be able to enter a chance to win a future course giveaway.

Thanks for reading - until the next edition!

It’s a Great Day to Start Securing Things for a Smart & Safer Society.

Take care and Best Regards,

M. Yousuf Faisal. (Advice | Consult Cyber & business leaders in their journey on Securing Things (IT, OT/ICS, IIOT, digital transformation, Industry 4.0, & AI) & share everything I learn on this Newsletter | and upcoming Academy). 

Follow Securing Things on LinkedIn | X/Twitter & YouTube.

Reply

or to participate.