Mitsubishi Electric's $1B Nozomi Acquisition Shifts OT Security to Hardware Vendors
Mitsubishi Electric's acquisition of Nozomi Networks consolidates OT security with industrial hardware, forcing enterprises to reconsider multi-vendor IoT stacks.
Industrial Giants Replace Security Specialists
Mitsubishi Electric's $1 billion acquisition of Nozomi Networks — the largest operational technology security deal in recent M&A history — fundamentally changes how enterprises buy IoT and OT security. Instead of layering third-party security tools over industrial hardware, buyers now face vendors offering integrated stacks: threat detection, network visibility, and endpoint protection bundled with the PLCs, SCADA systems, and sensors already running their factories and critical infrastructure.
Nozomi had raised $100 million from Mitsubishi Electric, Schneider Electric, Honeywell, and Johnson Controls before the acquisition. That investor list signals where the market is moving. Industrial hardware manufacturers are acquiring security capabilities rather than partnering with them, betting that enterprises prefer consolidated vendors over integrating point solutions.
This directly challenges pure-play security vendors like Claroty, which secured $100 million in funding backed by Bosch and Chevron for cyber-physical systems protection, and Palo Alto Networks, which offers ML-powered OT firewalls and virtual patching. The competitive dynamic shifts from "best-of-breed security" to "which industrial vendor delivers sufficient security with the least procurement friction."
What Changes for Buyers
Enterprises managing IoT deployments in manufacturing, energy, or critical national infrastructure gain simplified procurement. A single vendor relationship replaces contracts with separate hardware, network visibility, and threat detection providers. Integration risk drops — no middleware to troubleshoot, no finger-pointing between vendors when incidents occur.
But this consolidation trades flexibility for convenience. Buyers locked into Mitsubishi hardware now face switching costs if they want different security capabilities. Multi-vendor strategies that previously allowed enterprises to swap security tools without touching operational technology become harder to execute.
Budget implications cut both ways. Unified platforms reduce deployment costs and the overhead of managing multiple vendor relationships. However, enterprises lose negotiating leverage. When security is bundled with hardware, buyers cannot play security vendors against each other on price. The hardware vendor sets the terms.
Post-Quantum Encryption Enters IoT Procurement
Quantum Secure Encryption launched an enhanced Quantum Preparedness Assessment platform in February 2026, adding post-quantum compliance dashboards, migration roadmaps, and risk scoring. The company renewed a deal with India's Muthoot Group for 14,000 user licenses and signed a three-year agreement covering 4,500 licenses with three Brazilian government clients.
The threat model — "harvest now, decrypt later" attacks where adversaries collect encrypted IoT data today to decrypt once quantum computers mature — forces enterprises to evaluate cryptographic lifespan when selecting IoT vendors. Devices deployed in 2026 with 10-year operational lifespans will still be transmitting data when quantum decryption becomes viable.
This pressures generalist security vendors like Fortinet (55% firewall market share, 40% Unified SASE billings growth) and Check Point ($2.906 billion billings, up 9% in Q1 2026) to accelerate post-quantum roadmaps. Enterprises should prioritize vendors with quantum-ready encryption in RFPs now, particularly for long-lifecycle IoT deployments, rather than retrofitting quantum resistance later.
Quantum Secure Encryption differentiates through quantum-specific SDKs like qREK, but adoption remains narrow compared to established vendors. The real impact is RFP language shifting to require post-quantum roadmaps from all IoT security bidders, not just specialists.
Runtime Protection Targets AI-Powered Devices
Exein's Photon runtime security blocks cyberattacks at execution on edge devices, targeting defense, aged care, and home security markets. Unlike network-based security that monitors traffic patterns, runtime protection operates at the device layer, preemptively stopping malicious code before it executes.
This approach competes with Inturai's quantum-safe encryption for IoT edges (partnered with PQStation) and Kigen's GSMA-certified eSIMs for scalable security patching. No pricing or adoption data is public, limiting budget certainty, but the execution-level approach appeals to enterprises deploying AI-native IoT where lightweight security minimizes latency and processing overhead.
The lack of disclosed customers or benchmark data makes Photon a pilot candidate, not a production-scale replacement for established tools. Enterprises should evaluate runtime protection in limited deployments where execution speed and edge processing matter more than vendor maturity.
Market Context and Spending Trajectory
Enterprise IoT spending reached $324 billion in 2025, up 13% year-over-year. Security subsets are projected to grow from $28.67 billion in 2025 to $80 billion by 2031, reflecting escalating threat surfaces as connected devices proliferate across operational environments.
That growth funds consolidation like the Mitsubishi-Nozomi deal and specialized capabilities like quantum encryption. Buyers gain more sophisticated security options but face greater complexity in evaluating vendor roadmaps against long-term threats.
What to Watch
Track whether other industrial hardware vendors — Schneider Electric, Honeywell, Siemens — follow Mitsubishi's acquisition strategy. If they do, pure-play security vendors will either consolidate or focus on niche capabilities too specialized for hardware giants to build.
Monitor NIST's post-quantum cryptography standards timeline. Finalized standards accelerate vendor adoption and make quantum-ready encryption a table-stakes requirement rather than a differentiator.
For enterprises procuring IoT security in 2026, favor vendors demonstrating quantum roadmaps, runtime protection for AI workloads, and integration paths with existing industrial hardware. The cost of retrofitting security into long-lifecycle IoT deployments far exceeds paying for it upfront.
Technology decisions, clearly explained.
Weekly analysis of the tools, platforms, and strategies that matter to B2B technology buyers. No fluff, no vendor spin.
