Ea­ton Gi­ga­bit Net­work M2 net­work card

Network Middle East - - PRODUCT WATCH -

Ea­ton, a provider of power man­age­ment so­lu­tions, has launched its first UL cer­ti­fied net­work card, the Gi­ga­bit Net­work M2. This launch marks the ex­pan­sion of Ea­ton’s cy­ber­se­cu­rity pro­gram and col­lab­o­ra­tion with global safety sci­ence or­gan­i­sa­tion UL es­tab­lish­ing mea­sur­able cy­ber­se­cu­rity cri­te­ria for net­work-con­nected power man­age­ment prod­ucts and sys­tems. New UL cy­ber­se­cu­rity cer­ti­fi­ca­tion for Ea­ton’s con­nected un­in­ter­rupt­ible power sup­ply (UPS) tech­nol­ogy demon­strates the com­pany’s ca­pa­bil­i­ties to meet strin­gent spec­i­fi­ca­tions and cus­tomer ex­pec­ta­tions for safe, se­cure power man­age­ment in in­creas­ingly con­nected en­vi­ron­ments.

Who needs the prod­uct?

The Gi­ga­bit Net­work M2 im­proves power sys­tem re­li­a­bil­ity by warn­ing ad­min­is­tra­tors of is­sues and en­abling the or­derly, grace­ful shut­down of servers and stor­age. The de­vice is also com­pat­i­ble with Ea­ton’s In­tel­li­gent Power Man­ager (IPM) soft­ware and op­tional sec­ond-gen­er­a­tion mon­i­tor­ing probes, en­abling it to im­prove busi­ness con­ti­nu­ity and strengthen data cen­tre re­silience. For in­stance, in the event of power or en­vi­ron­men­tal anomalies, the Gi­ga­bit Net­work M2 can trig­ger poli­cies con­fig­ured to keep mis­sion-crit­i­cal ap­pli­ca­tions run­ning.

What ben­e­fits does it of­fer tar­geted cus­tomers?

As home to the most busi­ness-crit­i­cal in­for­ma­tion and ap­pli­ca­tions, data cen­tres make at­trac­tive tar­gets for cy­ber­crim­i­nals. As a re­sult, or­gan­i­sa­tions must work harder than ever to make their data cen­tres se­cure. While UPS sys­tems have long been crit­i­cal to en­sur­ing data cen­tre con­ti­nu­ity and dis­as­ter re­cov­ery, it’s now nor­mal for them to have pub­lic cloud con­nec­tiv­ity. This de­liv­ers ben­e­fits around net­work mon­i­tor­ing and op­ti­mi­sa­tion, im­prov­ing over­all re­li­a­bil­ity and en­abling the UPS to be used for en­ergy stor­age, or as part of a UPS-ASa-re­serve so­lu­tion. Yet, greater UPS con­nec­tiv­ity also of­fers a way into the data cen­tre and it’s an at­tack vec­tor that cy­ber­crim­i­nals have ex­ploited in the past. A com­pro­mised UPS can en­dan­ger re­silience, en­able in­tel­li­gence gath­er­ing on a site’s power con­sump­tion, or act as a launch pad for fur­ther net­work in­tru­sions.

Newspapers in English

Newspapers from UAE

© PressReader. All rights reserved.