SELL IT TO ME
Eaton Gigabit Network M2 network card
Eaton, a provider of power management solutions, has launched its first UL certified network card, the Gigabit Network M2. This launch marks the expansion of Eaton’s cybersecurity program and collaboration with global safety science organisation UL establishing measurable cybersecurity criteria for network-connected power management products and systems. New UL cybersecurity certification for Eaton’s connected uninterruptible power supply (UPS) technology demonstrates the company’s capabilities to meet stringent specifications and customer expectations for safe, secure power management in increasingly connected environments.
Who needs the product?
The Gigabit Network M2 improves power system reliability by warning administrators of issues and enabling the orderly, graceful shutdown of servers and storage. The device is also compatible with Eaton’s Intelligent Power Manager (IPM) software and optional second-generation monitoring probes, enabling it to improve business continuity and strengthen data centre resilience. For instance, in the event of power or environmental anomalies, the Gigabit Network M2 can trigger policies configured to keep mission-critical applications running.
What benefits does it offer targeted customers?
As home to the most business-critical information and applications, data centres make attractive targets for cybercriminals. As a result, organisations must work harder than ever to make their data centres secure. While UPS systems have long been critical to ensuring data centre continuity and disaster recovery, it’s now normal for them to have public cloud connectivity. This delivers benefits around network monitoring and optimisation, improving overall reliability and enabling the UPS to be used for energy storage, or as part of a UPS-ASa-reserve solution. Yet, greater UPS connectivity also offers a way into the data centre and it’s an attack vector that cybercriminals have exploited in the past. A compromised UPS can endanger resilience, enable intelligence gathering on a site’s power consumption, or act as a launch pad for further network intrusions.