How the Eaton Gigabit Network Card protects against supply chain cyber attacks
2:22
Eaton’s Network-M2 card for power quality connectivity provides protection from a supply chain attack. In addition to enterprise standard information security mitigations, feature branches undergo an independent code review process before being merged. M2 firmware is digitally signed, preventing the installation of unauthorized or corrupted firmware. M2 firmware is encrypted, preventing analysis for vulnerabilities. The M2 file system is digitally signed, preventing unauthorized changes to your data. Eaton’s Nework-M2 card transforms a UPS or Uninterruptable Power Supply into an enterprise level IoT device. Learn more at https://www.eaton.com/cybersecurity
Eaton’s Network-M2 card for power quality connectivity provides protection from a supply chain attack. In addition to enterprise standard information security mitigations, feature branches undergo an independent code review process before being merged. M2 firmware is digitally signed, preventing the installation of unauthorized or corrupted firmware. M2 firmware is encrypted, preventing analysis for vulnerabilities. The M2 file system is digitally signed, preventing unauthorized changes to your data. Eaton’s Nework-M2 card transforms a UPS or Uninterruptable Power Supply into an enterprise level IoT device. Learn more at https://www.eaton.com/cybersecurity
Related videos for "network card network"
-
The Eaton Gigabit Network Card for cybersecurity
1:36
As a leader in UPSs (uninterruptible power supplies), Eaton launched the Gigabit Network Card for additional cybersecurity and also faster speeds.
-
The Eaton Gigabit Network Card for cybersecurity
1:19
As a leader in UPSs (uninterruptible power supplies), Eaton launched the Gigabit Network Card for additional cybersecurity and also faster speeds.
-
07 Device Management - Configuration Settings on Network Cards (Multiple Devices)
2:14
07 Device Management - Configuration Settings on Network Cards (Multiple Devices)