How the Eaton Gigabit Network Card protects against supply chain cyber attacks
2:22
Eaton’s Network-M2 card for power quality connectivity provides protection from a supply chain attack. In addition to enterprise standard information security mitigations, feature branches undergo an independent code review process before being merged. M2 firmware is digitally signed, preventing the installation of unauthorized or corrupted firmware. M2 firmware is encrypted, preventing analysis for vulnerabilities. The M2 file system is digitally signed, preventing unauthorized changes to your data. Eaton’s Nework-M2 card transforms a UPS or Uninterruptable Power Supply into an enterprise level IoT device. Learn more at https://www.eaton.com/cybersecurity
Eaton’s Network-M2 card for power quality connectivity provides protection from a supply chain attack. In addition to enterprise standard information security mitigations, feature branches undergo an independent code review process before being merged. M2 firmware is digitally signed, preventing the installation of unauthorized or corrupted firmware. M2 firmware is encrypted, preventing analysis for vulnerabilities. The M2 file system is digitally signed, preventing unauthorized changes to your data. Eaton’s Nework-M2 card transforms a UPS or Uninterruptable Power Supply into an enterprise level IoT device. Learn more at https://www.eaton.com/cybersecurity
Related videos for "network card network"
-
Gigabit Network Card (Network-M3)
1:03
With a zero-trust architecture and compatibility with remote and on-site management tools, Eaton's Gigabit Network Card (Network-M3) gives IT professionals enhanced management and cybersecurity capabilities.
-
Eaton Gigabit Network-M3 card – Enhanced capabilities, unmatched security
0:15
Eaton Gigabit Network-M3 card – Enhanced capabilities, unmatched security
-
Eaton Gigabit Network Card (Network-M3): Overview
8:21
Eaton's latest network management card improves business continuity by providing warnings of pending issues to administrators and helping to perform orderly shutdown of servers and storage.