How the Eaton Gigabit Network Card protects against supply chain cyber attacks

2:22

Eaton’s Network-M2 card for power quality connectivity provides protection from a supply chain attack. In addition to enterprise standard information security mitigations, feature branches undergo an independent code review process before being merged. M2 firmware is digitally signed, preventing the installation of unauthorized or corrupted firmware. M2 firmware is encrypted, preventing analysis for vulnerabilities. The M2 file system is digitally signed, preventing unauthorized changes to your data. Eaton’s Nework-M2 card transforms a UPS or Uninterruptable Power Supply into an enterprise level IoT device. Learn more at https://www.eaton.com/cybersecurity​

Featured Videos
How the Eaton Gigabit Network Card protects against supply chain cyber attacks

Eaton’s Network-M2 card for power quality connectivity provides protection from a supply chain attack. In addition to enterprise standard information security mitigations, feature branches undergo an independent code review process before being merged. M2 firmware is digitally signed, preventing the installation of unauthorized or corrupted firmware. M2 firmware is encrypted, preventing analysis for vulnerabilities. The M2 file system is digitally signed, preventing unauthorized changes to your data. Eaton’s Nework-M2 card transforms a UPS or Uninterruptable Power Supply into an enterprise level IoT device. Learn more at https://www.eaton.com/cybersecurity​

Related videos for "network card network"

Similar Videos