An uninterruptible power supply (UPS) is ready 24/7, 365 days a year to secure the supply of high-quality electrical power to your critical load.
Such a critical and complex system requires regular maintenance to avoid unexpected downtime. Helping to minimise the risk of outages, remote monitoring is like having a virtual Eaton specialist on site.
Eaton Cyber Secured Monitoring is a cloud-based service designed to predict the failure of power components. With the addition of analytics, it shifts power monitoring from a reactive to a proactive model.
24/7 specialist system monitoring with the capability to remotely diagnose any issue, and to assess whether the issue can be fixed remotely or requires on-site assistance.
even a tentative cyberattack can impact the voltages and current values of a UPS system. By identifying whether your system has been exposed to an attack, our team of experts can help prevent any damage.
by showing all required interventions over a 12-month period.
Eaton Cyber Secured Monitoring uses Industrial Gateway and Gigabit Network connectivity cards, the first to receive UL 2900-1 and IEC 62443-4-2 certifications, based on strong security criteria including encryption algorithms. The chosen IoT platform has been a market leader in Europe for over 20 years and is audited annually for IEC certification.
Security is further guaranteed by:
Eaton’s corporate strategy outlines a secure development lifecycle that includes guidelines and deliverables for guaranteed safety and security during the development of Eaton products.
For example, at a very early stage, a product’s data flow is analysed to identify any criticality. Any sensitive and personal data that can be identified through this process is checked to ensure compliance with the latest data protection regulations, such as GDPR. This process enables Eaton to identify security requirements for all products with in-built intelligence. Security requirements are identified based on a wide different range of industry standards. Collated into a single internal document , these requirements provide a uniform approach to product development that is compliant with multiple security standards, and can therefore be sold in any part of the world.