Managing cybersecurity risks

Connectable devices cybersecurity-assessed in our own lab

Connected devices and the vast amounts of data they generate continue to grow exponentially, with forecasts calling for 75.4 billion connected devices by 2025.1 But in a world of amped-up connectivity comes an increased risk of cyberattacks.

Today's customers want cybersecurity addressed for many reasons, like operational downtime, customer data loss, impacts on lifecycle costs and brand reputation — any one of which can seriously impact customer loyalty and the bottom line. And because cybersecurity incidents can cripple an organization in minutes, customers now want suppliers to provide evidence that the products they sell comply with industry cybersecurity standards.

A series of industry firsts

For years, Eaton has maintained strict procedures at every stage of the product development process. This discipline has paved the way for collaboration with renowned standards leader, UL (Underwriters Laboratories), to establish measurable cybersecurity criteria for network-connected power management products and systems.

A connected world needs trusted environments. Our collaboration with UL further expands our commitment to advancing these new technologies and innovations, while building trust and ensuring the highest level of defense against emerging cybersecurity threats.

Michael Regelski, senior vice president and chief technology officer for Eaton’s electrical business
Eaton cybersecurity lab in Pittsburgh, PA
Eaton cybersecurity lab in Pune, India

Eaton has the first research and testing facility approved to participate in UL's Data Acceptance Program for cybersecurity in Pittsburgh, Pennsylvania. Recently, UL approved a second Eaton lab to join the program — another industry first — in Pune, India. These accredited lab environments provide the global capability to test Eaton products with intelligence or embedded logic to key aspects of the UL 2900-1 and 2900-2-2 Standards. 

There's no need to take chances with connected solutions. With products tested in our specialized labs, our customers can rest easier, knowing Eaton devices are compliant with the highest industry cybersecurity requirements before they're installed in critical systems.

We know cybersecurity is a global threat and having the capability worldwide to ensure the highest standards are consistently applied to our technology is a key advantage for our customers.

Michael Regelski, senior vice president and chief technology officer for Eaton's electrical business

Less uncertainty, more security

In the summer of 2017, the general requirements for the UL 2900 Standard for Software Cybersecurity for Network-Connectable Products (UL 2900) were published. These guidelines include processes to test devices for security vulnerabilities, software weaknesses and malware. Backed by testing methodology that aligns with UL requirements throughout the product development lifecycle, we're proud to announce a series of technologies that meet these new UL cybersecurity standards:

Power Xpert Dashboard

The Power Xpert Dashboard was the first power management product certified to the UL 2900-2-2 Standard for cybersecurity in industrial control systems. This user portal to Eaton's switchgear enables customers to monitor, diagnose and control devices from outside the arc flash boundary.

WaveLinx smart lighting system

Our WaveLinx smart lighting system was the next Eaton technology certified to the UL standard for cybersecurity. Meeting the requirements of UL 2900-01, WaveLinx technology supports connectivity with IoT and smart building management systems to bring powerful insights and wireless control of lighting to commercial facilities.

Gigabit Network Card

Eaton’s Gigabit Network Card is the first UPS connectivity device to meet the UL 2900-2-2 cybersecurity standard. This network card protects data center uninterruptible power systems (UPSs) and power distribution units (PDUs) against cyberthreats. 

SMP IO-2230

The utility grid automation technology SMP IO-2230 is the first utility substation automation technology certified under UL 2900-2-2. The technology is designed to help global customers monitor and control intelligent electronic devices on the electric grid and in microgrid applications.

These are the first of many Eaton power management devices that will attain UL 2900 certification. Look to Eaton for additional devices certified to UL cybersecurity standards in the months ahead.

Enabling a secure environment

In a hyper-connected world, trusted environments are a must. Eaton's commitment to defending those environments comes to life at our Product Cybersecurity Center of Excellence, where our experts discover new ways to help protect products and systems against cyberattack, provide internal training and help customers deploy and maintain secure solutions.

In many companies, security is an afterthought, made evident by the number of updates deployed to account for process miscues. But at Eaton, cybersecurity is part of our DNA and an integral consideration, with strict protocols placed on the people, processes and technologies within our Secure Development LifeCycle process (SDLC), the program that integrates security protocols at every phase of product creation. SDLC spans from inception through to deployment and maintenance, enforcing cybersecurity best practices via training, threat modelling, requirements analysis, implementation, verification and ongoing support.

Strengthening cybersecurity education and research 

Eaton’s emphasis on cybersecurity extends to partnerships with universities to attract and prepare the next generation of engineers to develop new security strategies for connected devices. For example, we’ve established the Eaton Cybersecurity SAFE (Security Assessment and Forensic Examination) Lab at Rochester Institute of Technology (RIT) to provide students with hands-on experience in solving cybersecurity challenges. Together with RIT, we’re helping to equip the next generation of cybersecurity experts with the training and field experience needed to build secure products now and into the future. 

1) IHS Markit. The mobile and telecommunications landscape is changing faster than ever before. 

Retrieved from

Additional resources

  • Utilities Knowledge center

    Access the information and resources that will help your business today and in the future.
    Explore more