INFRASTRUCTURE TEAM
+27 (0) 11 237 1000
Please note we do not sell directly to the public. Please use our Dealer locator to find your nearest Mustek Dealer. Click Here
What is remote monitoring for UPS?
An uninterruptible power supply (UPS) is ready 24/7, 365 days a year to secure the supply of high-quality electrical power to your critical load.
Such a critical and complex system requires regular maintenance to avoid unexpected downtime. Helping to minimize the risk of outages, remote monitoring is like having a virtual Eaton specialist on site.
Eaton Cyber Secured Monitoring is a cloud-based service designed to predict the failure of power components. And with the addition of analytics, it shifts power monitoring from a reactive to a proactive model.
What is remote monitoring for UPS?
An uninterruptible power supply (UPS) is ready 24/7, 365 days a year to secure the supply of high-quality electrical power to your critical load.
Such a critical and complex system requires regular maintenance to avoid unexpected downtime. Helping to minimize the risk of outages, remote monitoring is like having a virtual Eaton specialist on site.
Eaton Cyber Secured Monitoring is a cloud-based service designed to predict the failure of power components. And with the addition of analytics, it shifts power monitoring from a reactive to a proactive model.
The main benefits include:
Remote monitoring also enables:
Eaton Cyber Secured Monitoring uses Industrial Gateway and Gigabit Network connectivity cards, the first to receive UL 2900-1 and IEC 62443-4-2 certifications, based on strong security criteria including encryption algorithms. The chosen IoT platform has been a market leader in Europe for over 20 years and is yearly audited for the IEC certification.
Security is further guaranteed by:
What protocols does it use?
Eaton’s corporate strategy outlines a secure development lifecycle that includes guidelines and deliverables for guaranteed safety and security during the development of Eaton products.
For example, at a very early stage, a product’s data flow is analysed to identify any criticality. Any sensitive and personal data that can be identified through this process is checked to ensure compliance with the latest data protection regulations, such as GDPR. This process enables Eaton to identify security requirements for all products with in-built intelligence. Security requirements
are identified based on a wide different range of industry standards. Collated into a single internal document , these requirements provide a uniform approach to product development that is compliant with multiple security standards and can therefore be sold in any part of the world.
The secure-by-design approach was used throughout the development of the entire solution. Run manually rather than by automated scanning, the security assessment found that it was not possible for any sensitive or personal data to be regularly transmitted.
Share this on your favourite channel: