Managing cybersecurity risks

Connectable devices cybersecurity-assessed in our own lab

Connected devices and the vast amounts of data they generate continue to grow exponentially, with forecasts calling for more than 41.6 billion connected IoT devices by 2025.1 But in a world of amped-up connectivity comes an increased risk of cyberattacks.

Today's customers want cybersecurity addressed for many reasons, like operational downtime, customer data loss, impacts on lifecycle costs and brand reputation — any one of which can seriously impact customer loyalty and the bottom line. And because cybersecurity incidents can cripple an organization in minutes, customers now want suppliers to provide evidence that the products they sell comply with industry cybersecurity standards.

A series of industry firsts

For years, Eaton has maintained strict procedures at every stage of the product development process. This discipline has paved the way for collaboration with renowned standards leader, UL (Underwriters Laboratories), to establish measurable cybersecurity criteria for network-connected power management products and systems.

A connected world needs trusted environments. Our collaboration with UL further expands our commitment to advancing these new technologies and innovations, while building trust and ensuring the highest level of defense against emerging cybersecurity threats.

Michael Regelski, senior vice president and chief technology officer for Eaton’s electrical business
Eaton cybersecurity lab in Pittsburgh, PA
Eaton cybersecurity lab in Pune, India

Eaton has the first research and testing facility approved to participate in UL's Data Acceptance Program for cybersecurity in Pittsburgh, Pennsylvania. Recently, UL approved a second Eaton lab to join the program — another industry first — in Pune, India. These accredited lab environments provide the global capability to test Eaton products with intelligence or embedded logic to key aspects of the UL 2900-1  Standard. 

There's no need to take chances with connected solutions. With products tested in our specialized labs, our customers can rest easier, knowing Eaton devices are compliant with the highest industry cybersecurity requirements before they're installed in critical systems.

We know cybersecurity is a global threat and having the capability worldwide to ensure the highest standards are consistently applied to our technology is a key advantage for our customers.

Michael Regelski, senior vice president and chief technology officer for Eaton's electrical business

Less uncertainty, more security

The general requirements for the UL 2900 Standard for Software Cybersecurity for Network-Connectable Products (UL 2900) include processes to test devices for security vulnerabilities, software weaknesses and malware. Backed by testing methodology that aligns with UL requirements throughout the product development lifecycle, we're proud to announce a series of technologies that meet these UL cybersecurity standards:

Power Xpert Dashboard

The Power Xpert Dashboard was the first power management product certified to the UL 2900-1 Standard for cybersecurity in industrial control systems. This user portal to Eaton's switchgear enables customers to monitor, diagnose and control devices from outside the arc flash boundary.

SMP IO-2230

The utility grid automation technology SMP IO-2230 is the first utility substation automation technology certified under UL 2900-1. The technology is designed to help global customers monitor and control intelligent electronic devices on the electric grid and in microgrid applications.

Advanced network protection that's leading the industry.

In addition, we are proud to announce that the Eaton program has expanded to include cybersecurity certifications under the IEC (International Electric Code) 62443-4-2 standard as well as UL 2900-1 for the following two network data cards. This makes Eaton the first company in our industry to receive dual product certifications under IEC and UL standards. 

Gigabit Network Card

Eaton’s Gigabit Network Card is the first UPS connectivity device to meet the UL 2900-1 cybersecurity standard and also the IEC 62443-4-2 standard. This network card protects data center uninterruptible power systems (UPSs) and power distribution units (PDUs) against cyberthreats. 

Industrial Gateway Card

Eaton’s Industrial Gateway Card also achieved industry-first certification under the UL 2900-1 standard as well as the IEC 62443-4-2 standard. This device facilitates remote monitoring of UPS systems through any building management system, enabling customized system maintenance actions and immediate notifications during power events, without having to be onsite.

Continued innovation leads to new certifications.

These are the first of many Eaton power management devices that will attain UL 2900 and IEC 62443 certifications. Look to Eaton for a growing portfolio of technologies certified to these critical cybersecurity standards going forward.

Enabling a secure environment

In a hyper-connected world, trusted environments are a must. Eaton's commitment to defending those environments comes to life at our Product Cybersecurity Center of Excellence, where our experts discover new ways to help protect products and systems against cyberattack, provide internal training and help customers deploy and maintain secure solutions.

In many companies, security is an afterthought, made evident by the number of updates deployed to account for process miscues. But at Eaton, cybersecurity is part of our DNA and an integral consideration, with strict protocols placed on the people, processes and technologies within our Secure Development LifeCycle process (SDLC), the program that integrates security protocols at every phase of product creation. SDLC spans from inception through to deployment and maintenance, enforcing cybersecurity best practices via training, threat modelling, requirements analysis, implementation, verification and ongoing support.

Strengthening cybersecurity education and research 

Eaton’s emphasis on cybersecurity extends to partnerships with universities to attract and prepare the next generation of engineers to develop new security strategies for connected devices. For example, we’ve established the Eaton Cybersecurity SAFE (Security Assessment and Forensic Examination) Lab at Rochester Institute of Technology (RIT) to provide students with hands-on experience in solving cybersecurity challenges. Together with RIT, we’re helping to equip the next generation of cybersecurity experts with the training and field experience needed to build secure products now and into the future. 

1) IDC (2019, June). 41.6 billion IoT devices will be generating 79.4 zettabytes of data in 2025. Retrieved from https://www.idc.com/getdoc.jsp?containerId=prUS45213219

The importance of validating connected products with a common global standard

As more manufacturers and industries build and deploy smart IIoT devices, the security of systems become more important and difficult to manage. Read how a common global cybersecurity standard can help save on downtime and lost revenues.

Additional resources

  • Utilities Knowledge center

    Access the information and resources that will help your business today and in the future.
    Explore more