Unlock industry-leading cybersecurity with confidence
In today’s fast-paced digital world, top-tier cybersecurity is no longer optional—it’s a must-have. With cyber threats becoming more sophisticated every day, the need for rock-solid protection is greater than ever. Vertiv has been at the forefront of developing secure solutions and we now offer the highest industry-standard security certifications, including UL 2900 and IEC 62443-4-2, so your systems stay ahead of emerging threats.
While others are still playing catch-up, our Vertiv™ Liebert® IntelliSlot™ RDU120 card is setting the gold standard in cybersecurity for data center infrastructure. Empower your organization with the confidence that your infrastructure is built to handle today’s—and tomorrow’s—biggest threats.
A strong security system must be designed as a system-wide approach with shared responsibilities across the different components and a comprehensive understanding of how physical, personnel and cybersecurity layers work together.
Vertiv adopts the CIAA model when it comes to security design which places a priority on identifying risks associated with confidentiality, integrity, authenticity and availability. There are many ways in which a system can be compromised and a good threat modelling program with risk assessment will lead to a strong choice of system architecture requirements with a dedicated regime of testing and continuous monitoring to follow on.
Examples of cybersecurity threat and risk assessments:
- Confidentiality could be breached, allowing unauthorized access to data. This breach could be achieved through packet sniffing, which can be avoided through encryption techniques.
- Data Integrity supports accuracy and completeness of data could be compromised through Man-in-the-Middle infiltration and can be avoided through appropriate hashing functions or CRC (Cyclical Redundancy Check) error checks.
- Data source authenticity could be circumvented through a spoofing attack - pretending to be someone. The appropriate application of digital certificates and signatures will minimize this particular risk.
- Finally, availability of data or a service could be impaired through a DoS (Denial of Service) or bad patch "upgrade" incident. This can be alleviated with a rigorous patch management policy and intelligent resource management via firmware or software routines.
In the end, adopting a secure-by-design approach and considering security over the whole system lifecycle at the development stage is the only way to mitigate and provide optimal security coverage.
One of the most important security standards that has emerged is the IEC 62443-4-2 covering components, which offers a voluntary but stringent methodology as well as documented performance, putting responsible entities in a good place when the Cyber Resilience Act (CRA) comes into force in the EU in 2027.
In short, the IEC 62443-4-2 Security Level 2 Certification provides for the following:
- Forces vendors to undergo a thorough scrutiny of product security and protective measures
- Confirms the robustness of the products’ security over many vectors and scenarios
- Allows for easier progressive security improvement
- Provides end customers or users with reassurance about the overall security performance
- Allows for a clear and documented differentiation from products which are not conforming to the standard.
Why choose Vertiv for enhancing your cybersecurity?
As well as adhering to the standards, Vertiv offers a powerful combination of technology and strategies to meet the cybersecurity of today and prepare for what’s next. Some of the highlights of the secure technology employed in the Vertiv™ Liebert® IntelliSlot™ RDU120 card include:
- Unmatched secure boot with hardware trust anchor: Our system’s tamper-proof security starts from the very first boot. With verified software and a hardware trust anchor, we block anything malicious from getting a foot in the door.
- A modern Linux OS for seamless updates: Say goodbye to vulnerabilities. Our OS is designed for fast updates, CVE (Common Vulnerabilities & Exposures) mitigation, and cutting-edge security management, so you're always a step ahead.
- 1GB ethernet standard: High-speed, next-gen connectivity means your network can keep up with the demands of today and tomorrow.
- Shared codebase with leading platforms: We tap into a shared codebase, meaning faster development, quicker fixes, and more support—keeping you ahead of the curve.
The strategic advantage of the Vertiv™ Solution becomes clear in its comprehensive integration capabilities. It delivers all these advanced features through streamlined architecture that eliminates the need for additional hardware, offering the same robust functionality as our traditional network cards while significantly simplifying your infrastructure. This architectural efficiency not only optimizes performance but also provides compelling long-term value for your investment.
The bottom line: invest in cybersecurity, unlock success
In today’s cyber-driven world, a strong security posture isn’t just important—it’s a business imperative. With industry-leading certifications, cutting-edge features, and a competitive price point, we provide the protection and peace of mind you need to stay ahead.
Cybersecurity is more than just protecting data—it’s about building trust, enabling growth, and supporting your business’s resiliency in the face of evolving threats. Our solution helps you strengthen your security while keeping your infrastructure systems reliable and your customers confidently reassured.
As Warren Buffet wisely noted, “It takes 20 years to build a reputation and five minutes to ruin it. If you think about that you’ll do things differently.”