Download document () of 20
Services

Cybersecurity services

Industrial facilities are increasingly integrating and deploying smart, digital technologies into their OT infrastructure. As this happens, systems become more connected and the exposure to potential vulnerabilities and damaging cyber events increases. Eaton can help you develop a comprehensive strategy to mitigate risks across your electrical infrastructure and OT environment. Our team of certified experts is prepared to help you build up cyber resiliency throughout your operation so you can proactively respond to cybersecurity threats—resulting in minimal interruptions to your operations. With our support, we give you peace of mind, knowing that your systems and most critical assets are protected.

Expertise
Operational technology (OT) domain knowledge
Service network
Unmatched scale and availability
World class operations
Backed by UL and IEC certified labs

Core features

cyber-security-framework.jpg
Reprinted courtesy of the National Institute of Standards and Technology, U.S. Department of Commerce. Not copyrightable in the United States.

Technical framework

  • Eaton cybersecurity services are based on the NIST Cybersecurity Framework and customized for OT/ICS using mappings to NIST SP800-82IEC 62443 and other industry standards and best practices from SANS and the Center for Internet Security (CIS) Critical Security Controls (CSC’s)
  • Eaton also offers services tailored to IEC 62351NERC CIP and other standards

Eaton’s cybersecurity life-cycle management

Our cybersecurity services are designed to provide complete life-cycle management to maximize the availability of your facility.

Trust Eaton to secure your operational technology

Over 100 years developing products and services

Having designed hardware and software products for decades, along with providing the associated installation and maintenance services positions Eaton as the most capable cybersecurity provider in the industry for electrical infrastructure and building systems. Our experienced team of cybersecurity leaders identify and address gaps in your processes and personnel training programs to minimize your overall attack surface.

 

Offering deep cybersecurity experience

Customers rely on Eaton to understand, dissect and alleviate cybersecurity risk. It starts with dedicated people. Our team members meet and exceed competencies recognized by international standards organizations through rigorous, in-depth technical training programs. You can be confident that management, engineering and personnel have the knowledge and service capabilities to address advanced cyber threats.
man and woman working in control center with monitors

Field experts backed by our Cybersecurity Center of Excellence (COE)

CP_lockup_onImage.jpg

Join trusted experts and learn to manage cybersecurity risk

A world dependent on connectivity and electrification needs trusted environments. Join us for Cybersecurity Perspectives: the global forum and educational program showcasing the advanced tools and resources needed to expand your cybersecurity skillset.

Specifications

Our service foundations

NIST

  • SP 800-53R4, SP 800-82R2
  • SP 800-37 (RMF), FIPS 140-2
  • Critical Infrastructure Framework
  • NISTIR 7678 Vol 1 Rev 1

IEC

  • IEC 62443
  • IEC 62351
  • IEC 61850

UL

  • Standard for Software Cybersecurity for Network-Connectable Products (2900-1)

US Department of Defense

  • Unified Facilities Criteria (UFC) 4-010-06 (MIL-STD 3007)

NERC

  • NERC CIP

U.S. Department of Homeland Security

  • Catalog of Control Systems Security
  • SCADA Procurement Language
  • ICS-CERT

Best Practices

  • SANS
  • Center for Internet Security
Download Links