UL Unveils Framework For Certifying Resiliency Of Network, Data Center Products

UL recently announced the release of a new framework for certifying the resiliency of network and data center products. UL 2825 marks the first deliverable in response to recently introduced U.S. legislation requiring independent certification of network and security-related product performance and protection.

New IT security legislation introduced in the state of Texas enacted an IT infrastructure resiliency law in 2010 designed to hold IT device manufacturers accountable for product claims through an independent and thorough validation certification process. Pending legislation in several other states, as well as possible attention at the U.S. federal government level, will require independent resiliency certification of network and security products.

UL 2825 sets standard requirements by which network infrastructure devices are evaluated against published vulnerabilities that affect a particular device.  The device is expected to continue to operate as intended while subjected to exploits of published vulnerabilities.  In order to accomplish this, UL has standardized on BreakingPoint cyber tomography machines (CTMs) when testing and certifying IT devices against the UL 2825 framework.

"The world faces a new type of safety threat designed to exploit weaknesses inherent in deployed IT equipment, potentially undermining the public's trust in these devices," stated Bob Jamieson, UL's Commercial Director of Operations, Life Safety & Security industries.  "UL, as a benchmark of trust, has worked with industry and with safety stakeholders to publish an appropriate framework for testing a device's resiliency.  Additionally, after carefully evaluating companies and products necessary to perform the appropriate testing to UL 2825, we felt that BreakingPoint provided the product, solutions and cyber security experience to best meet our needs."

To achieve UL 2825 certification, network and data center devices must undergo a battery of assessments that closely mirror the high stress conditions seen in production networks.  Using the BreakingPoint line of cyber tomography machines, UL will assault these devices with Internet-scale network conditions including high-stress user load and real-world application traffic and live security attacks updated on a monthly basis.  UL will then measure the resiliency of the IT devices, as compared to the manufacturer's published metrics, and should the devices meet the appropriate requirements, publicize certification results for use by state and federal governments, enterprises, service providers and consumers.

This system of evaluation is ideal for equipment manufacturers to certify the resiliency of all products, as well as each time that product undergoes an update.  UL 2825 covers servers, routers, firewalls, universal threat management (UTM) devices, intrusion prevention systems (IPS), and converged network server equipment.

Featured

  • Security Industry Association Announces the 2026 Security Megatrends

    The Security Industry Association (SIA) has identified and forecasted the 2026 Security Megatrends, which form the basis of SIA’s signature annual Security Megatrends report defining the top 10 factors influencing both near- and long-term change in the global security industry. Read Now

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.