Working with our Vertiv Sales team enables complex designs to be configured to your unique needs. If you are an organization seeking technical guidance on a large project, Vertiv can provide the support you require.

Learn More

Many customers work with a Vertiv reseller partner to buy Vertiv products for their IT applications. Partners have extensive training and experience, and are uniquely positioned to specify, sell and support entire IT and infrastructure solutions with Vertiv products.

Find a Reseller

Already know what you need? Want the convenience of online purchase and shipping? Certain categories of Vertiv products can be purchased through an online reseller.


Find a Reseller

Need help choosing a product? Speak with a highly qualified Vertiv Specialist who will help guide you to the solution that is right for you.



Contact a Vertiv Specialist

Need help choosing a product? Speak with a highly qualified Vertiv Specialist who will help guide you to the solution that is right for you.



Contact a Vertiv Specialist

Secure Data Is a Key Element In the Fight Against Terrorism

Cyber security…yawn!

It’s almost becoming a daily news item of what institution/high profile politician/bank or even Jennifer Lawrence’s iPhone have had data compromised. The public have become largely indifferent to the concept and accept it as a risk of modern life, no more than having your video recorder stolen in the 1980’s by the local thief who spied it in your house.

However, institutions charged with border protection, protecting the welfare and lives of its citizens and military intelligence agencies are far from jaundiced in their interest in the topic.

Obama’s $14bn

Before leaving office, Barack Obama included $14bn for cyber security in the 2016 budget, and still US federal agencies struggle with cyber security. Whether it's phishing, unpatched software, socially engineered trojans or any of the other techniques of cyber terrorists, the weakest link in any organisation is the ability of that hacker, once inside, to be able to roam undetected through the network.

Access denied

To mitigate this risk, what most of these organisations now deploy is what is known as a ‘Secure Switch’ to separate main network access from classified network access. This means that the user has to physically select through the switch which network to use. With the assurance that even if there is a breach in the main network, the hacker cannot ‘jump’ across into the classified network and compromise data.

It's certified

Vertiv’s Secure Desktop Switch with patented “Always-on active anti-tampering system” means that Hardware-based peripheral isolation loads all firmware on ROM with no keyboard buffering or memory.

Governments, Police, Army, Financial Institutions, Healthcare are all vigilant to help protect their reputation. Vertiv’s Switch View Secure helps these organisations protect theirs. 

Related Articles

Partner Login

Language & Location