Working with our Vertiv Sales team enables complex designs to be configured to your unique needs. If you are an organization seeking technical guidance on a large project, Vertiv can provide the support you require.

Learn More

Many customers work with a Vertiv reseller partner to buy Vertiv products for their IT applications. Partners have extensive training and experience, and are uniquely positioned to specify, sell and support entire IT and infrastructure solutions with Vertiv products.

Find a Reseller

Already know what you need? Want the convenience of online purchase and shipping? Certain categories of Vertiv products can be purchased through an online reseller.


Find a Reseller

Need help choosing a product? Speak with a highly qualified Vertiv Specialist who will help guide you to the solution that is right for you.



Contact a Vertiv Specialist

The page you're viewing is for English (Canada) region.

Defense Against BMC Cyberattacks And Unauthorized Access

Firmware Solutions For Servers, Network, Storage And Iot

September 24, 2019

Firmware Solutions For Servers, Network, Storage And Iot

Avocent® Core Insight Cyberhardening

An industry-first technology that thwarts the threat of Cyberattacks.

  • Integrates RunSafe Security’s Alkemist, a patented cyberhardening process that protects our code against memory corruption errors and buffer overflow exploits - the techniques attackers typically use to gain control of embedded systems and devices
  • Transforms Avocent® Core Insight Binary code at boot time using Runtime Application Self-Protection (RASP) and Moving Target Defense (MTD) techniques

Avocent® Security Manager

Strong user Access and Control is mandatory to securing IT assets. Avocent® Security Manager (ASM) is a security application that delivers Operating System independent role-based user management, password policy implementation and enforcement (like California SB-327), support for directory services like LDAP, and the Certificate Manager feature.

  • Implements a Linux-independent user database and user management, compatible with IPMI and Redfish
  • Manages extended password policies like strength, expiration, first-time forced password change
  • Includes Privileged Access Management (PAM) module to hook into existing software infrastructure smoothly
  • Provides tools for certificate management in the firmware used to create, manage and store user certificates, import trusted certificates, generate and store SSH key pairs
  • Built in support for Trusted Platform Manager (TPM) on select ASICs. With the TPM module, manufactures can securely store cryptographic keys used to validate firmware at boot time, authenticate users, for example
Partner Login

Language & Location