Effective monitoring can save your UPS

August 2018 Infrastructure, Security Services & Risk Management, Products & Solutions

The cornerstone of network reliability and availability, the uninterruptible power supply (UPS), has for more than three decades ensured the protection of hardware, software and data for small, medium and large networks all around the globe.

While UPSs themselves are designed to be durable and dependable, maximising their potential requires that they are properly looked after. And, while most are aware that even with care, parts such as batteries will eventually need replacement; many overlook the importance of the monitoring and regular maintenance of this vital piece of equipment.

Even with the inclusion of the self-monitoring software and auto-notification features incorporated into many of the latest UPS models, regular inspections ensure that UPS systems are operating properly.

“The recent innovation of cloud-enabled UPSs, designed to protect smaller, distributed IT devices and networks has, however, provided a major step forward in the ease and convenience of maintaining UPSs,” says Riaan de Leeuw, VP, Schneider Electric ITD Anglophone Africa.

The APC by Schneider Electric Smart-UPS with SmartConnect combines ease of installation and use, together with monitoring and automated actionable alerts to propel a new generation of partner service provision. “Monitoring is also a perfect platform for Managed Service Providers (MSPs) to deliver value to their customers because more than ever, almost every business is dependent on the availability of IT services for their daily operations,” he says.

MSPs can install up to 25 APC SmartConnect compatible Smart-UPSs at any customer site, and RMM integration with APC SmartConnect eliminates the need for costly training, ensuring partners an easy workflow integration by removing the necessity to code or even install SNMP traps.

Cloud-enabled UPSs also allow MSP to proactively view the UPS status through the secure portal, as well as schedule firmware updates. Partners can use the information received from the cloud monitoring service to provide additional services to customers, schedule regular inspections and deliver proactive, timely maintenance that will avoid unnecessary downtime.

“Included in the benefits of cloud-enabled UPSs is peace of mind, where clients know their UPS system is being monitored and, as a result, properly and proactively maintained for reliable performance in the event of an unplanned power outage. No matter where IT services are located, end customers can remain focused on their core competencies and business as usual, safe in the knowledge that this crucial part of their infrastructure is safely being managed,” de Leeuw concludes.

For more information, contact Schneider Electric , Chetan Mistry, +27 11 254 6400, chetan.mistry@schneider-electric.com, https://www.se.com/ww/en/





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Integrated security key to protecting cloud applications
Infrastructure Information Security
Cloud-native applications have transformed the way businesses operate, enabling faster innovation, greater agility, and enhanced scalability. Yet this evolution brings an equally complex security landscape.

Read more...
Identity-led security in banking
Secutel Technologies Access Control & Identity Management Products & Solutions
Traditional keys, cards, and siloed systems are no longer sufficient in a world where security, compliance, and operational efficiency must work together seamlessly. In 2026, the focus is firmly on smart access.

Read more...
The global state of physical security
Genetec News & Events Infrastructure
Physical security has become a strategic business function, improving IT collaboration and decision-making. Moreover, interest in AI has more than doubled among users, and organisations seek flexibility to deploy workloads on-premises, in the cloud, or hybrid.

Read more...
SA availability of immutable backup storage appliance
CASA Software Infrastructure Security Services & Risk Management
CASA Software has launched the newly released Nexsan VHR-Series, a fully integrated, enterprise-class, immutable backup storage appliance purpose-built for Veeam software environments, with usable capacity ranging from 64 TB to 3,3 PB.

Read more...
Beagle Watch named best security company in Johannesburg
News & Events Security Services & Risk Management
Beagle Watch Armed Response has been named Johannesburg’s Best Security Company in the 2025 Best of Joburg Awards, surpassing about 26 nominated private security firms in the greater Johannesburg region, thanks to overwhelming public support.

Read more...
Proactively enhancing campus safety
Surveillance Products & Solutions
Strengthening security management and proactive alerting have become priorities for schools. To address risks such as expansive campuses, multiple entry points, blind spots, and potential intrusions.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.