RackGuardian logo

by AlphaGuardian

Full protection for your OT systems

Protect your rack-based environmental, power and networking systems with one device.

App screenshot

The data in your rack systems has enormous value. In fact, this data actually has more value than the servers and networking hardware in your rack. Just how much value is there in data? According to Aon Insurance: 84% of the market value of the S&P 500 companies is in intangible assets, much of which is data.

OT systems attacked to implement malware (end of 2022)2
Growth in vulnerabilities discovered in OT systems (end of 2022)3
Percentage of companies with lack of visibility into all OT systems on their networks (end of 2022)3

RackGuardian: The new Standard

Whether you need to protect your network closets, MDF or IDF rooms, Server rooms or network edge sites, RackGuardian has your racks covered. We know that most every company has to protect their racks and data to the latest security standards, including:

The HIPAA security compliance standards require Comprehensive Cyber, Physical and Operational Protection Measures. This includes HIPAA Security for Racks. The following are quotations from HIPAA regulations:

  • Physical access monitoring and control - HIPAA Security for Racks is key for any healthcare organization or business partner. The Department of Health and Human Services, nearly half of HIPAA Security violations for 2016 involved breaches of Physical Security. HIPAA regulations specifically define Physical Network Security requirements and these include Section 164.310: Facility Access Controls. Implement policies and procedures to limit physical access to its electronic information systems and the facility or facilities in which they are housed, while ensuring that properly authorized access is allowed. Physical access control is a key piece of HIPAA compliance and must be implemented for all entities covered under this law.
  • Backup power monitoring and control - Backup Power is a necessity to allow the protection of and access to critical medical records in the event of a power back out or other power event. This requirement is described in HIPAA Security “ 164.308(a)(7)(ii)(C) Establish (and implement as needed) procedures to enable continuation of critical business processes for protection of the security of electronic protected health information while operating in emergency mode. When a covered entity is operating in emergency mode due to a technical failure or power outage, security processes to protect EPHI must be maintained.”
  • Environmental monitoring and control - Medical records must be protected from more than just cyber or physical threats. HIPAA Security standards require that they must also be protected from destruction in the event of a natural or environmental event. This is specifically provided for in HIPAA Section 164.304 “Physical safeguards are physical measures, policies, and procedures to protect a covered entity's electronic information systems and related buildings and equipment, from natural and environmental hazards…”

The Credit Card Payments PCI DSS security compliance standards require Full Cyber, Physical and Operational Measures. The following quotes are directly from the latest standards issued May 2015:

  • Cyber-secure access control - Requirement 1.1 “Establish and implement firewall and router configuration standards…Firewalls and routers are key components of the architecture that controls entry to and exit from the network. These devices are software or hardware devices that block unwanted access and manage authorized access into and out of the network. Configuration standards and procedures will help to ensure that the organization's first line of defense in the protection of its data remains strong.” Firewalls must protect your system monitoring traffic as well as your networked power and environmental monitoring systems.
  • Secure access monitoring and control - Requirement 9 “Any physical access to data or systems that house cardholder data provides the opportunity for individuals to access devices or data and to remove systems or hardcopies, and should be appropriately restricted… Criminals attempting to gain physical access to sensitive areas will often attempt to disable or bypass the monitoring controls. Sensitive areas refer to any data center, server room or any area that houses systems that store, process, or transmit cardholder data.”
  • Power monitoring and control - “Tie all access control and monitoring systems to an Uninterruptible Power Source (UPS).” In addition, most all POS servers include UPS systems as a standard component. Maintaining and monitoring all UPS systems is critical to ensuring the integrity of all credit card data.
  • Environmental monitoring and control - Inherent in PCI DSS standards are maintaining an environment conducive to maximizing network equipment uptime. This includes proper cooling and environmental controls for all areas in which data is transported or stored.

Gramm Leach Bliley Act security compliance standards require All Appropriate Cyber, Physical and Operational Protection Measures be taken. The following are quotations from the Federal Financial Institution Examination Council's IT Examination Handbook as of July 2015:

  • Cybersecurity controls - “The institution should have a documented testing and evaluation plan that addresses the integration of security controls, level of assurance desired, and strategies and activities performed in obtaining that assurance.”
  • Physical access control - “Management should deploy adequate physical security in a layered or zoned approach at every IT operations center commensurate with the value, confidentiality, and criticality of the data stored or accessible and the identified risks…An institution should implement policies and procedures to prevent the removal of sensitive electronic information and data. These policies should address the use of laptop computers, personal digital assistants, and portable electronic storage devices.”
  • Environmental monitoring and control - “Every operations center should have adequate heating, ventilation, and air conditioning (HVAC) systems in order for personnel and equipment to function properly. Older computer equipment produces a significant amount of heat, requiring cooling capacity exceeding that of a standard office building. Some newer models do not produce as much heat and thus do not require as much air conditioning. Organizations should plan their HVAC systems with the requirements of their computer systems in mind. Back-up sources of electricity should be able to sustain HVAC systems, because inadequate cooling could render computer equipment inoperable in a short period of time.”
  • Backup power monitoring and control - “Computing equipment should have a continuous uninterrupted power source. Management should take reasonable action to protect computing equipment power sources. Consequently management should monitor and condition the voltage of electricity sources to prevent power fluctuations…Management should configure the UPS to provide sufficient electricity within milliseconds to power equipment until there is an orderly shutdown…Power surges can also damage computer equipment. Consequently management should monitor and condition or stabilize the voltage of electricity sources to prevent power fluctuations.”

FCC Telecommunications Security Standards require Full Cyber, Physical, Power and Environmental Protection Measures. The following are quotes from the latest FCC Standards:

  • Secure access monitoring and control - FCC Physical Network Security Standards specifically require access controls for all local and remote telecommunications sites. A specific category for Physical Network Asset Management was created as PR.AC 1-5. “Physical access to assets is managed and protected. Physical access controls are in place and effective per established guidelines. Physical access to the core network assets are managed, including any unmanned sites.” - Cybersecurity Risk Management and Best Practices, March 2015.
  • Backup power monitoring and control - Wireline and wireless companies were required to implement battery power backup and monitoring under the 911 standards of 2009 as revised in 2013 under FCC 13-158. Providers of Voice over IP (VoIP) service must also provide a minimum of 8 hours of backup throughout their networks and must offer to provide 8 hours minimum backup power to each customer for their local equipment. This obligation includes the continuous monitoring and testing of battery backup systems within the company's network and the provision of monitoring and testing to be carried out by the subscriber for their own backup power. This change was enacted with FCC 15-98 and codified in FCC Code as newly enacted § 12.5 Backup Power Obligations. The effective dates for the backup power for VoIP systems are February 16, 2016 for larger providers and August 11, 2016 for providers servicing less than 100,000 retail subscriber lines.
  • Environmental monitoring and control - FCC Physical Network Security Standards specifically require the remote monitoring of the physical environment of local and remote sites within a telecommunication provider's network. “The physical environment is monitored to detect potential cybersecurity events.” This statement takes on new meaning with the requirement to deploy backup power systems throughout a provider's network. Batteries, generators and other backup power components have long been favorite targets of physical vandalism and are also easily hacked by flaws in remote management protocols. - Cybersecurity Risk Management and Best Practices, March 2015

AlphaGuardian's Patented Tech

Everything you need to secure your network OT

Cyber/Physical Firewall for your OT devices

RackGuardian is the only rack management device that incorporates an integrated firewall within its hardware. By plugging your rack power, environmental and networking systems into the Private Network Port of RackGuardian, their SNMP ports are now hidden to the outside world.

Powerful Analytics for your Environmental, Power & Network Systems

Traditional rack monitoring systems will send you large numbers of nuisance alarms based on human-set alarm technology. RackGuardian's patented Alarm Analytics learns the normal operating conditions for your OT systems in your rack; it will only raise an alarm when a statistically significant event is occurring. RackGuardian is also perfect for the control room of any process plant because it is fully 18.2 compliant.

Secure Cloud-Based App

In the past, rack monitoring systems have required you to view your data via a local DCIM program or via a webpage directly on the rack monitoring unit. Local DCIM software can only monitor a finite number of devices and has to be continuously patched and upgraded. Meanwhile, your rack monitoring unit must maintain open ports which others could use for a cyber attack. AlphaGuardian's secure cloud-based dashboard lets you monitor an unlimited number of racks.

RackGuardian operation and connection details

RackGuardian connects to any SNMP or Modbus system in your rack. It can connect to Modbus either via Modbus/TCP or via Modbus/RTU over RS-485 or RS-232. In addition, RackGuardian supports monitoring a wealth of different sensor data from your SNMP and Modbus systems, including:

  • Voltage
  • Current
  • Temperature
  • Humidity
  • Leak detection
  • Smoke detection

Contact us

Questions about RackGuardian? Send a message using this form, or send an email to info@alphaguardian.net.