HIPAA Breaches and Data Rack Security

Greetings and welcome back!  This week, we begin a look at HIPAA Cyber/Physical/Operational security, specifically addressing the HIPAA Breaches and Data Rack Security.  This last week, the Federal Government’s Health Care Industry Cybersecurity Task Force released a stinging report on the continuing rise in HIPAA breaches and the failure of cyber/physical/operational security solutions being employed.  Over the next few weeks, we hope to address some key points of data protection that are largely ignored by the large companies servicing the HIPAA marketplace.  We will begin this week with an overview of the 3 key aspects of HIPAA security:

  • Cybersecurity
  • Physical Access Security
  • Operational Security

The cyber security, physical security and operational security of your electronic Protected Health Information (ePHI) is all covered by HIPAA and the HITECH Act – where the penalties for HIPAA and there violations receive their teeth.  And as the following graph shows, the actual data breaches reported during 2016 by Health and Human Services reflected a broad variety of indigents from each of these three areas.   As you look at this graph – several things may strike you as surprising:

  1. Unauthorized Physical Access (this means by a person who has been given access to the physical data) and Physical Theft comprise more than 1/3rd of all HIPAA violations.
  2. Unauthorized Cyber Access (again, meaning network access by someone who has been given access to the data) is nearly 1/5th of all HIPAA violations.
  3. Operational Incidents – where data is destroyed or lost accounts for a significant amount of HIPAA violations

HIPAA Regulations for Your Data Rack

 

Thinking about these facts for a minute, let’s now dive one step deeper to seeing exactly where these data breaches have come from. research from Protenus shows, insiders actually accounted for more than 40% of all data breaches!  These are the unauthorized cyber and physical access and part of the physical theft and operation incidents.

Let’s digest all of this information for a minute.  We know from the new government report that HIPAA breaches despite companies spending more money on cybersecurity.  What we have learned from the actual breaches reported last year is the following:

  • 43% of all HIPAA Breaches were Physical or Operational Incidents
  • Most all of these Physical and Operational Breaches were related to Insiders

These facts make it very clear that looking purely at cybersecurity firewalls to protect your organization against data breaches is literally only covering about half of the problem.  The data in your system is largely located at rest and in transit through your data rack in your network room and anyone who can gain access to that rack can steal data at will.  This is exactly the reason that we built RackGuardian – to protect from ALL threats – cyber as well as Physical and Operational.  We encourage the reader to look deeply at the full-spectrum of security protection offered by RackGuardian and we are always more than happy to confidentially chat with you about your own security needs.

Until next time,

Be Well!

Server and Telecom Rack Physical Security Compliance

This week, we continue our series on: The 3 Functions of Rack Security Compliance. As a quick reminder, these 3 functions are the following:

  1. Cybersecurity
  2. Physical Network Security
  3. Operational Security

This week, we focus on the second function of data center security compliance, namely: Physical Network Security. Physical Network Security systems in most data centers are comprised of 3 layers:

  1. Perimeter access security
  2. Rack physical access security

Its important to understand that most physical access security systems use standard protocols to make communication easy. Just like SNMP is the most common protocol used for network management communications, the Wiegand protocol is the most common protocol used for security management communications. Since few have heard of Wiegand, the first question is: what is the Wiegand protocol? The answer is that it is actually a group of standards all under one collective heading. It includes a method of communication between the card or fob reader and the controller unit as well as methods for storing data on both the card or fob and the controller. We are focusing on the communication aspect of the system as that is where much of the vulnerability lies.

Much of what I am sharing today comes from several well documented research projects that target Wiegand-based access systems. Brad Antoneiwicz from the Open Security Research group at Foundstone Security, a part of Intel Security has done excellent research in this area. You may want to link to his blog post about Wiegand vulnerabilities here and you may see an excellent presentation that he did gave that is posted online here. Brad shows in his blog and his presentation that it is easy to establish a man-in-the-middle attack on an card access system. That’s because the process is very easy execute in a small time frame and with limited tools and resources. Just as SNMP is vulnerable to virtual man-in-the-middle (MitM) attacks on network systems, so too card access systems can be attacked by a physical MitM gain entry to data centers and data racks.

With a simple Arduino board and some good logic, Antoneisicz shows us that you can easily gain access to any Wiegand-based card access system. The protocol is trivial to duplicate and you can use something as simple as a battery-powered Arduino to hijack a card access system and gain entrance into a data rack and its valuable data. It turns out that, while some parts of card access systems do offer some level of encryption (for example, the server usually offers https for remote management security) the serial communications from the card reader to the card controller is almost always open to intercept. This allows you to read, communicate and ultimately, hijack the card reader to gain full access to that facility or rack.

For those of you who really want to take a deep dive on the subject of access card reader hacking – including hacking the actual RFID signal from the access card – here is a truly detailed report from Bishop Fox Security.  This presentation was very well received at the DefCon hackers convention in the summer of 2015 and it considered the definitive published work of all the easiest means to hack access security cards.  Everyone who uses a security access card system should familiarize themselves with this report.

So what is the bottom line here? It is that access cards are easily hacked.  The serial communications on a card access system are NOT supervised or encrypted but, are allowed to pass freely in open protocol format from point to point.  Similarly, the RFID signal on an access card floats freely and anyone can grab that signal and use it to create a duplicate card or otherwise hack an access system.   Anyone who can gain access to the wire or wireless data from a card can gain access to whatever that card system is supposed to be protecting.

Fortunately, there is an answer to this huge security hole. Our RackGuardian has an plug-in product known at the EnviroScout which can inspect and supervise ALL communications from the Wiegand-based reader to the controller. If this device sees any signs of tampering, the RackGuardian will immediately send a message to our server and then to our IOS device within 2 seconds of detection.  The combination of instant notification to your mobile device coupled with our on-board analytics to catch any signs of tampering gives you the security that you need in your data center.

As a reader of this blog, you know that security compliance is serious business and its getting more pervasive all the time. We have shown through peer-reviewed research that existing card access systems fail to pass a simple third-party security test. Please consider discussing your physical security needs with one of our experts and lock-down your data center and data racks today.

Until next time,

Be Well!

Server and Telecom Rack Cybersecurity Compliance

Welcome back! We continue this month on the 3 keys for Server and Telecom Rack Security Compliance.  This month’s blog is: Server and Telecom Rack Cyberecurity Compliance. To begin with, whether you remotely host your servers offsite or you have your own data center(s), you need to have the ability to remotely manage the systems in your racks. These systems include the following groups of items:

Processing and Storage
Networking Systems
Power, Environment and Security

All of these systems need to be managed remotely at some point. Each of these systems is typically managed by SNMP from a central console system. Sadly, as this peer-reviewed paper demonstrates, even the supposedly secure SNMPv3 is full of vulnerabilities. That is, both can be taken-over by unauthorized individuals or groups and the results are devastating. As this peer-reviewed paper from Georgia Tech shows, its amazingly east to hack SNMPv3 because of flaws that are inherent in the protocol.  The bottom line is that, while you need to remotely manage your systems to keep them working, the very process of remote management can expose your data to cyber criminals. The question then becomes: What can SNMP exploits do to my data?  The answer can be seen in the chart below:

Server and Telecom Rack Security Compliance

As you can see, it is mainly the power environmental and security systems that are at risk.  Processing/Storage and Networking systems are typically open to ports 80 and 443 and are normally guarded by the perimeter firewall and often by a locally resident firewall.  However, Power Environment and Security systems are normally not protected or, if they are protected, such protection often fails to inspect the SNMP packets being sent to and from these systems. The simple fact is, as Table 1 from the Georgia Tech paper demonstrates, its easy to enter SNMP-enabled systems and change settings in ways that can destroy data stored in the servers and storage systems to which these systems are attached. As the Table also shows, its possible to launch Denial of Service (DoS) attacks through several of these systems, effectively shutting down that network segment and access to its data.

 

Your Data Racks, you need to protect your rack infrastructure. AlphaGuardian’s RackGuardian system is the only system on the market that is uniquely focused on protecting your data by protecting the security of your rack infrastructure. Power systems such as Rack PDU’s and UPS’s, cooling systems such as In-Rack Cooling, and security systems rely on SNMP. Our RackGuardian unit attaches to these systems and locks out ANY attempt to communicate with them.  At the same time, it securely gathers all the information that you need about your power, environment and security via its secure private network port. All information is then sent via an encrypted, push communication to a certificate-based data server. The result is you get all the information that you need for remote rack management while keeping all of your systems – and your data – completely safe.

Please think about this for a bit and let us know how we can help you.

Until next time,

Be Well!

Cyber Attack Using Rack PDUs as a Backdoor to Server Data

Greetings and welcome back!  This month we look at something that we have been predicting for some time, a Cyber Attack Using Rack PDU’s as a Backdoor to Server Data.  There was an excellent article on this in Identity Week last month.  In this article, it discusses an attack on DDoS protection firm Staminus.  In this attack, the intruders managed to do all of the following:

  • Bring down Staminus’ entire network
  • Reset routers to factory settings
  • Stole Staminus’ databases and dumped the contents online

The attackers were brazen to say the least as they actually posted how they hacked Staminus with an online post.  The two key factors they mentioned in their attack were:

  • Use one root password for all the boxes
  • Expose PDUs to WAN with telnet authority

The first mistake is all-too-common for any type of equipment.  If you use the same password for everything, a hacker only needs to break it once and they are in.  The second problem is the specific reason that we built RackGuardian.  Here, they used an open Telnet port on rack PDU’s to gain backdoor access into the servers in the rack.  I will add that, whether a hacker uses Telnet, FTP or SNMP, each of these ports is normally open on a rack PDU and each has minimal security.

So what can you do once you gain access into a rack PDU?  Plenty!  You can immediately traverse to the servers in the rack if they are on the same sub net.  If they are on a different subnet, you will first need to go to the switch and then back again.  In this case, its not clear which they did as they also had the open passwords on the switches and routers.

The long and short is that a rack PDU makes a perfect camoflauge as a sniper nest to extract data from a server without easily being observed.  After all, who expects data to be coming from a rack PDU?

The moral of the story is clear: You MUST secure your rack PDU’s and RackGuardian is the only product that is specifically built with this purpose in mind.  Cyber Attack Using Rack PDUs is a real threat to every organization.  RackGuardian does all the things that you need to protect your rack systems from harm.  It plugs into the Ethernet ports of your Rack PDU, UPS and other systems and it provides full monitoring of the power and environment in your rack – while it secures all of your rack power and environmental systems from being used as hacker targets.

Think about this and, we would be more than happy to have a confidential conversation about how to protect your rack systems.

Until next time,

Be Well!

 

 

Security Compliance for Data Racks

Welcome back! This week’s blog is: Security Compliance for Data Racks. To begin with, whether you remotely host your servers offsite or you have your own data center(s), you need to have the ability to remotely manage the systems in your racks. These systems include the following groups of items:

  • Processing and Storage
  • Networking
  • Power, Environment and Security

All of these systems need to be managed remotely at some point. Whether your racks are located in a data center, IDF room, MDF room are telecom closet, if a server goes down at night, you’re going to need to reboot it.  The most common way to reboot a server in a remote rack is via power cycling an individual plug on a rack PDU or rack UPS.  In some cases, you may use a specialty device that is specifically devoted to a reboot function.

Each of these systems, PDU, UPS and reboot bar are typically managed by SNMP from a central console system. Sadly, as this  peer-reviewed paper from Georgia Tech shows, even the latest version of SNMP – SNMPv3 – can now be easily compromised. For those who are taken back by this, please realize that SNMPv3 is a protocol that is now 15 years old.  If I asked you to use a 15 year old piece of software to secure your database, would you trust it?  Of course not and so, it should not be a surprise that SNMPv3 can not be trusted as a secure protocol.

The question then becomes: What can SNMP exploits do to my data?  The answer to that question comes from a quick review of the 3 types of systems shown above: processing and storage, networking and power/environmental/security that are typically in a data rack. The first two items are typically open to ports 80 and 443 and are normally guarded by the perimeter firewall. But, many servers, storage and systems and networking gear such as switches, are managed via SNMP.  Because SNMP devices communicate in a very friendly manner toward one-another, this makes it easy for a hacker who has gained access into the SNMP port of a PDU, UPS or other support system to jump to a data system such as a server and steal data.

While that is a very bad scenario, its not the only problem.  Table 1 from the linked Georgia Tech paper shows that many different attacks can be launched by gaining access to one of these devices.   The simple fact is, its easy to enter SNMP-enabled systems and change power cycle servers over and over, destroying database.  As the Table also shows, its also possible to launch Denial of Service (DoS) attacks through several of these systems, effectively shutting down that network segment and access to its data.

 

SNMPv3 Vulnerabilities

The information presented in this week’s blog makes it clear that, if you are concerned about an Security Audit Compliance & Your Data Racks, you need to protect your rack infrastructure. AlphaGuardian’s RackGuardian system is the only system on the market that is uniquely focused on protecting your data by protecting the security of your infrastructure. Power systems such as Rack PDU’s and UPS’s, cooling systems such as In-Rack Cooling, and security systems such as rack-mount environmental and security monitoring units all support and rely on SNMP. RackGuardian protects all of these devices while it securely monitors them as well.  All information is then sent from RackGuardian is transmitted via an encrypted, push communication to a certificate-based data server. The result is you get all the information that you need for remote rack management while keeping all of your systems – and your data – completely safe.

Please think about this for a bit and let us know how we can help you.

Until next time,

Be Well!

Cyber Attacks on Telecom Rack Systems

Welcome back!  This week we continue our look a vulnerabilities for Server and Telecom Racks as we look at Cyber Attacks on Telecom Rack Systems.

As we walk through this blog series, please keep one fact always in mind: Cybersecurity is all about the data that resides in your rack. It doesn’t matter whether that data happens to be in a server, a storage system or a telecom system.  Any data can be stolen can be used to gather information about your organization and can be used against your organization. A cyber criminal can do everything from steal that data to erase that data and everything in between. If you have data, it is valuable to someone and, in today’s world, people will steal or destroy it for the right price.

Data about your organization lives in many places. I list the obvious of servers and storage systems here but, did you ever think of the data in your telecom system? IP-based PBX systems dominate telecom sales for medium and larger organizations. This is a particularly hot spot for us because we have seen just how easy it is to log into PBX systems from all of the major brands.

Virtually every phone system today is managed via the network and that means that if you can manage it, a cyber criminal can get into it. If a cyber criminal gets into one of these systems – and the point is more of “when than if” because none of these systems offer much true cyber protection – there is no limit to the information they can gain or the damage they can cause.

Consider the following critical data that can be stolen from most phone systems:

  • The phone numbers and names of each person who has been called by your employees
  • The phone numbers and names of everyone who has called someone in your organization
  • Voicemails left for your employees
  • Personal calendars and other information that are tied into the system

Cyber Attacks on Telecom Rack Systems

So what would an unscrupulous competitor pay for this information? It turns out, just like the drug economy exists because their are buyers, so too, cyber crime exists because their are buyers of this data. A whole underground economy exists and flourishes in the business of black market data.

In addition to stealing data from your IP-PBX or other phone system, hackers can also break into your phone system for the purpose of using your system to originate international calls.  Hacking IP-PBX systems for toll fraud has become a huge problem in the past few years.  To alert its customers to this problem, TDS Telecom, a large Independent Voice and Data Carrier, sent the following warning to its customers:

Telephone hackers can infiltrate vulnerable PBX systems to make international and long distance calls, listen to voice mail, or monitor conversations…By controlling the PBX maintenance port, hackers can change the call routing configuration, alter passwords, add or delete extensions, or shut down a PBX, all of which adversely impact business operations.

Unfortunately, you may only find out you have been hacked when you receive a bill for international calls made from one or more of your lines that were not dialed by anyone in your company…Your business, not your Long Distance Carrier, is responsible for all charges incurred on your system due to fraud (including toll fraud), abuse, or misuse of services, whether known or unknown, and whether or not your Long Distance provider takes any actions to stop or block Toll Fraud. The responsibility for the security of your PBX system is yours and you should take steps to protect your assets.

So, yes, by attacking your PBX system, cyber criminals can actually make fraudulent toll calls, running up enormous bills in the process. They can also steal sensitive information about your employees, your customers and your vendors.  As you can see from the above information, there is virtually no limit to what a cyber criminal can do to you through your phone system and the only way that you might even know that someone has tampered with your system is if they run up an enormous toll charge.

For all of the readers of this blog, please consider the small cost of securing your phone system with RackGuardian. RackGuardian is the only product that can both monitor the maintenance port of your PBX system while it shuts off any attempt to connect to the system from the outside.  RackGuardian also monitors the power and environment in your telecom server room, a huge factor necessary to keep your system up and operational.  It provides the ability to reboot your telecom server in a uniquely secure manner.  In addition, it on-board analytics can warn you when your UPS system battery is about to fail.  No other product has gives you such a broad-scale protection for your telecom systems.

Cyber vulnerabilities in PBX/IP systems are real and, with time, they will only increase. RackGuardian can protect your phone system, its power, environment and everything in the rack. Its a small price to pay vs. a risk from hackers that is growing exponentially by the year.

Please think on this and, until next time,

Be Well!

Denial of Service Attacks on Data Racks

Greetings. This week’s blog is about SNMP Denial of Service Attacks on Rack PDU’s.  Rack Power Distribution Units, or PDU’s are a standard feature in every rack and are used to distribute the power in a rack via individual power outlets.  Most all PDU’s used in server and telecom racks today are intelligent, in that they use SNMP to communicate their status to a central console or trap receiver.

A Denial of Service (DoS) attack and a Distributed Denial of Service (DDoS) attack can cripple any organization.  DoS attacks seek to overwhelm and overflow the network with large sums of data that will effectively cripple the ability of your network to operate.  In order to launch a DDoS attack, a cyber hacker needs several devices that speak the same protocol language and SNMP is becoming a favorite of hackers.

In terms of sheer numbers, Rack PDU’s are one of the most prevalent devices in your network, trailing only servers and switches. Because of this, they offer a great opportunity to a hacker to launch a very destructive Distributed Denial of Service (DDoS) attack. The fact that so many of your Rack PDU’s are tucked-away in remote server rooms makes them that much more vulnerable to attack.

To get to the heart of this, let’s take a quick look at DDoS and reflection/amplification. The reflection component of this attack happens when someone spoofs one of your active IP addresses as the host point for your SNMP queries. The hacker sends out SNMP requests to lots of devices, like rack PDU’s using your IP address as the spoofed host. That will cause all of those devices to respond to your IP address with data. As the hacker adds more SNMP’s to his request list, the volume grows and can reach into the gigabytes per second. To up-the-ante, the bad guys can used techniques that elicit huge data responses from each SNMP query and may ultimately amplify the original request by well over 1000 times. A nice article and visual picture of this can be found here.

USENIX, the Advanced Computing Systems Association, has identified SNMP as the second largest source for Reflection/Amplification DDoS attacks and they list Power Distribution Units as one of those specific sources that can be easily used in such an attack. Because SNMP, even SNMPv3, is no longer secure as can be seen in this excellent peer-reviewed article, it is clear that your PDU’s provide a good source for DDoS attacks and it is important that you secure them.

We ask all readers of this blog to take a look at how many PDU’s you have under management. We then ask that you consider that you can’t manage what you can’t secure. Please take a look at how RackGuardian can protect each of your critical racks. It is the only system that completely shuts out cyber intruders, while giving you all the management information on your systems that you require.

Until next time.

Be Well!

Cyber Risks of Power Reboot Devices

Welcome back!  This week, we look at a very serious problem with server and telecom racks: Cyber Risks of Power Reboot Devices.  To begin with, having the ability to reboot a server or telecom unit remotely is an extremely handy thing to use and it can save an enormous amount of time and effort.   The problem is that all-too-many of these devices have little if any protection from a cyber criminal using this device against you.

Let’s at the various devices that can be used to remotely power cycle an electrical outlet a little more closely.  Here are the common types of units used for that purpose in order of market penetration:

  • Intelligent Rack PDU’s
  • Rack mounted and small UPS units
  • Remote reboot devices

Rack PDU’s are Vulnerable

Intelligent Rack PDU’s are in high demand and use in server and telecom racks and for good reason.  Most of them can measure power usage, provide reboot capabilities and allow you to better manage your rack systems.  The problem is that Rack PDU’s rely on SNMP as their primary form of communication.  SNMP was a great protocol in its day but, the most recent version – v3 – is now 15 years old!  That brings me to a simple question: Would you trust a 15 year old piece of software or “secure protocol” to manage your critical systems?  I think the answer is: NO.

SNMP Communications are Vulnerable

To make the point clearly, there was an excellent study done by a group at Georgia Tech University on the security of SNMPv3 specifically for the units listed above: PDU’s, UPS’s and Reboot Devices.  The study is available here and proves beyond any doubts that rack servers and telecom units connected to these systems are highly vulnerable.  Please note that the research report also shows that Distributed Denial of Service (DDoS) attacks can be launched by using these SNMP devices.  SNMP devices are being increasingly used in DDoS attacks because of their prevalence and ability to be used in an amplification scheme as the SANS Institute points out.

Its clear from these reports that using any version of SNMP natively presents a risk to the systems being powered with these PDUs and UPSs.  In fact, its clear that power systems being managed by open SNMP ports are not in compliance with Sarbanes Oxley, HIPAA, Gramm-Leach-Bliley and other data standards.

Remote Reboot Devices are Extremely Vulnerable

While PDU’s and UPS’s that use SNMP are clearly vulnerable, there is actually one last item that we need to examine: Remote Reboot Devices.  We have examined several popular brands of Remote Power Reboot Devices and most of them allow control via simple HTTP access.  Please remember that HTTP has NO ENCRYPTION and all your logins and passwords are passed over your network in clear text.  Now for the kicker; because the purpose of these devices is REMOTE rebooting, you primarily use them from outside your facility.

If you login via HTTP to a reboot box over the Internet (the most common use of a reboot box) you are passing your login and password as PLAIN TEXT for anyone in the world to see.

I would encourage every reader of this blog to think about these facts and how secure your facility needs to be.  If you are covered under any data security standard, you must place a protective system between your rack PDU, UPS or Reboot device and your network.  Even if you are not under a security standard, if you use a Remote Reboot Device, you are just taking your server’s life and data into anyone’s hands who wants to take the effort to sniff your traffic.

RackGuardian was built from the ground-up to protect your rack assets from cyber or physical hackers.  At the same time, its patented remote control features provide a FULLY ENCRYPTED reboot authorization process with 2-Factor Authentication.  Please give us a call to confidentially discuss your rack security needs.  We are here to help you meet your compliance standards while continuing to give you the remote management capabilities that you need.

Until Next Time,

Be Well!

Comprehensive Server & Telecom Rack Protection

Greetings and welcome to our blog.  In this installment, we are going to look at how you can provide Comprehensive Server & Telecom Rack Protection for your systems.  To begin with, let’s define what we mean by “comprehensive protection”.  We define this as:

Protecting the entire rack contents from environmental, physical security and cybersecurity vulnerabilities.

In today’s blog, we are going to take a look at the first area of needed protection for your racks: environmental protection.  Rack monitoring products are nearly as old as server and telecom racks themselves.  Normally, these systems provide the ability to monitor the temperature and humidity of your rack and some also offer the ability to monitor the power being distributed in your rack by your PDU’s.  These are all good things but, as the systems that you place in your racks become increasingly critical and expensive to own and operate, basic environmental information is of limited value to actually help you operate your rack-based systems in the most secure and efficient manner.  Let’s look at the kind of environmental information that can truly help you maximize your system’s reliability and operation.

  • Rack Energy Efficiency – Two years ago, the Department of Energy released and excellent study on small server and telecom room energy use. Among the findings in this study were that:
    • The Power Usage Efficiency (PUE) of small server rooms was measured at over 2.0 on several sites and the average was 1.85.
    • The wasted energy accounts for thousands of dollars in wasted cooling energy for every server room per year.
    • The inefficient cooling of server rooms and resultant hot spots leads to equipment failures and other reliability problems
  • Rack Backup Power Availability – Battery monitoring products have become almost standard for large data centers because users know that the failure of a UPS battery can have catastrophic consequences.  However, the smaller UPS units that protect server and telecom rooms have very minimal software capabilities to manage the backup battery.  Its a fair question to ask: If you purchase a UPS, how much battery time does it have at the present time?  Very few software products give you an accurate look at that number and that creates a huge problem for the servers that you are trying to protect with the UPS.
  • Rack Environmental Hazard Protection – Leak detection systems, like battery monitors, are common and nearly standard at all data centers.  But again, they seldom are used in small server or telecom rooms.  That is a huge problem because the fact is, whereas racks in data centers have very little chance of having water touch them directly, server rooms and telecom closets are often located with in close proximity to water and drain pipes within a commercial office.  This makes the possibility of water-related system and data loss a very real possibility.

We are pleased to say that our patented RackGuardian product is the only one on the market that can truly solve each of these problems.  To begin with, our patented energy management functions will actually tell you where to best place the servers and equipment in your racks to allow for the least airflow resistance and therefore, the most efficient and reliable cooling.  We have proven that this results in lowered cooling costs for your server and telecom rack sufficient to pay for the RackGuardian in less than 2 years.

In addition, another patented features of our RackGuardian is its ability to manage battery conditions for even the smallest UPS unit.  Our proprietary technology will allow you to know when your UPS batteries are becoming weak.  Every UPS battery will eventually fail, just as your car battery fails.  Its just a matter of when.  RackGuardian’s ability to spot weakness early in the battery process will allow you to replace your batteries and keep your UPS operating in a manner in which you expect.

Lastly, the RackGuardian offers the Flexi-Pad liquid sensor that is built just for data cabinets.  Traditionally, leak detection has been done by cables which simply do not work in a data rack environment.  The Flexi-Pad is a leak detection sheet that simply fits underneath your servers or on top of your servers.  Our on-board analytics have the ability to communicate with the Flexi-Pad to spot any sign of a liquid at its earliest point.

Best yet, RackGuardian’s on-board analytics virtually eliminate false alarms while it ensures that every real alarm will reach you instantly.  AlphGuardian’s patented iOS App can put a system alarm onto your phone in less than 2 seconds and its acknowledgment features insures that you have received the alarm.  We ask that you would think about these powerful features in conjunction with your server or telecom racks and give us a call to let us show you how we can protect your systems and pay back your investment quickly.

Until next time,

Be Well!