Detect unauthorized RF transmissions around data centers
Both data center hosting providers and companies managing their own data centers require robust security procedures. In addition to some of the most sophisticated cybersecurity measures, many data centers now include biometric access controls and round-the-clock security guard patrols in an attempt to prevent cyber and physical intrusions.
The consequences of a security breach in a data center include lost/corrupted data, web service downtime and sensitive data falling into the wrong hands. Attacks may be carried out by organized crime groups or by state-sponsored actors.
While physical and cyber security measures mean that data cannot be physically removed or exfiltrated via an external attack on the network, the RF spectrum remains a relatively unprotected channel. RF transmitting devices such as cell phones (or technology which is more sophisticated and less commercially available) can be used to exfiltrate data in a way which is unmonitored and undetectable by most data centers.
Hosting providers and self-hosting organizations need a way to verify that there are no unauthorized RF transmissions into or out of the facility. The source of any attempted attacks needs to be instantly located in order to apprehend those responsible.
Detect and locate unknown RF emissions
A network of RF receivers can be installed in a data center to continuously monitor the RF spectrum in real time. Our indoor monitoring system is known as RFeye Guard. It works autonomously to monitor spectrum 24/7 and provide alerts when unusual or unwanted signals are detected. The source of transmitting signals can then be located for removal, further investigation and possible identification of those responsible.
RFeye Guard can be used to locate any suspect RF transmissions, ignoring known signals which are authorized within the facility. Even devices which are designed to evade detection using very low power or short-duration signals can be detected with our receiver technology.
A combination of indoor and outdoor receivers can be used for ‘geofencing’. This allows transmissions from outside the secured area to be ignored to minimize false alarms.
Integrate RFeye Guard with existing security systems to add to your security picture and even view data remotely to protect against attacks by on-site security staff.
Additional benefits of the solution
Diagnose issues with communications and network infrastructure from changes to the RF spectrum e.g. interfering signals or absence of expected transmissions.