
At Reliable Controls cybersecurity isn't just a checkbox. It's a foundational pillar in how we design, manufacture, and support our building automation solutions. As custodians of critical infrastructure, we're committed to a proactive, layered approach to protecting the integrity and confidentiality of our systems and our customers' data.
Secure by design
We develop our products with a security-first approach:
Adoption of industry-recognized standards: We integrate protocols like BACnet Secure Connect to ensure secure interoperability.
Secure development life cycle: We embed security at every stage of development, from ideation to product release. Once our solutions are deployed in the field, our cybersecurity incident and reporting process ensures any issues are dealt with promptly.
Threat modeling and risk assessment: We anticipate vulnerabilities before they emerge, not after they’re exploited.
Penetration testing and code audits: Third-party and internal testing, including SCA, SAST, and DAST, validates the resilience of every Reliable Controls product.
Defense in depth
One barrier isn’t enough, so we create multiple levels of defense for stronger protection:
Multilayered network security with segmentation, firewalls, and role-based access
Authentication and encryption protocols to ensure secure communication across all endpoints
Secure firmware updates via digitally signed packages and validated boot processes
Audit trails and log management to provide vital visibility into system activities
Customer empowerment
We equip our Authorized Dealers and customers with:
Reliable Controls Hardening Guide
Security bulletins and product alerts
Training and best-practice resources
Internal technical support and application engineering teams
Cybersecurity is a shared responsibility. We enable our customers to be effective stewards of their system’s security.
Lead the way
As cyberthreats evolve, so do we. Our cybersecurity roadmap includes:
Continuous monitoring of industry threats and timely responses to cybersecurity issues
Constant, real-time communication about events that could impact our customers
Not just reacting to cyberthreats but anticipating them
| Date | Name | CVE | Description |
|---|---|---|---|
| December 10, 2021 | Name:Apache Log4 | CVE:CVE-2021-44228 | DescriptionReliable Controls software is not affected by the Apache Log4j vulnerability. There is no risk of exposure to Reliable Controls products from this vulnerability and there are no additional steps required to secure your Reliable Controls systems. |
If you've identified a potential security vulnerability, please report it immediately. Our dedicated security team will investigate and respond promptly.
Reliable Controls supports three secure remote access configurations, all managable via RC-RemoteAccess software:
Use the following table to determine which configuration best suits your system:
BACnet Secure Connect (B/SC) is a secure evolution of the BACnet protocol that uses TLS 1.3 encryption, digital certificates, and mutual authentication to safeguard device communications from unauthorized access and network threats.
Reliable Controls products support B/SC through RC-RemoteAccess, which simplifies secure deployment by acting as a B/SC hub for encrypted communications between connected devices.
Reliable Controls solutions that support secure communications—such as B/SC and RC-RemoteAccess--use TLS 1.3 with strong cipher suites and X.509 digital certificates to ensure encrypted, authenticated, and tamper-resistant data exchange.
For web-based products RC-WebView and RC-Reporter, secure communications to users are handled through Microsoft Internet Information Services. The highest support TLS version depends on the Windows Server version used:
System and Organization Controls 2 (SOC2) compliance indicates how an organization protects customer data and provides security through IT and OT services using five criteria: security, availability, processing integrity, confidentiality, and privacy.
SOC2 compliance generally applies to the governance around an implemented system and as such applies to the organization and infrastructure that hosts these services. Reliable Controls software products are on-premise solutions. We are unable to get SOC2 certification directly, but we work with our implementers and hosting service providers to adhere to SOC2. Our products are positioned to comply with the security, availability, processing integrity, confidentiality, and privacy criteria with:
We are committed to ensuring our products meet the requirements of the EU Cyber Resilience Act, including secure-by-design principles, vulnerability handling, and transparency obligations. We are aligning our processes and products with its requirements and remain committed to achieving compliance with all obligations as they become applicable under the Act's implementation timeline.
Yes. We complete software bills of materials reports for all software products to improve transparency, supply chain visibility, and vulnerability tracking. Software bills of materials are available on request through our Tech Support team.
Reliable Controls provides secure deployment guidance through our dealer network, including recommendations for network segmentation, access controls, B/SC setup, and secure remote access. Customers are encouraged to consult their dealer and request secure configuration options tailored to their building and IT policies.
Connect with our cybersecurity team for guidance tailored to your building systems.