Reliable Controls logo

Secure building systems

At Reliable Controls cybersecurity isn't just a checkbox. It's a foundational pillar in how we design, manufacture, and support our building automation solutions. As custodians of critical infrastructure, we're committed to a proactive, layered approach to protecting the integrity and confidentiality of our systems and our customers' data.

Core principles


computer security icon

Secure by design

We develop our products with a security-first approach:

  • Adoption of industry-recognized standards: We integrate protocols like BACnet Secure Connect to ensure secure interoperability.

  • Secure development life cycle: We embed security at every stage of development, from ideation to product release. Once our solutions are deployed in the field, our cybersecurity incident and reporting process ensures any issues are dealt with promptly.

  • Threat modeling and risk assessment: We anticipate vulnerabilities before they emerge, not after they’re exploited.

  • Penetration testing and code audits: Third-party and internal testing, including SCA, SAST, and DAST, validates the resilience of every Reliable Controls product.


computer security icon

Defense in depth

One barrier isn’t enough, so we create multiple levels of defense for stronger protection:

  • Multilayered network security with segmentation, firewalls, and role-based access

  • Authentication and encryption protocols to ensure secure communication across all endpoints

  • Secure firmware updates via digitally signed packages and validated boot processes

  • Audit trails and log management to provide vital visibility into system activities


computer security icon

Customer empowerment

We equip our Authorized Dealers and customers with:

  • Reliable Controls Hardening Guide

  • Security bulletins and product alerts

  • Training and best-practice resources

  • Internal technical support and application engineering teams

Cybersecurity is a shared responsibility. We enable our customers to be effective stewards of their system’s security.


computer security icon

Lead the way

As cyberthreats evolve, so do we. Our cybersecurity roadmap includes:

  • Continuous monitoring of industry threats and timely responses to cybersecurity issues

  • Constant, real-time communication about events that could impact our customers

  • Not just reacting to cyberthreats but anticipating them

Security alerts

Date Name CVE Description
December 10, 2021 Name:Apache Log4 CVE:CVE-2021-44228 DescriptionReliable Controls software is not affected by the Apache Log4j vulnerability. There is no risk of exposure to Reliable Controls products from this vulnerability and there are no additional steps required to secure your Reliable Controls systems.

Report a cybersecurity issue

If you've identified a potential security vulnerability, please report it immediately. Our dedicated security team will investigate and respond promptly.

Frequently asked questions

Still have questions?

Connect with our cybersecurity team for guidance tailored to your building systems.

Timely, thoughtful support, typically within 3-5 business days
Expert guidance you can rely on informed by real-world experience
Handled with care and strict confidentiality