Monitoring Centers | Rapid Response Monitoring Services
exterior view of rapid response

THE BEST FACILITIES. Period.

The facts are plain — no one invests more in the infrastructure that supports your customers and your business.

The power of in-facility monitoring.

While some monitoring providers have chosen to allow monitoring from home, where redundancy, data security, quality, and reliability are compromised, we have been committed to delivering the highest quality professional monitoring services in the industry exclusively from our fully redundant facilities since our founding.

COMMAND AND CARE

Deploy the definition of multi-redundancy. Two bicoastal, hardened Command Centers and one secure, hosted Customer Care Center stand ready to serve you 24/7/365. Our headquarters Command Center, home to our original monitoring & data center, is based in Upstate NY. Our redundant Command Center, full-load capable monitoring & data center, is based in Southern California. Our operations branch out in a hub-and-spoke model to include our secure, hosted Customer Care Center in Southern Nevada. Three centers, one standard of service: Excellence.

Image of yellow caterpillar machinery.

POWER REDUNDANCY

What do remote arctic research stations have in common with Rapid Response? Both use primary generators, not secondary units.

A primary generator is designed, engineered, and built to be the primary source of off-grid power for a facility. A unit like this has the fuel storage, duty rating, and reliability to provide full-time, full-capacity electricity — and we have six of these units supporting our Command Centers.

Through our digitally-controlled CATERPILLAR diesel generators, Rapid Response has enough private power generation at each of our Command Centers to equivalently power 30 homes for 30 days. Power generation is ensured by months of on-site fuel storage in independent redundant tanks.

Electricity runs through multiple enterprise-scale UPS (uninterruptible power supply) battery banks with digital switching controls to eliminate gaps between grid failure and generator spinup. Combined with quad-bus wiring to every piece of equipment in our facilities, power failure is practically impossible.

There’s backup power, and then there’s having powerful backup. That’s the difference of having true redundancy.

Row of cooling system refrigeration units.

DATA REDUNDANCY

What’s better than having the best firewall in the world protecting your data? Having two firewalls. What’s better than having a Data Center with two firewalls? Having two Data Centers, each with two firewalls.

See the pattern? When you partner with Rapid Response, you don’t get hyperbole — you get a partner who literally has invested more in redundancy than any other provider.

  • Firewalls by Palo Alto Networks® are capable of securing on-premises data center hardware and hosted cloud environments with the same level of protection and consistently defend against advanced threats with full traffic visibility and control.
  • VxRail Servers by Dell EMC® maximize maintenance efficiency with less hands-on time & fewer steps during tests, provide data-in-transit validation to meet strict government requirements & regulations, and run selfmonitoring virtual environments that rapidly identify root causes and proactively remediate anomalies.
  • ChilledDoor Rack Cooling by Motivair® allows for on-demand cooling on a per-rack level ensuring optimal computer performance and maximum uptime. Usually seen in supercomputing infrastructure, this glycol-fed liquid cooling solution is installed on every server rack in our Data Centers to exponentially increase our cooling redundancy.

Layered redundancy is the central component of our Data Center design philosophy. That’s why we have two Command Centers each with cutting-edge Data Center infrastructure.

Blue graphics surrounding exterior of office building.

TELECOMMUNICATIONS REDUNDANCY

Reimagine real-time communication, insulated against failure. It begins with assuming the impossible is possible, then investing in prevention.

Private Synchronous Optical Networking (SONET) rings consolidate our ethernet, data, video, and voice traffic on a single, fail-safe platform. This continuous, subterranean optical fiber structure surrounds each of our Command Centers with multiple input & output points such that if the lines were ever compromised, the SONET ring self-heals and seamlessly reroutes all telecom connections to another entry point to the facility. The SONET rings facilitate multiple national and local providers to safeguard against provider level failures.

Each Command Center has multi-layer alarm processing redundancy built on a multi-gigabit fiber-optic network. All facilities are connected via Multiprotocol Label Switching (MPLS) connections from two independent network providers, which enter the facilities via our private SONET Rings, creating a real-time 24/7/365 link between facilities. Why does this matter? Because even if one of our facilities, with all of the redundancy of infrastructure, was somehow fully incapacitated then the other Command Center could take over all data processing seamlessly with zero downtime.

Close up of house blueprint plans.

STRATEGIC FACILITY ARCHITECTURE

Simply put, each Command Center is designed to be a fortress to protect our infrastructure and our people.

For example, our Headquarters’ generators are installed in pairs — and each pair is located on opposite sides of the facility. Our UPS systems are divided into two locations, located in different areas of the building, and not placed on exterior walls. Our power switching room is located in the center of the building, also apart from our other power infrastructure elements. Each piece is secured behind multiple access-controlled doors and is supported by independent HVAC, fire protection, and video monitoring infrastructure. This same philosophy extends to every piece of every element of our power, data, security, and monitoring operations.

ALWAYS ON GUARD.

Physical safety is the foundation of a secure facility. Our dedicated corporate security division operates on three defining pillars of safety operations.

ACCESS CONTROL

Every doorway in our facilities is access controlled, and that access is compartmentalized based on a staff member’s rank and role within the company. This approach controls the flow of people in the facility and exponentially increases security redundancy overall — accessing one door does not guarantee access to the entire facility. Above and beyond UL standards, the entire Monitoring Center operations area and surrounding departments deploy biometric access control. Further, all external portals to the building utilize dual verification, with high-traffic entries utilizing a mantrap design to prevent piggybacking.

PHYSICAL ENFORCEMENT

It has always been important to us to set the bar high for enforcement, not just for protecting access to our customers’ data, but for the physical security of our on-site monitoring specialists. As such, we have established an armed corporate security division composed of former police officers and military veterans who are trained and equipped to protect our facilities in every way possible. They actively patrol within and around the buildings to establish presence, inspect all security infrastructure, and physically verify our video monitoring systems.

VIDEO MONITORING

We have deployed a company-wide, enterprise-level Avigilon camera system featuring hundreds of 4K cameras that provide static, motion-tracking, and controllable recording of all areas of our campuses, inside and out. State-of-the-art facial recognition and AI object tracking software actively parse all video feeds for potential threats, and our on-staff corporate security officers provide live monitoring 24/7/365. This all ensures that seasoned judgment is engaged alongside the best technology to protect the facilities, our customers’ data, and our team members at all times.

CYBERSECURITY IS PART OF OUR CULTURE

Individual commitment to preventing attacks and protecting our customers and their subscribers’ data is something we instill on day one — and practice every day.

SECURE VPN & MFA

Secure VPN connections provide advanced encryption for all systems in our facilities, customer applications, and account management platforms. Multi-Factor Authentication credentials combine two categories of identifying information to enhance data access security.

TRAINING SIMULATIONS

Spear-phishing. Social-engineering. Ransomware. We simulate it all to develop the most reliable and effective cyberattack prevention method — seasoned judgment. Rapid Response staff is tested repeatedly on digital defense tactics and continual retraining is required as part of our policies.

THREAT MONITORING

A select team of technical experts monitor full network traffic visibility reports in concert with our advanced dual-redundant firewalls and maintain all hardware and software countermeasures. Attackers never stop, and so we maintain an on-site technical staff at all times.