Rack Enclosure Cabinets


Brea Networks offers enclosed server rack cabinets with locking doors and side panels. These cabinets are ideal for applications that require physical equipment security at the rack level, instead of at the room level. These racks come with ventilated doors that allow plenty of airflow from front to back. These racks are ideal for server rooms and high-density data centers.

These enclosed racks are perfect for hotter, heavier equipment and applications with higher wattages. Brea Networks offers plenty of options to choose from including front doors with shatter-resistant clear acrylic windows, construction for harsh environments (up to NEMA IP54 standards), and seismic ratings for earthquake zones.

SmartRack Enclosures


Brea Networks offers SmartRack enclosures that are designed for high-density server and networking applications in IT environments with provisions to integrate cooling, power distribution, and cable management.

SmartRack enclosures ship fully assembled! They also come with tool-less mounting slots, so they can be rapidly installed and deployed quickly. The SmartRack also includes adjustable mounting rails so that you can view it easily and eliminate time-consuming measurements. The doors and panels are lightweight and give you convenient access.

The SmartRack enclosures are able to hold up to 3,000 pounds and are able to support cooling, power distribution, cable management, and monitoring features in order to keep your services working non-stop.

Network Rack Features


  • Ships fully assembled for rapid deployment and roll into place on heavy-duty pre-installed casters.
  • Front and rear sets of equipment mounting rails adjust in 1/4″ increments. Adjustment is quick and convenient. The easy-view depth index ensures consistent rail placement without requiring time-consuming measurements.
  • Toolless accessory mounting rails (2 rails per enclosure) include slots for quick installation of compatible PDUs and vertical cable managers. Mounting slots are arranged in an industry-standard pattern compatible with a wide variety of accessories. Each rail can accommodate two vertical PDUs or cable managers side-by-side (four items per enclosure).
  • Enclosure includes mounting hardware of 50 pieces of M6 cage nuts and 50 pieces of M6 screws
  • Textured powder coat finish for tough resistance to environmental concerns such as deployment in warehouses.
  • Massive front to rear ventilation capacity. 65+% open space in door perforation pattern meets or exceeds server manufacturer requirements.
  • Maximum usable internal depth of 37 inches/94 cm (front to rear rail).
  • Weight ratings of 3000 lb stationary and 2250 lb rolling.
  • Front door is locking, reversible and removable.
  • Rear doors are locking and reversible. Split rear door design reduces clearance requirements for service entry allowing the enclosure to be placed closer to a wall.
  • Locking removable side panels are ‘half size’ to make them smaller and lighter improving ease of installation and servicing. Two side panels per side (4 panels total). Side panels are keyed alike to the front and rear doors.
  • Built in baying tabs allow enclosures to be combined securely in rows. Center-to-center width can be set at 600mm or 24″ to match standard data center floor tiles.
  • Casters are pre-installed and support a rolling load capacity of 2250 lbs, allowing the enclosures to be pre-configured and rolled to the final installation location. Casters are removable.
  • Leveling feet extend to allow enclosure to be positioned on uneven floors. Levelers are removable.
  • Compact design allows the enclosure to roll through standard height commercial doorways.

Even More Features:

  • Convenient grounding system. All components are grounded to the enclosure frame which includes multiple connections for facility ground. Front and rear doors include quick-release ground wires.
  • Open bottom for cable access.
  • Top panel has generous cable access holes. Panel can be removed toollessly in seconds without having to disconnect cables first.
  • Included stabilizing brackets are used for shipment and can be reattached at the bottom of the enclosure frame on the inside or outside of the rack.
  • Meets all enclosure requirements towards PCI DSS (Payment Card Industry Data Security Standard) Compliance
  • Compatibility with airflow optimization accessories as well as cable management accessories.


Hire Us Today!


Acceptable Interruption Window,Acceptable Use Policy,Access Control List (ACL),Access Path,Access Point,Access Profile,Access Rights,Access Type,Accountability,Accounting Legend Code,Account Management (user),Active Security Testing,Ad Hoc Network,Administrative Safeguards,Advanced Encryption Standard (AES),Advanced Penetration Testing,Advanced Persistent Threat (APT),Adversary,Adware,Alert Situation,Alternate Facilities,Alternate Process,Analog,Anti-Malware,Anti-Virus Software,App Attack,Application Layer,Architecture,Asset,Asymmetric Key (Public Key),Attack,Attack Mechanism,Attack Vector,Attenuation,Audit Trail,Authentication,Authenticity,Availability,Backdoor,Bandwidth,Banner,Banner Grabbing,Baseline Security,Bastion,Bastion Host,Behavioral Outcome,Biometrics,Bit Error Rate,Black Core,Blended Attack,Block Cipher,Block Cipher Algorithm,Botnet,Boundary,Bridge,Bring Your Own Device (BYOD),Broadcast,Brute Force,Brute Force Attack,Buffer Overflow,Business Continuity Plan,Business Impact Analysis/Assessment,Category,Central Services Node,Certificate Authority (CA),Certificate Management,Certification Revocation List,Chain of Custody,Chain of Evidence,Challenge Response Protocol,Checksum,Chief Information Security Officer,Chief Security Officer,Cipher,Cipher Text,Ciphony,Claimant,Cleartext,Clinger-Cohen Act of 1996,Cloud Computing,Cold Site,Collision,Common Access Card (CAC),Common Attack Pattern Enumeration and Classification (CAPEC),Compartmentalization,Compliance,Compliance Documents,Computer Emergency Response Team (CERT),Computer Forensics,Confidentiality,Configuration Management,Consumerization,Containment,Content Filtering,Control,Countermeasure,Critical Infrastructure,Criticality,Criticality Analysis,Cross-Site Scripting (XSS),Cryptography,Cryptosystem,Cybercop,Cyberespionage,Cyber Security Architecture,Cyber Security,Cyberwarfare,Data Asset,Data Classification,Data Custodian,Data Element,Data Encryption Standard,Data Flow Control,Data Leakage,Data Owner,Data Retention,Data Transfer Device (DTD),Database,Decentralization,Decryption,Decryption Key,Defense-in-Depth,Demilitarized Zone,Denial of Service Attack,Digital Certificate,Digital Evidence,Digital Forensics,Digital Signature,Disaster,Disaster Recovery Plan,Discretionary Access Control,Disk Imaging,Disruption,Distributed Denial of Service (DDoS),Domain Name System ,Domain Name Systems (DNS) Exfiltration,Dual-Use Certificate,Due Care,Due Diligence,Duplicate Digital Evidence,Dynamic Ports,E-Commerce,E-Government,Eavesdropping,Easter Egg,Egress,Egress Filtering,Electronic Key Entry,Electronic Key Management System,Electronic Signature,Electronically Generated Key,Elliptical Curve Cryptography (ECC),Embedded Cryptographic System,Embedded Cryptography,Encapsulation Security Payload,Encipher,Encryption,Encryption Algorithm,Encryption Certificate,Encryption Key,End Cryptographic Unit,End-to-End Encryption,Enterprise,Enterprise Architecture,Enterprise Risk Management,Entrapment,Eradication,Ethernet,Event,Evidence,Exercise Key,Exploit,Exploit Code,Exploitable Channel,External Network,External Security Testing,Fail Safe,Fail Soft,Failover,False Positive,Federal Information System,Federal Public Key Infrastructure Policy Authority (FPKI PA),File Encryption,File Name Anomaly,File Protection,File Security,File Transfer Protocol (FTP),Fill Device,Firewall,Firewall Control Proxy,Firmware,Flaw Hypothesis Methodology,Flooding,Focused Testing,Forensic Copy,Forensic Examination,Forensic Specialist,Forensically Clean,Forensics,Forward Cipher,Freeware,Full Disk Encryption (FDE),Gateway,gethostbyaddr,gethostbyname,Get Nearest Server,Global Information Grid (GIG),Global Information Infrastructure (GII),GNU,Gnutella,Governance,Governance, Risk Management and Compliance ,Graduated Security,Group Authenticator,Guard System,Guessing Entropy,Guideline,Hacker,Handshaking Procedures,Hard Copy Key,Hardening,Hardware,Hardwired Key,Hash Value,Hash-based Message Authentication Code (HMAC),Hashing,Hash Function,Hash Functions,Hash Total ,Header,High Assurance Guard (HAG),High Availability,High Impact,High Impact System,Hijack Attack,Hijacking ,HoneyClient,Honeypot,Honeymonkey,Hops,Host,Host-Based Intrusion Detection System (HIDS),Hot Site,Hot Wash,HTTP Proxy,HTTPS,Hub,Hybrid Attack,Hybrid Encryption,Hybrid Security Control,Hyperlink,Hypertext Markup Language (HTML),Hypertext Transfer Protocol (HTTP),Identity,Incident,Incident Handling,Incremental Backups,Inetd,Inference Attack,Information Warfare,Ingress Filtering,Input Validation Attacks,Integrity,Integrity Star Property,Internet,Internet Control Message Protocol (ICMP),Internet Engineering Task Force (IETF),Internet Message Access Protocol (IMAP),Internet Protocol (IP),Internet Protocol Security (IPsec),Internet Standard,Interrupt,Intranet,Intrusion Detection (ID) ,IP Address,IP Flood,IP Forwarding,IP Spoofing,ISO,Issue-Specific Policy,ITU-T,Jitter,Jump Bag,Kerberos,Kernel,Lattice Techniques,Layer 2 Forwarding Protocol (L2F),Layer 2 Tunneling Protocol (L2TP),Least Privilege,Legion,Lightweight Directory Access Protocol (LDAP),Link State,List Based Access Control,Loadable Kernel Modules (LKM),Log Clipping,Logic Bombs,Logic Gate,Loopback Address,MAC Address,Malicious Code,Malware,Mandatory Access Control (MAC),Masquerade Attack,md5,Measures of Effectiveness (MOE),Monoculture,Morris Worm,Multi-Cast,Multi-Homed,Multiplexing,NAT,National Institute of Standards and Technology (NIST),Natural Disaster,Netmask,Network Mapping,Network Taps,Network-Based IDS,Non-Printable Character,Non-Repudiation,Null Session,Octet,One-Way Encryption,One-Way Function,Open Shortest Path First (OSPF),OSI,OSI layers,Overload,Packet,Packet Switched Network (PSN),Partitions,Password Authentication Protocol (PAP),Password Cracking,Password Sniffing,Patch,Patching,Payload,Penetration,Penetration Testing,Permutation,Personal Firewall,pharming,Phishing,Ping of Death,Ping Scan,Ping Sweep,Plaintext,Point-to-Point Protocol (PPP),Point-to-Point Tunneling Protocol (PPTP),Poison Reverse,Polyinstantiation,Polymorphism,Port,Port Scan,Possession,Post Office Protocol, Version 3 (POP3),Practical Extraction and Reporting Language (Perl),Preamble Pretty Good Privacy (PGP)TM,Private Addressing,Program Infector,Program Policy,Promiscuous Mode,Proprietary Information,Protocol,Protocol Stacks (OSI),Proxy Server,Public Key,Public Key Encryption,Public Key Infrastructure (PKI),Public-Key Forward Secrecy (PFS),QAZ,Race Condition,Radiation Monitoring,Reconnaissance,Reflexive ACLs (Cisco),Registry,Regression Analysis,Request for Comment (RFC),Resource Exhaustion,Response,Reverse Address Resolution Protocol (RARP),Reverse Engineering,Reverse Lookup,Reverse Proxy,Risk,Risk Assessment,Risk Averse,Rivest-Shamir-Adleman (RSA),Role Based Access Control,Root,Rootkit,Router,Routing Information Protocol (RIP),Routing Loop,RPC Scans,Rule Set Based Access Control (RSBAC),S/Key,S/MIME,Safety,Safeguards,Safeguarding Statement,Salt,Sandboxing,Sanitization,Scanning,Scatternet,Scavenging,Scoping Guidance,Secret Key,Secret Key (symmetric) Cryptographic Algorithm,Secret Seed,Secure Electronic Transactions (SET),Secure Communication Protocol,Secure Communications,Secure Erase,Secure Hash Algorithm (SHA),Secure Hash Standard,Secure Shell (SSH),Secure Sockets Layer (SSL),Secure State,Secure Subsystyem,Security,Security Association,Security Attribute,Security Banner,Security Authorization Boundary,Security Assertion Markup Language (SAML),Security Categorization,Security Category,Security Concept of Operations ,Security Content Automation Protocol (SCAP) ,Security Control Assessment,Security Control Assessor ,Security Control Baseline ,Security Control Effectiveness ,Security Control Enhancements,Security Control Inheritance,Security Controls,Security Controls Baseline,Security Domain,Security Engineering,Security Fault Analysis (SFA),Security Features Users Guide,Security Filter,Security Functions,Security Goals,Security Impact Analysis,Security Information and Event Management (SIEM) Tool,Security Inspection,Security Kernel,Security Label,Security Level,Security Management Dashboard,Security Markings,Security Mechanism,Security Net Control Station,Security Objective,Security Perimeter,Security Plan,Security Policy,Security Posture,Security Program Plan,Security Range,Security-Relevant Change,Security-Relevant Event,Security-Relevant Information,Security Requirements,Security Requirements Baseline,Security Requirements Traceability Matrix (SRTM),Security Safeguards,Security Service,Security Specification,Security Strength,Security Tag,Security Target,Security Test & Evaluation (ST&E),Security Testing,Seed Key,Segment,Sensitive Information,Separation of Duties,Server,Session,Session Hijacking,Session Key,SHA1,Shadow Password Files,Share,Shell,Signals Analysis,Signature,Simple Integrity Property,Simple Network Management Protocol (SNMP),Simple Security Property,Smartcard,Smurf Attack,Sniffer,Sniffing,Social Engineering,Socket,Socket Pair,SOCKS,Software,Source Port,Spam,Spanning Port,Split Horizon,Split Key,Spoof,SQL Injection,Stack Mashing,Standard ACLs (Cisco),Star Network,Star Property,State Machine,Stateful Inspection,Static Host Tables,Static Routing,Stealthing,Steganalysis,Steganography,Stimulus,Store-and-Forward,Straight-Through Cable,Stream Cipher,Strong Star Property,Sub Network,Subnet Mask,Switch,Switched Network,Symbolic Links,Symmetric Cryptography,Symmetric Key,SYN Flood,Synchronization,Syslog,System Security Officer (SSO),System-Specific Policy,T1, T3,Tamper,TCP Fingerprinting,TCP Full Open Scan,TCP Half Open Scan,TCP Wrapper,TCP/IP,TCPDump,TELNET,Threat,Threat Assessment,Threat Model,Threat Vector,Time to Live,Tiny Fragment Attack,Token Ring,Token-Based Access Control,Token-Based Devices,Topology,Traceroute (tracert.exe),Transmission Control Protocol (TCP),Transport Layer Security (TLS),Triple DES,Triple-Wrapped,Trojan Horse,Trunking,Trust,Trusted Ports,Trusted Certificate,Tunnel,UDP Scan,Unicast,Uniform Resource Identifier (URI),Uniform Resource Locator (URL),Unix,Unprotected Share,User,User Contingency Plan,User Datagram Protocol (UDP),Virtual Private Network (VPN),Virus,Voice Firewall,Voice Intrusion Prevention System (VIPS),War Chalking,War Dialer,War Dialing,Wardriving,Web of Trust,Web Server,WHOIS,Windowing,Windowing System,Windump,Wired Equivalent Privacy (WEP),Wireless Application Protocol (WAP),Wiretapping,World Wide Web (“the Web”, WWW, W3),Worm,X.400,XNS,XHTML,XML,XMPP,XMT,Y2K,Yottabyte,Ymodem,Zero Day,Zero-day Attack,Zombies, cyber security company, cyber security in orange county, cyber security in California, cyber security in los angeles, cyber security in brea, cyber security in brea ca, managed it services, managed it support, it services, it support, managed it support orange county, managed it services orange county,Brea,Fullerton,Yorba Linda,City of Industry,Irvine,Anaheim,Santa Ana,Villa Park,Fountain Valley,East Irvine,Ontario,Diamond Bar,Buena Park,Walnut,Orange,Placentia,La Palma,Pomona,Montclair,North Tustin