Security Dealer & Integrator

JUL 2014

Find news and information for the executive corporate security director, CSO, facility manager and assets protection manager on issues of policy, products, incidents, risk management, threat assessments and preparedness.

Issue link: http://sdi.epubxp.com/i/343949

Contents of this Issue

Navigation

Page 101 of 109

P rotecting data centers from hackers, unauthorized access by employees or other threats demands constant attention, proactive thinking and implementation of today's best technology. While definitive pre- cautions are usually taken to secure the network, basic physical security proce- dures for securing the data center itself are often not as well thought out. For many organizations, the answer lies in multiple layers and types of safe- guards including physical measures such as video surveillance or mantraps and established policies and procedures that limit physical access such as the use of key management and access control systems. Systems offer reliable industry standard features Key control systems are designed to securely hold keys and automatically track key usage. They are an industry standard in casinos used to secure access to cash and chips; in prisons to secure and automate access to facility keys; and in housing complexes, automo- bile dealerships, hotels, school campuses and myriad other applications. Advanced systems can also secure card access badges as well as provide safe storage for smaller valuable items such as cash boxes, mobile devices and weapons. To access a stored key or badge, the authorized user simply enters his or her personal identification code on the key- pad. When the system verifies the user, the door will open and the location of the requested key will light up. Key control systems can also be configured with card readers or biometric readers and can be networked for centralized control. At any time, security operations can view the By Fernando Pires S-24 ACCESS CONTROL TRENDS AND TECHNOLOGY 2014 �������������������������������������� JULY/AUGUST Employing a multi-layered approach optimizes physical protection of highly sensitive areas Key management systems enhance data center's physical security Key management systems are ideal for use in a data center facility security plan because they offer a variety of control and usage options. (Image Courtesy of BigStock.com)

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Dealer & Integrator - JUL 2014