Security Dealer & Integrator

JUN 2017

Find news and information for the executive corporate security director, CSO, facility manager and assets protection manager on issues of policy, products, incidents, risk management, threat assessments and preparedness.

Issue link: http://sdi.epubxp.com/i/835749

Contents of this Issue

Navigation

Page 48 of 59

June 2017 www.SecurityInfoWatch.com / Security Dealer & Integrator 49 let-resistant models are also available. Access through a security revolver should begin with either card or bio- metric authentication. ree-factor (card, PIN and biometric) provides the highest level of security. A personal interlock or "mantrap" works to prevent tailgating/piggy- backing by only allowing one person through at a time. Upon authentica- tion, the outer door opens, the user steps in, the door closes behind them, and then the interior door opens to grant access to the data center floor. e unit works with body weight, sensors or an additional checkpoint for identification in the middle of the interlock. Depending on the require- ments, the interlock may be equipped with sensors, contact mats, scales or internal monitoring. Additional options include bullet-resistance and biometric authentication abilities. Aer passing through the layers of security, an authorized user finally enters the actual data center, where servers and critical IT equipment is located. Once in the room – especially in cases of co-location – securing the racks or cabinets themselves is a must. Providing badged access to the racks with an audit trail of who accessed, when and for how long is critical. An oen-overlooked layer – cabinet control – offers an excellent opportu- nity for systems integrators to upsell. As an extension of the access control system, the racks can be secured indi- vidually or with an elevator control system for a bank of servers. While data center security is com- plex, understanding the type of loca- tion and the options for each layer of protection offers a new and exciting business opportunity for the smart sys- tems integrator. ■ » Jason Patterson is a sales manager and Dave Rogers is Business Development Manager for dormakaba. To request more information about the company, please visit www.securityinfowatch.com/12304402. Data Center Security Best Practices By Steven Anson A physical security breach can cause immeasurable harm to a data center. Given the increasing need to protect critical information, any data loss, or even the inability to meet the mandatory regulatory requirements, can result in lost customers, fines and lost revenue. Interoperability is a critical building block for data center physical security. The entire ecosystem of manufacturers and integrators that serve the data center physical security market need to make sure their products work together to provide a scalable, layered physical security solution. An effective, layered approach requires all systems to work in a cohesive manner. Network-based solutions are clearly the future of data center security, and disparate systems that do not talk to one another will be left behind. Understanding the Six Layers – from the Inside Out Each data center's security strategy is unique; however, building a layered approach to data center security helps tailor the solution to a data center's needs. The first step in determining the right layered approach is talking to a trusted technical adviser to better under- stand the current system, future needs and working environment. LAYER ONE: The data center cabinet: The core of the data center is the IT infrastructure housed within a data center cabinet. As a rule, these cabinets are remarkably insecure. Cabinet access control is being implemented into more compliance standards to prevent server theft, storage theft, monitoring devices, virus uploads and interrup- tion to power or connectivity. The ability to positively identify who is getting into these cabinets is now required for top-tier data centers and compliance regulations. LAYER TWO: Data center room and white space: To prevent unau- thorized people from entering the white space, access control, such as dual-factor biometrics, is essential to controlling authorized access to the data center. When combined with real-time video verification, a new element is added to further guard against unauthorized access. LAYER THREE: Hallways, escorted areas, and gray space: The gray space, hallways and escorted areas that lead to the data center floor are frequently where proper security measures are overlooked. This can lead to unauthorized access of critical mechanical and electrical infrastructure. LAYER FOUR: Facility entrance and reception: The visitor accep- tance area is the first critical point within the building to control authorized and unauthorized access. This is a standards compliance requirement. LAYER FIVE: Clear zone: The clear zone is a large area that contains critical infrastructure assets such as generators, fuel containment and main power feeds. This zone requires security measures that enable total situational awareness. LAYER SIX: Perimeter: When properly implemented, the perimeter defense can reduce the overall cost of a data center facility's security system and improve the effectiveness of the plan. » To learn more about the layered approach to data center security, download Anixter's whitepaper: http://anixter.com/datacenter. Steven Anson is VP Marketing for Anixter. Request more info about the company at www.securityinfowatch.com/10212860.

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Dealer & Integrator - JUN 2017