Intelligent CIO Europe Issue 46 | Page 37

EDITOR ’ S QUESTION

Data centres are vital to the success of many enterprises . However , their critical role and the value of the data they hold also makes them an attractive target for attacks , both cyber and physical .

As more and more businesses experience security breaches , the wave of compromised data is on the rise . Some are caused by weaknesses in an organisation ’ s virtual perimeter . For instance , when hackers exploit software vulnerabilities to gain access to a connected system from the outside . Others rely on a breach of a physical perimeter , such as when a visitor or employee enters the facility to connect a rogue device .
In fact , IT leaders and data centre employees were surveyed about data risk and a staggering 75 % believe that employees have put data at risk intentionally . To keep up with the evolving threat landscape , physical security teams must develop a coherent and proportionate strategy that is supported by effective governance structures .
Take a layered approach
It is essential that security personnel do not put too much reliance on any one sensor or analytic to detect unwanted intruders . Instead , they should build out a
It is essential that security personnel do not put too much reliance on any one sensor or analytic to detect unwanted intruders .
layered approach to perimeter security that ensures all is not lost should one method fail . Biometrics ,
Biometrics , LiDAR , video surveillance and fencing are just some of the detection technologies that can be combined as part of a comprehensive plan to discourage and identify intruders .
LiDAR , video surveillance and fencing are just some of the detection technologies that can be combined as part of a comprehensive plan to discourage and identify intruders . A layered approach will not only improve response time but minimise the risk of breaches going undetected . They also reduce false and nuisance alarm issues as personnel have eyes on the scene before choosing how to respond .
Centralise security and operation
As the threat landscape evolves , security personnel need greater situational awareness and a better understanding of what is happening in their ecosystem . That is why operators should invest in and rely upon a scalable unified system .
A unified system combines information from all available sensors to provide greater awareness to operators . This not only means showing video feeds when alerts are triggered by the access control system , but also being able to see data from all related sensors in a single click , from anywhere in the system .
There are many ways in which a unified security platform can enhance security and streamline compliance operations . For example , by making it easier to set expiry times for contractor passes or by automating the generation and sharing of audit reports so that any irregular activity is quickly brought to light . p
NICK SMITH , BUSINESS DEVELOPMENT
MANAGER AT GENETEC
www . intelligentcio . com INTELLIGENTCIO EUROPE 37