Intelligent CIO North America Issue 15 - Page 35

EDITOR ’ S QUESTION

Data centers have become part of a nation ’ s critical infrastructure and any disruption to them can have severe consequences . Their critical role and the value of the data they hold also makes them a target for attacks , both cyber and physical . With data now recognized as one of the world ’ s most valuable commodities , cybercriminals are investing in more sophisticated methods of attack .

However , many cyberattacks often start with physical access . Whether deliberate via disgruntled employees or those coerced into helping criminals , the easiest way into the server racks is via someone with physical access .
In addition to the value of the data itself , the disruption to business and society that would be caused by affecting or even halting the data center ’ s operation makes them an attractive target for terrorists or activists . An integrated , layered approach to security to mitigate against internal and external threats is essential , starting beyond the data center ’ s perimeter and extending through to the server room .
is particularly useful in maximizing limited physical security resources . Again , combined with network audio , warning people that they might be entering a prohibited zone can be an effective way to manage security remotely .
• Access control : Preventing unauthorized access to buildings is one of the most critical security requirements for data centers . Modern and increasingly ‘ frictionless ’ access control can include video verification in addition to access credentials through cards or even mobile phones and can be configured to only give specific individuals access to those buildings and areas within them for which they have authorization . Cameras and connected sensors can also ensure the security of buildings , safety of those within and operations of the data center .
• Server room and racks : The place where the ‘ crown jewels ’ are kept , access to the server room and racks themselves are seen as the ultimate goal . Physical access to a server itself would allow for the implanting of malware or spyware , granting
• IP surveillance solution : Monitoring the airspace above and around a data center through drone detection is critical . The scale of a data center can also mean a lengthy physical perimeter open to physical breach . Network video , thermal cameras and analytics can cover the entire site perimeter and alert a response . Official site entrances and exits also need monitoring and protection . Network video surveillance combined with technologies such as license plate recognition can ensure that only those authorized enter the site .
• Premises and site : Within the site itself , radar is a valuable complementary technology to traditional video surveillance in tracking people and moving objects across open spaces and large sites . Being less sensitive to things that might trigger false alarms in other surveillance technologies – such as moving shadows or light beams , small animals , raindrops or insects , wind and bad weather – radar
Preventing unauthorized access to buildings is one of the most critical security requirements for data centers .
cybercriminals access and power . Securing access to server rooms and monitoring the activity within them are therefore some of the most critical areas of data center security . In the cabinets and racks themselves , specific access control technology and video verification can be used for access , while also creating an important audit trail of individuals who have opened the cabinet . p
ETTIENE VAN DER WATT , REGIONAL DIRECTOR ,
AXIS COMMUNICATIONS
www . intelligentcio . com INTELLIGENTCIO NORTH AMERICA 35