Beyond traditional security at data centers
Victoria Hanscomb
Share this content
Mobile, visitor management and command and control systems elevate security measures in data centers, says Kim Rahfaldt, Director of Marketing and Public Relations, AMAG Technology.
Article Chapters
ToggleThe ubiquity of data centers
In today’s digital age, data centers are pivotal in powering the global economy.
From the moment we wake up and check our emails to the late-night Netflix binge, every online activity relies on the infrastructure housed within these vital facilities.
However, as the world becomes increasingly interconnected, the security challenges facing data centers are growing more complex by the day.
Data centers must address physical security concerns and comply with stringent regulatory requirements.
Fortunately, emerging technologies such as mobile access control, visitor management and command and control systems offer promising avenues for enhancing security beyond the typical access control and video solutions while streamlining operations.
Importance of physical security
Physical security threats pose a substantial risk to data centers, potentially compromising the integrity and availability of services.
Theft, vandalism and unauthorized access can all have devastating consequences, ranging from data breaches to costly downtime.
To mitigate these risks, data center security teams implement five layers of security from the front door to the customer’s cage to ensure the highest level of security using robust access controls, surveillance systems and perimeter security measures.
Meeting compliance and regulatory requirements
Data centers operate in a complex regulatory environment, subject to a myriad of industry regulations and data protection laws such as GDPR, HIPAA and PCI DSS.
Non-compliance exposes organizations to legal penalties, costly fines, tarnishes their reputation and erodes customer trust.
Therefore, data centers must deploy comprehensive security measures to ensure compliance with these rigorous requirements.
Trustworthiness of mobile security for data centers
Leveraging mobile security solutions offers data centers a versatile and efficient means of access control.
Widely used mobile wallet platforms such as Apple Wallet and Google Wallet, present compelling opportunities for enhancing security and convenience in data center environments.
Digital access credentials: Storing access credentials digitally within Apple Wallet or Google Wallet eliminates the need for physical access cards or key fobs reducing the risk of loss or theft and streamlining the access control process.
Employees often forget their physical credentials and do not bother to return home to retrieve it, however, phones are rarely forgotten and an employee is likely to go back home to retrieve it.
Deploying digital credentials also saves money on printers, ink and cards, helping data center staff meet sustainability goals.
Precious real estate used to set up a badge creation station can be repurposed and employees can focus on more important tasks than creating badges.
Secure authentication: Accessing the data center facility becomes seamless with smartphones equipped with Apple Wallet or Google Wallet.
Using near field communication (NFC), secure authentication methods such as tapping the smartphone against a reader or scanning a QR code at entry points ensure quick and hassle-free access.
Biometric/two factor authentication: Both Apple Wallet and Google Wallet offer robust biometric authentication features, including facial and fingerprint recognition.
Data centers can implement two-factor authentication by combining digital access credentials with biometric authentication.
This multi-layered approach significantly reduces the risk of unauthorized access and enhances overall security posture.
Remote access management: Data center administrators can remotely manage access permissions and credentials stored in mobile wallets through centralized management platforms such as Symmetry Wallet.
This enables efficient onboarding and offboarding of employees and the revocation of access rights in case of personnel changes or security incidents.
Organizations can provision and revoke an unlimited number of credentials instantly, saving time.
Secure: Apple Wallet and Google Wallet employ robust encryption to protect stored access credentials from unauthorized access or interception, making them the safest credential available.
This ensures that sensitive information remains secure, even if the smartphone is lost or stolen.
Enhanced employee experience: Utilizing Wallet within a mobile phone delivers a better employee experience.
Downloading the credential is fast as no app is needed to get up and running.
Employees no longer must worry about carrying a badge to open doors.
A person’s phone is rarely a few feet from them; therefore, they will rarely forget their credential.
It is secure and, in some cases, can operate even after the phone loses power.
Using the encrypted security features with the device ensures it is safe.
It reduces the likelihood of unauthorized access – people share physical credentials but will not share their phones!
Managing visitors
Data centers need a fast, efficient and automated way to process visitors through their highly vulnerable and protected facilities.
Unauthorized access, physical security vulnerabilities, equipment damage and non-compliance with security policies are among the primary concerns when welcoming visitors into data center facilities.
Implementing robust visitor management protocols is essential to mitigate these risks effectively.
Protecting access: Unauthorized access could lead to theft of equipment, data breaches or sabotage, resulting in excessive damage.
Visitors may inadvertently compromise physical security measures by propping open doors, tampering with locks or bypassing security checkpoints, which could create vulnerabilities for unauthorized access.
Visitors may try to access confidential information or sensitive data physically or electronically.
This could involve trying to access servers or network equipment without permission.
They might accidentally damage equipment, such as servers, cables or cooling systems, by mishandling or improperly interacting with them.
Security operators are concerned with ensuring that visitors adhere to the data center’s security policies and procedures.
This includes wearing identification badges, following escort protocols and respecting restricted areas.
Implementing a visitor management system can automate the process by having an electronic record of when a visitor arrives and departs.
Access to select doors and areas can ensure a visitor goes only where they are allowed and does not enter unauthorized or sensitive rooms or areas.
Better customer experience: A visitor management system can send a welcome email that includes instructions or essential information the visitor must know before they enter a data center facility.
A QR code can speed up check-in and make visitors feel welcome.
Audit trail and reporting: Visitor management systems provide an audit trail so administrators can generate comprehensive reports for compliance purposes, thereby ensuring adherence to regulatory requirements and reducing costly fines.
Centralized global security management
Large data centers who operate several different security systems will find deploying a centralized global security management system (command and control) will streamline operations.
A centralized system integrates various security subsystems, such as access control, video surveillance, intrusion detection and fire alarms, into a centralized platform.
This allows security operators to monitor all security events and alarms from a single interface, providing a comprehensive view of the data center’s security posture.Â
This eliminates the need to open and acknowledge alarms in each of the separate systems.
Security operators can quickly identify security incidents, assess their severity and initiate appropriate response actions, such as dispatching security personnel or notifying law enforcement agencies.
The system can automate security workflows and response procedures based on predefined rules and policies.
For example, the system can automatically escalate alarms to higher levels of authority or trigger specific response actions based on the type and severity of the incident.
They can help facilitate compliance with regulatory requirements and industry standards by providing comprehensive reporting and audit trail capabilities.
Data centers can generate detailed security reports, including incident logs, response times and compliance metrics, to demonstrate adherence to security policies and regulations.
Security remains a top priority in an ever-evolving threat landscape.
Mobile access control, visitor management and centralized security management systems offer data centers a secure, convenient and efficient means of enhancing security with a better user experience, while meeting regulatory requirements and safeguarding against physical threats.
This article was originally published in the September edition of Security Journal Americas. To read your FREE digital edition, click here.