Data Center Security: Always a Main Concern for Businesses
When it comes to what customers value, data center security tops the list. Of course, power, cooling, connectivity and other features play important roles in evaluating data center performance as well. But any defects in physical facility security can have devastating effects.
Protecting Against Physical Intrusion
Security starts with the physical building being guarded against intrusion. A good security model begins with 24/7/365 in-house security staff, layered security zones, security cameras and 360-degree monitoring. These assets help prevent theft from external break-ins and from employees.
It's also critical to have a safe office to house data security personnel. This office should provide a direct view of all non-alarmed entrance points to the facility. The security personnel needs to be able to evaluate and screen all people entering and exiting the facility.
Preferably at the reception area, the data center office should be enclosed with strong glass enclosures that can be quickly closed to keep out intruders. This space must be able to house security personnel alone so they can evaluate a situation and call for emergency assistance when needed.
Proven access control systems must regulate all facility entrances. Typical data center methods for access control include swipe cards, digilocks, biometrics and turn-style doors that prevent tail-gating. Many data centers use a combination of these methods. Such combinations provide an excellent deterrent to intrusion attempts.
However, good judgment comes into play as well. Security personnel must also be trained on internal processes regarding who is authorized to enter the facility. Who can enter to make deliveries? Who can remove equipment for repairs? Current access procedures require collaboration and vendor management.
Adding More Eyes and Ears to Data Security
No data center can possibly hire enough security guards to see everything going on in the facility around the clock. So, installing cameras and monitoring devices such as CCTV control systems can monitor all external entrances and any other area of the facility continuously.
The monitoring system must provide real-time alerts and record all activity for follow-up review and analysis. Alerts should be provided to the security team whether they're in the security office or away on security rounds.
As with any technology, the monitoring system and security personnel will only be as good as the training provided, processes developed and procedures followed. If the internal data security program is flawed in any way, the facility will be at risk.
It Boils Down to Trust
Companies select colocation providers for a number of reasons. However, security is always a main concern. After a business does its preliminary assessment of a provider, it then visits the facility to evaluate the physical features, including data security.
At the end of the day, the customer wants to see stringent security controls and monitoring technologies in place. It wants to see sophisticated cameras and monitoring equipment. But most of all, companies want to see a professional security team in place around the clock. Nothing builds trust more than a properly trained, expert security staff on-site continuously.
CyrusOne uses military-grade data center security protocols to protect all physical assets and provide zero threat of unauthorized access or infiltration. Our specific security profile includes:
€On-site security guards 24/7/365
€Video surveillance and recording of all exteriors and interiors
€Biometric and key card access control
€Turn style doors to prevent tail-gating
€Reinforced physical structure including concrete bollards, steel-lined walls, bulletproof glass and barbed wire fencing
For more information about our data center security and colocation solutions, please contact us online or call (855) 564-3198 today.
Protecting Against Physical Intrusion
Security starts with the physical building being guarded against intrusion. A good security model begins with 24/7/365 in-house security staff, layered security zones, security cameras and 360-degree monitoring. These assets help prevent theft from external break-ins and from employees.
It's also critical to have a safe office to house data security personnel. This office should provide a direct view of all non-alarmed entrance points to the facility. The security personnel needs to be able to evaluate and screen all people entering and exiting the facility.
Preferably at the reception area, the data center office should be enclosed with strong glass enclosures that can be quickly closed to keep out intruders. This space must be able to house security personnel alone so they can evaluate a situation and call for emergency assistance when needed.
Proven access control systems must regulate all facility entrances. Typical data center methods for access control include swipe cards, digilocks, biometrics and turn-style doors that prevent tail-gating. Many data centers use a combination of these methods. Such combinations provide an excellent deterrent to intrusion attempts.
However, good judgment comes into play as well. Security personnel must also be trained on internal processes regarding who is authorized to enter the facility. Who can enter to make deliveries? Who can remove equipment for repairs? Current access procedures require collaboration and vendor management.
Adding More Eyes and Ears to Data Security
No data center can possibly hire enough security guards to see everything going on in the facility around the clock. So, installing cameras and monitoring devices such as CCTV control systems can monitor all external entrances and any other area of the facility continuously.
The monitoring system must provide real-time alerts and record all activity for follow-up review and analysis. Alerts should be provided to the security team whether they're in the security office or away on security rounds.
As with any technology, the monitoring system and security personnel will only be as good as the training provided, processes developed and procedures followed. If the internal data security program is flawed in any way, the facility will be at risk.
It Boils Down to Trust
Companies select colocation providers for a number of reasons. However, security is always a main concern. After a business does its preliminary assessment of a provider, it then visits the facility to evaluate the physical features, including data security.
At the end of the day, the customer wants to see stringent security controls and monitoring technologies in place. It wants to see sophisticated cameras and monitoring equipment. But most of all, companies want to see a professional security team in place around the clock. Nothing builds trust more than a properly trained, expert security staff on-site continuously.
CyrusOne uses military-grade data center security protocols to protect all physical assets and provide zero threat of unauthorized access or infiltration. Our specific security profile includes:
€On-site security guards 24/7/365
€Video surveillance and recording of all exteriors and interiors
€Biometric and key card access control
€Turn style doors to prevent tail-gating
€Reinforced physical structure including concrete bollards, steel-lined walls, bulletproof glass and barbed wire fencing
For more information about our data center security and colocation solutions, please contact us online or call (855) 564-3198 today.