Tips and Strategies for Securing Datacenters

Tips and Strategies for Securing Datacenters

When I think about datacenter security, usually the first thing that pops into my mind is cybersecurity tools and strategies to prevent hackers from penetrating and gaining access to the important data stored therein. However, security of datacenters should actually begin with physical security of the perimeter to add another layer of security between the data and individuals with malicious intent.

Tips and Strategies for Securing DatacentersEvery datacenter usually has its own set of unique physical security challenges, as does any facility, making it difficult to secure, but after reading “A Guide to Physical Datacenter Security,” I offer you the following strategies and tips:

  1. Protect the perimeter: Develop a physical security policy for the datacenter, and ensure that every employee is aware and follows it. Consider implementing biometric access or security guards. Install CCTV monitoring equipment facing each of the outside walls, and don’t forget to aim a few cameras at the ceiling. Some intruders will try to use the ceiling as a crawl space to gain entry.

  2. Segregate loading and storage areas: Servers that do not contain data are still susceptible to an attack if physical access to the server is gained by a malicious individual due to sophisticated technology. This technology can be installed or implanted into servers, search data and report back to a central location without ever being detected.
  3. When receiving a shipment of bare servers, be sure the loading dock is segregated and secured away from the storage area to help prevent someone compromising the integrity of the equipment before it even gets on the racks.

  4. Keep power and network cabling neat: Obviously power is needed to turn on servers and have them communicate; therefore, make sure all cabling is nice, neat and clean to help prevent employees from making a mistake inside the datacenter. This could lead to unscheduled downtime and could compromise data integrity.

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

  • Street Smarts

    The ongoing acceptance of AI and advanced data analytics has allowed surveillance camera technology to shift from being a tactical tool to a strategic business solution. Combining traditional surveillance technology with AI-based data-driven insights can streamline transportation systems, enhance traffic management, improve situational awareness, optimize resource allocation and streamline emergency response procedures. Read Now

  • Midtown Manhattan Shooting Kills 4, Including NYPD Officer

    Four people were killed, including a NYPD officer, in a midtown Manhattan shooting on Monday. That’s according to CNN. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.