The Formula for Data Security

Data centers across United States implement integrated security solution for protection of customer assets

Involta, LLC is an award-winning national provider of IT intelligence, end-to-end infrastructure, managed services and colocation through their enterprise-class, multi-tenant data centers. The company offers a lineup of scalable, reliable, best-in-class services to meet the growing demands of businesses, including 24/7/365 network operations center solutions and managed technical and cloud services, including their Involta PULSE PlatformSM and Involta CompliantCloudSM services platform.

Founded in 2007, Involta has data centers spread across in Arizona, Idaho, Iowa, Minnesota, Ohio and Pennsylvania. The company serves a multitude of clients in healthcare, technology, manufacturing, government and various other industries where IT is missioncritical, including numerous Fortune 500 companies.

Strict Requirements for Security

Involta facilities are built in secure, climate-controlled structures and are located in geographic safe zones. Additionally, their centers have no exterior signage and all staff are trained to follow stringent security procedures for client confidentiality purposes. While these measures play a key role in day-to-day security operations, another crucial aspect to be considered is their physical and electronic security.

Because Involta houses an organization’s most critical equipment and disseminates highly sensitive data, their facilities required a layered approach to their security solution—including access control, video surveillance, wireless locks and more—to ensure access is granted only to the appropriate person.

“There are several requirements our access control system and overall security solution must be able to meet,” said Thomas Lang, Involta data center manager for the Ohio region. “We refuse to compromise security or performance when it comes to our customers’ data and IT infrastructure.”

Open Platform Access Control and Integrations Fit Bill

Open Options’ DNA Fusion platform was able to meet these requirements and then some.

“We implemented Open Options’ DNA Fusion in our corporate headquarters back in 2007,” Lang said. “And it has since become the standard in access control technology for Involta.”

DNA Fusion is installed at 11 sites in Idaho, Arizona, Iowa, Ohio, Pennsylvania and Minnesota, and currently has 14 authorized operators.

Authentic Mercury hardware panels and other equipment are installed in the head end room of the centers, which is only accessible by authorized Involta staff.

Lang cited the scalability of the software, user-friendly feature set, and ease of use as some of the standout characteristics of DNA Fusion.

Another feature that was non-negotiable when selecting their access control provider was the ability of the system to integrate with other technologies. DNA Fusion connects with a host of other systems including video management, intelligent locks, critical communications and more, and has two decades of access control innovation and development to the Authentic Mercury open hardware platform to provide a true open architecture access control solution.

Mercury Security has more than 20 OEM partners, the most extensive feature set available, and the world’s largest install base with more than 3 million controllers. Multiple manufacturers support this hardware platform, which allows the end user a valuable choice in software. Because of Open Options’ commitment to open architecture and their numerous third-party technology integrations, Mercury Security named Open Options one of the company’s first Platinum Elite partners in 2014.

Alongside Open Options, Involta works with a number of their technology partners for a customized integrated solution. Some of these include ASSA ABLOY’s HES KS100 server cabinet lock with Aperio technology to secure their cabinets and HID multiCLASS card readers to support a variety of proximity cards. The company has also installed Samsung and Axis cameras for video surveillance in both the interior and exterior of the properties, and uses Milestone XProtect software for their video management needs.

Furthermore, Involta deploys two-factor authentication at high security entrances with Iris ID iCAM7 series biometric readers, and powers various components of their solution, including electromagnetic locks and PTZ cameras, with Altronix products.

Intuitive Feature Set Provides Well-rounded Solution

In addition to its impressive portfolio of integration partners, DNA Fusion also houses a number of user-friendly features within the software, including drag and drop capabilities, the option for custom toolbars, and instantaneous reporting.

“DNA Fusion is intuitive and has a wide array of features that prove to be very valuable in our operation,” Lang said. “Time schedules and access levels are two features in particular we use in our daily operations to streamline access for our nearly 200 employees. We appreciate DNA Fusion’s ability to recognize assigned authority and schedules to make sure proper access is being observed.”

A recent improvement to Involta’s security solution at the Akron data center is the addition of Open Options’ mantrap controller. Lang worked with their integrator company to make sure the implementation and execution went smoothly. The mantrap feature is unique to a designated area containing two or more doors that the customer wants to strictly control access to. During the operation of a mantrap, when a single door is open, no other doors will open until the initial open door closes.

In order to manage their security remotely, Involta uses DNA Fusion’s web application, Fusion Web. This allows operators to take advantage of the critical features of DNA Fusion—such as managing, addressing alarms and events, and controlling doors—from any supported web browser. Because Involta logs and retains access and events for auditing purposes, their employees find DNA Fusion’s ability to run custom reports extremely helpful.

“The software and supporting products, coupled with Open Options’ customer service and support, have proven time and time again they are the best choice for our access control needs,” said Lang. “We look forward to implementing DNA Fusion in our new facilities as we continue to grow.”

Involta has opened two new data center locations in 2017 alone—one in Cleveland, Ohio and Pittsburgh, Pennsylvania—and continues to look at underserved markets for future expansion opportunities.

This article originally appeared in the December 2017 issue of Security Today.

Featured

  • The Business Case for Video Analytics: Understanding the Real ROI

    For security professionals who may be hesitant to invest in video analytics, now's the time to reconsider. In a newly released Omdia report commissioned by BriefCam (now Milestone Systems), the research firm uncovered a compelling story: more than 85% of North American and European organizations that use video analytics achieve a return on investment within just one year. The study, which surveyed 140 end users across multiple industries, demonstrates that security technology is no longer just for security — it's a cross-organizational tool that delivers measurable business value far beyond traditional safety applications. Read Now

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

Featured Cybersecurity

Webinars

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3