The Formula for Data Security

Data centers across United States implement integrated security solution for protection of customer assets

Involta, LLC is an award-winning national provider of IT intelligence, end-to-end infrastructure, managed services and colocation through their enterprise-class, multi-tenant data centers. The company offers a lineup of scalable, reliable, best-in-class services to meet the growing demands of businesses, including 24/7/365 network operations center solutions and managed technical and cloud services, including their Involta PULSE PlatformSM and Involta CompliantCloudSM services platform.

Founded in 2007, Involta has data centers spread across in Arizona, Idaho, Iowa, Minnesota, Ohio and Pennsylvania. The company serves a multitude of clients in healthcare, technology, manufacturing, government and various other industries where IT is missioncritical, including numerous Fortune 500 companies.

Strict Requirements for Security

Involta facilities are built in secure, climate-controlled structures and are located in geographic safe zones. Additionally, their centers have no exterior signage and all staff are trained to follow stringent security procedures for client confidentiality purposes. While these measures play a key role in day-to-day security operations, another crucial aspect to be considered is their physical and electronic security.

Because Involta houses an organization’s most critical equipment and disseminates highly sensitive data, their facilities required a layered approach to their security solution—including access control, video surveillance, wireless locks and more—to ensure access is granted only to the appropriate person.

“There are several requirements our access control system and overall security solution must be able to meet,” said Thomas Lang, Involta data center manager for the Ohio region. “We refuse to compromise security or performance when it comes to our customers’ data and IT infrastructure.”

Open Platform Access Control and Integrations Fit Bill

Open Options’ DNA Fusion platform was able to meet these requirements and then some.

“We implemented Open Options’ DNA Fusion in our corporate headquarters back in 2007,” Lang said. “And it has since become the standard in access control technology for Involta.”

DNA Fusion is installed at 11 sites in Idaho, Arizona, Iowa, Ohio, Pennsylvania and Minnesota, and currently has 14 authorized operators.

Authentic Mercury hardware panels and other equipment are installed in the head end room of the centers, which is only accessible by authorized Involta staff.

Lang cited the scalability of the software, user-friendly feature set, and ease of use as some of the standout characteristics of DNA Fusion.

Another feature that was non-negotiable when selecting their access control provider was the ability of the system to integrate with other technologies. DNA Fusion connects with a host of other systems including video management, intelligent locks, critical communications and more, and has two decades of access control innovation and development to the Authentic Mercury open hardware platform to provide a true open architecture access control solution.

Mercury Security has more than 20 OEM partners, the most extensive feature set available, and the world’s largest install base with more than 3 million controllers. Multiple manufacturers support this hardware platform, which allows the end user a valuable choice in software. Because of Open Options’ commitment to open architecture and their numerous third-party technology integrations, Mercury Security named Open Options one of the company’s first Platinum Elite partners in 2014.

Alongside Open Options, Involta works with a number of their technology partners for a customized integrated solution. Some of these include ASSA ABLOY’s HES KS100 server cabinet lock with Aperio technology to secure their cabinets and HID multiCLASS card readers to support a variety of proximity cards. The company has also installed Samsung and Axis cameras for video surveillance in both the interior and exterior of the properties, and uses Milestone XProtect software for their video management needs.

Furthermore, Involta deploys two-factor authentication at high security entrances with Iris ID iCAM7 series biometric readers, and powers various components of their solution, including electromagnetic locks and PTZ cameras, with Altronix products.

Intuitive Feature Set Provides Well-rounded Solution

In addition to its impressive portfolio of integration partners, DNA Fusion also houses a number of user-friendly features within the software, including drag and drop capabilities, the option for custom toolbars, and instantaneous reporting.

“DNA Fusion is intuitive and has a wide array of features that prove to be very valuable in our operation,” Lang said. “Time schedules and access levels are two features in particular we use in our daily operations to streamline access for our nearly 200 employees. We appreciate DNA Fusion’s ability to recognize assigned authority and schedules to make sure proper access is being observed.”

A recent improvement to Involta’s security solution at the Akron data center is the addition of Open Options’ mantrap controller. Lang worked with their integrator company to make sure the implementation and execution went smoothly. The mantrap feature is unique to a designated area containing two or more doors that the customer wants to strictly control access to. During the operation of a mantrap, when a single door is open, no other doors will open until the initial open door closes.

In order to manage their security remotely, Involta uses DNA Fusion’s web application, Fusion Web. This allows operators to take advantage of the critical features of DNA Fusion—such as managing, addressing alarms and events, and controlling doors—from any supported web browser. Because Involta logs and retains access and events for auditing purposes, their employees find DNA Fusion’s ability to run custom reports extremely helpful.

“The software and supporting products, coupled with Open Options’ customer service and support, have proven time and time again they are the best choice for our access control needs,” said Lang. “We look forward to implementing DNA Fusion in our new facilities as we continue to grow.”

Involta has opened two new data center locations in 2017 alone—one in Cleveland, Ohio and Pittsburgh, Pennsylvania—and continues to look at underserved markets for future expansion opportunities.

This article originally appeared in the December 2017 issue of Security Today.

Featured

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Motorola Solutions Named Official Safety Technology Supplier of the Ryder Cup through 2027

    Motorola Solutions has today been named the Official Safety Technology Supplier of the 2025 and 2027 Ryder Cup, professional golf’s renowned biennial team competition between the United States and Europe. Read Now

  • Evolving Cybersecurity Strategies

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.