the technology will be used to monitor routes to holy sites during this year ’ s Hajj – so too can threat actors use that technology to carry out acts of espionage and sabotage . Aerial incursions can be just as big a threat as ones on the ground , so operators need to take all steps to minimise blind spots and increase their field of vision .
Layer 2 : Inside the barriers
Moving from the outside to the inside , operators face the challenge of tracking all authorised movement throughout the site . With radar covering the entire perimeter of the facility , operators can then take a closer look at unexpected activity or incidents using pan , tilt and zoom ( PTZ ) cameras that can focus on a specific area .
Upon identification , sensors can automatically trigger live or pre-recorded audio as well as assign security personnel or emergency services . Given the IoT-enabled design of these solutions , operators can also track figures or vehicles as they move around
the premises . Data centre facilities can occupy huge pieces of land , so a network surveillance solution is critical for operators , either on-site or remote , to view and effectively monitor the premises without requiring additional security patrols or personnel .
Layer 3 : The buildings
Serving as the gatekeepers to any structure , access solutions such as door stations and controllers leverage credentials-based controls to provide
www . intelligentdatacentres . com 65