U N C O V E R I N G T H E L A Y E R S
access to pre-authorised people and vehicles . Credential types can range from cards , PINs and QR codes , to biometrics such as facial and iris recognition ( subject to local regulatory restrictions regarding personal data privacy ), or a combination of two or more . Number plate scanners also serve to confirm authorised vehicles moving in and out of loading bays and parking lots .
Many access control solutions deploy Multi-Factor Authentication to reinforce identity confirmation , and operators can also use two-way communication to directly interact with personnel and authorised visitors .
Sienna Cacan , Global Enterprise Segment Marketing Manager at Axis Communications
Body-worn solutions can be used to add a further layer of security on building access points and be a powerful tool for perimeter patrols . Operators can see , hear and record everything the wearer does , as well as ensure that behavioural standards and response procedures are adhered to .
Layer 4 : The server room
Surveillance monitoring and access control do not end at the door to the server room . Using multi-directional cameras equipped with motion sensors , operators can immediately be alerted to and track any movement within the space .
The deployment of motion sensors means operators do not need to spend additional time and resources keeping an eye on empty rooms , as the cameras only need to be activated once movement has been detected .
Layer 5 : The data itself
Modular and multi-directional cameras equipped for wireless I / O connectivity offer operators an up-close look at the server racks , while fingerprint and QR code scanners mounted on all doors ensure access by authorised personnel only .
Cameras can also be leveraged in some data centre monitoring roles in place of other hardware . For example , infrared cameras can be used to detect smoke or gas leaks , while others can be used to detect leaking water from HVAC and cooling apparatus . Operators can then integrate these systems and the data they generate with their Data Centre Infrastructure Management ( DCIM ) solutions , along with other systems that form part of the greater surveillance and site monitoring strategy .
Cybersecurity , sustainability and a new possibility
Given that data centres are likely targets of cyberattacks , operators need to ensure their security and surveillance are equally as secure as the data and applications they ’ re hosting . Ideally , all solutions must support Zero Trust principles – a framework wherein every user and software connection is verified and authorised according to conditional requirements of an organisation ’ s security policies – as well as make extended use of data encryption , IP address filtering and signed firmware .
At the same time , protection solutions can positively contribute to data centres ’ sustainability initiatives . By investing in environmentally friendly security products , offering low energy usage levels and being from trusted suppliers , operators can work to fulfil their corporate social responsibilities and outfit their facilities to be beacons of sustainability for the greater industry .
This is the promise of data centre protection . It ’ s not just about protection , but a holistic way to design and deploy a security ecosystem that benefits the enterprise , its clients , the industry and the world . With the help of tried and tested technologies , as well as trusted manufacturers and integrators , data centres in the Middle East can lead the way in an informationpowered world . �
66 www . intelligentdatacentres . com