The protection of your data infrastructure

The protection of your data infrastructure

Maintaining a data center is a huge responsibility. While data center customers certainly have systems in place for dealing with cyber threats, the physical security is still a critical aspect of the security equation. Designing and, implementing highly secured “gold standard” data center facility capable of hosting the most sensitive data (such as a bank or government data), cost a lot of effort and money.

Ensuring 100% uptime

Very little detail matters in a data center. As data center provider, we are providing 100% uptime of the facility. Inadequate access to the facility could compromise the entire data center operation. For that reason, data centers need at least two sources for utilities such for example: electricity (redundant transformers, batteries, generators, etc.).

Customers should also know that the issue of resiliency not just in terms of cost but in terms of benefits and also evaluating each of their systems in this manner.

Controlling who gets access to your infrastructure

The objective of physical data center security is pretty straightforward: keep out unauthorized people while closely monitor who do have access. In order achieve the best protection for your IT infrastructure, there must be at least several layers of physical security to ensure nobody gain access by bypassing just one mechanism. Some sheets described:

  • The physical barrier
    Data centers are surrounded by a fence; to protect someone enters the perimeter. There is an old saying that “if you want to break into the back door of a building, drive a car through the front door,” for that reason it is recommended to surround or secure the premises with foot-thick concrete walls, crash barriers and other measures between the first layer and the premises.
  • Trembler wire / powered fence
    A trembler wire is a wire installed on top (or also behind) the fence that will set off an alarm if anyone climbs or jumps over it. This alarm will directly notify security.Camera’s
    Surveillance cameras need to be installed around the perimeter of the building at all entrances and exits as well at every access point throughout the building. Cameras have a way of preventing crime before it even starts. At our latest data center in Amsterdam, we have installed 100’s of cameras to secure your critical infrastructure. The footage is digitally recorded and stored.
  • 24×7 on-site staff
    It is important to have always at least one person onsite; the best way is to have two or more people on-site (24×7). One person to check the systems and one person to walk around.
  • Vehicle traps
    Access to the parking lot and loading dock need to be controlled by the data center staff. The use of a double fence protects that two vehicles can enter the site at the same time. By separating the customer and supplier entrance (loading bay), security staff can monitor each movement better.
  • Strict access policy
    Before someone get inside the building, people should provide a legal photo ID. Once approved, visitors will receive a formal ID card that allows them into the data center, depending on whether they are a customer or visitor the ID card restrict access to specific areas of the building (preventing that everyone can access the data hall).
  • Biometrics
    Biometrics ensures that the person who enters the area is allowed to enter. This prevents using someone others ID card to enter a specific area.

Datacenter.com AMS1 added a secure door (tourniquet) to ensure that the data hall is wholly secured and tailgating (following someone through a door before it closes) is not possible. By this way, we force visitors to be identified before we are allowing access to your critical IT infrastructure.In addition to the installed security by the data center, some data centers, like Datacenter.com, allows customers to tailor their solution within the facility to add additional security layers, such as cages, biometric access per cabinet, etc.

There is no doubt that physical security demands will continue to evolve in time. Regulation will have a significant role in determining requirements. Data center providers must ensure that each facility is up to date and adhering to current regulatory standards to meet the highest customer expectations.

 

If you are considering Datacenter.com as your colocation partner, we encourage you to come tour our facility in person. You will not only get to inspect our data center with your own eyes, you will also have the opportunity to evaluate and meet the most friendly and flexible people who will deliver excellence service.

More Insights

  • Why Busbar better benefits the needs of a contemporary datacenter

    That datacenters supply power, cooling and security is clear, but how about the way the customers receive the power? Is there a best practice? In this blog I will share my vision regarding the use of busbar as a power distribution method for server racks.

    Read more
    Read more
    Blog
  • Global Data Center Survey by the Uptime Institute

    The Uptime Institute, famous for its Tier rating system, has a yearly data center survey. We’ve taken a look at their latest report and highlighted the most interesting and surprising results. The survey was held under 867 data centers worldwide, of which 43% were based in the USA and Canada, 19% in Europe and 13% in Latin America. Asia Pacific and Africa accounted for 12 and 11%, while Russia and China both came last with 1%.

    Read more
    Read more
    Blog
  • Video: We are Datacenter.com

    Interested in learning more about Datacenter.com’s flagship data center in Amsterdam? Data center AMS1 is strategically located in Amsterdam Southeast, on the prime fiber network routes from international carriers and backbones in Europe. AMS1 showcases superior engineering and energy efficiency.

    Take a look inside of our data center.

    Read more
    Read more
    Resources

Call us on +31 (0)20 - 2384 200
We are happy to answer your question

Email us for more information