The information technology industry goes to great lengths to protect its data. We often employ multiple layers of security through IPS (Intrusion Prevention Systems), IDS (Intrusion Detection Systems), firewalls and anti-virus. What happens if someone can physically touch and affect your equipment? We are usually so busy preventing digital attacks that we forget about physical attacks.
If you manage your servers in your own building, consider asking yourself who has access; employees, building maintenance, cleaning staff? How secure is your physical infrastructure? If you’re unsure, it may be time to consider your security options.
Most in-house data centers are generally located behind one or two locked doors. We’ve seen on-site telecom rooms secured with access control but have a shared suspended ceiling with adjacent offices and hallways.
In a colocation data center, where you host your mission critical or backup infrastructure in a dedicated data center operated by a partner, physical security is a way of life.
How FIBERTOWN Layers Physical Security Controls
Data Center Room Controls
Human access is controlled through RFID (key card access) and biometrics. Private data center suites and cages feature key lock access or card readers.
Video surveillance and archiving run 24×7 from more than 70 cameras throughout the facility. Reports can be generated at any time showing traffic flow within our facilities. Escorted access-only for all non-approved visitors.
Building Interior Security
Purpose-built rooms keep customer and telecom equipment highly secured. All HVAC, power and building systems are monitored 24×7 by the Network Operations Center.
Defense mechanisms protect against potential hazards including overhead and underfloor smoke detection, leak detection on all underground piping and dry-pipe pre-action fire suppression in zones throughout the facility.
The FIBERTOWN HOUSTON entrance is manned 24×7 by onsite security, behind bullet-proof glass doors with key card access controls. Guests must check in and present proper identification. All visitors are escorted through the data center by security guards.
A perimeter fence and guarded entry gate provide authorized-only access to the data centers. The private parking lot is monitored 24×7 by onsite personnel. Video recording and monitoring track everyone in and out of the facility.
Understanding not only the digital points of failure but the physical access to equipment is a key component in any business continuity plan.
When troubleshooting IT issues, professionals generally take a bottom-up approach…why not extend this logic to your data security?