Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Migrating to IP-Based Physical Security in the Data Center

August 24, 2010

Data centers are no longer just resources to improve processes and productivity, but are becoming vast repositories of sensitive personal, enterprise and government information that dramatically impact how people interact on an individual level. With concerns growing about personal privacy and national security, data centers are quickly becoming the 21st century version of Fort Knox.

As more people become comfortable with putting their information on the Web and government agencies look to high-speed networks to improve cooperation and efficiency, more and more personal information such as Social Security numbers, medical records and credit cards are being stored in data centers. The transfer of data is becoming more fluid: smart grids are linking data centers and power plants while consumers readily transfer personal information among several companies through a few clicks. To protect the nation’s critical infrastructure from terrorist attacks, identity fraud or information warfare, the need for robust, IP-based security in the data center is becoming increasingly important.

Migrating to an IP-based physical security system in the data center provides improved response time to security breaches. The ability to track people, limit access to areas and spaces, provide an audit trail of who accessed what area, and integrate with video to provide visual records is accommodated by the real-time capabilities of today’s high-speed networks. Additionally, the structured cabling approach of an IP-based system creates a modular, flexible implementation for easier moves, adds and changes. Lastly, the digital recording formats utilized by networked video recorders gives security personnel the ability to record, store, search, retrieve, share and send data with a greater degree of efficiency when compared with traditional analog-based recording systems.


Threats both Outside and In

To fully protect personal or national interests against potential attacks, cyber security measures and strategically placed cameras alone are not sufficient. With the consolidation of server hardware through virtualization driving up the data value per cabinet, there is an increased risk and chance of more damage or loss because more data are held per cabinet. As data becomes more accessible, security threats can come from both the inside and outside. Recent studies have shown that most employers feel that employees are a greater threat to security than external forces. Employees also admit (more than 40 percent) that they have taken sensitive data with them to a new position. Some say (25 percent) that they would take the data anyway, regardless of the penalties. There are also new regulatory requirements such as Sarbanes-Oxley (SOX) and the Payment Card Industry Data Security Standards (PCI DSS), which necessitate better oversight and auditing of the IT systems that contain sensitive financial data.

Computer Room Layer Controls

Access points in the data center are much more limited than the general facility, which makes monitoring easier and more targeted. By using additional controls such as biometric access control, environmental monitoring and RFID asset tracking, the computer room has heightened security compared to the outer layers of the building. The computer room relies on redundant power and communications networks to ensure security is maintained at near 100 percent levels of availability. It further restricts access by monitoring all authorized users and integrating systems for enhanced awareness. Multiple forms of verification are needed to gain access to this level. A problem that might persist at the facility level but needs to be eliminated at the computer room is tailgating, which is two or more people move through an access point without providing credentials. Using biometric access control and close visual monitoring utilizing high resolution CCTV cameras, access can be better restricted to address this problem and secured enclosure.

Cabinet-Level Controls

A second layer of data protection beyond the computer room layer controls in the data center is electronic locking at the cabinet level. An ideal cabinet-level locking solution integrates with existing enterprise access control system, which effectively extends the audit trail capabilities from the perimeter layer of the facility to the individual cabinet doors within the data center. As noted earlier, many enterprises are not only worried about external threats, but also internal ones as well. A cabinet-level locking solution allows enterprises to maintain control over the most sensitive computing and network equipment.

Power of Integrated Systems

With an IP-based system, data are exchanged across the network without additional infrastructure required. Data, events or alarms from the video and intrusion system are integrated together and may be used to create more nuanced alarm event definitions. Integration saves time by correlating events and timelines. This creates a completely new world of efficient image and data management, which ultimately allows for better record, store, search, retrieve, share and send capabilities. Achieving this type of interoperability is made possible by utilizing a Category 6 or Category 6A structured cabling infrastructure that provides the sufficient bandwidth to handle the massive amount of data generated from the security systems, especially video.

Editor’s note: Special thanks to Anixter for the above information.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Finding the Balance in Migrating to IP

    See More
  • the cloud

    Migrating Physical Security to the Cloud: Understanding the Total Cost of Ownership

    See More

Related Products

See More Products
  • The Complete Guide to Physical Security

  • Physical Layer Security in Wireless Communications

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing