Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Physical Security

Datacenter Integrity...Physical Security Matters

By John Romanowich
April 12, 2011

Today’s vital business information now fills datacenters instead of file cabinets. These facilities are critical to the operations of almost any company or government agency. As the amount of data scales, customers have more reasons to be concerned about all facets of security. Just as firewalls, antivirus and other cyber security methods are standard expectations for the network, so is physical protection of each data center facility, where a tremendous volume of information is aggregated into a concentrated area, exposing new risks.

Physical security is a key operational element for keeping datacenters secure. Vehicles and pedestrians travel near these facilities, and the centers must be well guarded against intrusion. Datacenters must ensure that, for example, someone cannot just walk in and steal information using a flash drive, enter viruses behind the firewall, or attempt sabotage.

Outdoor video analytic systems have found a new and growing market in providing physical security for data centers. Yet, there are a number of challenges unique to datacenters that are well served by a smart video solution. During working hours, data centers use video analytic detection and assessment systems to help operators observe and analyze pedestrian and vehicular traffic. During off hours, the centers rely on these same solutions to provide a buffer zone of early detection of breaches and video detail post-event analysis, enabling operators to intercept and prosecute violators.

Like any perimeter security strategy, early detection is key for preemptive awareness, and smart cameras play a vital role. Video analytic cameras work day and night, obtaining a wide range of information to thwart sophisticated attacks where pre-surveillance often takes place. Potential intruders who plan to break in will most often monitor the facility in advance of their breach. When security professionals are alerted to this activity with video detail, a heightened level of security can be put into place to ensure appropriate response to this elevated security environment.

Safety is another concern addressed by video analytics. Datacenters are increasingly located in suburban areas, where illumination is either not allowed or not desired as it would otherwise draw unwanted attention. The use of smart thermal cameras can provide an optimal detection source for these situations because they can detect intrusions that might occur even in complete darkness. Datacenters utilize high-voltage step-down transformers to meet power requirements, creating a dangerous environment for anyone who may scale the fence for sabotage or more innocent purposes like retrieving a baseball or family pet.

Until recently, there’s been disappointment among customers applying video analytics to outdoor applications due to the nuisance alarms associated with widely varying environment of lighting, wind, and weather. Key to solving the nuisance alarm problem is the use of tremendous on-board video processing within each smart camera to tame the variations of the outdoor environment in advance of applying analytics. These systems are now being deployed to accurately detect the entry of unauthorized persons or vehicles to datacenter facilities. Such smart cameras use video processing to filter the effects of environmental elements and provide accurate detection regardless of wind, weather or the movement of small animals, trees or blowing trash on the ground. When security operations receive accurate information they can mount an appropriate response relative to the nature of the alert.

Achieving security awareness around datacenters is dependent on knowing the location and nature of an intrusion. For this reason, video analytic cameras can be designed to employ GPS information to determine the size, speed and bearing of detected objects. This information can be used to track the location of detected intruders onto a site map of the facility for real-time, coordinated response. The same GPS information can also be used to steer Pan/Tilt/Zoom cameras to automatically zoom and follow intruders for close-up identification.

Video analytic cameras can be an economical solution as well. The same video processing that gives these smart cameras their outdoor detection accuracy also gives them greater coverage area. These cameras can automatically detect human-sized objects at distances that exceed 600 meters. As a result, infrastructure requirements (poles, communications and power) can be greatly reduced, lowering overall project costs substantially. A video analytic system designed for a high degree of accuracy in the outdoors is also considered a force multiplier in increasing security effectiveness at datacenters.

Mission-critical information is safe, secure and trusted when cyber and physical security work together for optimal results.  

KEYWORDS: cyber security data center security perimeter security smart cameras thermal cameras video analytics

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John Romanowich is CEO of SightLogix, Inc.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Healthcare Data Compliance: Maintaining Integrity, Privacy and Security

    Healthcare Data Compliance: Maintaining Integrity, Privacy and Security

    See More
  • The Value of Integrity, and What it Means for Security

    See More
  • metrics-freepik

    Overcoming security metrics challenges to measure what matters

    See More

Related Products

See More Products
  • The Complete Guide to Physical Security

  • Physical Layer Security in Wireless Communications

  • Physical Security and Environmental Protection

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing