Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSectorsSecurity Enterprise ServicesCybersecurity NewsGovernment: Federal, State and Local

Securing a World-Class Data Center

SEC0219-data-Feat-slide1_900px
SEC0219-data-slide2_900px

RagingWire is using AMAG Symmetry Access Control and G4S Secure Integration to meet strict compliance requirements, in addition to helping the security team to provide high levels of security, professionalism and customer service for its wide range of customers.

Photo courtesy of RagingWire

SEC0219-data-slide3_900px

Edward Ankers, RagingWire’s Director of Corporate Security, says of the company’s multiple campuses, including the one in Ashburn, VA: “We always stay on top of the latest products for multi-factor identification systems that use tokens, codes, biometrics, and other recognition technologies. We also keep up with the very best equipment to monitor visitors through an integrated system of access control, mantraps and video management.”

Photo courtesy of RagingWire

SEC0219-data-Feat-slide1_900px
SEC0219-data-slide2_900px
SEC0219-data-slide3_900px
February 4, 2019

RagingWire Data Centers, Inc. is a premier data center provider in North America and part of the global data center platform of NTT Communications (NTT Com), the information and communications technology (ICT) solutions and international communications business within the NTT Group.

RagingWire has approximately two million square feet of data center infrastructure on campuses in Ashburn, Virginia; Dallas, Texas; and Northern California, with growth plans in these locations and other top North American data center markets. RagingWire enables its hyperscale and enterprise customers to reach international markets as well as scale up as needed by leveraging the global presence of its parent company, NTT.

Since its inception, RagingWire has delivered high levels of security, professionalism and customer service for its wide range of customers. In addition, as a federal government facility, RagingWire meets rigorous security controls and environmental standards to attain data center and security industry certifications. Its audit standards include SSAE 18 Type 2 audit, PCI DSS 3.2, ISO 27001, Type 2 SOC audit, HIPAA, and FISMA Moderate. When clients need to perform audits and accreditation processes, RagingWire provides facility tours and interviews with its IT and physical security professionals, which includes G4S Secure Integration as its security partner to provide systems integration services nationally.

Edward Ankers is RagingWire’s Director of Corporate Security. He says, “As data centers become more vitally integrated into all aspects of our economy and our daily lives, our security staff must remain more vigilant than ever before to protect this critical infrastructure. We know that criminals may seek to damage data centers in an effort to cause a ripple effect of digital chaos. Other criminals may look to make money on the black market by selling stolen equipment such as servers, cables and the copper wire stored on data center construction sites.”

In addition, he says, “Insider threats are always an issue at any company, which is why we train our employees to look for certain signs of behavior gone wrong, and are always monitoring our security cameras appropriately for tell-tale signs of suspicious activity.”

Ankers was recently seeking a security system that enabled multiple integrator relationships across several states to ensure consistency during installations, service and maintenance; one that would integrate with other technologies; an efficient and reliable Video Management System; and one that would meet three-factor authentication compliance requirements.

He found AMAG Technology’s Symmetry Access Control System to not only meet compliance requirements, but is one that operates with IRIS scanners and badge readers to provide three-factor authentication, whereby employees must present something they have (access card), something they know (PIN) and something they are (biometric) to access the data center.

Symmetry Access Control also integrates with Vingtor-Stentofon’s Turbine audio solution to provide another layer of security. While manning a perimeter guard station, RagingWire security officers use the audio system to greet visitors. After the guest explains the purpose of their visit and the officer can see their face, the officer raises the gate to allow entrance.

Ankers is proud of his security team, many of whom are former military veterans, he says. “Our security teams are 100-percent comprised of RagingWire employees. We believe in hiring thoroughly vetted, full-time, professional security officers who are vested in the company’s success while proudly wearing our logo. We feel that former military or law enforcement personnel are often the best at understanding the ‘always be prepared’ nature of security, even on nights and weekends, 24/7/365. Also, we look for service-oriented people who will boost our company’s reputation by escorting people in need of assistance, tidying up when necessary, and promptly handling issues with plumbing, wildlife, parking and whatever else may come up. We make sure our guards are well-trained to quickly analyze data from the various security cameras and detection systems that we deploy around all points outside and inside our data centers.”

In addition to the Symmetry Access Control system, Ankers says that as the company builds new data centers on its multiple campuses, future security plans will include anti-climb perimeter fencing, a security checkpoint equipped with an M30-P1 rated, anti-ram barrier arm that protects the site from a 15,000-pound truck traveling up to 30 mph; secure loading docks; large mantraps; and high-definition, 360-degree field of view cameras on all secured doors and rooms, roofs and parking.

KEYWORDS: cyber risk management data center security insider threats security convergence security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • digital landscape

    Unlocking digital trust: The power of collaboration in a data-driven world

    See More
  • privacy-access-freepik

    Considering the consumer privacy conundrum in a data-filled digital world

    See More
  • cybersecurity-laptop

    Persistent data exposure is a much riskier problem in today’s remote world

    See More
×
RagingWire is using AMAG Symmetry Access Control and G4S Secure Integration to meet strict compliance requirements, in addition to helping the security team to provide high levels of security, professionalism and customer service for its wide range of customers. Photo courtesy of RagingWire
Edward Ankers, RagingWire’s Director of Corporate Security, says of the company’s multiple campuses, including the one in Ashburn, VA: “We always stay on top of the latest products for multi-factor identification systems that use tokens, codes, biometrics, and other recognition technologies. We also keep up with the very best equipment to monitor visitors through an integrated system of access control, mantraps and video management.” Photo courtesy of RagingWire

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!