Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and ManagementSecurity Education & Training

5 Minutes with Eddie Ankers

By Diane Ritchey
5 Minutes with Eddie Ankers
April 17, 2020

To date, more than 140,000 people have died worldwide of COVID-19, the flu-like disease caused by the new coronavirus, according to data from Johns Hopkins University. The United States had the highest confirmed death toll, with more than 31,000 fatalities.

During the COVID-19 crisis, enterprise security executives are busier than ever – standing up business continuity plans, enacting broader contingency plans, mitigating risks with employees working at home and more – all to keep businesses humming as the coronavirus outbreak has spread.  

Like many businesses, data centers are critical facilities during this time, as more employees work from home. Edward Ankers is Director of Corporate Security, NTT Global Data Centers Americas, Inc. (formerly RagingWire Data Centers). What challenges has the coronavirus presented to Ankers, especially as stay-at-home orders went into effect and most enterprise employees are telecommuting? How has his business continuity plans evolve? And what lessons has he learned to date?

Security magazine: Are all of your company’s employees working from home, and if so, what challenges has that brought?

Ankers: There are some employees who have to continue working at the data center due to their roles within our security operation. We have implemented all necessary protective protocols to isolate them physically while still enabling them to do their jobs.

All of our non-essential employees have been instructed to work remotely until further notice. We made sure they were given the appropriate equipment to work productively away from the facility. We’re very happy with the cooperative spirit our employees have shown to date. Supervisors are in regular contact with their teams, and all reports have indicated that productivity has not declined during this crisis.

Security magazine: What changes have been made to the operation of your SOC?   

Our SOCs are integrated with one another. Some of the changes to our daily operations are:

  •  We only allow one person in the SOC at any given time
  •  The SOC is disinfected at shift change
  •  All turnover discussions are conducted through appropriate distancing barriers
  •  All personnel are required to wear gloves and masks while staffing the SOC
  •  No documents are shared or exchanged with personnel outside the SOC

In addition, we launched a Crisis Communications tool for all employees that enables them to:

  • Read the latest company news from our organization
  • View helpful tips (IT, productivity, health)
  • Get answers to FAQs
  • View internal and external resources links
  • Find emergency contact info
  • Contact us to make a request

Security magazine: How have the responsibilities of your security team been affected during this pandemic? Any new responsibilities?

Ankers: Health screening and managing social distancing have been the two most notable additions to the security team’s responsibilities. We have found that adding informational and directional signage has been effective. Our signage is a gentle but direct reminder for people to maintain safe distances between each other. We have also deployed social distancing vinyl stickers on the lobby floors six feet apart at all locations. We also continue to educate and verbally direct our data center personnel on an ongoing basis.

Another responsibility we have been required to modify has to do with our protocol for foot patrols of our buildings and sites. We have changed our routes to avoid lobby areas, breakrooms and other populated, non-critical areas that can be monitored with cameras. Security staff have been instructed to simply stay away from people while conducting patrols of critical areas, and if they must interact to stay at least 6 feet away and practice safety and vigilance while doing so.

Security magazine: Once the pandemic is over and things return to as normal as possible, do you anticipate any changes that you will make to your business continuity plan?

Like other data center operators, we anticipate many changes once the pandemic is over. Supply chain modifications as well as personal protective equipment (PPE) inventory levels will need to be addressed. In addition, we will:

  • Establish a collective voice with other data center providers to order supplies during a time of crisis
  • Maintain our new health screening protocols as well as procedures for denying people access to a site
  • Include alternate secure entry points that can be easily enabled or disabled and staffed with security personnel as well as surveillance systems
  • Increase and maintain our stock of latex gloves, safety masks, and eye protection

Security magazine: Were you properly prepared for this pandemic?

Ankers: We are always prepared for different scenarios, including natural disasters such as hurricanes, tornadoes, winter storms, etc. This situation presented a new challenge in how we managed risk related to appropriate social distancing, sanitizing, ingress/egress routes, and staff shifts to minimize cross-contamination possibilities. We have found that with the right communication tools and decision-making processes, we very quickly adapted to the situation and enacted new protocols and procedures to protect the safety of all individuals associated with our data centers.

Specific actions we are taking to maintain the data centers include:

  • Deferring face-to-face meetings which are non-essential and/or involve large numbers of employees.
  • Advising employees who are feeling unwell to seek medical advice and work from home until they are fully recovered.
  • Enabling remote work for all employees whose presence at the data center is not essential.
  • Requesting and receiving cooperation from our customers to adhere to our policy of limiting access of all personnel to the data centers.
  • Implementing new health screening protocols by asking all entrants to the data centers about their recent travel and any illnesses.
  • Enacting new building access protocols in which we are now asking all customers and staff to enter through the main lobby of each building and to be cleared by security before entering internal spaces. We will not allow any personnel to travel between buildings, including our own internal employees, to help avoid cross contamination across physical sites.
  • Adding shipping & receiving department precautionary measures, such as all packages will be received with care and placed in quarantine for a period of no less than 24 hours.
  • Increasing cleaning and sterilization throughout the data center to help limit potential exposure to customers and employees. Includes conducting sanitizing activities daily in our workplaces and providing hand sanitizer throughout the facilities for all building occupants.
  • Requesting customers, contractors and visitors to self-disclose if they have visited a risk area and the timeframe of the incubation period since leaving the risk area is not yet over.
  • Ensuring frequent contact surfaces in our offices are cleaned thoroughly, multiple times daily and providing easily accessible hand sanitizer in our workplaces.

Additional resources from Ankers:

“Continuing a proud family tradition” – a short video where Edward Ankers describes the heritage of security professionals in his family.  https://www.youtube.com/watch?v=nfWytOaBMHY

“Protecting the newest critical infrastructure” – a short video in which Edward Ankers describes the importance of security in data centers. https://www.youtube.com/watch?v=AYk33AKvd1M

 

 

 

 

KEYWORDS: coronavirus COVID-19 data center security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!