| |||||||||
| |||||||||
Current Filter: Network>>>>>Feature> The secure data centre Editorial Type: Feature Date: 05-2014 Views: 2460 | |||
| Matt Lovell, CTO at Pulsant, explains why the secure data centre is more than information security, offering some advice on the bit that is often overlooked. Entrusting the critical data and systems of your business to a third party requires a high level of trust, and when investigating potential hosting or colocation partners, organisations must pay a lot of attention to the information and data security credentials of vendors. However, equally as important is the security capability of the data centre itself.
LOCATION, LOCATION, LOCATION Considering data sovereignty, the geographical location of your data centre is important, for example, keeping your data within the boundaries of the EU if your organisation is based in that region. However, there are other considerations, such as geological factors that can impact on a data centre's suitability. Is the site located in an area prone to extreme weather such as flooding, extreme heat or cold?
POWER AND CONNECTIVITY
ACCESS CONTROL Once the access request has been verified, you should be able to proceed through a traditional anti-tailgate entrance (or remote anti-ram raid bollards) supported by CCTV capturing of a vehicle's occupants as well as its licence plate for an automatic number plate recognition (ANPR) system. There should be clear, well-marked routes directing visitors, employees or deliveries to designated parking areas. Gaining access to the actual building should once again involve validation of an access request for visitors and customers and an escort to another designated waiting area. Employee access should be managed through a combination of card-swipe systems using pin or token verification. This can be further bolstered with biometric access control, particularly for granting access to the heart of the data centre. Typically data centres employ a layered approach for granting access to data centre halls, often requiring triple authentication before access is granted.
THE PERIMETER
A 24-HOUR SECURITY TEAM The checklist for a safe, secure and reliable data centre provider is exhaustive, and finding the perfect hosting partner near impossible. Ultimately, your decision should be based on a combination of vendor credentials, including reputation, solution capability and data centre security if you want to make a truly sound investment. | ||
Like this article? Click here to get the Newsletter and Magazine Free! | |||
Email The Editor! OR Forward Article | Go Top | ||
PREVIOUS | NEXT |