BACK TO TOP

Data Centers: Specialized Security for Sensitive Settings

Sign up to receive our blog posts in your inbox.

 

 
Woman Handling Control Center

Data centers, whether self-owned and managed or operated by a third party, are built to be secure environments. But successful daily operations require the attentive eye of well-trained, experienced security teams to help ensure that data is secure and employees are safe. This sensitive environment requires a specialized security team. 

Personnel Quality

This highly compartmentalized environment with its own strict requirements demands sophisticated background screening for personnel, unique training and thoughtful recruiting. The greatest tangible threat to a data center is the potential for a breach of the confidential data and information that is contained within. Hence, the demands of recruiting, background screening and management of all data center employees is highly rigorous.

Health & Safety Management 

Experienced security teams understand that data center responsibilities extend beyond the ordinary. For example, the power required to run a typical data center is enormous and keeping these systems cool is critical to their peak functionality. The battery room, providing backup and continuous power supply in case of a power failure or other disturbance, has the potential to be toxic due to the release of hydrogen gas from the charging phase. Regular battery cleaning and room ventilation is a key to safety. Security personnel need to continually monitor noise, lighting, temperature and humidity readings to ensure environmental and health code compliance. Physical site security is paramount to ensuring the health and safety of all personnel. 

Strict Access Control

Controlling access to the building is often established with one primary guarded entrance. This helps to ensure that people who access the data center are authenticated through the proper access control protocol such as biometrics or traditional card access systems. Robust penetration testing plans are essential to ensuring that your perimeters are secure and access control is effective. Beyond a comprehensive understanding of who is permitted in the building, security officers also need to know what the access restrictions are for each area of the data center.

It is imperative to select the right security provider to meet your needs. Learn more in our best practice, 8 Steps to Selecting the Right Security Provider.

 

guy hassfield  About the Author
  Guy Hassfield is the Vice President of National Accounts Business Development for Allied Universal.