SUPPLEMENT ENCLOSURE SOLUTIONS
HOW SECURE is secure? A
ccording to the most recent studies, only about 20% of data centres are
secure, leaving an overwhelming 80% at risk. It is likely that small centres are at the high end of this range. Fortunately, there is wide commonality among Data Privacy Directives in that, when boiled down to their essence, data privacy rules and regulations all seek to accomplish the same thing. Government regulations and non-government standards invariably ask four basic questions regarding access to sensitive information: • Do you have safeguards in place to control access to sensitive data? • Are you able to continuously monitor who is accessing sensitive data? • Are you alerted in real-time when information is being accessed without authorisation?
• Can you produce an audit trail showing who has accessed sensitive data and when they accessed it? It’s important to remember that ‘access’, within the context of these questions, means physical access as well as network access, and that specific requirements for controlling physical access exist in all rules and regulations concerning the protection of private or sensitive information. In most centres the problem begins
with the fact that keys and key cards can become separated from their authorised users. Any key or key card that is forgotten, lost, stolen, etc. represents a potential, undetected security breach. And, the greater the number of keys and key cards in a given environment, the greater the possibility of unauthorised access to physical assets in a server cabinet. It therefore becomes important to review alternatives. Although no data privacy rule or
regulation specifies biometrics as the specific means to secure physical access, the EMKA/Digitus solution provides a secure methodology for addressing the intention of those rules and regulations, and its implementation is sure to satisfy even the most thorough regulatory audit. When combined with cards and PIN codes, this three level system is at the forefront of security management.
CABINET SECURITY The standing myth is that most threats of physical attacks come from outside the data centre. However, according to the Gabriel Consulting Group 2011 Data
S18 JUNE 2015 | DESIGN SOLUTIONS: SUPPLEMENT How to protect micro data centres and
individual defined high risk cabinets in data centres or co-location situations. By Andy Billingham, MD EMKA (UK)
Centre Security Survey, more than 60% of all malicious attacks on the data centre are by insiders. Insiders have access to authorised cards, and sometimes other people’s cards. Additionally, an authorised person can misplace their card or have it stolen. According to the Global State of Information Security Survey 2013 by PwC, CIO Magazine, and CSO magazine, 42% say their organisation has ‘an effective strategy in place and is
offering a wide range of lock options working with EMKA based locks in networked or stand-alone configurations. The EMKA/Digitus Cabinet Sentry is specifically designed for single cabinet use to secure both front and rear doors with biometric, proximity card and digital pin technologies as required. It is capable of managing up to four environmental sensors, e.g. temperature, humidity, air-flow, air pressure or water, and up to four variable sensor power outputs with either mains power + LAN or power over Ethernet (POE) connection. The Cabinet Sentry additionally features up to two auxiliary serial (RS232) inputs and may be integrated with 3rd party access control systems using its Wiegand output or via DAS-SQL, so enabling 4G Bluetooth control by the Digitus dedicated mobile phone app. Major Data Centre operators have long understood the need for physical access control on server cabinets. Likewise, in corporate facilities, where data stores are potentially exposed to a significant number of mission-critical employees, it is recognised that
proactive in executing the plan’. On closer analysis, however, the same study found that only 8% of those respondents rank as truly secure. It is to address this large number of
vulnerable standalone cabinets that the EMKA/Digitus Cabinet Sentry security locking system has been developed, using BioLock technology, to provide an extremely effective and efficient way of securing access to server cabinets using biometrics, iClass cards or proximity cards. The big advantage to data centre managers is the way that Cabinet Sentry brings biometric security to stand-alone data and control cabinets, also including vending machines, single cabinet data systems, vulnerable industrial controls, and especially for niche cabinets within larger establishments. Cabinet Sentry can be used as a part of a networked system or as a standalone product, and is deliberately priced as a low cost solution since EMKA/Digitus believe that Data Centre Security is too important to be expensive. This simple device – only 256
components in a compact 101.42mm x 51.46mm x 29.00mm package – secures both front and back cabinet doors,
The EMKA/Digitus Cabinet Sentry security locking system has been developed, using BioLock technology, to provide an extremely effective and efficient way of securing access to server cabinets using biometrics, iClass cards or proximity cards
servers must be protected from thumb drive data theft and from theft of a server itself. Those same considerations apply to co-location facilities. The most common method of physical access control at the server is to enclose it within a cage or cabinet featuring a mechanical keyed lock.
BIOMETRIC SECURITY BENEFITS So, the benefits of this biometric security include: simplified security administration; reduced opportunities for breaches; indisputable audit trail, etc. Although it must be recognised that
physical security does not guarantee compliance, and of course compliance does not guarantee physical security, nonetheless the EMKA/Digitus approach offers peace of mind in that the traditional multi-layered perimeter approach has focused predominantly on the outside levels of perimeter defence: keeping out ‘undesirables’; maintaining a clear zone between the outer perimeter and the reception area; gatekeeping at reception; service corridor security features; and data room entry.
EMKA
www.emka.co.uk
T: 024 7661 6505 Enter 256
/ DESIGNSOLUTIONS
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60 |
Page 61 |
Page 62 |
Page 63 |
Page 64 |
Page 65 |
Page 66 |
Page 67 |
Page 68 |
Page 69 |
Page 70 |
Page 71 |
Page 72 |
Page 73 |
Page 74 |
Page 75 |
Page 76 |
Page 77 |
Page 78 |
Page 79 |
Page 80 |
Page 81 |
Page 82 |
Page 83 |
Page 84 |
Page 85 |
Page 86 |
Page 87 |
Page 88 |
Page 89 |
Page 90 |
Page 91 |
Page 92 |
Page 93 |
Page 94 |
Page 95 |
Page 96 |
Page 97 |
Page 98 |
Page 99 |
Page 100 |
Page 101 |
Page 102 |
Page 103 |
Page 104 |
Page 105 |
Page 106 |
Page 107 |
Page 108 |
Page 109 |
Page 110 |
Page 111 |
Page 112