search.noResults

search.searching

saml.title
dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
DOCUMENT & DATA MANAGEMENT


THE BIGGEST THREAT


Physical entry to a data centre should be strictly controlled with procedures in place to monitor and manage pedestrian access, says Tony Smith, Major Accounts and Marketing Manager at Integrated Design Limited.


Data is the oil of the digital era, rising to the top spot of the world’s most valuable resources list over recent years. In this digital age, enterprises of all sizes and sectors rely on data centres – either offsite at purpose-built facilities or onsite within their own premises – to store large amounts of networked computers, confi dential information and other critical IT assets. This reliance on data centres makes them a highly desirable target for those wanting to cause widespread disruption, so IT security managers have a huge responsibility to keep these facilities secure.


Cybercrime continues to proliferate, with incidents of data breaches and theft increasing worldwide. But, in the rush to secure networks, servers and endpoint devices, many organisations overlook the risks hidden in the physical infrastructure necessary to keep data centres operating securely.


Physical entry to a data centre should be strictly controlled with procedures in place to monitor and manage pedestrian access both into and within the data centre.


In this environment, entrance control has two key aims, fi rstly to prevent unauthorised people from entering the facility beyond reception, or other restricted access areas within the facility. And, secondly, in the event of an


46 | TOMORROW’S FM


intruder gaining access, to quickly detect this and identify the suspect so that the correct response can be deployed.


Capable of integrating with every known access control system, the Fastlane entrance control range exists to enforce a building’s entry procedures and ensure each person entering a facility is identifi ed.


Whether you wish to issue authorised personnel with key cards or verify their identity using biometrics, the intelligent technology within a Fastlane turnstile which decides to allow entry – or deny it – makes thousands of calculations per second based on luggage being carried or pulled, tailgating, unauthorised passages and much more, and is capable of processing up to 60 authorised people per minute.


In the event of an unauthorised access attempt being made, or an irregular fl ow of traffi c being detected, an alarm sounds to alert security staff. If integrated with a CCTV system, images of the breach and the suspected intruder will be captured and can be quickly reviewed to identify the people involved. The individual causing the alarm can be recognised as a friend – who perhaps forgot their key card that day and saw no harm in tailgating a fellow employee through the gate – or potential foe, at which point the appropriate response can be deployed.


twitter.com/TomorrowsFM


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62  |  Page 63  |  Page 64  |  Page 65  |  Page 66  |  Page 67  |  Page 68