What is the physical security of the data center?
The physical security of a data center is the set of protocol built-in within the data center facilities in order to prevent any physical damage to the machines storing the data. Those protocols should be able to handle everything ranging from natural disasters to corporate espionage to terrorist attacks. That is the text definition, but what is it really?
Physical security has long served as a necessity to protect a business’ critical infrastructure and data from unauthorized access. In the data center market, physical security controls such as perimeter fencing, card readers and even biometric technology have become industry-standard safeguards to provide proper access. However, as risks—and even the way we routinely conduct business—continue to evolve and become more complex, businesses need to augment these controls with more advanced solutions. Advanced security technology allows users enriched oversight to empower and allow them to remotely manage access and monitor activity in near real time to better control physical security in a rapidly evolving security landscape. To help meet their security needs, many businesses leverage third-party data centers to provide the necessary physical security and compliance to help satisfy their own requirements and promote availability.
This webinar will discuss why data centers must employ strict physical security programs that provide ready access to authorized personnel while restricting unauthorized individuals.
Topics to be discussed:
- How to conduct risk assessments as part of the site selection process and continue these assessments periodically throughout the life cycle of the data center
- How to utilize layered physical security defenses and best practices such as building setbacks, perimeter fencing, card readers, biometric access controls, patrolling armed guards, video monitoring and visitor screenings to bolster physical security
- The importance of data centers maintaining specific certifications and accreditations such as SOC 1, SOC2, PCI DSS, IS027001, HITRUST and FISMA to provide independent, third party assurance of the provider’s control implementation
- How to implement innovative technologies that offer businesses improved oversight and tighter control of their physical environments to mitigate increasingly complex threats and remain secure and compliant