PROTECTING A WORLD-CLASS DATA CENTER FROM CRIMINAL ACTIVITY
In recent years, data center colocation, which allows multiple businesses to power and secure their computing systems within a shared facility, has become a multi-billion dollar global industry.
RagingWire, which is part of NTT Communications, one of the largest telecommunications companies in the world, was one of the early companies to help build the data colocation market in 2000. Today, the company owns approximately two million square feet of data center infrastructure, which is equivalent to thirty times the size of the White House, in campuses across North America.
This ‘always be prepared’ nature of security, as Mr Ankers describes it, has been supported by the Symmetry Access Control system, an AMAG Technology solution.
While each solution adds a new layer of security to the center, Symmetry Access Control creates a clear line of communication between each of these defences. This not only reduces the risk of error but also integrates disparate solutions into one system that can be controlled and monitored from a single location.
By integrating access control, video monitoring, and sound systems across the centers, users have a complete overview of all security systems. In-house security officers are fully trained to quickly analyse data from the network of cameras and detection systems in place, and can easily identify trends and detect potential threats.
Strict requirements for employee and visitor access
When they arrive on site, guests use the Vingtor-Stentofon Turbine audio system to explain the nature of their visit to a security officer who can identify them through video monitoring and grant them access with the click of a button.
For employees, an access card may be enough to gain entry to the center, but as they move further into the facilities and into more restricted areas, they may be required to show additional identification.
Symmetry Access Control allows RagingWire to comply with strict security regulations which require employees to go through three-factor authentication. The system operates with various readers, as well as the IRIS scanner, meaning that for an employee to be granted access to a restricted area, they would need to present something they own (an access card) something they know (a PIN) and something they are (biometrics).
Different sets of rules can also be determined within the system, easily deciding which level of access is attributed to each employee, and which of them have access to the most restricted areas.
These rules can easily be modified from within the system. And if a threat is detected, the system can be used to block access throughout the center to reduce movement and further risk, and issue announcements via the campus-wide audio system. Users always have a complete overview of all movements throughout the center, and the ability to provide a real-time response to any situation.