Electronics Protection - Fall 2015 - (Page 10)

Feature Electronic Access Solutions - Design Considerations for Your Data Center Steve Spatig, General Manager Electronic Access Solutions Business Unit, Southco and security systems. Lastly, it goes without saying that any system is only as good as the electronic locks it employs. Therefore, the For most data center managers, security is the number-one prior- highest quality electronic locks should always be specified. ity. Accordingly, from the exterior, data centers are some of the The following solutions address the common scenarios that most secure facilities in the world. They may be hidden underdata center managers face when integrating electronic access ground, or tucked away in nondescript buildings in industrial parks. systems at the rack level. The perimeter is protected by security guards, and sometimes, physScenario 1: A simple solution for adding electronic access is ical barriers that even a heavy truck needed, without having to wire into an could not penetrate. Only credentialed existing network. personnel may enter these facilities, If the main goal is to transition from which may store sensitive government mechanical locking to electronic lockdata, financial information or corporate ing, a self-contained electronic locking proprietary documentation. device that incorporates a keypad or But how secure are the actual racks RFID access control reader, an elecof data from the numerous individutronic lock and a mechanical override als who do have clearance to enter into a single, battery-operated unit is these buildings? Even barring malioften the best choice. cious tampering, statistically more than Units like these are generally easy 40 percent of data breaches occur to install and require no software, because of inadvertent use by insidwiring or networking, making the ers. Therefore, even if the grounds, transition from mechanical to eleclobby and individual server rooms tronic access straightforward. Once the are securely locked, the same level of mechanical lock has been removed, security should be extended down to this new lock can often be retrofitted the individual racks as well. into existing panel preps without the need for any cutting or drilling that could release metal dust and damage Methods of Securing Racks nearby electronics. Furthermore, selfIn many data centers, key managecontained, gear motor-driven units are ment is a major pain point. Over the energy-efficient, produce little heat in Determining the most appropriate method of physically years, traditional lock-and-key solusecuring data at the rack level depends on the unique secucomparison with solenoid-driven units, tions used to secure server racks have rity requirements of the data center. and take up little space - important evolved through alternative options, considerations for the server cabinet, such as mechanical combination locks which is often already tightly packed with electronics. with multiple key codes; however, keys and codes still present Scenario 2: Rack access needs to be controlled using the same challenges when tracking and monitoring access. Intelligent eleccredential readers already being used elsewhere in the facility. tromechanical locks are more widely used in data centers today For data centers with serious security needs, such as those due to the higher level of sophistication they offer, in that they housing government or banking information, an intelligent locking provide remote programming and monitoring. These electronic access solutions generate digital access signatures that can be used system that can be integrated with the facility's pre-existing security network is critical. For this solution, high-quality intelligent locks for audit trail purposes as required by numerous data regulations are hardwired from each data cabinet into the building's physical for financial, government and healthcare industries. Because of access control (PAC) panel, taking advantage of infrastructure these advantages, intelligent, reliable electronic access systems are and monitoring systems already in place. The same software that preferred by most data center managers. controls access to the building entrance point also controls access to the server cabinet, allowing existing facility access credentials How to Select the Right Rack-Level Security Solution to be used at the rack level. For instance, where it is necessary to Every data center has a unique set of security requirements, employ a pre-existing RFID reader or a fingerprint reader already and the ability to tailor electronic access solutions to a data used for building, these access controllers can be wired to eleccenter's existing infrastructure is essential. With so many options tronic locks to provide a custom, standalone solution. and considerations, how does one determine the most appropriIntegrated systems can be configured to convey very specific ate and cost-effective method of physically securing the racks that information about the status of the lock, to further enhance secustore valuable information? rity. Lock status (locked or unlocked), latch status (handle up or Being clear about why electronic locking is desired, and what it down), or door status (open or closed) can be monitored locally is meant to accomplish can help data center managers and their or from a remote location. Other security-enhancing features can suppliers select the best solution for rack level security. The apbe wired in as well, such as a video camera or a mechanism to propriate solution should only be as complex as needed to achieve release the lock for emergency venting if unusually high temperathe required functionality. In addition, installers should be able to tures are detected. Additionally, digital access records generated retrofit new devices to integrate with existing cabinets by electronic access solutions can be used to satisfy audit trail 10 Fall 2015 * www.ElectronicsProtectionMagazine.com http://www.ElectronicsProtectionMagazine.com

Table of Contents for the Digital Edition of Electronics Protection - Fall 2015

Electronics Protection - Fall 2015
Contents
Editor's Choice
Beat the Heat: Six Best Practices for Protecting Your People and Your Business from Arc Flash Hazards
Data Center Design and Cooling for Sensitive Electronics
Electronic Access Solutions - Design Considerations for Your Data Center
An Unsung Hero: the Gas Discharge Tube
Innovation Demands That You Break the Rules
Enclosures
Thermal
Power
Hardware
Industry News
Calendar of Events

Electronics Protection - Fall 2015

https://www.nxtbook.com/nxtbooks/webcom/ep_2017summer
https://www.nxtbook.com/nxtbooks/webcom/ep_2017spring
https://www.nxtbook.com/nxtbooks/webcom/ep_2017winter
https://www.nxtbook.com/nxtbooks/webcom/ep_2016fall
https://www.nxtbook.com/nxtbooks/webcom/ep_2016summer
https://www.nxtbook.com/nxtbooks/webcom/ep_2016spring
https://www.nxtbook.com/nxtbooks/webcom/ep_2015winter
https://www.nxtbook.com/nxtbooks/webcom/ep_2015fall
https://www.nxtbook.com/nxtbooks/webcom/ep_2015summer
https://www.nxtbook.com/nxtbooks/webcom/ep_2015spring
https://www.nxtbook.com/nxtbooks/webcom/ep_2014winter
https://www.nxtbook.com/nxtbooks/webcom/ep_2014fall
https://www.nxtbook.com/nxtbooks/webcom/ep_2014summer
https://www.nxtbook.com/nxtbooks/webcom/ep_2014spring
https://www.nxtbook.com/nxtbooks/webcom/ep_20140102
https://www.nxtbook.com/nxtbooks/webcom/ep_20131112
https://www.nxtbook.com/nxtbooks/webcom/ep_20130910
https://www.nxtbook.com/nxtbooks/webcom/ep_20130708
https://www.nxtbook.com/nxtbooks/webcom/ep_20130506
https://www.nxtbook.com/nxtbooks/webcom/ep_20130304
https://www.nxtbook.com/nxtbooks/webcom/ep_20130102
https://www.nxtbook.com/nxtbooks/webcom/ep_20121112
https://www.nxtbook.com/nxtbooks/webcom/ep_20120910
https://www.nxtbook.com/nxtbooks/webcom/ep_20120607
https://www.nxtbook.com/nxtbooks/webcom/ep_20120304
https://www.nxtbook.com/nxtbooks/webcom/ep_20120102
https://www.nxtbook.com/nxtbooks/webcom/ep_20111112
https://www.nxtbook.com/nxtbooks/webcom/ep_20110910
https://www.nxtbook.com/nxtbooks/webcom/ep_20110607
https://www.nxtbookmedia.com