In a recent report by InformationWeek, over 400 IT pros were surveyed to find out where they were allocating their funds in 2012. Topping the project list for IT managers were initiatives to improve security. Protecting assets requires both digital security, and physical security, and the two often overlap.
IT facility management has gravitated its focus towards security in recent years. Due to the sheer amount of sensitive information stored in servers with increased Internet commerce, a security breach can harm a business, and its customers. High-profile information thefts have cost businesses millions of dollars and hurt reputation. Other instances have seen important digital assets destroyed. As a result, security protocols have been tightened and further access and identification measures have been implemented. Protecting crucial assets and information really comes in two forms, physical and digital security. However, they often go hand in hand.
”It is easier to break into a system once you are in a facility and have crossed into their logistical zone. It is easier to log in and get information, ” says Jordan Ferrantelli, a security consultant at Aon Security Consulting.
PROACTIVE SECURITY: Do No Harm
Loss of sensitive information can come as a result of theft. But another pitfall is information lost because of environmental factors, or failed equipment that was not properly monitored. Lost databases and information can be a potentially heavy blow for companies, especially those that rely on large databases to conduct business. A hospital that has gone paperless relies on their servers for every aspect of organization, from payment services to private medical records. Losing these records could be catastrophic for what it means to patients, and the hours or work lost. Having security personnel on site to watch over servers is not a competent solution to protect these assets. Temperature and humidity, as well as other factors, can cause server failure, but are undetected without the right environmental monitoring tools. The first step in security is to be able to monitor the health of the servers, and prevent a problem before it happens.
PROACTIVE SECURITY: Digital Threat and Virtualization
Stolen information has become a major security threat for governments and businesses alike. The first step is to make sure the right personnel are accessing the facility. Large- scale security breaches are an easier task once someone is on the inside and can log-in on the network. Tracking facility site users and keeping records of those that access the site are important measures to keep a site secure. In addition to using card-readers to allow access, have server cabinet doors trigger an alert when opened. With proactive remote monitoring, data center managers can be alerted when there is any movement towards accessing the servers.
IT security is a battle outside the facility as well. Extranet connections, supply chain transactions, and other digital communications have made protecting the network a more daunting task. Virtualization in computing has also posed new risks. As a result, new DCIM measures are being taken, with complex routing topology and more robust multi-layered encryption. These days, attacks are being launched directly at applications like XML and SQL because such protocols are easily accessed. Data Center Infrastructure Management solutions by companies such as IBM and Cisco offer data center security that are constantly evolving.
CLOUD COMPUTING: Increase Risks
As more businesses move to the cloud, increased security risks are surfacing. Because all information is transferred via Internet, data is more easily accessed remotely. APIs that manage the content being transferred can also be breached without proactive security. Another risk is the third party providing the cloud service. Rigorous control of access on site is a fantastic step, but who is keeping employees of the cloud service accountable? This boils down to faith and firm trust in the cloud provider.
INCREASE SECURITY: Uptime Devices
Uptime Devices has been a leading innovator in environmental monitoring, power monitoring, and security, for over a decade. Their original SNMP-based monitoring unit Sensor Hub™ has been the standard for monitoring and protecting assets, while the expandable design of Remote Physical Monitor CM has allowed for unparalleled flexibility to cover multiple stations on just 1U of rack space.
Uptime Devices’ monitoring tools cover more than just natural environmental conditions. They also offer solid security solutions. Implement the 360° Motion Detector to trigger when there is unsolicited movement on site. Connect the Security Sensor to Sensor hub™ to send an alert to the facility manager when a server door is opened. There are a range of solutions through Uptime Devices to increase security for your IT environment, including network cameras, sirens, and more. As highlighted by the most recent major security breach last week, which saw 780,000 Medicaid recipients’ data exposed, protecting your site with proactive security monitoring is a necessity.
For more information on how Uptime Devices’ products can help protect your assets and provide solid security for your data center or IT facility, please visit our site:www.uptimedevices.com/products , or email: sales@uptimedevices.com