IT Infrastructure Increasingly Supports Physical Security Initiatives

Carl Weinschenk

If life in the data center was a musical, the first two songs security and IT folks would break out in song and dance to would be "Let's Get Physical" and "We're All in this Together."

If the show was based on this story in The Register, it would be a somber production. The piece details the repeated break-ins to C I Host, a co-location facility in Chicago. The scary part -- aside from the fact that the thieves appear to have been a pretty violent bunch who struck and repeatedly tazered the night manager -- is that this was the fourth time in two years that facility was broken into and the company seems to have not been upfront with its customers. In a broader sense, the benefit IT managers and their bosses can gain from other companies' misfortunes is that physical security efforts must be redoubled.

It is a changing world in which physical and electronic initiatives are coalescing. Enterprise IT Planet details how this transition is essentially inevitable. Examples abound: Data from card scanners used to gain entry to the facility and areas within are stored and trafficked like any other data on the corporate local-area network (LAN). Thus, the IT department is a key player in protecting it. An even better example is video surveillance. This world is moving to IP, and security images are handled as all other video used by the company.

The major intersection of IT and physical security is personnel authentication and facility access control, according to Security Magazine. The writer discusses the evolution of surveillance. Smart cards and biometrics are another hybrid physical/electronic security endeavor that may be jointly overseen by the IT and security departments. The piece suggests that it is important for IT and security staffs to coordinate procedures for employee terminations. A lapse of even a few minutes between termination and ending of access rights can be costly if the terminated person is angry and knows his or her way around a computer.

It is not only terminated employees who are a threat. A blogger at TechRepublic says danger often comes from disgruntled or greedy employees or contractors who use their physical presence to in some way rob from or disrupt the organization. The writer offers six steps for restricting personal access centering on electronic badges and close observation, and seven steps to protect information and equipment. The takeaway clearly is that the line between physical and electronic security is rapidly disappearing.

This release, posted at The Silicon Valley/San Jose Business Journal late last month, describes a data center Savvis opened in Santa Clara, Calif. The description is interesting both because of the particular features being offered and the high profile physical security is being given:

The data center's physical security features include guards, video monitoring systems, vehicle blockades, and bulletproof glass and walls. Entrance pods and "man traps" along with a biometric entry system are used to ensure that only fully authorized personnel are granted entry.
In the wake of 9/11 and amid the general specter of terrorism, physical security of data has become a vital issue. The evolution of the Internet and IP technology gives security and IT forces powerful tools with which to protect the company, its clients and employees.



Add Comment      Leave a comment on this blog post
Nov 6, 2007 2:10 AM Xavier Orberec Xavier Orberec  says:
More and more the convergence of Physical Security and IP Surveillance is becoming common place. A startup in Arizona called Iveda Solutions is spearheading this effort, where users can outsource the monitoring of their surveillance and secured hosting of video data at the datacenter. Charges to the customer for remote monitoring and remote access to their cameras are based for a small fee. check out their website at http://www.ivedasolutions.com Reply

Post a comment

 

 

 

 


(Maximum characters: 1200). You have 1200 characters left.

 

null
null

 

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.