ELECTRONIC ACCESS CONTROL
15
Secure &
compliant
coverage limitations most don’t cover down to rack level.
Now add to the problem when you’re using a colocation
data centre, even more personnel from other companies will
be working around your racks, mostly unsupervised.
Making access control work
There are two ways of achieving protection with EAC. One
would be the traditional building proximity access system
connected to the EAC swing locks, although there hasn’t
been a great deal of take up of this, as yet, by security
companies. The second option is the standalone system;
there are a number of systems on the market that all have
plus and minus points. The connectivity is normally TCP/IP,
which cuts down on interface cabling and all have a remote
opening feature. With space required on a SQL server,
ongoing license costs, and support can be extremely costly.
Most standalone systems have the ability to connect to
temperature and humidity sensors alongside fire and water
detection. Some even have the ability to control local rack
cameras, and this is the ultimate security option; having
an image of personnel accessing and working in
the rack is a complete audit trail with no
question or doubt about identity.
In fact, with a few tweaks here
and there some systems could
even be utilised as a mini
DCIM system; an interesting
proposition due to the high
costs of implementing and
maintaining a full-blown DCIM.
All IT departments
most often have their
own security and
compliance team, so it
makes sense that this department
should have control of all data to control
"All IT departments most often have their own
security and compliance team, so it makes sense
that this department should have control of all
data to control any type of likely breach"
any type of likely breach. Who holds the keys and access
to your data facility? It’s time to take control of all
your assets the equipment to do so is now
readily available. Rack companies
now have an EAS system
available to be fitted to
the rack before delivery
to the installation site,
you just need to
check for hidden
costs of licensing and
support. If you haven’t
had a physical breach
already, it will only be
a matter of time with
substandard security. n
www.networkseuropemagazine.com