Networks Europe Sept-Oct 2018 | Page 15

ELECTRONIC ACCESS CONTROL 15 Secure & compliant coverage limitations most don’t cover down to rack level. Now add to the problem when you’re using a colocation data centre, even more personnel from other companies will be working around your racks, mostly unsupervised. Making access control work There are two ways of achieving protection with EAC. One would be the traditional building proximity access system connected to the EAC swing locks, although there hasn’t been a great deal of take up of this, as yet, by security companies. The second option is the standalone system; there are a number of systems on the market that all have plus and minus points. The connectivity is normally TCP/IP, which cuts down on interface cabling and all have a remote opening feature. With space required on a SQL server, ongoing license costs, and support can be extremely costly. Most standalone systems have the ability to connect to temperature and humidity sensors alongside fire and water detection. Some even have the ability to control local rack cameras, and this is the ultimate security option; having an image of personnel accessing and working in the rack is a complete audit trail with no question or doubt about identity. In fact, with a few tweaks here and there some systems could even be utilised as a mini DCIM system; an interesting proposition due to the high costs of implementing and maintaining a full-blown DCIM. All IT departments most often have their own security and compliance team, so it makes sense that this department should have control of all data to control "All IT departments most often have their own security and compliance team, so it makes sense that this department should have control of all data to control any type of likely breach" any type of likely breach. Who holds the keys and access to your data facility? It’s time to take control of all your assets the equipment to do so is now readily available. Rack companies now have an EAS system available to be fitted to the rack before delivery to the installation site, you just need to check for hidden costs of licensing and support. If you haven’t had a physical breach already, it will only be a matter of time with substandard security. n www.networkseuropemagazine.com