Electronics Protection - Fall 2015 - (Page 10)
Feature
Electronic Access Solutions - Design Considerations for
Your Data Center
Steve Spatig, General Manager Electronic Access Solutions
Business Unit, Southco
and security systems. Lastly, it goes without saying that any system
is only as good as the electronic locks it employs. Therefore, the
For most data center managers, security is the number-one prior- highest quality electronic locks should always be specified.
ity. Accordingly, from the exterior, data centers are some of the
The following solutions address the common scenarios that
most secure facilities in the world. They may be hidden underdata center managers face when integrating electronic access
ground, or tucked away in nondescript buildings in industrial parks.
systems at the rack level.
The perimeter is protected by security guards, and sometimes, physScenario 1: A simple solution for adding electronic access is
ical barriers that even a heavy truck
needed, without having to wire into an
could not penetrate. Only credentialed
existing network.
personnel may enter these facilities,
If the main goal is to transition from
which may store sensitive government
mechanical locking to electronic lockdata, financial information or corporate
ing, a self-contained electronic locking
proprietary documentation.
device that incorporates a keypad or
But how secure are the actual racks
RFID access control reader, an elecof data from the numerous individutronic lock and a mechanical override
als who do have clearance to enter
into a single, battery-operated unit is
these buildings? Even barring malioften the best choice.
cious tampering, statistically more than
Units like these are generally easy
40 percent of data breaches occur
to install and require no software,
because of inadvertent use by insidwiring or networking, making the
ers. Therefore, even if the grounds,
transition from mechanical to eleclobby and individual server rooms
tronic access straightforward. Once the
are securely locked, the same level of
mechanical lock has been removed,
security should be extended down to
this new lock can often be retrofitted
the individual racks as well.
into existing panel preps without the
need for any cutting or drilling that
could release metal dust and damage
Methods of Securing Racks
nearby electronics. Furthermore, selfIn many data centers, key managecontained, gear motor-driven units are
ment is a major pain point. Over the
energy-efficient, produce little heat in
Determining the most appropriate method of physically
years, traditional lock-and-key solusecuring
data
at
the
rack
level
depends
on
the
unique
secucomparison with solenoid-driven units,
tions used to secure server racks have
rity requirements of the data center.
and take up little space - important
evolved through alternative options,
considerations for the server cabinet,
such as mechanical combination locks
which
is
often
already
tightly
packed with electronics.
with multiple key codes; however, keys and codes still present
Scenario 2: Rack access needs to be controlled using the same
challenges when tracking and monitoring access. Intelligent eleccredential readers already being used elsewhere in the facility.
tromechanical locks are more widely used in data centers today
For data centers with serious security needs, such as those
due to the higher level of sophistication they offer, in that they
housing
government or banking information, an intelligent locking
provide remote programming and monitoring. These electronic
access solutions generate digital access signatures that can be used system that can be integrated with the facility's pre-existing security network is critical. For this solution, high-quality intelligent locks
for audit trail purposes as required by numerous data regulations
are hardwired from each data cabinet into the building's physical
for financial, government and healthcare industries. Because of
access control (PAC) panel, taking advantage of infrastructure
these advantages, intelligent, reliable electronic access systems are
and monitoring systems already in place. The same software that
preferred by most data center managers.
controls access to the building entrance point also controls access
to the server cabinet, allowing existing facility access credentials
How to Select the Right Rack-Level Security Solution
to be used at the rack level. For instance, where it is necessary to
Every data center has a unique set of security requirements,
employ a pre-existing RFID reader or a fingerprint reader already
and the ability to tailor electronic access solutions to a data
used for building, these access controllers can be wired to eleccenter's existing infrastructure is essential. With so many options
tronic locks to provide a custom, standalone solution.
and considerations, how does one determine the most appropriIntegrated systems can be configured to convey very specific
ate and cost-effective method of physically securing the racks that
information about the status of the lock, to further enhance secustore valuable information?
rity. Lock status (locked or unlocked), latch status (handle up or
Being clear about why electronic locking is desired, and what it
down), or door status (open or closed) can be monitored locally
is meant to accomplish can help data center managers and their
or from a remote location. Other security-enhancing features can
suppliers select the best solution for rack level security. The apbe wired in as well, such as a video camera or a mechanism to
propriate solution should only be as complex as needed to achieve
release the lock for emergency venting if unusually high temperathe required functionality. In addition, installers should be able to
tures are detected. Additionally, digital access records generated
retrofit new devices to integrate with existing cabinets
by electronic access solutions can be used to satisfy audit trail
10
Fall 2015 * www.ElectronicsProtectionMagazine.com
http://www.ElectronicsProtectionMagazine.com
Table of Contents for the Digital Edition of Electronics Protection - Fall 2015
Electronics Protection - Fall 2015
Contents
Editor's Choice
Beat the Heat: Six Best Practices for Protecting Your People and Your Business from Arc Flash Hazards
Data Center Design and Cooling for Sensitive Electronics
Electronic Access Solutions - Design Considerations for Your Data Center
An Unsung Hero: the Gas Discharge Tube
Innovation Demands That You Break the Rules
Enclosures
Thermal
Power
Hardware
Industry News
Calendar of Events
Electronics Protection - Fall 2015
https://www.nxtbook.com/nxtbooks/webcom/ep_2017summer
https://www.nxtbook.com/nxtbooks/webcom/ep_2017spring
https://www.nxtbook.com/nxtbooks/webcom/ep_2017winter
https://www.nxtbook.com/nxtbooks/webcom/ep_2016fall
https://www.nxtbook.com/nxtbooks/webcom/ep_2016summer
https://www.nxtbook.com/nxtbooks/webcom/ep_2016spring
https://www.nxtbook.com/nxtbooks/webcom/ep_2015winter
https://www.nxtbook.com/nxtbooks/webcom/ep_2015fall
https://www.nxtbook.com/nxtbooks/webcom/ep_2015summer
https://www.nxtbook.com/nxtbooks/webcom/ep_2015spring
https://www.nxtbook.com/nxtbooks/webcom/ep_2014winter
https://www.nxtbook.com/nxtbooks/webcom/ep_2014fall
https://www.nxtbook.com/nxtbooks/webcom/ep_2014summer
https://www.nxtbook.com/nxtbooks/webcom/ep_2014spring
https://www.nxtbook.com/nxtbooks/webcom/ep_20140102
https://www.nxtbook.com/nxtbooks/webcom/ep_20131112
https://www.nxtbook.com/nxtbooks/webcom/ep_20130910
https://www.nxtbook.com/nxtbooks/webcom/ep_20130708
https://www.nxtbook.com/nxtbooks/webcom/ep_20130506
https://www.nxtbook.com/nxtbooks/webcom/ep_20130304
https://www.nxtbook.com/nxtbooks/webcom/ep_20130102
https://www.nxtbook.com/nxtbooks/webcom/ep_20121112
https://www.nxtbook.com/nxtbooks/webcom/ep_20120910
https://www.nxtbook.com/nxtbooks/webcom/ep_20120607
https://www.nxtbook.com/nxtbooks/webcom/ep_20120304
https://www.nxtbook.com/nxtbooks/webcom/ep_20120102
https://www.nxtbook.com/nxtbooks/webcom/ep_20111112
https://www.nxtbook.com/nxtbooks/webcom/ep_20110910
https://www.nxtbook.com/nxtbooks/webcom/ep_20110607
https://www.nxtbookmedia.com