Who is accessing company’s most sensitive data? Where? When? And if someone without authorization did, how would one know?

Some of the world’s best-known companies have succumbed to data breaches that proved expensive—in terms of both cost and reputation. The focus, usually, is on a digital attack. Passwords and anti-hacking procedures come under scrutiny, particularly in a world where so much of information lives in the cloud.

But there is another way that company data can fall into unauthorized hands: someone could walk right up to the server and access it physically, with equally disruptive results.

Shared Data Centers May Increase Risk For Data Security

The risks increase when companies use shared data centers — or “colocation” — which has become an increasingly popular option. According to 451 Research KnowledgeBase, the global colocation market could grow from $23 billion in 2014 to $37 billion by 2017. All the “big data” has to go somewhere, and shared data centers provide a cost-effective solution, even for information of the most sensitive kind.

Data centers have stringent security procedures, of course. But is it wise to fully entrust the valuable data, sensitive customer information, to a third party? Can one be certain that a third party’s security procedures meet the legal compliance commitments, to the European Data Protection Directive, the Sarbanes–Oxley Act, the PCI Data Security Standard and other personal and commercial data protection regulations?

And do the company even know who they share server space with? It could be a direct competitor.

Data Center Security Management - A Must For Any Company’s Agenda

Disruption of physical security and potential breach as a result may not even be deliberate or malicious. Server rooms have a steady flow of authorized traffic: cleaners, maintenance staff, repair technicians and more. Unfortunately, accidents happen.

For these reasons, data center security management needs to be high on any company’s agenda. As high as cyber-security. In an interview with datacenterknowledge.com, Jason Cook, CTO of BT Americas, suggested: “Physical security is still one of the easiest ways to get access to data. With all of the sophistication in current technology, what’s the point, if someone can walk in and open the door?”

IBM estimates the average cost of a single data breach at $3.79 million. Fortunately, technologies that can help secure servers—even in colocation data centers—cost a lot less than that.

A Mechanical-Key Audit Trail Not Enough For Investigation In Event Of Breach

A high-security mechanical lock might seem like a solution. But a mechanical system can be expensive to run, due to the costs of secure key management and replacement when keys go missing. Once issued, there’s no way to change a physical key’s user rights. A mechanical-key audit trail — who had access to your servers, when, for how long — will probably not be enough to conduct a proper investigation in the event of any type of breach. Even high-security perimeter doors and CCTV-powered server room security will not suffice, if the server rack has an old-fashioned mechanical lock.

Server cabinet locks are the last line of defense against a physical breach, yet mechanical keys are still a common sight in data centers. This is becoming increasingly unsatisfactory, especially when that server could hold the key to the business success.

ASSA ABLOY Aperio® KS100 Server Cabinet Lock With Real-Time Access Control Capabilities

One solution is ASSA ABLOY’s Aperio® KS100 Server Cabinet Lock. The KS100 adds real-time access control capabilities to a server cabinet, drawer or rack. It brings server racks into an existing third-party access control system, without breaking the bank. KS100 electronic locks work with smartcards using all standard RFID technologies, including iCLASS® from HID, Seos™, MIFARE® and DESFire.

Installation is quick and easy, with power coming via a Power over Ethernet (PoE) connection. Once installed, KS100 locks integrate with your access control system and communicate wirelessly through an Aperio® Communication Hub. With online integration, when any of your smart credentials is presented to the lock, access decisions are communicated from and recorded by the system wirelessly.

With Aperio®, lost cabinet keys no longer compromise server security: smart credentials are simply de-authorized and a valid replacement can be quickly re-issued. The current status of any lock can be revealed with the click of a mouse. Generating detailed audit trails is straightforward, making the KS100 invaluable for incident investigation. With Aperio® server cabinet locks, businesses have the freedom to manage access to their own equipment and data, even in colocation data centers.

Do one know exactly who last had access to the servers, and when? Install Aperio®, and next time the data manager asks, the answer is yes.

Key Facts

  • The data center colocation market could be worth $37 billion by 2017
  • Companies have a legal requirement to protect sensitive customer data, under the European Data Protection Directive and other regulations
  • Investigating any breach properly requires detailed audit trails, which mechanical keys cannot provide
  • An Aperio® KS100 Server Cabinet Lock can integrate with an installed access control system, boosting security wirelessly and adding full audit trail capabilities to server space, even in shared data centers
Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

HID Global news

ISC West 2019 Day Two: Explaining The New And The Tried-And-True

There are many new technologies at ISC West this year. There are also some tried-and-true solutions on display. More mature products have the benefit of being fully vetted and battle-tested, which may make them a more comfortable choice for security customers. I had a couple of discussions on Day 2 of the show about the advantages, and possible drawbacks, of new products. “To a security director, when you say ‘new,’ he translates that into ‘risk,’” says Bill...

HID Global Announces General Availability Of Its WorkforceID Authentication Solution

HID Global, a globally renowned company in trusted identity solutions, has announced the general availability of WorkforceID Authentication solution, the latest addition to its cloud platform for creating a seamless, effortless experience for issuing, managing and using identity credentials in physical and digital workplaces. Workforce ID Authentication Workforce ID Authentication builds upon HID’s proven and widely deployed multi-factor authentication platform for consumer applications,...

HID Global Adds Cloud-Based Multi-Factor Authentication To Its WorkforceID Unified Identity And Access Management Platform

HID Global, trusted identity solutions announced the general availability of WorkforceID™ Authentication solution, the latest addition to its cloud platform for creating a seamless, effortless experience for issuing, managing, and using identity credentials in physical and digital workplaces. Multi-factor authentication platform Workforce ID Authentication builds upon HID's proven and widely deployed multi-factor authentication platform for consumer applications including online and cell...

HID Global case studies

HID Global Empowers qiiosk Ltd To Meet Rising Demand For Truly Touch-Free Dining Experiences

HID Global, a pioneer in trusted identity solutions announced that qiiosk Ltd. uses its HID NFC Tags to meet skyrocketing demand from restaurants and diners for its product Menu Tile, to give a completely contact-free dining experience. HID NFC Tags With HID NFC Tags, qiiosk was able to respond quickly to the demand for solutions capable of addressing the “new normal” of contactless dining, takeout, and delivery. The company’s enhanced solutions enable restaurant-goers to se...

HID Global Civil Registry Solution Advances Antigua And Barbuda’s Transformation To A Digital Society

HID Global, an identity solutions company announces that Antigua and Barbuda have deployed HID® Integrale™ for CRVS to modernize the country’s civil registry system. The solution helps the country embark on a digital transformation by enabling the secure registration and reporting of life events of residents and visitors, and offers a single, true source of verifiable identity information. The Government of Antigua and Barbuda (GOAB), the Ministry of Information, Broa...

HID Global Deploys Its Secure HID Integrale End-To-End Solution For Libya’s First Diplomatic And Special ePassport Program

HID Global, the globally renowned company in trusted identity solutions, has announced that it has deployed the government of Libya’s first diplomatic and special ePassport program. HID Integrale HID Global provided Libya’s Ministry of Foreign Affairs (MOFA) with HID Integrale, a secure end-to-end solution that expedites the application and issuance processes and manages the entire ePassport lifecycle. For improved security, the redesigned and modernized booklets include a durable...