Who is accessing company’s most sensitive data? Where? When? And if someone without authorization did, how would one know?

Some of the world’s best-known companies have succumbed to data breaches that proved expensive—in terms of both cost and reputation. The focus, usually, is on a digital attack. Passwords and anti-hacking procedures come under scrutiny, particularly in a world where so much of information lives in the cloud.

But there is another way that company data can fall into unauthorized hands: someone could walk right up to the server and access it physically, with equally disruptive results.

Shared Data Centers May Increase Risk For Data Security

The risks increase when companies use shared data centers — or “colocation” — which has become an increasingly popular option. According to 451 Research KnowledgeBase, the global colocation market could grow from $23 billion in 2014 to $37 billion by 2017. All the “big data” has to go somewhere, and shared data centers provide a cost-effective solution, even for information of the most sensitive kind.

Data centers have stringent security procedures, of course. But is it wise to fully entrust the valuable data, sensitive customer information, to a third party? Can one be certain that a third party’s security procedures meet the legal compliance commitments, to the European Data Protection Directive, the Sarbanes–Oxley Act, the PCI Data Security Standard and other personal and commercial data protection regulations?

And do the company even know who they share server space with? It could be a direct competitor.

Data Center Security Management - A Must For Any Company’s Agenda

Disruption of physical security and potential breach as a result may not even be deliberate or malicious. Server rooms have a steady flow of authorized traffic: cleaners, maintenance staff, repair technicians and more. Unfortunately, accidents happen.

For these reasons, data center security management needs to be high on any company’s agenda. As high as cyber-security. In an interview with datacenterknowledge.com, Jason Cook, CTO of BT Americas, suggested: “Physical security is still one of the easiest ways to get access to data. With all of the sophistication in current technology, what’s the point, if someone can walk in and open the door?”

IBM estimates the average cost of a single data breach at $3.79 million. Fortunately, technologies that can help secure servers—even in colocation data centers—cost a lot less than that.

A Mechanical-Key Audit Trail Not Enough For Investigation In Event Of Breach

A high-security mechanical lock might seem like a solution. But a mechanical system can be expensive to run, due to the costs of secure key management and replacement when keys go missing. Once issued, there’s no way to change a physical key’s user rights. A mechanical-key audit trail — who had access to your servers, when, for how long — will probably not be enough to conduct a proper investigation in the event of any type of breach. Even high-security perimeter doors and CCTV-powered server room security will not suffice, if the server rack has an old-fashioned mechanical lock.

Server cabinet locks are the last line of defense against a physical breach, yet mechanical keys are still a common sight in data centers. This is becoming increasingly unsatisfactory, especially when that server could hold the key to the business success.

ASSA ABLOY Aperio® KS100 Server Cabinet Lock With Real-Time Access Control Capabilities

One solution is ASSA ABLOY’s Aperio® KS100 Server Cabinet Lock. The KS100 adds real-time access control capabilities to a server cabinet, drawer or rack. It brings server racks into an existing third-party access control system, without breaking the bank. KS100 electronic locks work with smartcards using all standard RFID technologies, including iCLASS® from HID, Seos™, MIFARE® and DESFire.

Installation is quick and easy, with power coming via a Power over Ethernet (PoE) connection. Once installed, KS100 locks integrate with your access control system and communicate wirelessly through an Aperio® Communication Hub. With online integration, when any of your smart credentials is presented to the lock, access decisions are communicated from and recorded by the system wirelessly.

With Aperio®, lost cabinet keys no longer compromise server security: smart credentials are simply de-authorized and a valid replacement can be quickly re-issued. The current status of any lock can be revealed with the click of a mouse. Generating detailed audit trails is straightforward, making the KS100 invaluable for incident investigation. With Aperio® server cabinet locks, businesses have the freedom to manage access to their own equipment and data, even in colocation data centers.

Do one know exactly who last had access to the servers, and when? Install Aperio®, and next time the data manager asks, the answer is yes.

Key Facts

  • The data center colocation market could be worth $37 billion by 2017
  • Companies have a legal requirement to protect sensitive customer data, under the European Data Protection Directive and other regulations
  • Investigating any breach properly requires detailed audit trails, which mechanical keys cannot provide
  • An Aperio® KS100 Server Cabinet Lock can integrate with an installed access control system, boosting security wirelessly and adding full audit trail capabilities to server space, even in shared data centers
Download PDF version Download PDF version

HID Global news

ISC West 2019 Day Two: Explaining The New And The Tried-And-True

There are many new technologies at ISC West this year. There are also some tried-and-true solutions on display. More mature products have the benefit of being fully vetted and battle-tested, which may make them a more comfortable choice for security customers. I had a couple of discussions on Day 2 of the show about the advantages, and possible drawbacks, of new products. “To a security director, when you say ‘new,’ he translates that into ‘risk,’” says Bill...

Four Years Later, What Is The Lingering Impact Of COVID-19 On Security?

The economic fallout of the COVID-19 epidemic was felt in supply chain disruptions, higher prices, and shortages of certain goods. The physical security industry was not spared, although the epidemic also presented opportunities for security companies. Changing access control trends triggered by the pandemic are still reverberating throughout the industry, for example. Four years later, the impact of the pandemic is still being felt in the security market, lingering like the symptoms of "long CO...

The PSA Network Announces Sponsors For PSA TEC 2024

The PSA Network, the world’s largest consortium of professional systems integrators announced the lineup of sponsors for PSA TEC 2024 (TEC) in Dallas, Texas, May 13-17.  PSA TEC 2024 "PSA TEC 2024 will again be the most powerful event for security integrators, and we have an incredible group of technology partner sponsors that enable PSA to exceed expectations in delivering high-quality educational offerings, networking, and exclusive engagement with prominent industry pioneers...

HID Global case studies

HID Helps In Automating The Access Control Management At Żabka

Enhancing enterprise security is high on the list of priorities for businesses across sectors. Within the retail industry, there is an additional focus on enabling new ways of working through management tools. Integrated solutions and applications help to create a robust security landscape and ensure a future-ready posture as organizations look to address emerging risks and create better experiences for next-gen employees. Physical access control (i.e., the readers on the door and the credentia...

Royal Jersey Laundry And HID Deliver Cost-Saving, Efficient Linen Tracking For London's Luxury Hotels

HID, the worldwide pioneer in trusted identity solutions, announces that Royal Jersey Laundry has introduced a new tracking feature of HID’s linen management platform at each of its 5-star hotel customer sites to guarantee that drivers drop off and collect precise linen stock and that costly errors are avoided. Linen tracking This new feature replaces a paper-based system used by drivers for the management of cages filled with clean/soiled linen delivered/collected at customer sites. I...

HID Wins Contract To Provide Finland With New Driver’s License And European 2nd Gen Smart Tachograph Card Solution

HID, a worldwide pioneer in trusted identity solutions, has been awarded a contract to provide Finland with a new high-security driver’s license cards and personalization services solution, incorporating the European second-generation smart Tachograph solution.  This collaboration reflects HID’s commitment to enhancing security and efficiency in Finland's transportation systems. configurable solution Finland will benefit from a comprehensive, tailor-made, and configurable sol...