Download PDF version Contact company

Data centers are a challenging domain, the success of which depends on security of client data. Most data centers store data for more than one organization. It is very crucial for the data centers to prevent any unauthorized access of data.

Matrix offers a solution whereby data racks are secured biometrically, with records of every access along with its duration. Only authorized person can access specific racks for the stipulated time using biometric verification.

The solution is available in two forms. Time- and user-based rack access with a single biometric device.

Time-Based Rack Access

This form of access control proceeds in the following manner.Once the user completes authentication, he will be able to select the racks to be accessed from a list of accessible racks

Data center authentication: User shows biometric credentials to access the data center

Data center access allowed: Once user is allowed access, he/she will move towards rack access authentication.

Rack authentication: User will click on the screen and authenticate his/her identity through a biometric device placed alongside the screen.

Rack selection: Once user completes the authentication process for gaining access to respective racks, he will be able to select the racks to be accessed from a list of accessible racks.

Rack access allowed: Finally, the user will perform his assigned task within the defined time period.

Centralized Biometric Authentication

Biometrics provides high-end security over RFID, and hence integrating biometrics with access control solution fetches complete security for data centers. Usually, an employee is required to punch twice in order to access the data rack of his/her organization.

First Punch: A biometric device will be installed at the entrance of the data center. A user will punch on the device and accordingly he/she will be granted/denied access. This authentication ensures that an authorized user is trying to access the data center.

Second Punch: Once user is granted access, he/she will punch again at the device installed near the screen in order to access the respective racks. Once user punches, the screen will display the list of racks that he/she is allowed to access. For example – when ‘X’ employee of ‘ABC Organization’ punches the second time, the screen will display a list of ABC Organization racks that are allotted to him. The user then needs to select the racks that he wants to access and accordingly he/she will be granted access.Every rack that is allocated to a company can only be accessed for a definite period of time

Pre-Defined Rack Access

Every company has designated racks allotted to them. The admin can define the racks company-wise, which means whenever a user makes his second punch – a list with racks allotted to his/her respective company will be displayed on the screen.

This feature acts as a USP for data centers as they can ensure that a rack of company ‘X’ will not be accessible to or misused by an employee of company ‘Y’.

Every rack that is allocated to a company can only be accessed for a definite period of time. The admin can set the duration and accordingly users can access their respective racks for the stipulated time period.

User-Based Rack Access

The process of user-based access control proceeds as follows:

  • Data center authentication: User shows biometric credentials to access the data center
  • Data center access allowed: Once user is allowed access, he/she will move towards rack access authentication.
  • Rack authentication: User will show biometric credentials to access the rack.

Centralized Authentication And Control

User-based access differs from time-based access in this following manner.If the user is authenticated he/she will be allowed to work in the rack for a pre-defined period of time and once finished

First punch with two level authentication: A biometric device will be installed at the entrance of data center. User will show card or enter the pin code and then biometric credentials on the device and accordingly he/she will be granted/denied access. This authentication ensures that an authorized user is trying to access the data center. Two-level authentication improves the security level.

Second punch: User will move to the rack and show his/her biometric credential on the device installed at the rack. If the user is authenticated he/she will be allowed to work in the rack for a pre-defined period of time and once finished, the device will close the door automatically.

Admin can define the racks company-wise, which means whenever a user makes his second punch – a list of ABC Organization racks that are allotted to him will be displayed on the screen.

This feature acts as USP for data centers as they can ensure that a rack of company 'X' will not be accessible to or misused by employee of company 'Y'.Through Matrix's Access Control slution, data centers can manage each and every company’s rack virtually along with enhancing the security

Integration With Video Surveillance

Matrix Access Control solution for data centers can be integrated with video surveillance solutions. Hence, when a user tries to access the data center through the biometric device, an image gets captured. In case of unauthorized access, having an image can prove helpful for data centers.

As for time-based rack access, every rack is accessible for a definite period of time, and the admin can set the duration.

Data centers have data of more than one organization stored in a single location. Managing the data racks is a cumbersome process for data centers. Through this solution, data centers can manage each and every company’s rack virtually along with enhancing the security.

Benefits Of User-Based Access Control

The solution provides reports in the form of:

  • ‘Which’ rack is accessed by ‘whom’, ‘when’ and for ‘what’ time-duration
  • Records related to rack accessibility, time duration, etc.
  • Alarm for a rack held open for too long, access denied events, etc.

From the data center point of view, this system offers the following advantages:

  • Easy maintenance of diverse data
  • Accurate record of access allowed/denied in the software
  • No manual security required
  • Easy data rack management of various companies in a single location

In addition, from the company point of view, it is beneficial in the following ways:

  • Complete security of company data
  • Accurate records of who accessed data at what time

Target user profile:

  • Data centers
  • Server-based companies
Download PDF version Download PDF version

In case you missed it

Luxury Londoner Hotel Secured By OPTEX Laser Sensors
Luxury Londoner Hotel Secured By OPTEX Laser Sensors

OPTEX, the pioneering global sensing manufacturer, has specified and installed its compact and intelligent REDSCAN RLS-2020 LiDAR laser sensors at the new luxury five-star Londoner...

ASSA ABLOY eCLIQ: Secure Access At Hofbräuhaus Munich
ASSA ABLOY eCLIQ: Secure Access At Hofbräuhaus Munich

Munich’s Hofbräuhaus enjoys an iconic status, as both a heritage property and a spiritual home for lovers of German beer. “In this historic building is the world&r...

How Should Total Cost of Ownership (TCO) Impact Security Decisions?
How Should Total Cost of Ownership (TCO) Impact Security Decisions?

Direct costs such as purchase price and maintenance are important elements in the total cost of ownership (TCO). However, there are others. Elements such as opportunity costs of lo...