SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 Sets Sales Record In Security Market
    • A Landmark Gathering Shaping The Future Of Real Estate, Investment, Sustainability & Design
    • IDIS Launches New AI PTZ Cameras With NIR Performance
    • Leuze AI Boosts Optical Distance Sensor Accuracy
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Self-Service Access Control
  • AI special report
  • Cybersecurity special report
  • 6
Thermal imaging
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check Out Our Special Report On Cybersecurity

Read now!

IHS Markit Lists Five Best Practices For Data Center Perimeter Security

6 Dec 2019

IHS Markit Lists Five Best Practices For Data Center Perimeter Security
Contact company
Contact IHS Markit
icon Add as a preferred source Download PDF version

A recent IHS Markit report predicted that, by 2030, there will be 125 billion Internet-connected devices participating in the now well-known and widespread Internet of Things (IoT). Network surveillance cameras, lifestyle wearables, and smart home devices are all prime examples of IoT solutions that are capturing an unprecedented amount of information.

Now, there are more than three million data centers in the U.S. that are storing, processing and protecting this data. This data has become essential to everyday life for consumers and businesses alike. Consequently, perimeter security for data centers must be taken seriously. It is essential to execute strategies that proactively address security threats and prevent security breaches that would result in the loss of critical information.

Best practices

Here are five best practices for data center perimeter security plans:

  • Deter
    First, customers need to implement Crime Prevention Through Environmental Design (CPTED) strategies in order to deter physical breach attempts. This includes erecting fences and gates and using barbed wire. It also involves best practices such as planting tall shrubbery to encourage visitors to utilize better-lit and monitored passageways. CPTED strategies can even include designing winding roads, leading up to the data center, to discourage vehicles from approaching at high speeds.
  • Detect
    As data centers operate 24/7, customers need to deploy solutions that can monitor the premises and detect threats around the clock. First-class FLIR thermal security cameras with long detection ranges and the ability to yield high-contrast images with rich detail are optimal for data center deployments. These cameras are known for their high-performance even in adverse weather conditions, such as light rain, fog, smoke, or total darkness, that would render a standard video camera ineffective. When integrated with classification analytics, thermal cameras can distinguish between a human or vehicle. When paired with ground-based radar, customers gain redundancy and reduce the likelihood of a false positive. By deploying thermal cameras with HD visible cameras, remote operators can review thermal and visible video streams of the scene for improved alarm verification and intruder identification. 
  • Deny
    While video monitoring is one facet of data center protection, it must be complemented by access control systems to deny entry to unauthorized individuals. Deploying technologies such as video intercoms, card readers, biometric technologies, and turnstiles to reduce piggybacking help to ensure only verified employees or visitors can enter the facility. As people walk further into the facility, from escorted areas to data center rooms to the data center cabinet, identity authentication is critical.
  • Delay
    Integrating multiple types of security technologies, from thermal to radar to access control, may necessitate higher-level management software so that operators can have a global view of all threats. With a physical security information management (PSIM) solution, operators can easily track all targets on map displays, send alerts to law enforcement, and if necessary, initiate lockdown procedures to seal off critical areas and isolate an intruder.
  • Defend
    On a digital level, strong perimeter security plans should also account for cyber threats for edge devices. Implementing cyber-hardening technologies such as network monitoring software, end-to-end encryption between archivers and cameras via Transport Layer Security, and the elimination backdoors are a few examples.

Combining these practices to form a single, coherent, and interconnected security strategy ensures data centers are optimally protected.

Understand how converged physical and cybersecurity systems can scale protection.

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Physical security
  • Perimeter security
  • Security cameras
  • Network monitoring
  • Thermal imaging
  • Cyber security
  • Crime prevention
  • Internet of Things (IoT)
  • Data Security
  • Smart home
  • Related categories
  • Surveillance cameras
  • Access control systems & kits
  • Intruder detectors
Related white papers
How Security Systems Ensure Healthy Workplaces During COVID and After

How Security Systems Ensure Healthy Workplaces During COVID and After

Download
Delivering a Smart, Secure and Healthy Workplace with Cloud

Delivering a Smart, Secure and Healthy Workplace with Cloud

Download
Building A Safe Ecosystem For Visitors Post COVID-19

Building A Safe Ecosystem For Visitors Post COVID-19

Download
Related articles
What Do You Need To Know About Thermal Imaging Cameras?

What Do You Need To Know About Thermal Imaging Cameras?

Thermal Cameras And Smart Cities: Preventing COVID-19 In Public Places

Thermal Cameras And Smart Cities: Preventing COVID-19 In Public Places

What Are Some Unusual Applications Of Surveillance Cameras You Have Seen Recently?

What Are Some Unusual Applications Of Surveillance Cameras You Have Seen Recently?

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Thermal imaging
  4. News
  5. Corporate news

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Enhancing Physical Access Control Using A Self-Service Model
Enhancing Physical Access Control Using A Self-Service Model
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec