As Asia rapidly expands its digital infrastructure, the region's data centers are coming under unprecedented pressure to ensure robust physical security. From the rise of artificial intelligence workloads to increased cyber-physical threats, operators must now adapt to more complex and localized risk factors.
Experts say the way forward lies in adopting edge-based surveillance, layered protection strategies, and better training across all operational levels.
Edge-based surveillance essential
Conventional surveillance systems rely on centralized processing, where camera footage is transmitted to a remote server or control center for analysis. While this model still works in some environments, it is increasingly falling short in data centers where real-time responses and high reliability are critical.
Edge-based surveillance offers an alternative. It allows cameras to perform analytics locally, on the device itself. Jackie Wu, Department Manager at VIVOTEK’s APAC Sales Department, said that demand for this model is growing in the data center sector.
"Edge processing enables real-time analysis at the camera level, reducing bandwidth use, improving stability, and minimizing cybersecurity risks,” Wu explained. By keeping video processing local, facilities are better equipped to respond to threats instantly, even during network disruptions.
Image quality, bandwidth efficiency, and cybersecurity
Wu noted that data center operators typically evaluate IP cameras using three core criteria. These factors are all interdependent and must be carefully balanced.
“Operators look for high-resolution imaging, efficient bandwidth use, and strong cybersecurity,” Wu said. To meet these needs, VIVOTEK offers AI-powered cameras integrated with its VORTEX cloud platform. This combination allows users to manage video footage while maintaining high data protection standards.
VIVOTEK also embeds intrusion prevention software into its hardware through partnerships with security software firms. “This ensures multi-layer protection, including threat detection and real-time damage control,” Wu added.
Advanced video analytics support smarter incident response
The usefulness of video surveillance in data centers has expanded with the advent of AI-based analytics. These help operators monitor movement in sensitive areas and detect anomalies in real time.
“Smart motion detection, intrusion alerts, and line crossing are widely used in data centers,” Wu said. He added that these capabilities are particularly effective for reinforcing access control policies and supporting rapid security responses.
Such analytics are now embedded at the edge, meaning cameras can act as both sensor and analyzer. When paired with access control and facility management platforms, these systems help automate alerts and reduce human error.
A regional lens: Challenges unique to Asia’s data centers
While surveillance technology is advancing, several challenges specific to Asia continue to affect how data center security systems are designed and implemented. Bibin KR, an independent consultant who advises data centers across the Asia-Pacific region, highlighted a few persistent issues.
“In many Asian countries, the biggest issue is lack of security awareness and training,” Bibin said. He pointed out that budget constraints often lead to facilities choosing vendors based on price rather than quality. This results in under-trained staff and subpar technology deployments.
Another issue is the fragmented regulatory environment. “Unlike Europe, where GDPR provides a clear framework, Asian countries have very different and often unclear rules,” Bibin said. Only Singapore, Japan, and China have relatively mature data protection laws. In most other countries, regulations are still evolving, which complicates compliance and system design.
Natural disasters are also a major factor. “Typhoons, earthquakes, and flash floods can lead to extended power outages,” Bibin said. “Without backup systems for access control and video surveillance, the entire facility becomes vulnerable.”
Space constraints and collocation increase physical risks
In many Asian cities, data centers are built in space-constrained urban areas. This often means operating within shared or collocated facilities, where perimeter-level security is harder to enforce.
“In Europe, data centers are typically located in designated industrial parks, which makes it easier to design perimeter security,” Bibin said. “But in cities like Mumbai or Jakarta, you have to share space. That makes it harder to control access effectively.”
To address this, Bibin recommends a layered security approach that includes access control at cabinet or rack level. “Cabinet-level security is still overlooked,” he noted. “But in shared environments, proper logging, electronic locks, and audit trails are critical to prevent unauthorized access.”
The insider threat remains a top concern
According to Bibin, insider threats are one of the most overlooked risks in data center security. These can stem from negligence, poor training, or malicious intent.
“Sometimes passwords are shared or someone is careless while using a terminal,” he said. “Employees might not understand the importance of basic protocols. That is why regular training is just as important as deploying technology.”
Wu emphasized that edge-based analytics can help here too. For example, cameras equipped with people tracking and tailgating detection can identify and report unusual movement patterns, allowing security teams to respond before an incident escalates.
Spoofing and deepfakes present emerging risks
As biometric authentication becomes more common, data centers are beginning to face new risks from spoofing and AI-generated deepfakes. “Many companies now use facial recognition or iris scanning,” Bibin said. “But bad actors can spoof these systems using AI.”
To mitigate such threats, Bibin recommends using multi-factor authentication, anti-spoofing technologies, and liveness detection. “Relying on a single form of authentication is not enough anymore,” he said.
Designing for resilience: Best practices for integrators
There is no universal formula for securing a data center, but certain best practices can guide integrators working in the region.
“First, you have to do a proper risk assessment,” Bibin said. Threats in India may differ significantly from those in Japan or Vietnam. A good assessment will consider not only cyber threats but also climate risks, geopolitical tensions, and local infrastructure limitations.
The next step is to design a layered security system, starting from the perimeter and moving inward to include surveillance, access control, cabinet-level security, and intrusion detection.
“Training is critical,” Bibin added. “Employees are the eyes and ears of the organization. If they are not trained, even the best system can fail.”
Vendor selection also plays a crucial role. “You need vendors who not only provide good technology but also have strong after-sales support,” Bibin said. “In one case, we had to wait 30 days for a critical part to arrive from overseas. That kind of delay is unacceptable in a data center.”
Integrated, edge-based systems are the future
Asia’s data centers are evolving rapidly, and their security systems must keep pace. Edge-based surveillance is emerging as a key enabler, offering faster response times, reduced bandwidth usage, and enhanced cybersecurity. But technology alone is not enough.
A successful security strategy must be multi-layered, localized, and supported by ongoing training and regulatory awareness. As Bibin put it, “Technology is a double-edged sword. What matters is how well we prepare our systems and our people.”
With the right mix of edge intelligence, system integration, and operational discipline, Asia’s data centers can build the resilient security foundation they need to support the region’s digital future