By taking a multi-layered approach to physical security, facility operators can keep customer data secure while meeting business requirements and security best practices.
Data centers are the engine that drives the digital economy. Uninterrupted, continuous operation is critical to maintaining the services that an always-connected society relies on. Maintaining customer trust in the protection and availability of their data requires facility operators to offer the highest level of physical security. By taking a multi-layered approach to physical security, facility operators can keep customer data secure while meeting business requirements and security best practices.
Recognizing that different facilities face different security requirements, Senstar offers a wide range of video management, perimeter intrusion detection, access control, and video analytic solutions. Individually, they provide best-in-class protection; used in combination and managed under the Senstar Symphony Common Operating Platform, they form an integrated, multi-layered solution.
The Senstar Symphony Common Operating Platform with sensor fusion is a modular solution for video management, video analytics, security management, access control and data intelligence. Modules can be used individually, added when needed, or combined as a complete integrated solution. Highly cost-effective, Senstar Symphony is licensed per security device (camera, door, or sensor). All managed devices report to a shared rules and alarms management system, enabling operators to perform site security or operational functions from a “single pane of glass.”
Protecting the perimeter of a site is the first line of defense. Senstar perimeter intrusion detection systems (PIDS), including fence sensors, microwave sensors, and outdoor-optimized video analytics, provide early warning of unauthorized intrusions and offer organizations the following benefits:
• Reliable and effective detection (equip existing physical infrastructure like fences with edge-based intelligence)
• Integration with active deterrence devices (lights, sirens) and assessment devices (cameras, analytics, other sensors)
• Effectively respond to security events using critical information obtained from sensors and surveillance systems
• Low nuisance alarm rates via advanced technologies like sensor fusion and environmental noise rejection
Facility management and server/cabinet monitoring
Facility management encompasses many aspects related to the security, safety, and efficiency of the facility. By integrating the facility's electronic access control system with video surveillance and cabinet door latch monitoring, all activity related to the operation, maintenance and physical security of the servers can be monitored. For data centers, this means:
• Deploying systems that support multi-zone access, multi-factor authentication, and granular per-employee scheduling
• A common operating platform that enables the system to link access control events to individual security cameras, two-way intercom and on-screen door controls, simplifying situations that may require operator intervention.
The physical security of fiber optic links between the data center and the main network is a critical yet often overlooked part of overall security and operations. Damaged links can take a data center partially or entirely offline and cause massive service interruptions.
Senstar’s FiberPatrol fiber optic sensor can help prevent damage to communication cabling before it can occur by detecting and locating disturbances anywhere along its length. FiberPatrol detects third-party interference (TPI) to fiber optic data links over cable distances of up to 100 km or 62.1 mi. It requires just one optical fiber and supports the use of standard telecom-grade cable. Intrusions can be reported by cable distance, zones, or GPS coordinates, while classification abilities can indicate the nature of the intrusion, including the presence of heavy machinery, vehicle traffic, machine and human digging, and direct tampering of the cable conduit.
The sensor can also be used to verify the location of buried communications infrastructure and ensure redundant paths do not overlap or run-in close proximity to each other.
When it comes to data center security, each facility has its unique requirements. Implementing multi-layered security allows operators to protect valuable customer data and ensure businesses run smoothly.