A Logical Approach to Physical Data Center Protection

Data centers offer numerous security challenges. From initial risk assessment to implementing solutions to ongoing maintenance, find out how to cover all the bases to effectively keep these critical areas out of harm’s way.

Create a Security Program<p>Determining what is needed to secure a data center requires upfront work and forethought. Work with your system user to perform a thorough risk assessment. This will guide the physical and logical security design. illustration ©istockphoto.com/alexs</p>

It is important to create and deploy a security program that will meet your campus’ unique needs. Systems integrators can offer assistance on how to define policies and procedures and deploy them. Examine different deterrent security and detection measures, and  choose the ones that best fit your campus culture and needs.

Do you need security guards? How many? What will be the responsibilities of the security guard? Will they work round the clock or are two shifts sufficient? Answering these questions upfront will help accurately budget for security personnel.

Define the system to be used while establishing a criteria list to design for each specific site. It’s the task of the security designer to match the environment and application to the design criteria to come up with the best security layout. Don’t underestimate this! This is the cornerstone of the system.

Consider the criticality of security to business operations. What are the implications if the system fails? Fault tolerance or redundancy may be needed to avert a risk. Investigate the best solutions for your campus and be sure they integrate with the access control system. Do the work upfront to ensure system failure does not occur, and if it does, the camus fault tolerant solution will take care of it.

Review every aspect of security, even the far-out, exceptional situations. It’s those cases the bad guys will discover and exploit.

Optimize, Train and Maintain

Choose a security management solution with more flexibility and growth potential than you think you will need. A high-end system with a small number of doors often costs the same or only a little more than a system that will soon be outgrown or outdated. Avoid ripping out a cheaper system because you missed one additional feature you realized you needed.

Any system is only as good as its weakest link, which is usually not the technology or design, but how the technology is used and how consistently it’s used. Review all system features and teach campus stakeholders about them. In the end, it’s up to them whether or not they implement the features and receive the benefits; however, they can always grow into their system. Encourage your campus stakeholders to work in phases so as not to be overwhelmed, and assist them through each phase to be sure they are maximizing their investment.

If you appreciated this article and want to receive more valuable industry content like this, click here to sign up for our FREE digital newsletters!

Leading in Turbulent Times: Effective Campus Public Safety Leadership for the 21st Century

This new webcast will discuss how campus public safety leaders can effectively incorporate Clery Act, Title IX, customer service, “helicopter” parents, emergency notification, town-gown relationships, brand management, Greek Life, student recruitment, faculty, and more into their roles and develop the necessary skills to successfully lead their departments. Register today to attend this free webcast!

Get Our Newsletters
Campus Safety Conference promo