Access Control Systems (ZuKo)

We use multiple levels of security in data centers today to secure the facilities. We proceed according to a graded zone concept. 

gray-box

First Layers of Protection

The first zone forms the outer ring. The site is protected by a security fence and the entrances and exits are monitored by a camera system. Access to the building is only possible for security personnel, so there is a mandatory screening of all persons who want to enter the building. This area is continuously monitored around the clock by a camera that stores the data for 90 days and feeds the images directly into the security center. In principle, the security counter must also be manned around the clock.

Anyone wishing to enter the building must first register so that security personnel are informed in advance and can then verify the registration. If the person is an employee of a customer of the data center, the next step is a check against the customer's official personnel list. The list should never be older than 30 days and should be updated immediately when there is a change in personnel.

The second security zone is between the security desk and the actual data center area. These access routes within the building, as well as commonly used spaces such as conference rooms, kitchens and restrooms, require surveillance to prevent unauthorized access. A connection between camera and door access system or motion-controlled cameras are now standard for these areas. As a rule, alarms are raised in the security center if a door is not closed within a predefined period of time.

Full Protection

The third zone is the high-security zone, in which the areas for the IT systems and the system-critical systems of the data center operator are located. The highest security requirements apply in this zone. The doors should always be secured with cameras and a second protective measure such as access control systems or locks. To keep things running smoothly and to make sure everything is up to date, data center access control systems should be regularly checked and maintained.

The ideal protection is a multi-level security concept that includes various monitoring methods and a combination of mechanical and electronic security systems. The individual procedures used for this can vary and reflect different security standards in different areas. For example, the use of biometric access controls (fingerprint or iris scan), access locks or person isolation systems. Two-factor authentication ensures even higher access protection. At the same time, compliance with the new General Data Protection Regulation ensures that data protection for this sensitive data is also guaranteed.

Advantage of High Knowledge

We develop security solutions that address all of these requirements. Do you have questions about our security solutions or need individual advice? Feel free to contact us for a consultation.

Contact us!
gold-outline

Advantage of High Knowledge

High Knowledge experts know the latest trends and developments in the industry. We have been successfully planning and implementing data centers of all sizes for over 20 years. With us you get the professional advice you need to be able to operate your data center safely and reliably. Feel free to contact us for a consultation.

Contact us!
gold-box
gold-outline