Recognize that the last line of defense in physical security between data processing and storage equipment and access by unauthorized users is a secure server cabinet. A new report from Chatsworth Products explores the potential of cabinet-level electronic access control to improve physical data security.
Search Results for: security
The importance of physical security for protecting data is generally well understood, but how often does your organization assess the level of physical security for protecting data? Download the new white paper by Chatsworth Products, which presents an overview of data security regulations and compliance requirements, makes an argument for extending physical security to the rack level and recommends the use of electronic locking and access control systems at the rack level.
After the early days of cloud computing, IT teams quickly turned to multi-cloud solutions that promised to meet multiple business needs, but multi-cloud solutions aren’t without their own challenges. The new report from Digital Realty explores a computing solution that tackles some of these challenges and connects private infrastructure over a dedicated connection accessing public cloud resources while bypassing the internet.
Although the commercial and operational advantages of hybrid IT are compelling, for financial services and healthcare organizations as well as enterprises that market their services to the government sector, security and regulatory compliance are non-negotiable. Mark Houpt, Chief Information Security Officer at DataBank, takes a look at key security and compliance factors when adopting a hybrid IT strategy for your business.
DCF’s Voices of the Industry columns provide expert insights from industry leaders. Here’s a look at the Top 10 Voices columns of 2018 focused on trends like renewable energy, IT security, and data center construction.
IT security will once again be a key issue in the data center industry in 2019, according to the four thought leaders in the DCF Executive Roundtable.
The detect-and-respond security model requires organizations to build capabilities from the lowest levels and deploy solutions that can distribute the detection, obfuscation and isolation throughout their networks. This approach applies to sensors and IoT devices, controllers in connected equipment, and at all gateway and bridge points to expand the ability to monitor their equipment and network in real-time.
The term cybersecurity is commonly associated with the protection of digital data from theft or compromise by hackers. For enterprise customers, however, most data breaches aren’t the result of technology villains inventing new ways to do damage. Download the new white paper from Stream Data Centers that explores how the roles of compliance and physical access ensure virtual security for the enterprise.
This is the third post in a four-part series from Cyxtera that explores crucial elements to consider before choosing a colocation provider. This post focuses on ensuring your colocation provider is prepared to provide physical and virtual security for your data center.
In this edition of Voices of the Industry, Stewart Collier, Managing Director, Critical Environments, at Stream Data Centers, explains why it is time to recognize cybersecurity involves more than just technology, and how the roles of compliance and physical access ensure virtual security for the enterprise.