• About Us
  • Partnership Opportunities
  • Privacy Policy

Data Center Frontier

Charting the future of data centers and cloud computing.

  • Cloud
    • Hyperscale
  • Colo
    • Site Selection
    • Interconnection
  • Energy
    • Sustainability
  • Cooling
  • Technology
    • Internet of Things
    • AI & Machine Learning
    • Edge Computing
    • Virtual Reality
    • Autonomous Cars
    • 5G Wireless
    • Satellites
  • Design
    • Servers
    • Storage
    • Network
  • Voices
  • Podcast
  • White Papers
  • Resources
    • COVID-19
    • Events
    • Newsletter
    • Companies
    • Data Center 101
  • Jobs
You are here: Home / Cloud / Executive Roundtable: Is the Cloud More Secure Than the Enterprise?

Executive Roundtable: Is the Cloud More Secure Than the Enterprise?

By Rich Miller - June 18, 2018

Executive Roundtable: Is the Cloud More Secure Than the Enterprise?

LinkedinTwitterFacebookSubscribe
Mail

Welcome to our 11th Data Center Executive Roundtable, a quarterly feature showcasing the insights of thought leaders on the state of the data center industry, and where it is headed. In our First Quarter 2018 roundtable, we examine four topics: The security of cloud platforms and service provider facilities versus on-premises data centers, the pace of innovation in data center delivery and supply chain management, the impact of the GDPR and data center privacy regulation, and how the rise of the Internet of Things and edge computing will impact data center infrastructure.

Here’s a look at our distinguished panel:

  • Randy Rowland, President of Data Center Services at Cyxtera.
  • Dana Adams, Vice President and GM of Data Centers at Iron Mountain.
  • Joel Stone, Senior Vice President and Chief Operating Officer at RagingWire Data Centers.
  • Eric Ballard, Vice President, Network & Cloud at Stream Data Centers.
  • Samir Shah, Chief of Staff at BASELAYER

The conversation is moderated by Rich Miller, the founder and editor of Data Center Frontier. Each day this week we will present a Q&A with these executives on one of our key topics. We begin with a discussion about the security of cloud platforms and service provider facilities versus on-premises data centers.

Data Center Frontier: The long-predicted migration of enterprise IT workloads into third-party data centers appears to be gaining momentum. A key argument for keeping data and applications on-premises has been security. With the ongoing series of corporate data compromises, can service provider facilities – whether cloud or colocation – now make the case that they are more secure than the on-premises data center?

Dana Adams, Vice President and GM of Data Centers, Iron Mountain

Dana Adams, Vice President and GM of Data Centers, Iron Mountain

Dana Adams, Iron Mountain: We definitely see the migration of the corporate enterprise data center taking place with less and less resistance from internal stakeholders. This is partly driven by virtualization and the push to public and private cloud environments for increased cost efficiency, and partly driven by higher standards for security and compliance that are difficult to achieve in a sub-scale, on-premise legacy data center.

Just like data center operations, data center security and compliance are not typically the core competencies of the end user, whereas they are for a provider like Iron Mountain. A good data center services provider will ensure that physical security and compliance are woven into the design, construction and operations program for their data centers, and conduct regular monitoring through a combination of internal and external audits. Documentation and controls mapping should be standardized, which helps customer audits run smoothly. Our customers are often pleasantly surprised with how easy we have made their compliance certifications for them.

Samir Shah, VP of Product Management, BaseLayer

Samir Shah, BASELAYER: Service providers can offer a value proposition focused on security by addressing several key areas in their deployment models.

The first area to highlight is physical security. We’ve seen success working with service providers who deploy modular data centers to provide physical separation between customers. A layered approach allows for access based on individual needs. Note that the Department of Defense (DoD) has weighed in on physical security by creating a standard (ICD 705 Version 4.1) to help ensure robust infrastructure.

The second security focus area for a service provider is to leverage their diverse customer base to stay current on various security standards. As a result, best practices employed by large enterprises trickle down to mid/small customers who otherwise would not have access to these capabilities based on their lack of scale. Lastly, service providers should use analytics to capture anomalies which take place in their data center environments. As an example, we’ve seen service providers track changes in firmware code size to detect attacks on critical systems (generators, chillers, switchgear, etc.).

The clear trend for the industry is increased trust in moving highly sensitive workloads to shared environments. A great example of this took place earlier this year when the DoD moved classified data to Amazon’s cloud to centralize department data and systems. We believe this to be the first in many similar announcements from security focused end users.

Randy Rowland, President of Data Center Services at Cyxtera

Randy Rowland, President of Data Center Services at Cyxtera

Randy Rowland, Cyxtera: Data center security is of utmost importance. Colocation providers can absolutely make the case for enhanced security over on-premises data centers. But when it comes to security, picking the right colocation provider is about more than physical security certifications and compliance audits. There’s a much greater risk that bad actors will compromise your colocation facilities via its network.

To effectively defend against both physical and virtual threats, a holistic approach to IT infrastructure security is needed – one that is defined around users, their roles in the organization, and the resources they need to access to perform their job. By looking at your data center security holistically, ensuring your operations and cyber security team are working as one, you’ll be better placed to secure data against threats.

Eric Ballard, Vice President, Network & Cloud for Stream Data Centers,

Eric Ballard, Vice President, Network & Cloud for Stream Data Centers,

Eric Ballard, Stream Data Centers: Over the past couple of years, we no longer hear business suggesting that the decision for data center space is between building their own vs. colocation. The decisions now are all around colocation and cloud and what the future enterprise strategy looks like. We have seen companies move from a CapEx heavy model to an OpEx model. With this move, service providers have to prove that they are more secure and will provide the level of services that are required by the enterprise.

As a premier colocation provider, security is one of our core competencies and we are believers that companies should focus on their core competencies. We craft our internal policies and procedures and then validate them using multiple third-party auditors to achieve a multitude of certifications such as SOC2-Type2, PCI-DSS, HIPPA, ISO 27001, etc.

With a focus on physical security and a rigid enforcement and testing of security policy and procedure we can absolutely make the case that we are more secure.

JOEL STONE, RagingWIre

JOEL STONE, RagingWIre

Joel Stone, RagingWire: There are two kinds of data center security – cybersecurity, which protects the computer systems, applications, and data; and physical security, which prevents unauthorized access to or malicious actions in the data center facility. From a cyber perspective, the enterprises can implement the same cyber procedures and technologies in a colo facility that they can in an on-premises data center. So that’s a benefit. The physical security is typically a big improvement for an enterprise when they move to colo, as the colo facility will be able to leverage its scale and expertise to implement multi-layered, advanced security systems and officers as well as robust operational security processes.

At RagingWire, we typically have more points of security between the parking lot and server floor than what is required to access a TOP SECRET Sensitive Compartmented Information Facility (SCIF) in most U.S. government buildings. By hiring in-house, full-time, well-trained security guards who often have backgrounds in the military or law enforcement and outfitting them with sophisticated monitoring systems, every point in our facilities is watched diligently and attentively 24/7/365.

Our high-tech security barriers are in place at the perimeter of the site, with anti-ram barrier arms (that can stop a 15,000-pound truck traveling at 30 mph), anti-climb fences, badge access doors with code requirements, biometric readers, anti-tailgate access control turnstiles, high-def cameras that analyze suspicious behavior, and other devices we are constantly evaluating for their effectiveness in keeping our customers, employees, and equipment safe from harm.

NEXT UP: The pace of innovation in data center delivery and supply chain management.

Keep pace with the fact-moving world of data centers and cloud computing by following us on Twitter and Facebook, connecting with me on LinkedIn, and signing up for our weekly newspaper using the form below:

LinkedinTwitterFacebookSubscribe
Mail

Tagged With: BASELAYER, Cyxtera, Data Center Security, Iron Mountain, RagingWire Data Centers, Stream Data Centers

Newsletters

Stay informed: Get our weekly updates!

Are you a new reader? Follow Data Center Frontier on Twitter or Facebook.

About Rich Miller

I write about the places where the Internet lives, telling the story of data centers and the people who build them. I founded Data Center Knowledge, the data center industry's leading news site. Now I'm exploring the future of cloud computing at Data Center Frontier.

Comments

  1. jparker@esri.com'John Parker says

    June 26, 2018 at 5:05 pm

    Listening to the foxes talk about how cost efficient, good and safe their hen house is…… well what I would expect them to say

    Listening to end user owner operators opinions would be a worthwhile conversation

  • Facebook
  • Instagram
  • LinkedIn
  • Pinterest
  • Twitter

Voices of the Industry

Building an Enduring World Begins with Accountability and Defining an Approach for Long-term Success

Building an Enduring World Begins with Accountability and Defining an Approach for Long-term Success TJ Faze, Head of ESG Strategy and Engagement at Vertiv, outlines the company's learnings around its recent ESG efforts.

White Papers

data center health

Top 40 Data Center KPIs

A new white paper from Sunbird outlines 40 of the most critical data center KPIs that managers should monitor. The report covers KPIs from nine areas: capacity, cost, asset, change, space, power, efficiency, cooling, and connectivity.

Get this PDF emailed to you.

We always respect your privacy and we never sell or rent our list to third parties. By downloading this White Paper you are agreeing to our terms of service. You can opt out at any time.

DCF Spotlight

Data center modules on display at the recent Edge Congress conference in Austin, Texas. (Photo: Rich Miller)

Edge Computing is Poised to Remake the Data Center Landscape

Data center leaders are investing in edge computing and edge solutions and actively looking at new ways to deploy edge capacity to support evolving business and user requirements.

An aerial view of major facilities in Data Center Alley in Ashburn, Virginia. (Image: Loudoun County)

Northern Virginia Data Center Market: The Focal Point for Cloud Growth

The Northern Virginia data center market is seeing a surge in supply and an even bigger surge in demand. Data Center Frontier explores trends, stats and future expectations for the No. 1 data center market in the country.

See More Spotlight Features

Newsletters

Get the Latest News from Data Center Frontier

Job Listings

RSS Job Openings | Pkaza Critical Facilities Recruiting

  • MEP Coordinator - Data Center Construction - Ashburn, VA
  • Data Center Facility Engineer - Chantilly, VA
  • Data Center Site Operations VP - Seattle, WA
  • Senior Electrical Engineer - Data Center - Denver, CO
  • Senior Estimator - Data Center Construction - Denver, CO

See More Jobs

Data Center 101

Data Center 101: Mastering the Basics of the Data Center Industry

Data Center 101: Mastering the Basics of the Data Center Industry

Data Center Frontier, in partnership with Open Spectrum, brings our readers a series that provides an introductory guidebook to the ins and outs of the data center and colocation industry. Think power systems, cooling, solutions, data center contracts and more. The Data Center 101 Special Report series is directed to those new to the industry, or those of our readers who need to brush up on the basics.

  • Data Center Power
  • Data Center Cooling
  • Strategies for Data Center Location
  • Data Center Pricing Negotiating
  • Cloud Computing

See More Data center 101 Topics

About Us

Charting the future of data centers and cloud computing. We write about what’s next for the Internet, and the innovations that will take us there. We tell the story of the digital economy through the data center facilities that power cloud computing and the people who build them. Read more ...
  • Facebook
  • LinkedIn
  • Pinterest
  • Twitter

About Our Founder

Data Center Frontier is edited by Rich Miller, the data center industry’s most experienced journalist. For more than 20 years, Rich has profiled the key role played by data centers in the Internet revolution. Meet the DCF team.

TOPICS

  • 5G Wireless
  • Cloud
  • Colo
  • Connected Cars
  • Cooling
  • Cornerstone
  • Coronavirus
  • Design
  • Edge Computing
  • Energy
  • Executive Roundtable
  • Featured
  • Finance
  • Hyperscale
  • Interconnection
  • Internet of Things
  • Machine Learning
  • Network
  • Podcast
  • Servers
  • Site Selection
  • Social Business
  • Special Reports
  • Storage
  • Sustainability
  • Videos
  • Virtual Reality
  • Voices of the Industry
  • Webinar
  • White Paper

Copyright Endeavor Business Media© 2022