Thwarting data theft

Issue 3 2021 Access Control & Identity Management

In computer centres and other areas where many people have access, identification, organisation and control are non-negotiable. The E-Line brand from Dirak GmbH, available from Astra Fasteners, offers various solutions for these purposes.

Special care must be taken to secure customer data in computer centres in shared facilities with high levels of data and people traffic, for example, colocation centres. In this situation, it is advisable to organise access to the different racks by time and person, and to document each access event or attempt to obtain access. To prevent unauthorised access, colocation providers can provide their customers with access control on the server rack level with an integrated automatic documentation function. These solutions can also be used for computer centres that are only used by one company to organise access in groups of employees to ensure the security of internal data and systems.



For controlled access and organised security, developers offer different infrastructure with centralised and distributed solutions. A distinction is generally made here between online and standalone systems. In an online system, the closing system is integrated into E-Line by Dirak software and is managed. All handles are connected with the system in real-time so that all events within the closing system related to time are sent directly to a central office. This overview in real-time, supported by suitable software, provides online information about closing states as well as access events of authorised persons.

Although seamless documentation cannot provide 100% physical security against data theft, it is possible to track who obtained access to a given server rack at what time. This makes it possible to prevent internal misuse of data.

Individual access authorisations

The access authorisations can be issued individually, for example, so that maintenance teams are given only reduced access to specific racks. Either a card or PIN can be used for this. This is useful, for example, if a maintenance team arrives, since it is more convenient to enable a PIN for a certain time period than to issue a card which must later be returned. It is also possible to disable access by time if processes such as updates, backups or other electronic data processing operations need to run unhindered. Different alarms can also be configured in the administration software suite. If the rack is broken open, a sabotage alarm is also triggered and a message is sent to the central software at the same time.

Physical security solutions

The relevant online solutions differ in the nature of the connection and infrastructure. The MLR3000 system, for example, is a bus system for a central architecture in which only one IP address is needed for up to 32 handles. In the MLR5000 system, on the other hand, each handle has its own IP address. Which product is selected for the relevant computer centre always depends on the customer’s individual requirements. Astra Fasteners discusses this in advance with its customers and also provides support for them after the system is installed. Many solutions can also be easily connected to third-party systems, for example, via potential-free contacts, a Wiegand interface or an API interface.

Another consideration in choosing the right solution is that unlike online systems, standalone systems are not networked and are instead configured by master cards and user cards.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Physical security evolving beyond security teams
ATG Digital Access Control & Identity Management
The landscape of physical security is undergoing a major shift. Traditionally, selecting access control and visitor management solutions fell squarely on the shoulders of security professionals, but today includes legal, IT, technical operations and more.

Read more...
A passwordless future?
Access Control & Identity Management
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals.

Read more...