Data centre security

March 2016 Access Control & Identity Management, Information Security

The protection of networks and data centres is a growing concern given the recent spate of high profile security breaches and it is forcing organisations into taking serious steps to improve protection. For many businesses, this means implementing a combination of passive and active security measures designed to deter, detect and react against threats.

Fernando Pires, VP sales and marketing, Morse Watchmans.
Fernando Pires, VP sales and marketing, Morse Watchmans.

Included in these measures are multiple layers and types of safeguards, including physical measures, such as video surveillance or mantraps, and established policies and procedures that limit physical access, such as the use of key management and access control systems.

In particular, key systems are designed to securely hold keys and automatically track key usage. To access a stored key, the authorised user simply enters his or her personal identification code on the keypad and when the system verifies the user, the door will open and the location of the requested key will light up. Key control systems can also be configured with card readers or biometric readers and can be networked for centralised control. At any time, security operations can view the status of any key in the system; determine who currently has which keys out and for what area and when they are scheduled to be returned; or determine who has had keys out, for what areas and when. Keys can be returned to any cabinet in the system, but if a key is not returned when scheduled, e-mail alerts and text messages can be sent to selected individuals to enable quick action.

These types of automated key management systems are ideal for use in a data centre facility because, in addition to the security they provide, they offer a variety of control and usage options. Following are a few ­scenarios that illustrate how implementation of these options can help ensure a more secure facility.

Specialised enrolment

This application entails enrolment of individuals based on their function. For example, an operations centre engineer can be authorised for 24/7 key access, whereas a technician may be restricted to accessing a particular key at certain times and for specific amounts of time. Similar access restrictions/permissions are easily programmed for personnel such as cleaning staff or security guards, who have reason to be on the premises but are not company employees. System administrators can quickly and easily terminate or revise individuals’ access in the event they leave their job or their shift is changed. Additionally, keys are securely attached to a fob, which prevents switching or duplicating keys.

Access control

To address security concerns in high-risk environments such as data centres, a Remote Box provides an additional layer of protection. The key control cabinet is installed in a secure room where it is protected from any potential vandalism or tampering, and the Remote Box is typically installed outside the secure room. Once an authorised employee inputs his PIN and other information into the Remote Box and it is validated, a second employee inside the secure room inputs her information as well, providing access to the key for which the first employee is authorised.

The versatility of the key control systems also lends itself to more complex applications in larger data centre environments, as when multiple pieces of identification are needed to move about the data centre. In this example, a general access badge would allow the employee entrance to the building and a second badge would be used to access internal areas of the data centre facility. To maintain tight security, the internal access badge would be secured in a key cabinet when not in use by the authorised employee.

Custom tailored configurations

Sophisticated key management allows for a wide range of configuration and installation options, including other items found in a data centre to which access also needs to be controlled. These might include radios, cellphones, handheld computers, specialised test equipment, etc. which are used by different personnel through the course of any given day and are expensive and represent potential security breaches if stolen or misplaced.

Additional modules for the system such as lockers can hold and control access to these devices, complete with an audit trail to record when they are removed and by whom. And, as access control systems continue to proliferate, the access devices themselves, such as magnetic cards or proximity devices, need to be secured in the same way as physical keys do. More advanced systems also accommodate these devices with specifically designed modules that can be used in any combination with standard key or locker modules.

Given that so much of an organisation’s assets and information are online and accessible, organisations must take a proactive approach to defending against these attacks. Today’s key control systems deliver ample testament to the benefits of reducing security threats with a well-implemented key management system.

For more information contact Morse Watchmans, +1 203 264 4949, morse@morsewatchman.com, www.morsewatchmans.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.