Access controlled data centre

Access & Identity Management Handbook 2017 Editor's Choice, Access Control & Identity Management, Integrated Solutions, Products & Solutions

Cogent Communications was planning to open its 18th data centre in Europe when a unique opportunity emerged near Amsterdam: a large data centre had moved to a new location. That made property available that already contained the necessary security and technical infrastructure and only needed to be upgraded to the latest technology.

In terms of construction and security technology, the location met the high standards set by Cogent. Its strategic position close to the capital and its proximity to a large international airport proved to be deciding factors. After considering potential alternatives, an easy decision was made to select this location and the property was acquired.

The next step was to prepare the premises and ensure it was operational as soon as possible. A considerable part of the technical infrastructure was already in place and what was lacking was added, alongside Cogent’s own systems that had to be installed and organised.

“We were excited as a company to officially open the data centre to our customers as soon as possible. Fortunately, we already had a business relationship with Tyco in the United States. Through this connection, we were able to quickly make contact with the Dutch account manager and the team was able to complete the project within just three months,” explained Richard Rademaker, director of data centre operations for Cogent.

The solution

Cogent is a multinational Internet service provider that prides itself on offering the best value in the market to its customers while setting very high standards for network performance.

Cogent strives to create a very high degree of standardisation in its data centres to simplify maintenance and management: one of the biggest cost items in the sector. That is why Cogent turned to Tyco for the integral physical security solutions as they have been responsible for the security systems in all of Cogent’s data centres in the United States.

Before a detailed plan could be formulated, an extensive inventory of the existing security measures was carried out. For days, a team of specialists meticulously studied the resources already installed, ascertaining their specifications and assessing whether they could be used in the new security plan.

Based on this survey, Tyco consultants developed a plan of action to deploy an integrated solution using the existing fire alarm system alongside new intercom, video surveillance systems, intruder detection and an access control system using card readers.

Flexibility delivers advantages

By taking a flexible approach, the existing cables and as many components as possible were retained in the new system, resulting in significant cost savings and a lower total cost of ownership. The extensive knowledge, experience and flexibility of Tyco’s consultants ensured that the security plan met the strictest modern requirements and was installed as quickly as possible.

The company chose to deploy access control using C•CURE 9000 from Software House. With this centralised enterprise solution, the access control is fully managed from Cogent’s Network Operations Centres (NOC) in Washington DC in the USA, Frankfurt in Germany and Madrid in Spain. The high degree of standardisation that Cogent strives for with its security access systems also has its advantages here; simplifying the process of providing access privileges to employees so that it is fast and efficient to manage. With standardised systems and processes across data centres in Amsterdam, London, Frankfurt and throughout the United States, the system is highly streamlined and can be operated easily and quickly.

Physical security constitutes an increasingly important aspect of data centre operations. After all, the economic value of data increases as additional applications are developed.

No one stops to think that every smartphone app or every photo that is backed up in the cloud is found somewhere in the world on actual physical servers and storage that are connected via thousands of kilometres of cable. Cogent Communications and Tyco’s partnership helps to safeguard these files, ensuring they are stored safely and easily accessible whenever they are needed.

For more information contact Tyco Security Products, +27 (0)82 566 5274, emallett@tycoint.com, www.tycosecurityproducts.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
Recording 40 high-resolution channels
Dallmeier Electronic Southern Africa Surveillance Products & Solutions
With the new MK4 revision of the DMS 2400, Dallmeier introduces a more powerful version of its video appliance, enabling the recording of up to 40 high-resolution video streams, and offering significantly increased capacity.

Read more...
Short-range indoor LiDAR sensor
OPTEX Perimeter Security, Alarms & Intruder Detection Infrastructure Products & Solutions
The REDSCAN Lite RLS-1010L has been developed to provide comprehensive coverage and protect high-risk security zones and vulnerable, narrow indoor spaces that are difficult to protect with traditional sensors.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
ArxTech: Over 30 years of evolving security solutions for South Africa’s toughest challenges
Security Services & Risk Management Integrated Solutions
[Sponsored] For over 30 years, a Centurion-based company has helped shape how security technology is designed, deployed, and supported in South Africa. Originally known as CellSecure, it now operates as ArxTech.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.