BT makes the right call on security

Access & Identity Management Handbook 2014 Access Control & Identity Management

Management systems from Traka are being used by BT to track keys at its £90m flagship international data centre in Cardiff Bay, Wales.

Operations at the centre are supported by stringent security measures which ensure access to and within the building is controlled and restricted to authorised personnel whose use of site keys can be seen with a clear audit trail capability.

Occupied by 250 staff who manage the diverse requirements of BT’s hosting and managed service customers worldwide, the international data centre is a 5570 square metre facility on three floors with many areas which only authorised personnel can access.

Philip Richards of BT Security said: “There is no doubt as to the extensive demand for Internet-related services such as Web and content hosting, Web design and data management across homes and businesses on a global basis.

“The BT international data centre in Cardiff stands as a hub of creativity and development. It has a multi-layer security mechanism, both physical and logical, enabling us to provide the extremely high levels of security demanded by many of our customers.

“Every element of the security is critical, but perhaps the most resource-heavy is key management. We have invested in the most sophisticated, Internet- enabled biometric scanning system possible, but essentially, if keys go missing the security is swiftly breached. Traka was a critical component to protect the key systems in place and maintain overall security on site.”

Traditionally, keys had been stored in a key box and managed manually through use of a logbook. But management access to crucial IT equipment can be a time-intensive process with exposure to possible security breaches through lost keys or unauthorised staff mistakenly gaining access. The system needed to be optimised.

Traka’s solution means all keys on site are permanently attached (using a tamper-proof security seal) to a metal iFob so as to effectively electronically tag the keys with unique identities.

The iFob, with keys attached, locks into a receptor strip within a key cabinet until released by an authorised user via a fully automated and audited process. Traka cabinets, as installed at this location are run with software and can be networked across numerous locations on sites while being managed by one central administrator.

Since installing the Traka system, BT has seen vast improvement in its access management. Not only is there less misplacement of keys but the time spent managing the process has been greatly reduced and the overall security of equipment improved due to the automated authorisation system. Personnel simply cannot access areas or use technology if they are not authorised to do so. A further benefit is that user profiles uploaded to the Traka system contain training details for all staff. This alerts managers when machine licences need to be renewed and staff re-trained, so avoiding time-intensive manual tracking of staff qualifications.

Paul Mazaher, major accounts sales manager at Traka said: “As data becomes more business-critical for BT customers and for the company itself, the need for failsafe secure data centres to create and deliver new IT solutions is vital.”

He continued: “Even when it came to security systems, BT Cardiff looked for inspirational technology and Traka systems has been an integral part of the security infrastructure for over a decade. The benefit to BT is the significant cost and efficiency savings for the security team, as every key and electronic card is accounted for at all times even without the team being on site.”

For more information contact Traka, +44 1234 712345, [email protected], www.traka.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Physical security evolving beyond security teams
ATG Digital Access Control & Identity Management
The landscape of physical security is undergoing a major shift. Traditionally, selecting access control and visitor management solutions fell squarely on the shoulders of security professionals, but today includes legal, IT, technical operations and more.

Read more...
A passwordless future?
Access Control & Identity Management
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals.

Read more...