Because Hard Drives Shouldn’t Leave the Data Center

All it takes for sensitive information to be stolen is a thief walking out of a data center with a hard drive in their pocket.

Data centers are tasked with providing always available information services while securing against the ever present threat of both cyber-crime and physical theft. Unlike sophisticated cyber-attacks, physical data theft relies on more brute force approaches like exploiting weak security at entry control points often carried out by an employee.

The result of data theft can be disastrous to a company’s financial stability and, even worse, customer trust.

 

Is Your Data Center Secure from Physical Hacks?

A recent white paper from Anixta provides an overview of challenges faced by data centers and approaches to prevent physical theft. Good security practices against the physical theft of information at a data center is implemented across layers.

  1. Perimeter security
  2. Facility controls
  3. Computer-room controls
  4. Cabinet controls

Perimeter security is the first and last point of defense against a thief sneaking out a hard drive. The main goal of this layer is to provide deterrence, detect a threat early, and delay progress of the thief into or out of the facility. In order to accomplish these goals, all deployed security devices should be available over the network via standard IP-based Ethernet protocols. This includes sensors, surveillance cameras, locks, and man traps all connected to a centralized alarm system at a remote command and control center.

 

Intelligent Physical Security for Your Data Center

RONIN is the world’s first intelligent threat detection platform with the smarts to pinpoint the exact location of a hard drive – in a thief’s back pocket, in a shoe, a backpack, and even in a crowd. Way beyond just a metal detector, RONIN can identify the presence of a hard drive that matches the specific signature of a proprietary hard drive used in a data center.

ronin-ui-operator-mode-threat-monitor

Alerts provide contextual data for a threat event including real time camera footage, time stamp, direction of travel, the exact location of the threat item, and much more. The data of generated alerts is made available over standard IP-based Ethernet protocols providing interoperability to the connected command and control center.

RONIN sensors are very small and can be installed into doors, hallways, or other existing infrastructure to ensure that every entrance is secure. This provides the added benefit of covertly securing passageways so that people don’t even know they are being scanned as they pass through. Installations can be hidden within walls, columns, door-frames, pole fixtures, external concrete pillars, retro-fitted legacy detection systems or other existing security infrastructure.

It all comes at an unmatched cost-per scan with over three times the throughput rate of traditional metal detectors.

ronin-covert

 

 

Schedule a free demo of RONIN