There’s word seemingly every day about a security breach somewhere in the world. Some companies, like Conde Nast, are abandoning the world of the data center for cloud technology to store and protect their information. Is it too soon to say the data center concept is on it’s last legs? Not according to a recent article in Network World. The story suggested that companies look at becoming more adaptable and flexible – disciplines they require from their IT staff – in how they utilize their data centers.
Planning for the future
Business executives always plan for the future. If they can’t visualize what the next year holds for their operation, they are likely in trouble from the outset. The Conde Nast example – a predominantly print content provider – is, perhaps, best served in the cloud. However, virtually any other commercial sector can use the cloud for growth but still need a top-notch data center to run their platforms, applications and day-to-day operations, said Network World.
The cloud doesn’t “do it all”
ZDNet recently asked some IT professionals if the cloud can operate all of the applications needed to run a business. Ninety-two percent of the respondents didn’t think so. Paul Collins is with the Australian International School/Hong Kong and explained security flaws are a big problem.
“There is no such thing as an entirely infallible online cloud service… Let’s not even start talking about the NSA,” said Collins.
Biometric technology thwarts malicious activity
When considering whether to move to the cloud, company executives should explore how effective biometric access control is in protecting the data center. Using fingerprint scanners to capture an employee’s unique biological aspects allows security teams to know who is allowed into a data center and it almost completely eliminates the chance for another person to “piggy-back” through with the approved worker.
How it works
To deploy fingerprint access control, fingerprint scanners are installed at the physical entrance of the data center and at other, vital access points. An employee scans their fingerprint into the system where various points of the print are archived and made into a template for that person. When the worker wants to access the data center, they place their finger on a fingerprint reader. If the print matches the data collected by the system they are passed through into the facility. If it doesn’t match that person will be stopped at the access way. James Alexander of Info-Tech told online industry magazine, Processor, there are some risks but also significant rewards with biometric technology.
The main benefit,” said Alexander, “is convenience for end users. In this era of a million different passwords, the one thing you can’t forget is your finger. So it not only simplifies things for end users, it also alleviates support calls. In general, almost 50% of calls to corporate help desks are password resets, so that can equate to a big savings.”
For companies who are considering utilizing biometric access control for their operations, Alexander had some suggestions about how and where to use the technology.
“You should also consider biometrics for both physical premises access and for workstation login. Of course you need to balance any potential gains with the cost of implementing biometric technologies. If there is no type of built-in capability, you will need to add biometric devices to existing equipment,” explained Alexander.
Biometric security can also employ items such as mantraps as a secondary access limiter but the fingerprint scanning protection is a cutting-edge way to lock down the physical side of the data center to prevent incursions, prevent damage to server cabinets and thwart anyone with theft, vandalism or other criminal activity in mind.
Find out how RSA was able to achieve uniform access control with Digitus by downloading our whitepaper here.