Exhibitor Press Release

Subpage Hero

Subpage Hero

Use the featured image to change the subpage hero.

Physical Perimeter Security: Strategies for Data Centre Protection

Physical Perimeter Security: Strategies for Data Centre Protection
MicroPoint™ II pinpoints intrusion attempts to within 3 metres, simplifying incident detection and assessment for long data centre perimeters.

As cyber security threats escalate in complexity and as global privacy regulations expand, businesses are under significant pressure to ensure the protection of data and as importantly, the infrastructure that supports reliable housing and storage of this digital information. While there is much attention dedicated to securing the network perimeter, of equal importance is a focus on fortification of the physical perimeter of a data centre, given that this is the first line of defense against unauthorized site access. A comprehensive data centre security framework must pair cyber security and physical security to successfully mitigate risk to these critical assets.

Protecting the Outer Perimeter

Physical perimeter security aims to Deter, Detect and Delay an unauthorized intruder so that security personnel have sufficient time to Assess and Respond to an attack with appropriate protocols. In a data centre environment, crash-rated or anti-scale fencing, strategically installed to physically prevent entry by bad actors serves as an appropriate deterrent and delay mechanism. But even with these barriers in place, fortifying the perimeter against unauthorized access calls for multiple detection technologies, or layering, to provide an additional level of protection against breach. The incorporation of a fence-mounted sensor to detect cut-or-climb attempts, coupled with CCTV cameras for visual assessment capability and tracking of intruder movement, enables security personnel to take immediate, defensive action before an intruder has the opportunity to reach the protected asset.

While any fence detection sensor is designed to alarm on an attempt to scale or penetrate fence fabric, several performance metrics separate today’s ‘intelligent’ sensors from more traditional technologies.

“In evaluating a fence detection solution for a data centre environment, a system’s ability to discriminate between intrusion attacks and environmental disturbances is of utmost importance,” explains Maira Zanrosso, Director of Sales and Marketing for Arizona-based perimeter security systems producer Southwest Microwave.

High nuisance alarm rates can desensitize system operators, which in turn can increase risk of breach.

To address this challenge, Southwest Microwave developed the INTREPID MicroPoint II fence detection system, an advanced smart sensor currently in use at data centres worldwide that identifies intrusion attempts to within 3m and seamlessly integrates with camera presets to provide precise, immediate assessment of disturbances. MicroPoint II employs a proprietary Sensitivity Leveling™ process that enables the system to optimize detection sensitivity in 1 meter increments or ‘cells’ along the cable by accounting for variations in fence fabric or tension. This provides data centre clients, typically relying on fences that span extensive perimeters, with uniform detection across the entire protected fence line.

To filter out the environmental disturbances that typically trigger nuisance alarms in traditional fence sensors, MicroPoint II has the unique ability to differentiate between ‘Point Impacts’ - legitimate intrusion attempts that affect a small number of cells - and ‘Distributed Disturbances’ - such as strong wind, heavy rain or vibration from vehicles, trains or aircraft - which affect a longer linear distance. Where harsh climatic conditions are an issue, nuisance alarm reduction capabilities become key.

“We recommend that Users verify that any fence sensor they are considering offers advanced calibration capabilities and configuration settings to successfully filter out harmless environmental activity without the need for weather stations or other sensitivity-reduction tools that sacrifice detection performance,” says Zanrosso.

Maximizing Detection Probability and Adaptability

Just as nuisance alarm prevention must be top of mind, so must be achieving the highest probability of detection, given the significant ramifications of data compromise.

Zanrosso stresses that is critical for the User to take the time to consult with their Provider partner to ensure that adequate testing has been done to ensure good compatibility between the fence detection system being considered and the fencing on which it will be deployed.

“Rigid, crash-rated, anti-scale fencing typically deployed in data centre environments handles vibrations differently than a more flexible chain link or welded mesh material. As such, a sensor will register a climbing intruder attack completely differently,” she says.

The goal is to ensure that the fence detection system being evaluated can successfully identify these attacks, regardless of fence characteristics. This may mean using a different mounting configuration on a rigid fence versus one made of steel mesh.

For data centre clients, Zanrosso also urges that attention be paid to a detection system’s ability to adapt to changes in a site’s perimeter configuration. She recommends choosing an intelligent sensor with modular design, software-based detection zone assignment and seamless integration with a User’s alarm monitoring and control system to simplify system reconfiguration or the addition of new hardware if fencing must be moved or extended to accommodate facility growth.

Protecting Critical Inner Elements

Because servers and critical systems are vulnerable to attack from both unauthorized intruders and internal personnel, Zanrosso explains that the concept of layering should also be applied to a data centre’s critical inner elements. Along with 24/7 audited door access control and local and remote surveillance, installing fence detection systems on server room wire mesh panels and colocation cage access doors, walls and flooring adds reinforcement to these vulnerable entry points.

Since data centres are expected to deliver uninterrupted service, access to redundant network, cooling and power systems should also be well-controlled not only with network protection, but with physical safeguards. Zanrosso suggests that Users work with Provider partners to conduct performance trials on proposed sensors to validate that they can successfully filter out the distributed vibrations caused by generators or other systems that can trigger nuisance alarms.

Zanrosso also stresses the importance of selecting a sensor that offers authorized individuals the ability to easily disarm portions of the cable temporarily in system software to accommodate routine building or server maintenance.

 

Key Implementation Considerations

 

Along with the critical considerations outlined for evaluating Provider partners, Zanrosso reinforces the importance of appointing Systems Integrator partners with proven experience deploying the selected physical security technologies to ensure a seamless implementation. She encourages Users to verify that these partners possess the relevant technical certifications for any perimeter security solutions they are installing in the data centre environment to assure smooth and timely implementation, reduce rework requirements and optimize system performance.

“Successful physical perimeter protection for data centres combines intelligent technologies that address industry security specifications while also considering a User’s unique risk profile and site characteristics,” Zanrosso explains.

 

“We suggest that Users carefully identify solutions and partners based on their ability to help achieve a fortified physical perimeter that complements and enhances their network perimeter protection strategy, and that best protects against financial and reputational risks”.

 

 

Loading

Sponsors

Diamond Sponsors

  • Mitsubishi HI

 

Keynote Theatre Sponsor

  • Siemens

 

Platinum Sponsors

  • Huawei
  • Anixter
  • Eaton
  • Schneider Electric
  • Threatlocker

 

Gold Sponsors

  • Rolls-Royce
  • Beijing Huahuan
  • Carlo
  • Kaori
  • Anord Mardix
  • Excool
  • Innio Jenbacher

Gold Sponsors

  • Rahi
  • RED
  • Rotarex
  • Power Partners
  • R&M

Gold Sponsors

  • Saft
  • SterlingWilson
  • Stulz

Gold sponsor

  • Geroge Fischer Piping Systems
  • GSM Pte Ltd
  • Honeywell
  • Janitza electronics GmbH

Silver Sponsors

  • Hilti
  • ADC
  • Weiss
  • Armstrong
  • CE-Test
  • Chubb
  • Clever

Silver Sponsors

  • Eetarp
  • Honeywell
  • EP Engineering
  • CHINT GLOBAL
  • Convergint

Silver Sponsors

  • EbmPapst
  • KSTAR
  • Nitto
  • Ning Research
  • Procore

 

Silver Sponsors

  • Hitachi Energy
  • IXTechnology
  • YiKe
  • S.H. STAINLESS STEEL CONTRACTOR PTE LTD
  • Suzhou A-Rack Information Technology

 

Silver sponsor

  • B&D
  • Submer | Datacenters that make sense
  • Sumitomo Electric Industries
  • Sunbird Software
  • Syntax
  • WeiChai Singapore Pte Ltd

 

Silver sponsor

  • Nalco Water, an Ecolab Company
  • PAESSLER AG
  • Smardt
  • Socomec
  • Solar Turbines, A Caterpillar Company

 

Silver sponsor

  • KOHLER
  • TÜViT

 

Bronze Sponsors

  • XDK
  • Aggrekko
  • CasSystems
  • FNTSoftware
  • Gigabyte
  • CommScope
  • Reflex

Bronze Sponsors

  • Tamura
  • Exide Technologies
  • Baltimore Aircoil
  • Gigalight
  • Fuel Chief
  • Infinite
  • JenbacherInnio
  • Scolmore

Bronze Sponsors

  • Fourway Engineering
  • Motadata
  • nVent
  • Reconext
  • Unitest

Bronze sponsors

  • Austin Hughes Electronics Ltd
  • Beijing Top Electric Co. Ltd
  • Blueleaf Energy
  • Brucha Gmbh
  • DANFOSS

 

Bronze sponsors

  • Camfil
  • Canatec
  • CE-TEST & MEASUREMENT
  • Clever Electronic Co Ltd
  • Crestchic

 

Bronze sponsors

  • Deston
  • Yeeka
  • Vertiv
  • Vycon
  • DBS Cooling

 

Bronze Sponsors

  • DFUN(ZHU HAI) Co Ltd
  • JAEGGI Hybridtechnologie AG
  • Sightes Technology

 

LDC sponsors

  • Sitoca
  • Kohler Power
  • Janitza
  • TTK
  • Convergint
  • CommScope

 

LDC Sponsors

  • Open Computing
  • Roxtec
  • Hoppecke Asia Pacific
  • Johnson Controls (S) Pte Ltd
  • Schneider

 

Exhibitors

  • Vass
  • Data Terminator
  • Bricomp
  • Mitsubishi Electric
  • Onion Technology
  • Southwest Microwave
  • AREA31
  • EOS

 

Exhibitors

  • WASP
  • Johnson Controls (S) Pte Ltd
  • Legrand
  • MicroCare
  • Scolmore Group
  • TNS Asia Pacific

 

Partners

Knowledge Partner

  • Frost-&-Sullivan_blu-bkgd-print-jpg

 

News Distribution Partner

  • ACN Newswire

Global Event Partner

  • Data-Centre-Alliance-jpg

 

Associate Content Partner

  • Uptime Institute

 

Strategic SEO Partner

  • AdVantage

 

Strategic Event Partner

  • ISC2
  • Frost & Sullivan

 

Event Partners

  • AiSP
  • ARC Advisory
  • Asia Cloud Computing Association (ACCA)
  • Asosiasi Cloud Computing Indonesia
  • Fintech Association of Hong Kong
  • ISACA Singapore
  • GS1

 

Event Partners

  • Best Practice of eCommerce
  • BigDataX
  • CMO Council
  • CSCIS
  • Singapore Chamber of E-Commerce
  • La French Tech
  • CHIME


 

Event Partners

  • Practical DevSecOps
  • Digital Advertising Association Thailand (DAAT)
  • DevOps Institute
  • Forrester
  • European Data Center Association
  • Smart Asia India



 

Event Partners

  • IASA
  • IPI Singapore
  • itSMF
  • Michael Page
  • IFMA Singapore
  • Plug And Play




 

Event Partners

  • KinerjaBisa
  • Logistics & Supply Chain Management Society
  • NexChange
  • SG Tech
  • Open Connectivity Foundation
  • ASME





 

Event Partners

  • Singapore Cyber Security Consortium (SGCSC)
  • General Assembly
  • Accelerating Asia
  • Structure Research
  • Co Creation Lab






 

Media Partners

  • ACN Newswire
  • APAC CIO Outlook
  • APAC CIO Outlook
  • APSM ASEAN
  • APSM ASEAN
  • Asia Blockchain Review
  • Asia Blockchain Review
  • Asia Research News
  • AI Time Journal








 

Media Partners

  • Australian Cybersecurity Magazine
  • Australian Security Magazine
  • SearchCIO
  • Asia Content News









 

Media Partners

  • CryptoNewsZ
  • CIO Advisor APAC
  • Cross Border Magazine
  • ComputerWeekly.com
  • CMO Asia
  • Data Centre Magazine
  • DC Byte










 

Media Partners

  • Data Storage  ASEAN
  • e27
  • Cyber Security ASEAN
  • Fintech Finance
  • Cybersec Asia











 

Media Partners

  • Jumpstart Media
  • My Security Media
  • Retail CIO Outlook
  • Digicon Asia
  • Intelligent Data Centres












 

Media Partners

  • Supply Chain Brain
  • Techwire Asia
  • Techtarget
  • FutureCFO













 

Media Partners

  • FutureCIO
  • Frontier Enterprise – Jicara Media
  • Marketing Ops
  • Future IoT
  • Payment & Cards Network
  • Chief IT














 

Media Partners

  • Telecom Era
  • Wire 19
  • 计算机网络世界
  • Disruptive Tech Asean
  • GovTech SEA
  • Enterprise Security Magazine













 

Official Partner Hotel

  • MBS







 

Held In

  • SG







 

Supported By

  • SG







 

  • MHI
  • ebmPAPst
  • Eaton
  • Submer - till 13 Oct 2022 ONLY
  • Anixter