How access control can address data centre security

Streamlining access while also giving private, valuable data the security it needs: This is the balancing act which every data centre manager faces. The answer could be simpler than they think: Choosing the right electronic access control solution, integrating it and maintaining flexibility for every data centre user, visitor, customer and temporary contractor.

A breach in data security can cause severe financial damage. According to IBM’s latest “Cost of a Data Breach Report”, the average is $4.24 million (€4 million), a figure which has grown by 10% since 2020. Among European countries studied, the report finds the highest average cost in Germany: $4.89 million (€4.62 million) per breach. Healthcare is the sector where breaches are costliest, also according to the report.

For a data centre which provides co-location or managed cloud hosting services, the damage to reputation and trust could be catastrophic. Investments in these sites are often at a huge scale: The total investment at one data centre campus in London’s Docklands is expected to total £1 billion (€1.18 billion) by 2025. In other words, there is a lot at risk.

Enhanced cybersecurity is one obvious countermeasure, for both in-house enterprise centres and third-party facilities. However, compromising the physical security of servers is another route to many breaches — among the top 5 sources of initial attack, according to the IBM report.

How then can businesses avoid taking unnecessary, potentially expensive risks with servers and data? Well-chosen and correctly configured access control is part of the answer.

The importance of 3-layer access control

According to the UK’s Centre for the Protection of National Infrastructure: “Data centre operators should be able to demonstrate they have used a risk-based layered approach to security”.

“The ideal access control solution for a data centre usually demands three levels of security working together within an integrated system,” explains Lars Angelin, Aperio Business Development Manager at ASSA ABLOY Opening Solutions EMEIA.

On the outer level, perimeter security ensures only authorized personnel enter the building. Here, high-security door and gate locks can work alongside the likes of CCTV and monitored fencing. This is the first line of defence against every physical security breach.

Level 2 — room access — can be monitored and controlled with a range of access control door devices or electronic security locks. These enable monitored and filtered movement around the centre, balancing convenience and security.

The access control system should handle fine-grained access to separate rooms by user, security level or time of day or week. It must be simple for administrators to issue temporary access via a card credential or Mobile Key. Any lost credential must be cancelled easily, with a few clicks in the system software.

The third, final level of physical data security is the server rack or cabinet itself. Server rooms get a steady flow of authorized traffic: cleaners, maintenance staff and technicians, for example. Employee screening cannot be perfect — and accidents happen. Rack or cabinet locking is the last line of defence against a physical breach, malicious or accidental.

For more news updates, check out our June issue here.

Media contact 

Rebecca Morpeth Spayne, 

Editor, Security Portfolio 

Tel: +44 (0) 1622 823 922

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Big Interview Abdullah Tanoli

Big Interview – Hero of Leicester Square

Rebecca Spayne of Security Buyer has the privilege of speaking with a real-life hero, Abdullah Tanoli, the hero of Leicester Square..
Altronix - Security Buyer

Altronix POE367 Delivers 277VAC Support

Altronix has expanded its power product line with the new POE367 power supply/charger designed specifically for 277VAC input environments.
IFPO x GSA - Security Buyer

New Corporate Members for IFPO

The Global SecurAlliance (GSA)summer meeting on 16 June was held again at the stunning Château de Méry-sur-Oise on the outskirts of Paris.
SB Awards register now advert - Security Buyer

Launching Security Buyer Awards

Honouring innovation, leadership, and success across the global security industry at the Security Buyer Judges’ and Readers’ Awards 2025 
Product Spotlight - HID

Product Spotlight – HID

Access control is evolving into a smart, responsive platform—integrating embedded apps, IoT, and cybersecurity to deliver…
Genetec

Genetec brings new capabilities to Security Center SaaS

Genetec announced new updates to Security Center SaaS, the company’s enterprise-grade Security-as-a-Service (SaaS) solution..
I-Pro

i-PRO Launches Revamped EMEA Partner Program

i-PRO announced a major expansion of its EMEA Partner Program. The move supports i-PRO’s long-term growth strategy and…
ASIs international

ASIS International Introduces New ANSI-Approved Investigations Standard

ASIS International, a leading authority in security standards, is excited to announce the release of its revised American National Standards.
Gallagher Security and Yusuf Bin Ahmed Kanoo Company Limited sign MOU in Riyadh

Gallagher Security MOU with Yusuf Bin Ahmed Kanoo Company

Gallagher Security is proud to announce the signing of a Memorandum of Understanding (MOU) with Yusuf Bin Ahmed Kanoo Company…
Mike Hurst - Security Buyer

Zygal appoints Mike Hurst CPP CPOI

Zygal, which produces cutting edge AI cloud VMS and monitoring solutions for connecting, managing, and monitoring assets…
Scroll to Top