Multilayered datacentre security

Security Buyer takes a look at the growing importance of incorporating cybersecurity and AI driven capabilities into physical security at datacentres 

Trusting your data to a 3rd party landlord can be a significant risk. With open cages, unprotected meet rooms, and no remote surveillance, all it takes to bring down your network is an intruder plugging in a USB drive. Multilayered security solutions close security gaps by protecting physical assets with real-time monitoring and response management, eliminating both physical and cyber intrusion risks.  

It’s time for CIOs and CISOs to work together. With the widespread adoption of IoT and IIoT devices, we’ve entered into a new era of hybrid attacks that blur the lines between physical and cybersecurity.   

2019 was the worst year on record for data breaches so far. 2019 saw an increase of 33% from the year before for an alarming total of 5,183 separate data breaches that left 7.9 billion records exposed. CNET even rounded up a “2019 Data Breach Hall of Shame.” 

No company wants to be the next Equifax. Or the next Marriott, who in January 2019 announced that the records of 383 million guests – including some passport numbers and credit card information – had been hacked. 

With over 175 zettabytes of data expected by 2025, enterprise datacentres are one of the largest and fastest growing markets in the world. In the wake of these embarrassing catastrophes, enterprise level companies with datacentres have rushed to try and find the latest cyber security technologies promising protection.  

Layer 1 

One of the most important aspects of security sometimes remains overlooked: the physical layer of these datacentres (Layer 1). The actual fibre optic cables transmit this data, making it possible for millions to make financial transactions and surf the net, are not safeguarded properly in the majority of datacentres. In order to regain and keep the trust of their customers, companies are going to have to address their Layer 1 security.  

Current datacentre physical security standards are not stringent enough. Datacentres today focus on digital forms of prevention, surveillance, and fortification. They routinely use encryption and firewalls as their primary forms of data protection. They may additionally require the use of virtualised private networks and personnel training on common digital scams.  

Digital intrusion and detection systems include monitoring the number of service requests, the number of users with elevated rights accessing the system, the movement or extraction of large datasets, and an increase in phishing attempts.  

To address the physical layer, most enterprise datacentres employ small armies of technicians, security guards, CCTV cameras, gates, and biometric readers. Some also run regular audits to determine weaknesses. The problem is, the current industry standards for protecting the physical layer are often a) an afterthought and b) not enough to prevent service interruption and malicious attacks.   

Your data’s level of encryption means nothing if your entire network can be downed because of damage to the network’s critical physical infrastructure. The overwhelming task of connectivity is threatened by a single bump, intrusion, or cut of a cable, regardless of the firewalls and encryption equipped to protect the actual digital data. 

Data can also be stolen with encryption. What’s worse, if insufficient surveillance allows a bad actor to steal your data without your knowledge, they’ll have as much time as they need to crack your encryption. 

The only way to provide true security to your datacentre is to combine cyber and physical security. When you can centrally manage surveillance, detection, and response, your customers’ data is secure.  

Unified cyber-physical protection, or UCP, secures critical infrastructure from physical attacks by addressing the major cyber-physical vulnerabilities specific to enterprise datacentre environments. UCP is a combination of best of breed hardware and software components that provide continuous surveillance and automatic inspections to cut down costs over time and eliminate errors. It is fully compliant with NIST datacentre physical security requirements. 

IoT or AI driven surveillance can provide real-time data from state-of-the-art sensors in order to monitor, identify and prevent major outages due to physical disruption or tampering for both Inside and outside plant environments. These new technologies are sophisticated enough to discern false alarms and provide real-time analysis of the severity of any intrusion through a real-time dashboard that’s remotely accessible. 

Layer 2 

Hacking, malware and spyware are the obvious threats to data stored in a datacentre. 

A security information an…

To read more news and exclusive features see our latest issue here.

Never miss a story… Follow us on:
LinkedIn Security Buyer
Twitter logo @SecurityBuyer
Facebook @Secbuyer

Media Contact
Rebecca Morpeth Spayne,
Editor, Security Portfolio
Tel: +44 (0) 1622 823 922
Email: [email protected]

 

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Big Interview Abdullah Tanoli

Big Interview – Hero of Leicester Square

Rebecca Spayne of Security Buyer has the privilege of speaking with a real-life hero, Abdullah Tanoli, the hero of Leicester Square..
Altronix - Security Buyer

Altronix POE367 Delivers 277VAC Support

Altronix has expanded its power product line with the new POE367 power supply/charger designed specifically for 277VAC input environments.
IFPO x GSA - Security Buyer

New Corporate Members for IFPO

The Global SecurAlliance (GSA)summer meeting on 16 June was held again at the stunning Château de Méry-sur-Oise on the outskirts of Paris.
Product Spotlight - HID

Product Spotlight – HID

Access control is evolving into a smart, responsive platform—integrating embedded apps, IoT, and cybersecurity to deliver…
Genetec

Genetec brings new capabilities to Security Center SaaS

Genetec announced new updates to Security Center SaaS, the company’s enterprise-grade Security-as-a-Service (SaaS) solution..
I-Pro

i-PRO Launches Revamped EMEA Partner Program

i-PRO announced a major expansion of its EMEA Partner Program. The move supports i-PRO’s long-term growth strategy and…
ASIs international

ASIS International Introduces New ANSI-Approved Investigations Standard

ASIS International, a leading authority in security standards, is excited to announce the release of its revised American National Standards.
Gallagher Security and Yusuf Bin Ahmed Kanoo Company Limited sign MOU in Riyadh

Gallagher Security MOU with Yusuf Bin Ahmed Kanoo Company

Gallagher Security is proud to announce the signing of a Memorandum of Understanding (MOU) with Yusuf Bin Ahmed Kanoo Company…
Mike Hurst - Security Buyer

Zygal appoints Mike Hurst CPP CPOI

Zygal, which produces cutting edge AI cloud VMS and monitoring solutions for connecting, managing, and monitoring assets…
Secure Logiq

Secure Logiq expands into APAC

Secure Logiq is heading into the Asia-Pacific region with big plans and a clear focus on Australia and New Zealand. Helping to steer…
Scroll to Top