On the edge of vulnerability

Security Buyer sits down with industry experts to determine the best approach for organisations to secure their data storage, whether it be physically in a datacentre or on the edge \

Trusting your data to a third party landlord can be a significant risk. With open cages, unprotected meet rooms, and no remote surveillance, all it takes to bring down your network is an intruder plugging in a USB drive. Multilayered security solutions close security gaps by protecting physical assets with real-time monitoring and response management, eliminating both physical and cyber intrusion risks. It is the convergence of these technologies that allows data to be secure. 

It’s time for CIOs and CISOs to work together. With the widespread adoption of IoT and IIoT devices, we’ve entered into a new era of hybrid attacks that blur the line between physical and cybersecurity. So how can we protect data in the physical realm and on the edge? This feature will take a look at both aspects and how important it is to tackle each challenge equally.  

Multi-layered physical solutions 

One of the most important aspects of security sometimes remains overlooked: the physical layer of datacentres. The actual fibre optic cables transmit this data, making it possible for millions to make financial transactions and surf the net, are not safeguarded properly in the majority of datacentres. In order to regain and keep the trust of their customers, companies are going to have to address their Layer 1 security.   

Current datacentre physical security standards are not stringent enough. Datacentres today focus on digital forms of prevention, surveillance, and fortification. They routinely use encryption and firewalls as their primary forms of data protection. They may additionally require the use of virtualised private networks and personnel training on common digital scams.   

Digital intrusion and detection systems include monitoring the number of service requests, the number of users with elevated rights accessing the system, the movement or extraction of large datasets, and an increase in phishing attempts.   

To address the physical layer, most enterprise datacentres employ small armies of technicians, security guards, CCTV cameras, gates, and biometric readers. Some also run regular audits to determine weaknesses. The problem is the current industry standards for protecting the physical layer are often a) an afterthought and b) not enough to prevent service interruption and malicious attacks.    

Uri Guterman, Head of Product & Marketing, Hanwha Techwin Europe states, “Video surveillance is a key factor to securing datacentres. Cameras are now being implemented with AI to improve efficiency, cybersecurity and sustainability. We’ve become used to seeing artificial intelligence (AI) in almost every aspect of our lives. It used to be that putting AI at work involved huge server rooms and required vast amounts of computing power and, inevitably, a significant investment in energy and IT resources. Now, more tasks are being done by devices placed across our physical world, “at the edge.” By not needing to stream raw data back to a server for analysis, AI at the edge, or “edge AI”, is set to make AI even more ubiquitous in our world. It also holds huge benefits for the video surveillance industry.”     

He continued by explaining how cameras using edge AI can make a video installation more flexible and scalable, which is particularly helpful for organisations that wish to deploy a project in stages. “More AI cameras and devices can be added to the system as and when needs evolve, without the end-user having to commit to large servers with expensive GPUs and significant bandwidth from the start.     

“Because video analytics is occurring at the edge (on the device) only the metadata needs to be sent across the network, and that also improves cybersecurity as there’s no sensitive data in transit for hackers to intercept. Processing is done at the edge so no raw data or video streams need to be sent over a network. As analysis is done locally on the device, edge AI eliminates delays in communicating with the cloud or a server. Responses are sped up, which means tasks like automatically focusing cameras on an event, granting access, or triggering an intruder alert, can happen in near real-time.”    

Guterman finishes by stating, “Your data’s level of encryption means nothing if your entire network can be downed because of damage to the network’s critical physical infrastructure. The only way to provide true security to your datacentre is to combine cyber and physical security. When you can centrally manage surveillance, detection, and response, your customers’ data is secure.” 

Unified cyber-physical protection, or UCP, secures critical infrastructure from physical attacks by addressing the major cyber-physical vulnerabilities specific to enterprise datacentre environments. UCP is a combination of best of breed hardware and software components that provide continuous surveillance and automatic inspections to cut down costs over time and eliminate errors. It is fully compliant with NIST datacentre physical security requirements.  

IoT or AI driven surveillance can provide real-time data from state-of-the-art sensors in order to monitor, identify and prevent major outages due to physical disruption or tampering for both inside and outside plant environments. These new technologies are sophisticated enough to discern false alarms and provide real-time analysis of the severity of any intrusion through a real-time dashboard that’s remotely accessible…

To read the full feature, see our latest issue here.

Never miss a story… Follow us on:
LinkedIn Security Buyer
Twitter logo @SecurityBuyer
Facebook @Secbuyer

Media Contact
Rebecca Morpeth Spayne,
Editor, Security Portfolio
Tel: +44 (0) 1622 823 922
Email: [email protected]

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Product Spotlight - HID

Product Spotlight – HID

Access control is evolving into a smart, responsive platform—integrating embedded apps, IoT, and cybersecurity to deliver…
Genetec

Genetec brings new capabilities to Security Center SaaS

Genetec announced new updates to Security Center SaaS, the company’s enterprise-grade Security-as-a-Service (SaaS) solution..
I-Pro

i-PRO Launches Revamped EMEA Partner Program

i-PRO announced a major expansion of its EMEA Partner Program. The move supports i-PRO’s long-term growth strategy and…
ASIs international

ASIS International Introduces New ANSI-Approved Investigations Standard

ASIS International, a leading authority in security standards, is excited to announce the release of its revised American National Standards.
Gallagher Security and Yusuf Bin Ahmed Kanoo Company Limited sign MOU in Riyadh

Gallagher Security MOU with Yusuf Bin Ahmed Kanoo Company

Gallagher Security is proud to announce the signing of a Memorandum of Understanding (MOU) with Yusuf Bin Ahmed Kanoo Company…
Mike Hurst - Security Buyer

Zygal appoints Mike Hurst CPP CPOI

Zygal, which produces cutting edge AI cloud VMS and monitoring solutions for connecting, managing, and monitoring assets…
Secure Logiq

Secure Logiq expands into APAC

Secure Logiq is heading into the Asia-Pacific region with big plans and a clear focus on Australia and New Zealand. Helping to steer…
Sophos

Sophos Enhances Protection and Incident Response

Sophos announces an update to its Sophos Firewall, now including Sophos NDR Essential, which is free for all customers with an…
Dallmeier

Tenerife Airport relies on video technology

Tenerife Norte-Ciudad de La Laguna Airporthas significantly improved its safety by installing state-of-the-art video technology..
ICT

ICT announces Stewart Meyer as Chief Marketing Officer

Integrated Control Technology (ICT®), a leading provider of intelligent access control, intrusion detection, building automation and…
Scroll to Top