On the edge of vulnerability

Security Buyer sits down with industry experts to determine the best approach for organisations to secure their data storage, whether it be physically in a datacentre or on the edge \

Trusting your data to a third party landlord can be a significant risk. With open cages, unprotected meet rooms, and no remote surveillance, all it takes to bring down your network is an intruder plugging in a USB drive. Multilayered security solutions close security gaps by protecting physical assets with real-time monitoring and response management, eliminating both physical and cyber intrusion risks. It is the convergence of these technologies that allows data to be secure. 

It’s time for CIOs and CISOs to work together. With the widespread adoption of IoT and IIoT devices, we’ve entered into a new era of hybrid attacks that blur the line between physical and cybersecurity. So how can we protect data in the physical realm and on the edge? This feature will take a look at both aspects and how important it is to tackle each challenge equally.  

Multi-layered physical solutions 

One of the most important aspects of security sometimes remains overlooked: the physical layer of datacentres. The actual fibre optic cables transmit this data, making it possible for millions to make financial transactions and surf the net, are not safeguarded properly in the majority of datacentres. In order to regain and keep the trust of their customers, companies are going to have to address their Layer 1 security.   

Current datacentre physical security standards are not stringent enough. Datacentres today focus on digital forms of prevention, surveillance, and fortification. They routinely use encryption and firewalls as their primary forms of data protection. They may additionally require the use of virtualised private networks and personnel training on common digital scams.   

Digital intrusion and detection systems include monitoring the number of service requests, the number of users with elevated rights accessing the system, the movement or extraction of large datasets, and an increase in phishing attempts.   

To address the physical layer, most enterprise datacentres employ small armies of technicians, security guards, CCTV cameras, gates, and biometric readers. Some also run regular audits to determine weaknesses. The problem is the current industry standards for protecting the physical layer are often a) an afterthought and b) not enough to prevent service interruption and malicious attacks.    

Uri Guterman, Head of Product & Marketing, Hanwha Techwin Europe states, “Video surveillance is a key factor to securing datacentres. Cameras are now being implemented with AI to improve efficiency, cybersecurity and sustainability. We’ve become used to seeing artificial intelligence (AI) in almost every aspect of our lives. It used to be that putting AI at work involved huge server rooms and required vast amounts of computing power and, inevitably, a significant investment in energy and IT resources. Now, more tasks are being done by devices placed across our physical world, “at the edge.” By not needing to stream raw data back to a server for analysis, AI at the edge, or “edge AI”, is set to make AI even more ubiquitous in our world. It also holds huge benefits for the video surveillance industry.”     

He continued by explaining how cameras using edge AI can make a video installation more flexible and scalable, which is particularly helpful for organisations that wish to deploy a project in stages. “More AI cameras and devices can be added to the system as and when needs evolve, without the end-user having to commit to large servers with expensive GPUs and significant bandwidth from the start.     

“Because video analytics is occurring at the edge (on the device) only the metadata needs to be sent across the network, and that also improves cybersecurity as there’s no sensitive data in transit for hackers to intercept. Processing is done at the edge so no raw data or video streams need to be sent over a network. As analysis is done locally on the device, edge AI eliminates delays in communicating with the cloud or a server. Responses are sped up, which means tasks like automatically focusing cameras on an event, granting access, or triggering an intruder alert, can happen in near real-time.”    

Guterman finishes by stating, “Your data’s level of encryption means nothing if your entire network can be downed because of damage to the network’s critical physical infrastructure. The only way to provide true security to your datacentre is to combine cyber and physical security. When you can centrally manage surveillance, detection, and response, your customers’ data is secure.” 

Unified cyber-physical protection, or UCP, secures critical infrastructure from physical attacks by addressing the major cyber-physical vulnerabilities specific to enterprise datacentre environments. UCP is a combination of best of breed hardware and software components that provide continuous surveillance and automatic inspections to cut down costs over time and eliminate errors. It is fully compliant with NIST datacentre physical security requirements.  

IoT or AI driven surveillance can provide real-time data from state-of-the-art sensors in order to monitor, identify and prevent major outages due to physical disruption or tampering for both inside and outside plant environments. These new technologies are sophisticated enough to discern false alarms and provide real-time analysis of the severity of any intrusion through a real-time dashboard that’s remotely accessible…

To read the full feature, see our latest issue here.

Never miss a story… Follow us on:
LinkedIn Security Buyer
Twitter logo @SecurityBuyer
Facebook @Secbuyer

Media Contact
Rebecca Morpeth Spayne,
Editor, Security Portfolio
Tel: +44 (0) 1622 823 922
Email: [email protected]

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

OneLink

Product Spotlight – Gallagher’s OneLink

Gallagher Security presents, OneLink – the product that is elevating remote security through the power of the cloud 
Pinaccle systems

Pinnacle Systems further supports Installers and System Integrators

Pinnacle Systems has launched the Pinnacle Partner Programme, a new initiative designed to provide enhanced support for installers…
Stephen Tickle

Comelit-PAC Appoints Stephen Tickle as Regional Sales Manager

Comelit-PAC has appointed Stephen Tickle as its new Regional Sales Manager.  Stephen will focus on supporting PAC’s access control…
Intersec Saudi

Intersec Saudi Arabia returns with record exhibition space

Intersec Saudi Arabia, the premier industry platform for security, safety and fire protection, will return to the Riyadh…
Abloy UK

Abloy Academy breaks attendance records

Abloy UK has achieved record breaking attendance at its Academy, with more professionals than ever attending its…
Hikvision

Hikvision Introduces X-ray Baggage Inspection System

Hikvision India has recently introduced X-ray Baggage Inspection System with AI- enabled Intelligent Recognition Capabilities…
GBV

IFPO Column: The Quiet Signals of Danger

Yoyo Hamblen of IFPO and Gary Simpson, Nonverbal and Behavioural specialist discuss the important topic of Gender-Based Violence..
Doorbird Carousel

Product Spotlight – Door Communication for the “Neue Wallufer”

 A customised solution case study for a residential complex is presented by DoorBird and CompuNet Systems GmbH 
suprema

Suprema Achieves EN 60839 Certification

Suprema, a global provider of AI-powered access control and security solutions, has achieved EN 60839-11-1:2013 Grade 3 certification
ASSA ABLOY

Electric locks are a vital component in digital access

To protect the important openings in their buildings, organizations need locks they can trust. This means more than just strength…
Scroll to Top