Dedicated Servers: Physical Protection Against Breaches

biometric - handscanner - blog image

Protecting against data breaches is critical for most enterprise organizations, and often the biggest challenge lies in physically securing the facility where the data is stored. Security is especially important when implementing dedicated servers because you are usually not accessing the server directly. As with reliability, it is worth doing some extra research on a provider’s capability in this area.

Make sure your provider has the latest security measures, including:

  • Multi-layer verification process
  • Multi-factor authentication
  • Video surveillance

A strong multi-layer verification process should include locked external doors, locked internal doors, and locked cabinets and cages. How are the identities of authorized personnel verified? Look for authentication that includes at least two factors, such as physical key fob, key codes, and a form of biometric authentication such as palm recognition. The premises should be monitored 24/7 by video and staff, to interrupt any unauthorized access that may occur despite security protocol.

When security is a priority, finding a provider with a dedicated-only facility is the best option. A center that shares space with colocation will experience a significant amount of traffic, creating opportunities for weakness in security. When access to the entire data center is restricted, the chances of a breach are significantly reduced.

To read more about dedicated servers, follow the link to a previous post about IT Infrastructure Redundancy: Don’t Settle for Less.

Dedicated Server Benefits White Paper
Share this Blog Post
Share on Facebook0Share on Google+0Share on LinkedIn0Tweet about this on Twitter0

One thought on “Dedicated Servers: Physical Protection Against Breaches

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>