Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Join the DCA
DCA Member Search
Event Calendar

07/06/2017 » 28/12/2017
Training & Education Courses in 2017

Top Contributors

DCA Member's Blog
Blog Home All Blogs
Please post data centre industry comments, experiences, ideas, questions, queries and goings-on here - to stay informed with updates, ensure you are subscribed by clicking the "subscribe" button.

 

Search all posts for:   

 

Top tags: Date Centre  Datacentre  efficiency  EMKA UK  central  Cooling  data  data centre  London  cloud  data centre security  Location  pue  swinghandles  connectivity  EMKA  energy-efficient computing  LDeX Group  air management  anti contamination  BioLock  data centre cleaning  data centre security;  disaster recovery  EU CODE of Conduct  infrastructure  planning  power  university of east london  building 

Andy Billingham from EMKA discusses enclosure hardware security issues

Posted By Andy Billingham, EMKA (UK) Ltd, 15 June 2017

In this white paper Andy discusses how new demands in the area of industrial security drive a continuous development process in tandem with new materials and production technologies. He suggests these demands may be most easily categorised as:

- Very low level – no access restriction but protection of personnel and equipment required – a simple wing knob latch may be sufficient.

- General access limited and equipment protection needed – but a simple key system is needed – perhaps a quarter turn lock with a triangular key.

- Restricted access and equipment protection – but low value or risk – a higher security key system is appropriate, a profile cylinder key lock would be a suitable choice.

- Higher risk or value – perhaps requiring an electronic mechanism e.g. specialist private manufacturing establishments or research centres.

- Very high risk/value e.g. data centres or utilities where a comprehensive logging/monitoring and control system is vital – remotely accessible e.g. via an encrypted internet link.

The white paper explains how in turn these have an effect on usage of materials and the design concept. In this respect the trend is toward increasing sophistication – it’s no longer acceptable to open a control or data cabinet with a screwdriver if you don’t have the key! So where once a wing knob latch was sufficient it is important to consider the need for keylocks – perhaps to IP65 or even IP69 and the option of vibration resistant compression locks which prevent nuisance door opening, as well as more complete gasket pull-down and consistently higher IP sealings.

Other demands call for other materials such as high grade engineering plastics and yet other technologies – leading us to Biometric locking and three tier security. Read the full white paper here: www.emkablog.co.uk/enclosure-hardware-security.

Further information on EMKA products can be found on the EMKA website - www.emka.com. Readers can find the latest information and news on the EMKA blog – www.emkablog.co.uk or follow them on twitter - http://twitter.com/emkauk.

 Attached Files:

Tags:  biometric locking  compression latches  compression locks  enclosure hardware security  quarter-turn locks  stainless steel handles  swinghandles 

Share |
PermalinkComments (0)
 

The latest in EMKA Biometrics: Dual Format Authentication

Posted By Andy Billingham, EMKA (UK) Ltd, 18 January 2017

As our complicated world technologically evolves, challenges naturally ensue to harness and properly use the technology. These challenges become much more serious and difficult when the rate of technological change increases. As customers know, significant time is often necessary to understand, implement, experience, and adjust to the new technology if it is to be employed efficiently and effectively. If we are to embrace the productivity, operator value and other rewards that technological advances offer, the reality is that it is morphing at a historically high speed and there is every reason to believe that it will only continue accelerating with no pause in sight.

Without doubt, the most notable thing about biometrics is that, when used properly as a method of identification, it is completely accurate. Only you are you. And unlike a card, fob, token, password, PIN, photo or key, you are never misplaced, broken, forgotten or expired. The individual is ultimately the most convenient, definite and accessible verification of themselves – and since The Internet of Things increasingly forces technological interaction with everything, it is more important that access to all these things is enabled only by those who have the proper authority to do so.

That is why EMKA/Digitus Biometrics exists with a uniquely and properly designed biometric security to protect the things that it should, without compromising personal privacy, while providing ready access into and out of secure areas and enclosures to protect critical data, systems and assets. When it comes to accessing enclosures that house IT equipment, systems, hazardous materials, valuable assets and even private conversations, companies rightly need to objectively ensure that only those persons with a need to access the enclosure – the rack, cabinet, room, cage, vault – are allowed to do so under the parameters set by the organization’s security policy.

Cards alone can be awkward to manage. Aside from having to carry them or look geeky wearing them, they get lost, get technologically bypassed, require inventory management, and worse, get counterfeited and stolen. Biometrics, on the other hand remove all of these negatives. It used to be said that, by its nature, biometrics eliminated the plausible deniability that the unauthorized person had no fault in the breach. How many times has a security officer been told, “It wasn’t me!” claiming that the card/key/fob/token/password/PIN must have been misappropriated. But with Biometrics access solutions, not only is plausible deniability forever gone, but there is no longer any breach to even get to that point.

EMKA/Digitus Biometrics now provides the ultimate access security with devices to secure data equipment enclosures and pedestrian entrances, they recently announced the best of both worlds. The new DualLock combines biometrics and card technologies. Built directly into the data centre cabinet’s handle is the fingerprint reader and card reader, requiring dual-authentication at the cabinet!

No longer are “you” required to authenticate with just a card, or just a finger, or at the end of the row. Finally, there is an access security product on the market that ensures, without any doubt – at the enclosure door – that “you” are “you”, that you are permitted, and that you are doubly verified.

The greatest fear of advancing technology is that it outstrips our privacy and practical security. EMKA/Digitus products are designed to provide the best of all possibilities - and yes, it integrates with your enterprise access control software.

For further information please contact EMKA UK on 024 7661 6505 or enquiries@emka.co.uk.

 

Tags:  biometric locking  card reader  data centre security;  dual format authentication  DualLock biometric handle  EMKA  fingerprint reader 

Share |
PermalinkComments (0)
 
Sign In
Sign In securely
News

Data Centre Alliance

Privacy Policy