EN-Article

Three Reasons Perimeter Protection Needs to be Included inYour Data Center Security Strategy

Issue link: https://resources.genetec.com/i/1427255

Contents of this Issue

Navigation

Page 1 of 1

Your security system needs to work when and how you want it to, without unnecessary hassles. If you have an outdoor storage area you want to protect, you probably do want to be alerted if someone approaches that zone. Yet, when it's time for your employees or contractors to access the storage area, you don't want to be bothered by nuisance alarms — and you shouldn't be! Customize which targets warrant an operator response You don't need your security teams being called out to investigate intrusions by curious squirrels, stray dogs, or employees or contractors going about their work. Within a unified solution, you can customize which targets warrant an operator response, and which can be ignored. Optimize your system to identify friendly activity from true threats A patented algorithm in RSA called Fusion can help your operators understand if movement detected by the system is something you need to pay attention to, or if it's just noise, and automate workflows to trigger a response that is appropriate to the level of threat. Fusion, along with automated workflows to triage potential threats, can reduce nuisance alarms by up to 80 percent. That ensures suspicious people moving near your perimeter will be carefully monitored — and the local squirrels can gather nuts in peace. If suspicious activity or potential threats are revealed, a vulnerability assessment is a next step, so you can identify and fix weak points. Within Genetec Security Center, tools like heat maps can help your team identify potential vulnerabilities. If a drone flies over your fence every evening at 8 p.m., for example, your operator needs to know so they can determine whether the drone is flown by someone with potentially hostile intentions or just a kid with a new toy. 3. Leverage your existing technology to do more Restricted area surveillance is an important feature but it's only one component. Within a unified dashboard, RSA plays a pivotal role in helping operators interpret data from multiple connected systems, such as radar, lidar, access control, and video analytics. To get the most out of your investment in security hardware, choose a software solution that: Brings standalone intrusion detection systems together under one visualization pane Creates one or many zone overlays from your various intrusion detection technologies such as radar, lidar, laser, video analytics, and perimeter intrusion detection systems Merges data coming from different sensors of different technologies to track a target in motion Moving from intrusion detection to surveillance is a change in mindset, but there's no doubt that it's better to know something is going wrong before disaster strikes. How secure is your data center? Try the Genetec RSA Maturity assessment tool to help you evaluate the effectiveness of your data center security.

Articles in this issue

Links on this page

view archives of EN-Article - Three Reasons Perimeter Protection Needs to be Included inYour Data Center Security Strategy