Access controlled data centre

Access & Identity Management Handbook 2017 Editor's Choice, Access Control & Identity Management, Integrated Solutions, Products & Solutions

Cogent Communications was planning to open its 18th data centre in Europe when a unique opportunity emerged near Amsterdam: a large data centre had moved to a new location. That made property available that already contained the necessary security and technical infrastructure and only needed to be upgraded to the latest technology.

In terms of construction and security technology, the location met the high standards set by Cogent. Its strategic position close to the capital and its proximity to a large international airport proved to be deciding factors. After considering potential alternatives, an easy decision was made to select this location and the property was acquired.

The next step was to prepare the premises and ensure it was operational as soon as possible. A considerable part of the technical infrastructure was already in place and what was lacking was added, alongside Cogent’s own systems that had to be installed and organised.

“We were excited as a company to officially open the data centre to our customers as soon as possible. Fortunately, we already had a business relationship with Tyco in the United States. Through this connection, we were able to quickly make contact with the Dutch account manager and the team was able to complete the project within just three months,” explained Richard Rademaker, director of data centre operations for Cogent.

The solution

Cogent is a multinational Internet service provider that prides itself on offering the best value in the market to its customers while setting very high standards for network performance.

Cogent strives to create a very high degree of standardisation in its data centres to simplify maintenance and management: one of the biggest cost items in the sector. That is why Cogent turned to Tyco for the integral physical security solutions as they have been responsible for the security systems in all of Cogent’s data centres in the United States.

Before a detailed plan could be formulated, an extensive inventory of the existing security measures was carried out. For days, a team of specialists meticulously studied the resources already installed, ascertaining their specifications and assessing whether they could be used in the new security plan.

Based on this survey, Tyco consultants developed a plan of action to deploy an integrated solution using the existing fire alarm system alongside new intercom, video surveillance systems, intruder detection and an access control system using card readers.

Flexibility delivers advantages

By taking a flexible approach, the existing cables and as many components as possible were retained in the new system, resulting in significant cost savings and a lower total cost of ownership. The extensive knowledge, experience and flexibility of Tyco’s consultants ensured that the security plan met the strictest modern requirements and was installed as quickly as possible.

The company chose to deploy access control using C•CURE 9000 from Software House. With this centralised enterprise solution, the access control is fully managed from Cogent’s Network Operations Centres (NOC) in Washington DC in the USA, Frankfurt in Germany and Madrid in Spain. The high degree of standardisation that Cogent strives for with its security access systems also has its advantages here; simplifying the process of providing access privileges to employees so that it is fast and efficient to manage. With standardised systems and processes across data centres in Amsterdam, London, Frankfurt and throughout the United States, the system is highly streamlined and can be operated easily and quickly.

Physical security constitutes an increasingly important aspect of data centre operations. After all, the economic value of data increases as additional applications are developed.

No one stops to think that every smartphone app or every photo that is backed up in the cloud is found somewhere in the world on actual physical servers and storage that are connected via thousands of kilometres of cable. Cogent Communications and Tyco’s partnership helps to safeguard these files, ensuring they are stored safely and easily accessible whenever they are needed.

For more information contact Tyco Security Products, +27 (0)82 566 5274, [email protected], www.tycosecurityproducts.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
Bosch sells product business to Triton
Bosch Building Technologies News & Events Products & Solutions Facilities & Building Management
Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The division is set to focus on systems integration business in the future.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...
The need for integrated control room displays
Leaderware Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Cyber top business risk as climate change hits record high
Editor's Choice
Globally, companies identify cyberattacks, particularly data breaches, as their primary business concern for the coming year, with business interruption ranked second. In Africa and the Middle East, cyber incidents, shifts in legislation and regulation, and macroeconomic developments are the three foremost business risks.

Read more...
As technology converges, so does cybercrime
Editor's Choice
Cybercrime is no longer siloed: it involves complex collaborations and coordination between different malicious entities, including state actors, organised crime and even drug and human trafficking networks.

Read more...
The need for integrated control room displays
Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...