BT makes the right call on security

Access & Identity Management Handbook 2014 Access Control & Identity Management

Management systems from Traka are being used by BT to track keys at its £90m flagship international data centre in Cardiff Bay, Wales.

Operations at the centre are supported by stringent security measures which ensure access to and within the building is controlled and restricted to authorised personnel whose use of site keys can be seen with a clear audit trail capability.

Occupied by 250 staff who manage the diverse requirements of BT’s hosting and managed service customers worldwide, the international data centre is a 5570 square metre facility on three floors with many areas which only authorised personnel can access.

Philip Richards of BT Security said: “There is no doubt as to the extensive demand for Internet-related services such as Web and content hosting, Web design and data management across homes and businesses on a global basis.

“The BT international data centre in Cardiff stands as a hub of creativity and development. It has a multi-layer security mechanism, both physical and logical, enabling us to provide the extremely high levels of security demanded by many of our customers.

“Every element of the security is critical, but perhaps the most resource-heavy is key management. We have invested in the most sophisticated, Internet- enabled biometric scanning system possible, but essentially, if keys go missing the security is swiftly breached. Traka was a critical component to protect the key systems in place and maintain overall security on site.”

Traditionally, keys had been stored in a key box and managed manually through use of a logbook. But management access to crucial IT equipment can be a time-intensive process with exposure to possible security breaches through lost keys or unauthorised staff mistakenly gaining access. The system needed to be optimised.

Traka’s solution means all keys on site are permanently attached (using a tamper-proof security seal) to a metal iFob so as to effectively electronically tag the keys with unique identities.

The iFob, with keys attached, locks into a receptor strip within a key cabinet until released by an authorised user via a fully automated and audited process. Traka cabinets, as installed at this location are run with software and can be networked across numerous locations on sites while being managed by one central administrator.

Since installing the Traka system, BT has seen vast improvement in its access management. Not only is there less misplacement of keys but the time spent managing the process has been greatly reduced and the overall security of equipment improved due to the automated authorisation system. Personnel simply cannot access areas or use technology if they are not authorised to do so. A further benefit is that user profiles uploaded to the Traka system contain training details for all staff. This alerts managers when machine licences need to be renewed and staff re-trained, so avoiding time-intensive manual tracking of staff qualifications.

Paul Mazaher, major accounts sales manager at Traka said: “As data becomes more business-critical for BT customers and for the company itself, the need for failsafe secure data centres to create and deliver new IT solutions is vital.”

He continued: “Even when it came to security systems, BT Cardiff looked for inspirational technology and Traka systems has been an integral part of the security infrastructure for over a decade. The benefit to BT is the significant cost and efficiency savings for the security team, as every key and electronic card is accounted for at all times even without the team being on site.”

For more information contact Traka, +44 1234 712345, [email protected], www.traka.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Key and asset management for mining
Traka Africa Mining (Industry)
Traka specialises in intelligent management solutions for keys and equipment, helping organisations control their important assets, improving productivity and accountability, and reducing risk in critical processes.

Read more...
Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...
Unlocking efficiency and convenience
OPTEX Access Control & Identity Management Transport (Industry)
The OVS-02GT vehicle detection sensor is the newest member of Optex’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...