Processor Magazine - Data Center Access Policies

(4-Dec-09) Humans are the weakest link in any security scheme. Security professionals can do their best to protect systems with layers of anti-malware, personal and network firewalls, biometric login authentication, and even data encryption, but give a good hacker (or computer forensics expert) enough time with physical access to the hardware, and there’s a good chance they’ll break in. Thus, robust physical access controls and policies are critical elements of any comprehensive IT security strategy.

According to a report by the SANS Institute, “IT security and physical security are no longer security silos in the IT environment; they are and must be considered one and the same or, as it should be called, overall security.”

It is the innermost layer—physical entry to computer rooms—over which IT managers typically have responsibility, and the means to effective control over human access focuses on a set of policies, procedures, and enforcement mechanisms.

Click here for full article

To speak to one of our Analysts,
Contact Info-Tech Public Relations

pr@infotech.com

OR CALL

US: 1-888-670-8889
Canada: 1-844-618-3192
International: +1-519-432-3550

Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019