Processor Magazine - Data Center Access Policies


(4-Dec-09) Humans are the weakest link in any security scheme. Security professionals can do their best to protect systems with layers of anti-malware, personal and network firewalls, biometric login authentication, and even data encryption, but give a good hacker (or computer forensics expert) enough time with physical access to the hardware, and there’s a good chance they’ll break in. Thus, robust physical access controls and policies are critical elements of any comprehensive IT security strategy.

According to a report by the SANS Institute, “IT security and physical security are no longer security silos in the IT environment; they are and must be considered one and the same or, as it should be called, overall security.”

It is the innermost layer—physical entry to computer rooms—over which IT managers typically have responsibility, and the means to effective control over human access focuses on a set of policies, procedures, and enforcement mechanisms.

Click here for full article

Media Kit

Info-Tech Research Group Media Kit

Download Now


To speak to one of our Analysts,
Contact Info-Tech Public Relations
press@infotech.com

or call:
US: 1-888-670-8889
Canada: 1-844-618-3192
International: +1-519-432-3550

GET HELP Contact Us
×
VL Methodology