Download PDF version Contact company

“As a full service IT provider, a reliable access control system is essential for us to ensure the security of the data stored on servers. We’ve been using the access control solution from Nedap since the 1990s. INFO AG and its data centres have grown constantly since then, and AEOS with them. Nedap has proven its value as a committed partner during that period, with a system that is simple to control. One mouse click is all that’s needed to inform my customers about the identity of the last person to enter the data centre, or who entered during a specific period.” - Andreas Sauer Data Centre Manager, INFO AG

INFO AG is a full service IT provider and is counted among Germany’s leading provider of IT outsourcing and IT consulting services. INFO AG makes servers available so that customers can manage their own servers locally. A reliable access control system is essential for ensuring the security of the data stored on those servers. The entire data centre is subject to an extra high security classification to prevent unauthorised access and ensure constant protection of the data. INFO AG has been using the access control solution from Nedap for this task since the 1990s. In 2005 AEOS was implemented in the newly constructed INFO AG headquarters in Hamburg, which further expanded the long cooperation between the two companies. INFO AG and its data centres have grown constantly since then, and AEOS with them.

Security that scales up seamlessly

Mr. Sauer, the data centre manager for INFO AG, explains, “We now are working with a data centre covering approx. 10,000 m2 of floor space. INFO AG operates three data centres at its locations in Hamburg and Oberhausen. We are implementing AEOS as the access control system in each new building. It allows our employees to use their access ID at any of our facilities.” Each employee is granted access to the public areas of each building, but the data centres themselves remain accessible only to a select few employees. This allows INFO AG to ensure the security of all servers and data for its customers. At the same time it also facilitates compliance with all applicable laws and regulations.

This interface was specially developed for users who frequently create and issue new access IDs
The PIN code reader and the infrared scanner have both been seamlessly integrated into Nedap’s AEOS

Employees without authorisation can enter the data centres only in the accompaniment of a properly authorised person. To enter the data centre, the person must hold their access ID up to a Nedap reader and then enter a PIN code into an input device from Codeguard. The trick: the ordering of the numbers is constantly shuffled. This PIN code reader and the infrared scanner from Gunnebo that the person must pass through before entering the data centre have both been seamlessly integrated into AEOS. This scanner detects whether the person is being accompanied by another unauthorised person and whether they have a bag with them. If the scanner detects either of those situations and the person lacks proper authorisation for this, then AEOS denies access to the data centre. Employees are not the only ones who can be outfitted with access authorisation for the data centres. Visitors can also be granted access. This is necessary because some of the servers are the property of the respective customer and are directly managed, operated and serviced by them. The customers must pass through the same access control system as employees and can be granted the same authorisations. They are only able to access those specific areas within the data centre containing their servers, however. Mr. Sauer adds, “We can also give special authorisations to visitors, such as if they need to bring tools to service their server. These authorisations are also implemented and administered within AEOS.”

Greater security through maximum user friendliness

To authorise and administer these visitor IDs, INFO AG uses AEOS 3.0, the user-friendly interface from Nedap Security Management. This interface was specially developed for users who frequently create and issue new access IDs. At INFO AG the access IDs are produced and issued by the security guard on duty. He has access to an interface capable of handling all the tasks he might face. This prevents him from accidently working within the wrong user interface.

The learning curve for using AEOS 3.0 is very low for users. Mr. Sauer confirms: “AEOS 3.0 has an intuitive interface that helps prevent operating errors. AEOS 3.0 features multi-tasking, so users can also switch between different tasks at any time. If you are working in another screen or get interrupted by something, you can immediately pick back up and continue the work without worrying about losing the inputted data or actions you’ve performed. Because the security guard has full access to visitor authorisation in AEOS 3.0, I can provide our customers with relevant information or reports at any time. One mouse click is all that’s needed to inform a customer about the identity of the last person to enter the data centre, or tell them who entered during a specific period.” As an added benefit, the used visitor IDs can be reused once they have been reprogrammed and unblocked for the next user. And because visitors must register in advance to access the data centre, the security guard can prepare their access IDs in advance to avoid lines. Mr. Sauer says in conclusion: “AEOS supports us in implementing the high security standards applied at our data centres in the most user friendly way possible.”

Download PDF version Download PDF version

In case you missed it

Global regulations of AI: the role and impact on the physical security industry
Global regulations of AI: the role and impact on the physical security industry

The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically ad...

How does security innovation impact the skillsets operators need?
How does security innovation impact the skillsets operators need?

Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depe...

How can manufacturers and integrators mitigate the risks of port forwarding?
How can manufacturers and integrators mitigate the risks of port forwarding?

Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...