Download PDF version Contact company

Data centres are a challenging domain, the success of which depends on security of client data. Most data centres store data for more than one organisation. It is very crucial for the data centres to prevent any unauthorised access of data.

Matrix offers a solution whereby data racks are secured biometrically, with records of every access along with its duration. Only authorised person can access specific racks for the stipulated time using biometric verification.

The solution is available in two forms. Time- and user-based rack access with a single biometric device.

Time-based rack access

This form of access control proceeds in the following manner.Once the user completes authentication, he will be able to select the racks to be accessed from a list of accessible racks

Data centre authentication: User shows biometric credentials to access the data centre

Data centre access allowed: Once user is allowed access, he/she will move towards rack access authentication.

Rack authentication: User will click on the screen and authenticate his/her identity through a biometric device placed alongside the screen.

Rack selection: Once user completes the authentication process for gaining access to respective racks, he will be able to select the racks to be accessed from a list of accessible racks.

Rack access allowed: Finally, the user will perform his assigned task within the defined time period.

Centralised biometric authentication

Biometrics provides high-end security over RFID, and hence integrating biometrics with access control solution fetches complete security for data centres. Usually, an employee is required to punch twice in order to access the data rack of his/her organisation.

First Punch: A biometric device will be installed at the entrance of the data centre. A user will punch on the device and accordingly he/she will be granted/denied access. This authentication ensures that an authorised user is trying to access the data centre.

Second Punch: Once user is granted access, he/she will punch again at the device installed near the screen in order to access the respective racks. Once user punches, the screen will display the list of racks that he/she is allowed to access. For example – when ‘X’ employee of ‘ABC Organisation’ punches the second time, the screen will display a list of ABC Organisation racks that are allotted to him. The user then needs to select the racks that he wants to access and accordingly he/she will be granted access.Every rack that is allocated to a company can only be accessed for a definite period of time

Pre-defined rack access

Every company has designated racks allotted to them. The admin can define the racks company-wise, which means whenever a user makes his second punch – a list with racks allotted to his/her respective company will be displayed on the screen.

This feature acts as a USP for data centres as they can ensure that a rack of company ‘X’ will not be accessible to or misused by an employee of company ‘Y’.

Every rack that is allocated to a company can only be accessed for a definite period of time. The admin can set the duration and accordingly users can access their respective racks for the stipulated time period.

User-based rack access

The process of user-based access control proceeds as follows:

  • Data centre authentication: User shows biometric credentials to access the data centre
  • Data centre access allowed: Once user is allowed access, he/she will move towards rack access authentication.
  • Rack authentication: User will show biometric credentials to access the rack.

Centralised authentication and control

User-based access differs from time-based access in this following manner.If the user is authenticated he/she will be allowed to work in the rack for a pre-defined period of time and once finished

First punch with two level authentication: A biometric device will be installed at the entrance of data centre. User will show card or enter the pin code and then biometric credentials on the device and accordingly he/she will be granted/denied access. This authentication ensures that an authorised user is trying to access the data centre. Two-level authentication improves the security level.

Second punch: User will move to the rack and show his/her biometric credential on the device installed at the rack. If the user is authenticated he/she will be allowed to work in the rack for a pre-defined period of time and once finished, the device will close the door automatically.

Admin can define the racks company-wise, which means whenever a user makes his second punch – a list of ABC Organisation racks that are allotted to him will be displayed on the screen.

This feature acts as USP for data centres as they can ensure that a rack of company 'X' will not be accessible to or misused by employee of company 'Y'.Through Matrix's Access Control slution, data centres can manage each and every company’s rack virtually along with enhancing the security

Integration with video surveillance

Matrix Access Control solution for data centres can be integrated with video surveillance solutions. Hence, when a user tries to access the data centre through the biometric device, an image gets captured. In case of unauthorised access, having an image can prove helpful for data centres.

As for time-based rack access, every rack is accessible for a definite period of time, and the admin can set the duration.

Data centres have data of more than one organisation stored in a single location. Managing the data racks is a cumbersome process for data centres. Through this solution, data centres can manage each and every company’s rack virtually along with enhancing the security.

Benefits of user-based access control

The solution provides reports in the form of:

  • ‘Which’ rack is accessed by ‘whom’, ‘when’ and for ‘what’ time-duration
  • Records related to rack accessibility, time duration, etc.
  • Alarm for a rack held open for too long, access denied events, etc.

From the data centre point of view, this system offers the following advantages:

  • Easy maintenance of diverse data
  • Accurate record of access allowed/denied in the software
  • No manual security required
  • Easy data rack management of various companies in a single location

In addition, from the company point of view, it is beneficial in the following ways:

  • Complete security of company data
  • Accurate records of who accessed data at what time

Target user profile:

  • Data centres
  • Server-based companies
Download PDF version Download PDF version

In case you missed it

SHIELD certification: enhancing security and stakeholder collaboration
SHIELD certification: enhancing security and stakeholder collaboration

In today's complex security landscape, ensuring the safety of building occupants and assets requires more than just cutting-edge technology. Holistic approach The SHIELD certifi...

What are the new security applications in colleges and universities?
What are the new security applications in colleges and universities?

College campuses are meant to be places of learning, growth, and community. Fostering such an environment requires the deployment of policies and technologies that ensure safety an...

Real-time security analytics by Winston-Salem Police Department with Verkada
Real-time security analytics by Winston-Salem Police Department with Verkada

The Winston-Salem Police Department (WSPD), internationally accredited by the Commission on Accreditation for Law Enforcement Agencies (CALEA), is dedicated to proactive, data-driv...

Quick poll
Which feature is most important in a video surveillance system?