Morse Watchmans Blog

Key Control Systems Provide Crucial Information to Data Center Security Operations

Fernando Pires February 23, 2011
Fernando Pires

Video surveillance, intrusion detection and other physical security technologies are used extensively to help protect data centers from outside threats. They are excellent operational measures to guard against unauthorized personnel gaining access to the facility or those who would do intentional harm.Minimizing and controlling personnel access to computer rooms and equipment racks as well as offices and utility rooms is also a crucial precaution. This can be effectively accomplished using a key control and management system.

Key control systems were invented as a replacement for manual storage and tracking of keys. These high-tech key cabinets release assigned keys only to users with the proper authorization code (either bio identification or numerical code), and cannot be manipulated or easily tampered with. A rugged stainless steel construction and virtually indestructible key fobs, which readily accommodate both hard keys and plastic key cards, are designed for heavy use and the illuminated key slots make accessing and returning keys easy.

The key cabinets can be integrated with a data center’s access control card system to elevate overall security procedures. For example, an individual attempting to leave the restricted data room without first returning the key for the rack lock may be denied exit from the area. Or, when connected to the network, the key management system may send an email alert to security advising that a key has not been returned as scheduled.

Most important however is the capability of the key control system to automate the tracking of each key so that management will know who had which key and when. And when supplemented by reporting software, this enables management to create custom generated reports that can help to identify potential security issues or be used in forensic audits. The information collected can be used in business practices such as verification of time allotted to clients for billing purposes.

Including key control and key management into operational procedures can help to achieve a safer and more secure data center environment.

What's next? Now you’ve seen the importance of key management systems to data center access control operations. Learn more about our key control solutions by filling out a quick contact form or using our key cabinet configurator tool.

Topics: Key Control and Management, Asset Management, Data Centers