

Key card systems are better as they are generally not easy to duplicate. Nor does it give you any form of reporting as to who is using those keys. But it doesn’t take much to get these duplicated at your local hardware store.


So you need to find a way to control access. Traditional key locks are okay. I have met them.Īn unlocked server room cannot be controlled. Who can access the server room?Ī server room is only secure as its weakest point. There are a lot of server rooms out there that have been left unlocked. Often overlooked is the disgruntled employee, or some guy claiming to be from your I.T. Hollywood often paints this picture that data is stolen through the firewall by some teenager wanting to play Global Thermonuclear War. A dedicated space provides not only adequate cooling and power but also the necessary security. I have seen a lot of servers left out in the middle of an office setting, under someone’s desk, or tucked next to the cubicle plant. Here are some common questions to ask yourself. Physical Accessįirst, let’s cover the physical aspects. Now with out-of-band management options and virtualization, that attack platform has grown significantly. Over a decade ago, the answer was always, ensure that your servers are physically secure. ‘Hmm, this is all well and good,’ you might say, ‘But how do I prevent someone from breaking into my servers?’ PassWare WinKey Business: Product Page Are you protected? However, this document does contain some affiliate links. Disclaimer: I need to point out that Passware does not sponsor me in any way.
