Southco Resource Center

We hope you find something interesting to read, watch and share.

Bluetooth Technology: the “Key” to Effective Time-Based Data Center Access

Bluetooth Technology: the “Key” to Effective Time-Based Data Center Access

 

 

Today’s smartphone technology offers features and capabilities unimagined just a few years ago, with thousands of apps that make these powerful digital tools an individual’s primary link to the world around them.

With the ability to do everything from shopping and paying bills, to staying on top of emails and tracking package delivery in real time, designers across industries are looking at ways to harness this technology to enhance the physical security of equipment as well — in particular, the data center cabinets housing the physical infrastructure that our digital world depends on.

Securing the Data Center

For the data center manager, the only constant is change. New upgrades and server installations, as well as modifying networking or decommissioning systems and services, present a crucial challenge: managing the physical security of sensitive equipment.

With these activities, the risk of security breaches intensifies, especially when service technicians and contractors need to access equipment to perform routine troubleshooting and maintenance. This has created a need for an efficient, highly secure and fully trackable means of granting time-based access to carry out these tasks — and apply it to multiple locations from the remote central office.

Many data center managers are choosing to integrate electronic access solutions to more efficiently control and monitor access at the rack level. Compared to lock-and-key systems, which are operated with keys that can be misplaced or stolen, electronic access solutions offer enhanced access control.

So how does a new technician or contractor receive an access credential in real time from a remote central office? By using their Bluetooth-enabled smartphone.

Using Smartphones as Keys

Bluetooth technology offers a  user-centric, streamlined solution for the remote management of user credentials. When connected with cloud-based applications, Bluetooth-enabled devices – like the common cell phone – can be used as a key.

Electronic access solutions that integrate Bluetooth controllers offer a simple solution: Time-based virtual keys can be sent wirelessly to a smartphone application via a cloud-based web portal. The technician then simply opens the app to see any virtual keys they have received, along with the associated locked equipment location, description and period of access time.

The visitor approaches the secured data center entrance, clicks the access button on their phone app, which transmits the encrypted Bluetooth signal to the reader, unlocks the lock and sends a record of the access via the smartphone’s network connection to the cloud. This allows the data center manager to monitor access wirelessly, without having to connect to existing security networks. If necessary, Bluetooth solutions can also be integrated with existing building security systems to provide facility-wide monitoring and access control.

Managing Time-Based Access

Using Bluetooth lock controllers adds a new layer of security that helps the data center manager to more easily schedule, control and track movement in and out of the facility. The Bluetooth controller can be used to add or delete electronic keys remotely, ensuring that only authorized personnel have access to sensitive equipment and information – and only during a specified time frame.

Instead of assigning one physical key or code to a visitor or technician for the day, the data center manager can easily assign access to a specific server cabinet for a predetermined amount of time via a web-based application that syncs user Bluetooth devices to specific Bluetooth readers, based on the device ID.

Management of user credentials and access monitoring takes place through the cloud via a web-based administration portal. Once virtual keys have been delivered to the phone, Wi-Fi access is not required for communication between the Bluetooth-enabled phone and lock controller. And when the virtual key expires, it can’t be re-used or copied, ensuring that access is granted only for the purpose required.

Maintaining Compliance

The flexibility provided by these applications allows the data center manager to grant access to personnel from anywhere without having to physically be on site at the data center when maintenance needs to be performed. Bluetooth-based electronic access solutions for data centers can also be used as a solution for maintaining compliance with industry-mandated data protection standards.

Southco’s H3-EM Locking Swinghandle series can be connected with Bluetooth controllers for access control and offer the ability to maintain compliance with data protection regulations.

 

With data centers facing large fines and penalties for noncompliance with data protection regulations, maintaining physical access controls is critical to the protection of confidential information. When combined with Bluetooth controllers, intelligent electronic locks offer the ability to maintain the security of valuable information in compliance with regulations such as the Payment Card Industry Data Security Standard (PCI DSS), Health Insurance Portability and Accountability Act (HIPAA) and Federal Information Security Management Act (FISMA).

Evolving Access Control

As the data center environment continues to invest in new technologies to accommodate growing storage needs, physical security of the cabinets and equipment storing valuable information must be managed to the highest levels — in a manner that is both trustworthy and efficient to manage.

The ubiquitous nature of Bluetooth-enabled smartphones has enabled a convenient and unprecedented means of managing user access not currently experienced with traditional lock-and-key systems. By adding Bluetooth wireless-controlled electronic locks to servers and other data center equipment, data center managers and security personnel can control access, protect valuable data and ensure compliance with industry regulations.

See Related Resources