Security Solutions - Midches.com

Webinar - Physical Perimeter Security: Data Center Protection

Written by Matt Golueke | Feb 18, 2020 5:17:36 PM

An outdoor electronic perimeter intrusion detection system (PIDS) is the first line of defense against threats to a data center’s critical assets and infrastructure. Safeguarding servers, colocation cages, and other sensitive areas with physical perimeter security technologies provides additional layers of protection in this high-security environment.

During this 45-minute webinar, participants will be introduced to key elements of successful physical perimeter protection and today’s most effective intrusion detection strategies for data storage and processing sites.

The discussion will focus on aligning site risks and operational considerations with optimal physical intrusion detection system designs and performance criteria to effectively fortify facility and data.

  • DEVELOP an early warning strategy to complement cybersecurity protection measures
  • UNDERSTAND the principles of technology integration and layering to best protect against physical attack, information theft or business-crippling sabotage to critical systems
  • DISCOVER how an intelligent fence-mounted detection system can successfully mitigate risk of intrusion while filtering out environmental nuisance alarms that distract operators
  • IDENTIFY effective qualification strategies for vendor partners
  • MINIMIZE total cost of ownership by mitigating expenses typically associated with IDS implementation, operation, maintenance and expansion

This session offers an ideal learning opportunity for end users, consultants, architects, engineers and security systems integrators involved in data center protection.

 

Thursday, March 5 at 1pm ET -- Can't make the presentation? Learn more online here >>

 

ABOUT THE PRESENTER

Maira Zanrosso interfaces with clients worldwide to develop and implement perimeter intrusion detection strategies for the fortification of critical infrastructure and assets. Her focus is on integration of technologies to mitigate attack risk and maximize early warning of unauthorized access. She has 25 years of experience in the protection of high-security applications and speaks frequently on perimeter security best practices.