Contact Us
Sponsored Content

Safe And Secure: Discussing Data Center Perimeter Hardening At Bisnow's Data Center Event

Placeholder
Stopped in its tracks: This truck couldn't break through a well-designed security fence.

In their rush to meet booming demand, data center operators shouldn't overlook the importance of perimeter security when designing and building new facilities.

As a security expert specializing in multitenant data centers for Ameristar Perimeter Security, a subsidiary of Assa Abloy, Amy Dunton has seen firsthand what happens when physical security is treated as an afterthought.

“Performing the initial construction work while not meeting tenant security specifications can lead to costly delays and rework, which impacts ROI and is not a sustainable way to do business,” Dunton said. “Developers who are just checking a box when it comes to perimeter security are missing a big opportunity.”

Dunton moderates a roundtable, From Blueprint to Build, at Bisnow’s National DICE Data Center Construction, Design and Development East event on Feb. 20 in Reston, Virginia.

Joining Dunton on the panel was Matt Adamson, physical security engineer with cloudHQ, and Nicholas Peloso, physical security engineer for Amazon Web Services. Both have extensive experience on the topic, and Dunton said she looks forward to their participation.

“Investors, architects, general contractors and occupiers need to take perimeter security into consideration before shovels are in the ground,” Dunton told Bisnow prior to the event. “Data center security is very different from security for other kinds of commercial buildings, especially office buildings.”

Bisnow: Why is perimeter security important “from blueprint to build?”

Dunton: If you’re not looking at security from the moment you’re thinking of acquiring the land for the site, then you’re planting the seeds for costly mistakes down the line. What happens if you acquire what you think is a fabulous site for a data center, but then there is no way to put a perimeter fence around it? 

It is better to start thinking about perimeter security from the beginning to anticipate and solve for challenges earlier in the development and construction process.

Bisnow: What are some of those blueprint issues data center developers should be considering?

Dunton: One important issue to think about is the flow of traffic once you enter a site at the perimeter line. Entrance procedures have to operate smoothly for different types and sizes of vehicles: Can a semitrailer truck stop at the entrance, go through the gate and smoothly continue on?

When the site is too close to a major highway and the security entrance process isn’t smooth and efficient, we’ve seen cases of traffic backing up onto the highway, which isn’t good. 

The earlier the conversation about physical security takes place, the lower the chance that rework will be necessary. I’ve seen cases where rework ended up being nearly one-third of the project’s total cost, or projects where developers are paying tenants $35K per day in fees because the data center was not ready to be turned over in time. Physical security was only a fraction of the total rework that needed to be done, but it did contribute. 

We also advise clients to choose perimeter fences that allow the tenant to add new lighting and cameras as their needs change without having to go back to dig or rip equipment out. It saves an immense amount of money. 

Bisnow: In this age of AI, data centers are focused on issues related to power demand and reliability, but what about perimeter security threats? 

Dunton: All the excitement about AI and cybersecurity, as well as recent incidents involving vehicles, translate into an increased focus on security, broadly defined.  

That’s why it’s important for data center sites to have something called “standoff distance.” Key to this is a fence that is crash-rated, meaning it should be able to stop a 15,000-pound vehicle traveling 50 miles per hour.

Landscaping is another consideration. Trees are nice, but a tree right next to a fence is an invitation to climb the tree and jump over the fence.

Underlying all of this is the fact that it’s actually much easier to hack a system by getting into a data center and physically putting a flash drive into a server than doing it all remotely. By getting physical access, a bad actor can do a whole lot of damage.

We’ve had clients who have walked away from a deal if they come to the conclusion that the land isn’t securable.

Bisnow: What do you want the key takeaway to be from the Feb. 20 discussion?

Dunton: Cybersecurity and physical security should live within the same vertical from a project management standpoint.

Security is important and should not be an afterthought. Yes, power and land are important. However, you can have all the power you want and if someone enters your site without clearance and shuts everything down, a bigger generator isn’t going to do you much good.

This article was produced in collaboration between Studio B and Ameristar Perimeter Security. Bisnow news staff was not involved in the production of this content.

Studio B is Bisnow’s in-house content and design studio. To learn more about how Studio B can help your team, reach out to studio@bisnow.com