Data security services: Physical and logical data security strategies


    Requires Free Membership to View

Data security, including logical security (authorization, authentication, encryption and passwords) along with physical security (locked doors, surveillance or access control), has traditionally been associated with large enterprise applications or environments with sensitive data. The reality is that given increased reliance on information and data privacy awareness, data security is an issue of concern for all environments.

As a storage reseller, integrator or services provider, your options for selling services around physical security range from security assessment and site reviews, to installation and integration of various hardware, software, network and facility components:

More on data security services
Defining data security vs. data protection


  • Video surveillance, systems including still and moving image
  • Configuration change tracking, management and validation
  • Monitoring facilities and storage technologies equipment, temperature, ventilation, power and other alerts
  • Physical access control, authentication and monitoring, including card key or biometrics scanning systems
  • Locked or secured access cabinetry for servers, storage and networking gear as well as secured access to cabling and patch panels
  • Recovery of damaged media, including CD, disk and tape
  • Secure disposal and disposition of retired IT equipment and media
  • Asset and media tracking, including implementation of RFID-enabled tape volume labels, RFID scanning of tapes and removable disk drives (RDD) and GPS-enabled tape case tracking

The above is a representative list of technologies and services that you can directly provide, or partner with others to provide in order to help address your customers' physical data security issues. If you have no experience with security, then partnering with another provider or data security specialist would certainly be a means of getting some experience and developing additional service and solution offerings. Or, you could hire someone with experience to align with the type of data security services you want to provide. You could also engage with a data security consultant or contract-based person or organization to help develop your experience and security-related offerings. Yet another approach is to partner with security hardware or software providers and leverage their expertise. The caveat is that you obtain the proper experience to match the applicable security offerings you plan to deliver.

While logical data security may get headline coverage -- for example, encryption, key management, intrusion detection and forensics -- physical data security will continue to be an important part of any organization's total data security strategy. As a channel professional, there are certainly many opportunities to think outside the box to devise and deliver new data security services to your customers.

About the author:: Greg Schulz is founder and senior analyst of the independent storage analyst firm the StorageIO Group and author of the book Resilient Storage Networks (Elsevier).


This was first published in June 2007

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.