A patented process ensures that today’s known hacking methods, such as port scans and attacks on specific services, are no longer successful. This new technology means that the data center cannot be approached by hackers and is thus no longer vulnerable to attack. However, authorized users can continue to log in for example via the conventional Virtual Private Network (VPN).
New security rack solution stops unauthorized data access from within the company
A new type of security rack solution from Fujitsu provides protection against unauthorized data access from inside the company as well. Just like a safe, the strengthened housing prevents physical attacks on the IT systems, such as the theft of hard disks or the installation of spy hardware. An integrated controller monitors the rack using a range of different sensors and, for example, will only allow the doors to open after the administrator has been authenticated. Biometric access controls using an infra-red palm scanner (PalmSecure) and a “double-check“ with two people are just some of the features. Administrators who otherwise could unjustly fall under suspicion now enjoy complete protection thanks to the comprehensive audit-proof monitoring (e.g. according to ISO 27000).
Simple integration and comprehensive investment protection
The security rack solution is the size of a standard rack with 42 units and is 120 cm in depth; it can be easily integrated in existing data center environments via the software. The top seven completely isolated units contain the controller and the remaining 35 units provide the space for the server systems. Standard equipment can be used which means that existing IT systems can still be operated and the investment costs are low.
Important step on the road to full IT security
Fujitsu's new security rack solution is an important component in a comprehensive security concept which the company has been driving in its Research and Development "Digital Sovereignty" project in Augsburg, Munich and Paderborn: The objective is manipulation-proof and auditable end-to-end encryption for the operation of (existing) applications. The encryption covers the terminal and data transfer as well as the servers in the data center, the storage systems and the backup process. Sensitive applications and data are thus kept completely separate from the rest of the existing IT. The module structure of the concept ensures that protection levels can be implemented as dictated by the requirements.
Dela med andra