Tell us about your infrastructure requirements and how to reach you, and one of team members will be in touch shortly.
Let us know which data center you'd like to visit and how to reach you, and one of team members will be in touch shortly.
Tell us about your infrastructure requirements and how to reach you, and one of team members will be in touch shortly.
Let us know which data center you'd like to visit and how to reach you, and one of team members will be in touch shortly.
Robust access controls prevent unauthorized access to data center facilities, their staff, and the data they hold. Keycards and biometric scanners are both popular and effective means of implementing robust access controls. Here is a quick guide to what you need to know about them.
There are three main types of keycards: magnetic stripe cards, RFID cards, and smart cards.
Magnetic stripe cards have a stripe composed of tiny iron-based magnetic particles on the card’s surface. Data is stored by altering the magnetism of these particles.
When swiped through a reader, the card’s magnetic stripe is read by a magnetic head. This translates the magnetic information into digital data for authentication.
These cards are relatively inexpensive and easy to produce. They are, however, prone to wear and tear and can be easily cloned if the data is not encrypted.
Radio frequency identification (RFID) cards use electromagnetic fields to identify and track tags attached to objects. These cards contain an embedded microchip and antenna.
When placed near an RFID reader, the reader emits a radio frequency signal that powers the card, allowing the chip to transmit its stored information back to the reader.
RFID cards do not require physical contact with the reader, offering greater convenience and durability compared to magnetic stripe cards. They are also more secure due to the difficulty of duplicating the embedded chip.
Smart cards are equipped with an embedded microprocessor or memory chip, capable of storing and processing data. These cards can perform complex interactions with the reader, such as cryptographic processes for secure authentication.
There are two main types of smart cards. These are contact and contactless. Contact smart cards require physical contact with the reader via a metallic chip, while contactless smart cards use RFID technology to communicate wirelessly with the reader.
Smart cards provide a high level of security due to their ability to perform encryption and store large amounts of data, making them ideal for environments requiring stringent security measures.
There are three main types of biometric scanners used in data centers: fingerprint scanners, facial recognition systems, and iris scanners.
Fingerprint scanners capture the unique patterns of ridges and valleys on an individual’s fingertip. The scanning process involves placing a finger on the scanner surface, where either optical, capacitive, or ultrasonic sensors capture the fingerprint image.
Optical sensors use light to create a digital image of the fingerprint, capacitive sensors measure electrical signals to form the image, and ultrasonic sensors use high-frequency sound waves to capture detailed fingerprint data.
Fingerprint scanners are widely used due to their accuracy, cost-effectiveness, and ease of integration.
Facial recognition systems identify individuals by analyzing facial features such as the distance between the eyes, nose, mouth, and jawline. These systems use cameras and sophisticated algorithms to capture and analyze facial images.
The process begins with detecting a face in the field of view, followed by mapping key facial landmarks to create a facial signature. This digital representation is compared against stored facial templates for verification.
Facial recognition is non-intrusive and can be used in various lighting conditions, but its accuracy can be affected by changes in facial expressions, accessories, and aging.
Iris scanners authenticate individuals by analyzing the unique patterns in the colored part of the eye, known as the iris. These scanners use infrared light to illuminate the iris and capture high-resolution images.
The intricate patterns of the iris, which remain stable throughout a person’s life, are then processed into a digital template. This template is compared with stored iris patterns for authentication.
Iris scanners offer a high level of accuracy and security due to the complexity and uniqueness of iris patterns. They are less affected by external factors like glasses or contact lenses but can be more expensive and require precise alignment during scanning.
Here are the three main factors to consider when choosing between keycards and biometric scanners.
Keycards provide a basic level of security by granting access through the possession of a card. They can, however, be lost, stolen, or duplicated, which creates a security risk.
Biometric scanners offer higher security as they rely on unique physiological traits that are difficult to replicate or steal. At the same time, they also create an additional security risk due to the need to store biometric data.
Keycards can occasionally fail due to wear and tear or magnetic interference, leading to misreads. Biometric scanners offer high accuracy by using unique biological features for identification, but their reliability can be influenced by factors such as environmental conditions.
Keycard systems generally have low upfront and maintenance costs. Biometric systems typically have higher initial costs due to the advanced technology and sensors required. Maintenance can also be more expensive, involving regular updates and calibrations to ensure accuracy and reliability.
Discover the DataBank Difference today:
Hybrid infrastructure solutions with boundless edge reach and a human touch.