{"id":1614019,"date":"2025-04-10T17:42:25","date_gmt":"2025-04-10T08:42:25","guid":{"rendered":"https:\/\/www.hanwhavision.com\/?post_type=hws_news_center&#038;p=1614019"},"modified":"2025-06-20T13:35:28","modified_gmt":"2025-06-20T04:35:28","slug":"security-the-primary-stakeholder-but-not-the-only-one","status":"publish","type":"hws_news_center","link":"https:\/\/www.hanwhavision.com\/ar\/news-center\/1614019\/","title":{"rendered":"Security: The Primary Stakeholder, But Not the Only One"},"content":{"rendered":"\n<p class=\"has-text-align-right\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#959fa8\" class=\"has-inline-color\">Reprinted story from Data Center Dynamics (March 27, 2025)<\/mark><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2000\" height=\"1280\" src=\"https:\/\/www.hanwhavision.com\/wp-content\/uploads\/2025\/04\/cover-1-2000x1280.jpg\" alt=\"\" class=\"wp-image-1613894\" srcset=\"https:\/\/www.hanwhavision.com\/wp-content\/uploads\/2025\/04\/cover-1-2000x1280.jpg 2000w, https:\/\/www.hanwhavision.com\/wp-content\/uploads\/2025\/04\/cover-1-600x384.jpg 600w, https:\/\/www.hanwhavision.com\/wp-content\/uploads\/2025\/04\/cover-1-1200x768.jpg 1200w, https:\/\/www.hanwhavision.com\/wp-content\/uploads\/2025\/04\/cover-1-768x492.jpg 768w, https:\/\/www.hanwhavision.com\/wp-content\/uploads\/2025\/04\/cover-1-1536x983.jpg 1536w, https:\/\/www.hanwhavision.com\/wp-content\/uploads\/2025\/04\/cover-1-2048x1311.jpg 2048w\" sizes=\"(max-width: 2000px) 100vw, 2000px\" \/><\/figure>\n\n\n\n<p>For data center owners and operators, technology is, naturally, the most significant investment they make. As artificial intelligence (AI) becomes increasingly valuable for day-to-day activities, these tech investments become increasingly sophisticated and complex, making security an even greater priority for the industry, and a key focus for <span class=\"hwFont\">Hanwha Vision.<\/span><\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer short\"><\/div>\n\n\n\n<p>As a global leader in visual solutions, <span class=\"hwFont\">Hanwha Vision<\/span> is a trusted partner for data center operators worldwide.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer short\"><\/div>\n\n\n\n<p>Allen DiGerolami, business development manager for video surveillance in data centers at <span class=\"hwFont\">Hanwha Vision<\/span> America, brings his expertise to ensure robust security across the industry.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Devising a data center security plan<\/h2>\n\n\n\n<p>Data center security is complex. Numerous factors feed into the feasibility of surveillance systems used, some directly in an operator\u2019s control and others beyond it. Despite the growing focus on cybersecurity, physical security measures have sometimes been overlooked. However, recent industry trends and regulatory changes have pushed operators to rethink their approach.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer short\"><\/div>\n\n\n\n<p>When designing a data center, architects and engineers must also consider the needs of the anchor tenant, as facilities are typically built to accommodate what tenants are willing to invest in. This means security measures often vary depending on the tenant\u2019s risk tolerance and budget.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer short\"><\/div>\n\n\n\n<p>For multi-tenant and co-location data centers, service-level agreements (SLAs) ensure clarity on security measures and responsibilities. With multiple clients sharing space, co-location facilities must provide both visibility and security without compromising tenant privacy. From a network perspective, increasing the number of cameras can also overload infrastructure, making latency a pivotal concern for mission-critical operations.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer short\"><\/div>\n\n\n\n<p>Beyond operational needs, compliance requirements dictate many security decisions, influencing both infrastructure investments and customer selection. DiGerolami explains:<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer short\"><\/div>\n\n\n\n<h5 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">&#8220;For example, the National Defense Authorization Act (NDAA) and Department of Defense (DoD) regulations mandate perimeter fencing for government contracts. Additionally, large corporations often request advanced security measures such as Light Detection and Ranging (LiDAR) and infrared cameras outside the perimeter, adding extra layers of protection before an intruder even reaches the fence.&#8221;<\/mark><\/h5>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Cross-departmental collaboration<\/h2>\n\n\n\n<div class=\"wp-article-paragraph-image-block \" >\n\t<div class=\"content-container\">\n\t\t\n\t\t<div class=\"paragraph-image-inline-block\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.hanwhavision.com\/wp-content\/uploads\/2025\/04\/Cross-departmental-collaboration-e1744274370534.jpg\" alt=\"\" class=\"image-size-large\" \/>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<p class=\"mb-0 \">As data centers work to implement fully protective yet cost-effective security measures, interdepartmental collaboration plays an important role in the successful deployment of surveillance systems. Teams such as legal and HR, finance, operations, and IT must coordinate to ensure that blind spots are identified and addressed, avoiding gaps that can leave data centers vulnerable.<br \/>\r\n<br \/>\r\nWhile industry security standards exist, they act as guidelines rather than strict instructions, making knowledge-sharing crucial. Simply choosing the cheapest camera and deploying it \u201cas is\u201d isn\u2019t realistic \u2013 systems must comply with local regulations, avoid spyware risks, and meet certification standards.<br \/>\r\n<br \/>\r\nNaturally, security departments lead risk mitigation efforts, but failure to align with other key departments can create challenges in compliance, ethics, and operations.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Legal and HR: Addressing compliance and ethics in surveillance<\/h2>\n\n\n\n<p>With the rise of advanced surveillance technologies, legal and HR teams play an increasingly vital role in shaping policies around facial recognition, bio-metric data use, and inclusive video labeling (e.g., race, gender, and distinguishing characteristics.) Their involvement ensures that privacy regulations, ethical concerns, and employee rights are fully considered before deploying surveillance solutions.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Operations: AI-driven video surveillance<\/h2>\n\n\n\n<p>While on-site security guards manage physical access control, their ability to detect and intervene in real-time is often limited. Security breaches aren\u2019t always dramatic events like a drone attack or a vehicle ramming a gate. Rather, the more subtle threats, such as missing equipment or unauthorized movement within the facility, require continuous monitoring.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer short\"><\/div>\n\n\n\n<p>To meet SLAs and proactively mitigate risks, AI-powered cameras can supplement traditionally manned surveillance systems and physical human security. These AI-powered cameras can help by filtering out background noise and focusing on specific individuals or vehicles. DiGerolami says:<\/p>\n\n\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer short\"><\/div>\n\n\n\n<h5 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">&#8220;For example, in Northern Virginia or Canada, a perimeter camera\u2019s motion sensor is going to trigger every time a tree sways, overloading bandwidth and generating false alerts. With AI, you can train the system to ignore environmental movements and track only people or vehicles.&#8221;<\/mark><\/h5>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">IT: AI integrations in security systems<\/h2>\n\n\n\n<p>Integrating AI into data center security shifts the focus from reactive responsive to proactive threat prevention. Through APIs, all security elements \u2013 including door swipes, biometric scanners, palm readers, and fingerprint readers \u2013 should function in sync with cameras as sensors. DiGerolami says:<\/p>\n\n\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer short\"><\/div>\n\n\n\n<h5 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">&#8220;With API integration, cameras can activate only when a door is swiped by an authorized pass.&#8221;<\/mark><\/h5>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer short\"><\/div>\n\n\n\n<p>However, not all high-tech solutions are universally compatible-mismatched technologies can lead to delays, inefficiencies, and integration issues.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Industry trends in surveillance<\/h2>\n\n\n\n<p>As demand for power soars and resources dwindle amid the climate crisis and sustainability mandates, data center operators face tightening investment constraints. Departments involved in security are being tasked with streamlining and improving efficiency, driving innovation in surveillance strategies and infrastructure.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer short\"><\/div>\n\n\n\n<p>In Northern Virginia, for example, DiGerolami has observed a growing trend toward multistory data centers rather than the traditional horizontal expansion. This shift reflects the industry\u2019s need to maximize space and operational efficiency in high-demand regions where land is occupied and costly.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer short\"><\/div>\n\n\n\n<p>At the same time, regulatory changes are evolving at an accelerated pace, with decisions on critical issues, such as drone mitigation, now reaching Congress for review. These rapid developments are pushing data center operators to stay ahead of compliance requirements while enhancing security measures.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer short\"><\/div>\n\n\n\n<h5 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">&#8220;As of last year, it&#8217;s been estimated that 50 percent of data centers had perimeter fencing, and of those, approximately 10 percent or less had an active fence line&#8221;, DiGerolami explains.<\/mark><\/h5>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer short\"><\/div>\n\n\n\n<h5 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">&#8220;However&#8221;, Digerolami notes, &#8220;that the industry is shifting toward actively monitored fence lines to enhance perimeter security.&#8221;<\/mark><\/h5>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer short\"><\/div>\n\n\n\n<p><span class=\"hwFont\">Hanwha Vision<\/span> is at the forefront of this transformation, with DiGerolami emphasizing the importance of a holistic approach:<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer short\"><\/div>\n\n\n\n<h5 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">&#8220;<span class=\"hwFont\">Hanwha Vision<\/span> integrates with all active fence lines and collaborates with partners on entryways, doors, and access points. My involvement goes beyond cameras &#8211; it&#8217;s about delivering a full security solution rather than just a product. By building a team that brings all security components together, we significantly increase the chances of success.&#8221;<\/mark><\/h5>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer short\"><\/div>\n\n\n\n<div class=\"wp-article-paragraph-image-block \" >\n\t<div class=\"content-container\">\n\t\t\n\t\t<div class=\"paragraph-image-inline-block\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.hanwhavision.com\/wp-content\/uploads\/2025\/04\/1-1-600x511.png\" alt=\"\" class=\"image-size-small\" \/>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<p class=\"mb-0 \">Inside the data center itself, operators have been testing facial recognition technologies where permitted by civil codes and state regulations. One promising approach involves using 360\u00b0 fisheye cameras positioned in data center aisles that activate only when a designated security line is crossed. <br \/>\r\n<br \/>\r\nThis concept extends to an \u201cintelligent handoff\u201d system, where cameras act as sensors, tracking specific individuals as they move across the facility. In turn, this eliminates unnecessary distractions, such as flashing server lights, and enhances real-time security monitoring. DiGerolami adds:<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer short\"><\/div>\n\n\n\n<h5 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">&#8220;You can even install micro-domes or hidden cameras inside specific areas or racks to track access &#8211; who opens which doors, what technicians are doing, and any unauthorized changes.&#8221;<\/mark><\/h5>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer short\"><\/div>\n\n\n\n<p>These AI-enabled tracking capabilities make it easier for data center operators to retrieve footage, analyze incidents, and intervene much more quickly and easily.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer short\"><\/div>\n\n\n\n<p>DiGerolami highlights <span class=\"hwFont\">Hanwha Vision<\/span>\u2019s bi-spectrum thermal camera, which features dual-channel surveillance-combining optical and thermal imaging. This hybrid approach improves visibility in low-light conditions, providing an added layer of security for data centers operating 24\/7 in diverse environments.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer short\"><\/div>\n\n\n\n<h5 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">&#8220;The goal is to create a fully unified environment where nothing slips through the cracks, he explains. If an incident does occur, the security system ensures the breach is tracked through every layer of protection within the data center.&#8221;<\/mark><\/h5>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1785\" height=\"646\" src=\"https:\/\/www.hanwhavision.com\/wp-content\/uploads\/2025\/04\/Thermal-camera-comparison.png\" alt=\"\" class=\"wp-image-1613962\" srcset=\"https:\/\/www.hanwhavision.com\/wp-content\/uploads\/2025\/04\/Thermal-camera-comparison.png 1785w, https:\/\/www.hanwhavision.com\/wp-content\/uploads\/2025\/04\/Thermal-camera-comparison-600x217.png 600w, https:\/\/www.hanwhavision.com\/wp-content\/uploads\/2025\/04\/Thermal-camera-comparison-1200x434.png 1200w, https:\/\/www.hanwhavision.com\/wp-content\/uploads\/2025\/04\/Thermal-camera-comparison-768x278.png 768w, https:\/\/www.hanwhavision.com\/wp-content\/uploads\/2025\/04\/Thermal-camera-comparison-1536x556.png 1536w\" sizes=\"(max-width: 1785px) 100vw, 1785px\" \/><\/figure>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer short\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>While AI-enabled equipment requires a significant initial investment, it ultimately allows operators to do more with less-enhancing security, optimizing resources, and reducing reliance on extensive hardware.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer short\"><\/div>\n\n\n\n<p>However, the success of these systems depends not only on the technology itself but also on cross-departmental collaboration. Security, IT, legal, and operations teams must work together to ensure compliance, maximize system effectiveness, and create a resilient security framework.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer short\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-text-align-left\"><strong><a href=\"https:\/\/support.hanwhavision.com\/hc\/en-us\/requests\/new?button=solution\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">Expand your knowledge<\/mark><\/a><\/strong><\/h4>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.hanwhavision.com\/ar\/solutions\/data-center\/\"><img loading=\"lazy\" decoding=\"async\" width=\"1598\" height=\"406\" src=\"https:\/\/www.hanwhavision.com\/wp-content\/uploads\/2025\/04\/talk-to-us-on-data-center-solutions.png\" alt=\"\" class=\"wp-image-1613972\" srcset=\"https:\/\/www.hanwhavision.com\/wp-content\/uploads\/2025\/04\/talk-to-us-on-data-center-solutions.png 1598w, https:\/\/www.hanwhavision.com\/wp-content\/uploads\/2025\/04\/talk-to-us-on-data-center-solutions-600x152.png 600w, https:\/\/www.hanwhavision.com\/wp-content\/uploads\/2025\/04\/talk-to-us-on-data-center-solutions-1200x305.png 1200w, https:\/\/www.hanwhavision.com\/wp-content\/uploads\/2025\/04\/talk-to-us-on-data-center-solutions-768x195.png 768w, https:\/\/www.hanwhavision.com\/wp-content\/uploads\/2025\/04\/talk-to-us-on-data-center-solutions-1536x390.png 1536w\" sizes=\"(max-width: 1598px) 100vw, 1598px\" \/><\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Reprinted story from Data Center Dynamics (March 27, 2025) For data center owners and operators, technology is, naturally, the most significant investment they make. As artificial intelligence (AI) becomes increasingly valuable for day-to-day activities, these tech investments become increasingly sophisticated and complex, making security an even greater priority for the industry, and a key focus [&hellip;]<\/p>\n","protected":false},"featured_media":1613911,"template":"","hws_news_center_cat":[18631,235,18565],"acf":[],"_links":{"self":[{"href":"https:\/\/www.hanwhavision.com\/ar\/wp-json\/wp\/v2\/hws_news_center\/1614019"}],"collection":[{"href":"https:\/\/www.hanwhavision.com\/ar\/wp-json\/wp\/v2\/hws_news_center"}],"about":[{"href":"https:\/\/www.hanwhavision.com\/ar\/wp-json\/wp\/v2\/types\/hws_news_center"}],"version-history":[{"count":5,"href":"https:\/\/www.hanwhavision.com\/ar\/wp-json\/wp\/v2\/hws_news_center\/1614019\/revisions"}],"predecessor-version":[{"id":1634779,"href":"https:\/\/www.hanwhavision.com\/ar\/wp-json\/wp\/v2\/hws_news_center\/1614019\/revisions\/1634779"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hanwhavision.com\/ar\/wp-json\/wp\/v2\/media\/1613911"}],"wp:attachment":[{"href":"https:\/\/www.hanwhavision.com\/ar\/wp-json\/wp\/v2\/media?parent=1614019"}],"wp:term":[{"taxonomy":"hws_news_center_cat","embeddable":true,"href":"https:\/\/www.hanwhavision.com\/ar\/wp-json\/wp\/v2\/hws_news_center_cat?post=1614019"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}