1207, 2017

Efficient IT Rack Monitoring – In 3 Easy Steps

Successfully planning and implementing IT infrastructures also includes a well thought-out usage of IT and distribution cabinets. They contain high quality server and network technology that has to be physically secured – in order to avoid theft or tampering with sensitive data on the one hand, and on the other hand in order to keep mission-critical IT processes running flawlessy. Find out how easy it can be to guarantee the physical security of server racks and to fulfill regulatory requirements. […]

3003, 2017

IT Safety Act: How municipal utilities tackle the new challenge

Electrical power supply is a central part of mission-critical infrastructures. Outages or disturbances of these infrastructures have severe consequences and immediate effects on the other sectors and therefore on the state, economy and society. That is why they have to be secured safely and reliably so that outages can be prevented before they even occur. The new IT Safety Act has established a legal basis for the IT security of mission-critical infrastructure. Municipal utilities all over the European Union are now facing the challenge of fulfilling these compliance regulations. […]

2803, 2017

Access securely linked across the entire hospital

Especially in critical areas such as the healthcare sector, there are many regulatory requirements for the security of IT infrastructures and data protection in effect. Particularly patient data needs to be reliably secured at all times. Unauthorized access to critical areas can quickly lead to high and sometimes irrevocable damage. That is why appropriate safety measures are important which will, at best, prevent any disturbance before it even happens and alarm the responsible persons in case of an emergency. A smart access control system such as the Kentix DoorLock® offers protection against burglary, sabotage and [...]

311, 2016

Why a certification according to ISO 27001 pays off

Digitalization is progressing further and further – with all its advantages and risks. Avoiding it has become virtually impossible for businesses. That is why it is important to know how to successfully use the chances that industry 4.0 brings with it while at the same time repelling the threats. Regulations for the security of information technology are playing a big role in this. One of them is the ISO 27001 – but why is a certification according to specifically this guideline worthwhile? […]

1803, 2016

360° environmental monitoring – for a maximum of IT security

About half of all IT blackouts are caused by physical threats such as over temperature, fire, humidity or leakage. Compared to outages that are caused by software errors, the downtime of servers after a physical threat has struck is usually longer and the costs of repairing damage are higher. Yet most IT infrastructure is not sufficiently protected against physical threats. […]

1801, 2016

New law for higher security of critical infrastructures

Mission-critical infrastructures such as power plants, public transport, banks or hospitals are subject to very strict safety precaution. Outages or failures could lead to severe consequences and impair national security. Now, the EU committee has passed a new law that is to provide higher IT security for relevant companies. Supply shortages are thus to be avoided and putting national security at risk ought to be prevented pre-emptively. […]

Go to Top