Successfully planning and implementing IT infrastructures also includes a well thought-out usage of IT and distribution cabinets. They contain high quality server and network technology that has to be physically secured – in order to avoid theft or tampering with sensitive data on the one hand, and on the other hand in order to keep mission-critical IT processes running flawlessy. Find out how easy it can be to guarantee the physical security of server racks and to fulfill regulatory requirements. (more…)
Water ingress in the form of flooding usually causes the affected devices to give in and break down. But even small leakages can lead to defects or disturbances in the workflow. Ever so often they are hidden, for example underneath an air conditioning unit, and therefore can be detected quite late. The Kentix leakage sensors have the remedy for this predicament. (more…)
Electrical power supply is a central part of mission-critical infrastructures. Outages or disturbances of these infrastructures have severe consequences and immediate effects on the other sectors and therefore on the state, economy and society. That is why they have to be secured safely and reliably so that outages can be prevented before they even occur. The new IT Safety Act has established a legal basis for the IT security of mission-critical infrastructure. Municipal utilities all over the European Union are now facing the challenge of fulfilling these compliance regulations. (more…)
The point of presence (POP) acts as the starting point for the optical fiber path to the subscriber. The main functions of this “access node” include: to house all active transmission equipment from the telecom provider, to manage all fiber terminations and to facilitate the interconnection between optical fibers and active equipment. Optical networking equipment carries information using light waves via fiber optic cables. Large amounts of data are transmitted. Network operators deploy systems to carry communications between continents, across countries, between cities and within large metropolitan areas. Growth in bandwidth-intensive services – like streaming high-definition videos, mobile broadband and the growth of Cloud Services – is driving the need for increased bandwidth. (more…)
Our innovative door sensor in mini-format with its 6 integrated sensors secures your rooms against burglary, tampering and critical climate factors. Installing the sensor is easy: Simply affix it on doors and windows. In the past months we have worked hard to make it even better. Now, the MultiSensor-DOOR offers not only a new optimized design, but also several improved functions. (more…)
Kenya Kazi Services Ltd. is the largest security company in Central Africa. Around 24.000 employees work here to provide security for companies or at official receptions in all of Eastern and Central Africa. The ever growing IT infrastructure of the company is, however, faced with many threats in Africa. That is why Kenya Kazi Services Ltd. has decided to install a system for 360° environmental monitoring and therefore secure its IT which is so important for the daily workflow and business processes. (more…)
About half of all IT blackouts are caused by physical threats such as over temperature, fire, humidity or leakage. Compared to outages that are caused by software errors, the downtime of servers after a physical threat has struck is usually longer and the costs of repairing damage are higher. Yet most IT infrastructure is not sufficiently protected against physical threats.
With more than 120 vehicles the logistics company Alistair Group transports consumer goods for the mining and oil industry within East, Central and South Africa. For a smooth as possible workflow, all trucks are equipped with tracking systems that are connected to the company-owned Control Center. With the Kentix MultiSensor alarming systems, the logistics expert ensures 24/7 availability of the Control Center. The monitoring solution observes physical threats that put the IT environment at risk such as fire, leakage or unauthorized access and sabotage. (more…)