Als alternatief tonen we hieronder de webpagina in het engels.
Data Center Security
Information Technology Management
Data centers are subject to four threats that
are usually overlooked; these are forms of
Radiation-Based Data Destruction (RBDD)
Active systems like EMP burst devices
A portable, battery-powered EMP burst device can generate extremely powerful magnetic-field waves for a few milliseconds, comparable to a nuclear electromagnetic pulse (NEMP).
One such burst can be enough to damage all servers and other (safety) electronics in your location.
On the internet you can easily find instructions for making an EMP burst device. A handyman can construct one in a few hours with commonly available components. For people who have difficulty reading the texts, there is even an instruction video on YouTube.
And a lazy or less technically skilled criminal can rent a portable device, afully anonymously, for less than US $ 1000, from several sources all over the world. It is a real industry, an entirely new type of crime.
Through the air these NEMP waves will propagate for hundreds of meters, nd concrete walls are no obstacle. The waves can also travel through existing cables, through the metallic protection around cables or even common pipelines for gas and water, bringing the data-killing power burst to its intended target: your data center.
Military NEMP/EMPMore and more nations and organizations have access to nuclear materials and thus present a risk of nuclear explosions.
To give you an idea of the distances involved: a nuclear burst in the stratosphere above Moscow will create a NEMP field over all of Western Europe, including London. Such a NEMP field can destroy all unprotected data.
Electronic theft is defined as illegally gathering
radiated information by criminals resulting in electronics theft and/or alteration or other manipulation of data.
With sensitive equipment that is currently on the market, data transferred through the air can be read from hundreds of meters away, so in places where a large secured zone cannot be created, like for instance city offices in public buildings, confidential information can be stolen or manipulated.
High levels of solar activity, known as a solar-wind shock wave, cause a geomagnetic storm that interacts with the Earth’s magnetic field. This temporary disturbance of the Earth’s magnetosphere can destroy data.
In 1989, a geomagnetic storm energized ground-induced currents thatdisrupted electric power distribution throughout most of the province of Quebec and caused aurorae as far south as Texas. Another example is the solar storm which only very nearly missed the earth in 2012.
- Tampering and Altering Information
- Cyber warfare, Cyber crime
- Compromising Emanations
- EMP Bunkers and Shelters
- Datacenter Shielding
- HEMP / NEMP Protection
- Data theft
- Forensic Investigation
New solutions for protecting your data
In collaboration with several universities we have developed, tested and
implemented an electromagnetically shielded Faraday cage for data centers.
With the integrated filtered cables and shielded pipelines, this creates a
radiation-protection wall around your sensible data equipment.
The electromagnetic barrier will withstand any attack or pulse up to a million times.
- EMP busters - operated by terrorist groups, frustrated employees, lone wolves
- electronics theft - alteration/manipulation of data by cyber criminals
- collection of radiated information - by cyber criminals
- risk of solar storm - like the one that almost hit the Earth in 2012
- military EMP – e.g. a nuclear burst in the stratosphere above Moscow creating an EMP field stretching as far as London
Protective measures are no longer the exclusive domain of military, intelligence, forensic and governmental bodies. The high-performance shielding products made by Holland Shielding Systems are available for any company or legal entity taking its data protection seriously.
Together with you, Holland Shielding engineers will work out the optimal solution for your protection needs. We start by making a threat and risk analysis of your data center as the foundation of the Faraday cage protection system.