5 reasons why using a VDC (Virtual Data Centre) can improve your organisations Physical and Logical Security

A Virtual Data Centre (VDC) is a collection of cloud infrastructure which provides a wide range of benefits integrated into the heart of your IT infrastructure.   With these benefits come various security and compliance implications. However, if configured correctly, a VDC can actually improve an organisations physical and logical security levels in the following ways:

1) Physical Security

Think about Fort Knox and you have something close to a Virtual Data Centre!  In most cases, a VDC
physically resides within bricks and mortar location which exceeds standard building codes and is highly equipped to withstand both natural and man-made disasters.  

In addition, with higher tier Data Centres you will often find the following extra security features:

  • 24 x 7 security with back-to-base monitoring and physical security foot patrols
  • Access card ID sign in and sign out
  • Fire retardant systems
  • Security cameras and surveillance equipment
  • Isolated cages and lockable server racks
  • Multiple power and data feeds

2)  Logical Security – Securing Data from Hackers and Cyber Attacks

We all know the risk of poor policies and inadequate logical access controls leaving an organisation at risk from attacks.

However, by using a Virtual Data Centre, you can improve the security of both your on-site data and the data held in the cloud.   VDC provides a range of tools to implement tighter logical controls which include:

  • VPN Tunnels (IPsec VPN, SSL VPN)
  • Firewalls which secure and assist traffic flow between internal & external networks and block access from intruders.
  • Private Networking allowing network segmentation by logically separating your data from other VDC users, networking between departments and the internet providing network isolation and security.

Example 1 – Virtual Private Network

You can increase the security between your on premise data and your virtual data by using an IPsec VPN, (Virtual Private Network) between two locations.  The VPN creates a secure point-point encrypted connection allowing data to flow based on Fire Wall rules.  As a result, all data is encrypted and cannot be intercepted or accessed by other parties.
Example 2 - Point to Point Data Security used by individuals

Securing remote staff communication from hackers can be achieved by using a SSL VPN. An SSL VPN is designed for standalone devices such as desktops, laptops, tablets and telephones. .   This functionality secures communication between the VDC and the device by creating an encrypted tunnel through the internet back to the VDC.

3) Secure and Limit Data Access

User access can be segmented with different security permissions that allow access to specific data sets and documents allocated to each group. This allows granular control over users and the data they can access. Permissions can be set as Read Only, Read/ Write and Owner etc.

4) Data Sovereignty

Data sovereignty (the concept that information which has been converted and stored in binary digital form is subject to the laws of the country) is often difficult to achieve to the different data legislation across countries.  E.g. holding data in the USA means you must abide by USA federal laws. However, by selecting a VDC that's located in Australia, you ensure that your data complies with Australian legislation.

5) Secure Data – With a Disaster Recovery Policy

Disaster recovery is easier when your data centre is virtualized and with this, comes quicker and more effective data restoration times.  Restoring data from the cloud into your VDC can be as quick as a few minutes while restoring data from the cloud to your on premise location can vary according to your Internet connection speed and the amount which needs to be restored.

Read more: Three considerations to ensure your network is ready for the Internet of Things

With over 25 years’ experience in the IT industry, Gerardo Altman is the Managing Director of Velocity Host, an Australian-based Cloud Computing Provider specialising in services for Cloud Resellers and B2B Cloud Hosting.  Partnering with industry innovators and leaders our solutions and services help clients "Develop IT, Build IT, Grow IT”.

Feeling social? Follow us on Twitter and LinkedIn Now!

Join the CSO newsletter!

Error: Please check your email address.

Tags Private Networkingdata securityLogical Securityphysical securitycloud infrastructuredata sovereigntydata centresVDC (Virtual Data Centre)Fort Knox

More about CSOLogical

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Gerardo Altman

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place