Mission Critical Security Consultants

iFortress has pioneered and introduced a very simple “roadmap”, a clarifying dialog that defines Mission Critical Security and helps facilitate the way we discuss our efficiency and security objectives by highlighting four principle tenants: Physical; Operational; Logical; and Structural Security™ (POLS).

Each tenant is defined by a specific set of skills, technologies, and functions, and each must be applied in varying degrees depending on the level of efficiency and security that is established within your Plan. Absent of any one tenant or compromising its purpose within your best practices, efficiency and security obligations can render the mission critical facility and the business itself vulnerable. Achieving Mission Critical Security requires the full indoctrination as well as the balanced implementation of all four inter-dependent disciplines.

Physical Security

Physical Security involves measures that protect and control the access points and perimeters of your mission critical facility. This typically consists of the devices and barriers designed to prevent unauthorized access and monitors the activities that occur in and around your facility. Physical Security protects against such threats as forced entry, vandalism, and corporate espionage.

Operational Security

Operational Security is what ensures consistent and the uninterrupted functionality of your data center operations. This includes Mechannical, Electrical, and Plumbing (MEP) equipment and/or devices such as Computer Room Air Conditioning (CRAC), generators, uninterrupted Power Supply (UPS), transfer switch gear, and dry pipe or dry agent (e.g. FM 200) fire suppression. Generally “re-active” modes of security (i.e. when power fails, then the generator; when a fire, then suppression), Operational Security measures keep source malfunctions from adversely disrupting or crippling your business.

Logical Security

Logical Security is typically identified by systemic levels of defense such as system redundancy, data back up, storage, firewalls, hacker traps, anti-virus programs, and spyware. The most prevalent and costly Logical Security practices are Disaster Recovery and Contingency Site Planning; cognitively prescribed and paid for imperatives, which are affected after weighing the risk and cost of the business failing against the risk and probability of the data center itself failing.

Structural Security™

Structural Security™ is the strategic discipline that establishes the efficiency and security footprint of the facility. The floor, walls, ceiling, penetrations, etc.; the engineered architecture or structural foundation that actually cause efficiencies while the same time is your last, single line of defense that stands between the probability of high risk disaster and your inevitable need to survive. Structural Security™ is the driving force behind the paradigm shift from disaster recovery to Disaster Prevention.