Thursday 11 June 2015, Amsterdam
The report, now available on ASDReports, recognizes the following companies as the key players in the global data center physical security market: Bosch Security Systems, Cisco Systems, Honeywell Security Group, Schneider Electric, Siemens and Tyco International
Other Prominent Vendors in the market are: Advanced Perimeter Security, Allegion, Arecont Vision, Assa Abloy, Avigilon, Axis Communication, Axxon Soft, Boon Edam, Byremote, Digitus-Biometrics, DvTel, Easy Clocking, EMKA, Exacq Technologies, FutureNet Security Solutions, Hikvision Digital, Hurricane Fence Company, Integrated Biometrics, Jackson, March networks, MOBOTIX, MOXA, Perimeter Protective System, Ravica, Salient System, Samsung Techwin and Security Station
Commenting on the report, an analyst said: “Remote monitoring of facilities has become a trend in data center facility management. DCIM helps in monitoring the infrastructure of the facility. DCIM also includes facility management such as physical security, where video surveillance and biometric authentications are executed. Cameras installed through the facility can be monitored through the software installed in the control room systems. Nowadays, data centers are also equipped with remote management software without the need for on-site monitoring. The software offers 24/7 control.”
According to the report, the emergence of technologies such as cloud computing and big data analytics demands the construction of data center facilities worldwide. The popularity of social media and the IoT has resulted in the need for data centers to store and process information accurately with fast retrieval times. Data centers include infrastructure such as storage and servers, along with networking that connects the physical infrastructure and web-based interfaces. Enterprises are looking for modern design techniques to develop these facilities and make user access scalable, reliable, and efficient.
Further, the report states that the storing of data center security blueprints online without appropriate logical protections can lead to security breaches.
The study was conducted using an objective combination of primary and secondary information including inputs from key participants in the industry. The report contains a comprehensive market and vendor landscape in addition to a SWOT analysis of the key vendors.