Download PDF
Radiflow > Case Studies > Securing a Large Data Center in the EMEA Region: An IoT Case Study
Radiflow Logo

Securing a Large Data Center in the EMEA Region: An IoT Case Study

 Securing a Large Data Center in the EMEA Region: An IoT Case Study - IoT ONE Case Study
Technology Category
  • Cybersecurity & Privacy - Intrusion Detection
  • Infrastructure as a Service (IaaS) - Cloud Computing
Applicable Industries
  • Buildings
  • National Security & Defense
Applicable Functions
  • Facility Management
  • Maintenance
Use Cases
  • Tamper Detection
  • Traffic Monitoring
Services
  • Cybersecurity Services
  • System Integration
The Challenge
A leading data-center operator in the EMEA region, with multiple facilities spanning over 25,000 square meters, faced significant security challenges. The operator experienced interruptions in their internal IT network due to unsupervised work of third-party technicians. Despite having a high-end building control system that provided 24x7 monitoring and control to all the building’s infrastructure, the data center was vulnerable from a cyber perspective as it was connected to the IT network infrastructure. The operator launched an urgent OT cyber security project that included both IT-OT network segmentation and OT network asset mapping and anomaly detection. The main objectives were to harden the security of the server systems, secure the facility’s power supply and server cooling system, strengthen the segmentation between building and operational systems, create a visual OT network map, and set up a system for presenting supply-chain attacks that may threaten the data center through equipment vendors’ maintenance activities.
The Customer

Data Centers in EMEA Region

About The Customer
The customer is a leading data-center operator in the EMEA region. They operate multiple facilities that span over 25,000 square meters. The customer's data centers are equipped with high-end building control systems that provide 24x7 monitoring and control to all the building’s infrastructure. However, they faced challenges with their internal IT network due to unsupervised work of third-party technicians. This led to the realization that their data centers were vulnerable from a cyber perspective, despite their advanced building control systems. As a result, they launched an urgent OT cyber security project to enhance their security measures.
The Solution
The solution began with a meeting with the customer to understand their objectives and learn about the nature and specifics of the IT-OT network at the data center. A network model of the OT network was created using the iSID threat detection & monitoring platform. This was done by analyzing a representative amount of data traffic, recorded using a parallel data stream from the facilities main data switch. The iSID platform provided a detailed network model, including all assets, firmware, ports, open connections, and protocols, and vulnerabilities/risks associated with different assets. The digital image was reviewed by Radiflow’s cyber experts, in tandem with the customer, and modified to reflect network attributes that couldn’t be detected programmatically. Once all unnecessary open ports and protocols were handled, the model was deemed complete and suitable for reflecting the network’s baseline activity, and for use as a visual network map. iSID also created a logical business unit model, each with different security needs. Rule-based alerts for specific devices were set up, creating a central monitoring point for critical systems.
Operational Impact
  • The solution provided by Radiflow’s system is fully operational in one of the customer's data center facilities. The system has successfully created a detailed network model, including all assets, firmware, ports, open connections, and protocols, and vulnerabilities/risks associated with different assets. It has also set up rule-based alerts for specific devices, creating a central monitoring point for critical systems. The system has been deemed complete and suitable for reflecting the network’s baseline activity, and for use as a visual network map. The success of the system in one facility has led to considerations for its implementation in additional data centers operated by the customer.
Quantitative Benefit
  • not mentioned

Related Case Studies.

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.