Security Risk Management for Data Centre Infrastructure


SPP Pumps brings fire and cooling experience to DCs
SPP Pumps, a manufacturer of centrifugal pumps and systems, and its subsidiary, SyncroFlo, have combined their fire protection and cooling capabilities to support the expanding data centre sector. The companies aim to offer an integrated approach to pumping, fire suppression, and liquid cooling as operators and contractors face rising demand for large-scale, high-density facilities. The combined portfolio draws on SPP’s nearly 150 years of engineering experience and SyncroFlo’s long history in pre-packaged pump system manufacturing. With modern co-location and hyperscale facilities requiring hundreds of pumps on a single site, the companies state that the joint approach is intended to streamline procurement and project coordination for contractors, consultants, developers, and OEMs. SPP’s offering spans pump equipment for liquid-cooled systems, cooling towers, chillers, CRAC and CRAH systems, water treatment, transformer cooling, heat recovery, and fire suppression. Its fire pump equipment is currently deployed across regulated markets, with SPP and SyncroFlo packages available to meet NFPA 20 requirements. Integrated pump systems for construction efficiency The company says its portfolio also includes pre-packaged pump systems that are modular and tailored to each project. These factory-tested units are designed to reduce installation time and simplify on-site coordination, helping to address construction schedules and cost pressures. Tom Salmon, Group Business Development Manager for Data Centres at SPP and SyncroFlo, comments, “Both organisations have established strong credentials independently, with over 75 data centre projects delivered for the world’s largest operators. "We’re now combining our group’s extensive fire suppression, HVAC, and cooling capabilities. By bringing together our complementary capabilities from SPP, SyncroFlo, and other companies in our group, we can now offer comprehensive solutions that cover an entire data centre's pumping requirements.” John Santi, Vice President of Commercial Sales at SyncroFlo, adds, “Design consultants and contractors tell us lead time is critical. They cannot afford schedule delays. Our pre-packaged systems are factory-tested and ready for immediate commissioning. "With our project delivery experience and expertise across fire suppression, cooling, and heat transfer combined under one roof, we eliminate the coordination headaches of managing multiple suppliers across different disciplines.” Tom continues, “In many growth markets, data centres are now classified as critical national infrastructure, and rightly so. These facilities cannot afford downtime, and our experience with critical infrastructure positions us to best serve this market."

R&M introduces radio-based access control for racks
R&M, a Swiss developer and provider of infrastructure for data and communications networks, is introducing radio-based access control for data centres. The core product is an electromechanical door handle for the racks of the BladeShelter and Freenet families from R&M. Technicians can only open the door handles with authorised transponder cards, while administrators can control them remotely via encrypted radio connections and data networks. R&M says it is thus integrating high-security digital protection into its "holistic infrastructure solutions" for data centres. Package details One installation comprises up to 1,200 door handles for server and network racks, as well as radio and control modules for computer rooms. The door handles do not require any wiring in the racks. Their electronics are powered by batteries whose power is sufficient for three years of operation or 30,000 locking cycles. The personalised transponder cards communicate with the door handles via RFID antennas. In addition, there is software to manage users, access rights, the transponder cards, and racks. The software creates protocols, visualises alarm states, and supports other functions. It can be operated remotely and integrated into superordinate systems such as data centre infrastructure management (DCIM). The new offer is the result of the collaboration with German manufacturer EMKA, being based on the company's 'Agent E', an intelligent locking system. The R&M offering aims to integrate complementary systems from selected manufacturers into infrastructure for data centres. In Europe, R&M notes it is already working with several independent partner companies that pursue comparable medium-sized business models and sustainability goals. For more from R&M, click here.

OPTEX introduces indoor LiDAR sensor for DC security
OPTEX, a manufacturer of intrusion detection sensors and security systems, has launched the REDSCAN Lite, a short-range indoor LiDAR sensor designed to provide precise and rapid detection for protecting critical infrastructure within data centres. Founded in Japan in 1979, OPTEX has developed a series of sensor innovations, including the use of LiDAR technology for security detection. The company says its REDSCAN range is recognised for improving the accuracy and reliability of intrusion detection in sensitive environments. Addressing physical security risks in critical environments As data centres across the UK and EU are now classified as critical infrastructure, operators face increasing pressure to meet strict security standards and mitigate both internal and external risks. Industry data indicates that nearly two thirds of data centres experienced a physical security breach in the past year. The REDSCAN Lite uses 2D LiDAR technology to detect intrusions within a 10 m x 10 m range, reportedly responding in as little as 100 milliseconds. The sensor can be positioned vertically to create invisible ‘laser walls’ around assets such as server racks, ventilation conduits, and access points, or horizontally to protect ceilings, skylights, and raised floors. Engineered for high-density environments, the REDSCAN Lite is capable of detecting small-scale activities such as the insertion of USB drives or LAN cables through server racks. It is designed to operate effectively despite temperature fluctuations, low light, or complete darkness, helping reduce false alarms common in traditional systems. Purpose-built for confined data centre spaces Mac Kokobo, Head of Global Security Business at OPTEX, says the product was developed in response to growing demand from data centre operators, noting, “In today’s modern environments, such as data centres, spaces are becoming tighter and tighter filling with racks and processors. "This latest REDSCAN Lite has been developed to meet the specific need for rapid detection in tight indoor spaces where high security is crucial. “Feedback from customers highlighted a clear need for enhanced protection in small, narrow areas and spaces, so the REDSCAN Lite sensor has been designed to fit into the narrow gaps and is engineered to provide highly accurate and fast detection in indoor spaces that other technologies simply cannot reach.” The REDSCAN Lite RS-1010L is now available for deployment.

AWS outage sparks call for resilient DC strategies
This Monday’s Amazon Web Services (AWS) outage demonstrates the importance of investing in resilient data centre strategies, according to maintenance specialists Arfon Engineering. The worldwide outage saw millions unable to access popular apps and websites - including Alexa, Snapchat, and Reddit - after a Domain Name System (DNS) error took down the major AWS data centre site in Virginia. With hundreds of platforms down for over eight hours, it was the largest internet disruption since a CrowdStrike update caused a global IT meltdown last year. The financial impact of the crash is expected to reach into the hundreds of billions, while the potential reputational damage could be even more severe in the long run. A preventable disaster Although not caused by a lack of maintenance or physical malfunction of equipment and building services, the consequences of the downtime do reflect an opportunity for operators to adopt predictive maintenance strategies. Alice Oakes, Service and Support Manager at Arfon, comments, “The chaos brought by Monday’s outage shows the sheer damage that can be caused by something as simple servers going down. "While it might’ve been unavoidable, this is certainly not the case for downtime caused by equipment failures and reactive maintenance. “This is where predictive maintenance can make a real difference; it's more resilient, cost-effective, and environmentally responsible than typical reactive or preventative approaches, presenting operators with the chance to stay ahead of potential issues.” Predictive maintenance strategies incorporate condition-based monitoring (CBM), which uses real-time data to assess equipment health and forecast potential failures well in advance. This enables informed and proactive maintenance decisions before the point of downtime, eliminating unnecessary interventions and extending asset life in the process. CBM also reduces the frequency of unnecessary replacements, contributing to lower carbon emissions and reduced energy consumption in a sector under scrutiny for its environmental impact. Alice continues, “This incident is a timely reminder that resilience should be built into every layer of data centre infrastructure, especially the physical equipment powering them. "With billions set to be invested in UK data centres over the coming years, operators have a golden opportunity to future-proof their facilities. “Predictive maintenance should be cornerstone of both new-build and retrofit facilities to adapt to ensure continuity in a sector where downtime simply isn’t an option.”

Pressing challenges impacting the future of US data centres
In this exclusive article for DCNN, Matt Coffel, Chief Commercial and Innovation Officer at Mission Critical Group (MCG), explores how growth in the US data centre market is being affected by increasing challenges, demanding new levels of collaboration and innovation across the sector: An increasingly omnipresent industry Data centres and related facilities are everywhere today. Synergy Research Group states hyperscalers account for 44% of those facilities worldwide, while non-hyperscale colocation and on-premise account for 22% and 34% respectively. They also project that by 2030, hyperscalers will account for 61% of all data centres and related facilities. While there are no definitive estimates on how many of these facilities will be constructed in the US in the coming years, planning and development in the country are happening faster than ever before. Take, for example, the recent developments in Pennsylvania regarding investment in data centres and other technology infrastructure to support AI, including significant investments from Amazon and CoreWeave. With AI adoption surging and data generation accelerating in sectors like healthcare, financial services, and the federal government, the number of data centres is only set to grow. But as demand rises, so too do the obstacles. Data centre operators and their partners face mounting challenges that threaten timelines, drive up costs, and complicate efforts to scale efficiently - and there are no easy fixes. Persistent and critical challenges When it comes to the construction of a data centre, there are many factors to consider. However, four factors have emerged as critical challenges for data centre operators and their partners: permitting, power, skilled talent, and compute. 1. Regulation: Securing permits to build and operate Even as demand for compute and power accelerates, operators are forced to navigate lengthy and often inconsistent approval processes. In some jurisdictions, permitting can take two to three years before projects can even break ground. These delays put US developers at a disadvantage compared to countries with more streamlined regulatory systems. The challenge is compounded by the sheer scale of today’s facilities. Projects promising multiple gigawatts of capacity require not only land and power, but also regulatory sign-off on issues such as environmental impact, emissions, and noise. These reviews often involve multiple parties - utilities, consultants, environmental specialists, and local governments - which makes coordination slow and uncertain. Moreover, the difficulty varies widely by location. In cities like Austin in Texas, approvals can be tough to secure, while just miles outside the city limits, the process may move much faster. 2. Time to power According to the International Energy Agency’s (IEA) Energy and AI report, “Power consumption by data centres is on course to account for almost half of the growth in electricity demand between now and 2030 in the US.” This rising demand is evident in Northern Virginia, where a large cluster of data centres has been built over the past twenty years. With this cluster of data centres in a single area, along with the demands from AI and data processing loads, power substations have reached maximum capacity. This has forced utility providers and data centre operators to either bring in new lines from distant locations - where there is excess power, but transmission infrastructure is lacking - or to build new data centres in rural areas so they can access untapped power. Yet, building new transmission lines from other locations or setting up data centres can take years and doesn’t address the current power demand. 3. Access to skilled talent to support current and future projects Data centre operators and their partners are working to build new facilities across the US, often in remote parts such as Western Texas, where they can access untapped power sources. Building in these areas introduces several challenges related to skilled labour. Building and maintaining a data centre requires highly skilled electricians, mechanics, and controls specialists who can handle complex electrical and mechanical systems and often on-site power generation. However, the US faces a nationwide shortage of these workers. The US Bureau of Labor Statistics forecasts that employment for electrical workers will grow by 11% from 2023 to 2033 - a much faster rate than the average for all jobs. Still, many electricians are nearing retirement and set to leave the field in the coming years. This is likely to create a gap that operators will find difficult to fill as they work to build and keep their facilities running. Additionally, data centre operators and their partners face the reality that many skilled workers are unwilling to live far from population centres. Recent estimates from Goldman Sachs Research underscore the scale of this challenge. It projects that the US will require 207,000 more transmission and interconnection workers and 300,000 extra jobs in power technologies, manufacturing, construction, and operations to support the additional power consumption needs projected for the US by 2030. This dual challenge of labour scarcity and logistical complexity is making traditional, on-site construction methods increasingly untenable. As a result, the industry is pivoting towards prefabricated, modular power solutions that are engineered and assembled in a controlled factory environment. This approach mitigates the impact of localised labour shortages by capitalising on a centralised, highly skilled workforce and deploying nearly complete, pre-tested power modules to the remote data centre location for rapid and simplified final installation. 4. The accelerating pace of change in compute technology The speed at which compute technology is evolving has reached an unprecedented level, putting enormous pressure on data centre operators and their partners. Moore’s Law is no longer the standard; today’s compute configurations are far more advanced than ever before, with denser platforms being released every 12 to 18 months. This rapid cycle forces operators to rethink how they design and future-proof facilities - leveraging concepts such as modularisation - as infrastructure built just a few years ago can quickly fall behind. The need for collaboration Each of these challenges is significant on its own, but together they mark one of the most complex periods in the history of infrastructure development. To move forward, data centre operators, utilities, manufacturers, technology providers, and government agencies must work closely to identify solutions and provide support for each obstacle. On the skilled labour front, companies outside the manufacturing space are also contributing. Earlier this year, Google pledged support to train 100,000 electrical workers and 30,000 new apprentices in the US. This funding was awarded to the electrical training ALLIANCE (etA), the largest apprenticeship and training program of its kind, founded by the International Brotherhood of Electrical Workers and NECA. State leaders are playing a role as well. In Pennsylvania this summer, for example, the governor and other legislators have demonstrated strong support for data centre growth. MCG, a manufacturer and integrator of power and electrical systems, is one example of how industry players are stepping up. MCG designs, manufactures, delivers, and services systems tailored for data centre operators and other mission critical environments. In collaboration with operators and other equipment and technology providers, MCG produces modular power systems that are built off-site to ease workforce constraints. These systems are then delivered directly to data centres or their power facilities, where the MCG team commissions and maintains them. With efforts from government officials, companies like MCG and Google, and other stakeholders, the US data centre industry can continue powering the digital future - no matter how much demand for power and compute increases. For more from Mission Critical Group, click here.

Uncover the hidden risks in data centre resilience
In July 2024, a lightning arrester failure in Northern Virginia, USA, triggered a massive 1,500MW load transfer across 70 data centres - handling over 70% of global internet traffic. The result? No customer outages, but a cascade of grid instability and unexpected generator behaviour that exposed critical vulnerabilities in power resilience. Powerside’s latest whitepaper - entitled Data Centre Load Transfer Event – Critical Insights from Power Quality Monitoring - delivers a technical case study from this unprecedented event, revealing: • Why identical voltage disturbances led to vastly different data centre responses • How power quality monitoring helped decode complex grid interactions • What this means for future-proofing infrastructure in 'Data Centre Alley' and beyond Whether you are managing mission-critical infrastructure or advising on grid stability, this is essential reading. You can download the full whitepaper by registering below: [ninja_form id=5]

Securitas partners with Rohde & Schwarz on DC security
Securitas, a global security services provider, has announced a partnership with Rohde & Schwarz to integrate millimetre wave people-screening technology into its data centre security offering. The collaboration is aimed at strengthening protection against insider threats, data theft, and sabotage as demand for always-on digital infrastructure increases. Millimetre wave screening for critical environments At the core of the partnership is the use of Rohde & Schwarz’s Quick Personnel Security Scanners (QPS), which employ millimetre wave technology and artificial intelligence to detect potential threats. Already in use by government agencies and high-security organisations, the scanners provide non-contact, safe, and accurate screening while supporting real-time decision-making by on-site security officers. According to Securitas, the QPS improves operational flow by reducing the need for manual screening, enabling more efficient staffing models and allowing remote monitoring. The system also provides insights into alarm rates and throughput, supporting both regulatory compliance and continuity of operations. Milton Plet, Senior Vice President and Head of Global Clients Data Center Group at Securitas, says, “This is a perfect demonstration of how technology augments - rather than replaces - human expertise. "Our officers are still at the core of the solution, only better supported by real-time information to make even better decisions in order to protect our clients’ assets.” Expanding security options for data centres Andreas Haegele, Vice President of Microwave Imaging at Rohde & Schwarz, adds, “The strategic partnership with Securitas enables us to introduce our security scanners, formerly exclusive to governments, now also to data centres, where adaptability, consistency, and precision are key. "Together we are delivering a customised, future-proof solution that adapts to both clients’ needs and the threat landscape.” Nelson Barreto, Senior Vice President, Global Clients at Securitas Technology, argues, “By combining electronic security expertise along with our global protective services and reach, we’re delivering a smarter, more adaptive approach to securing data centres, no matter where they’re located.” Securitas has more than 90 years of experience in protective services. By adding advanced millimetre wave screening to its multi-layered security framework, the company says it aims to enhance both resilience and efficiency in data centre operations. For more from Securitas, click here.

4 in 5 CISOs say DeepSeek must be regulated
According to cybersecurity company Absolute Security’s UK Resilience Risk Index Report, four in five (81%) UK CISOs (Chief Information Security Officers) believe DeepSeek - a China-based AI chatbot raising global security concerns - must be urgently regulated by the UK Government before it sparks a full-scale national cyber crisis. In response to these growing risks, over a third (34%) have implemented full bans on AI due to cyber security concerns, while 30% of CISOs say they’ve already pulled the plug on AI tools within their organisation. The findings come from a recent survey commissioned by Absolute Security, which polled 250 UK CISOs at enterprise organisations via independent research agency Censuswide, to assess how businesses are coping with accelerating cyber challenges in an increasingly AI-powered world. DeepSeek, the rapidly rising AI platform, has raised significant cybersecurity concerns due to its potential to expose sensitive data and be misused by cybercriminals. These issues have led organisations and governments to reconsider their cybersecurity strategies. Businesses are already struggling to cope with the increasing complexity of cyber threats, as shown by the recent Harrods breach among others. However, as CISOs grapple with this evolving landscape, the added layer of AI-powered threats is prompting a re-evaluation of cyber defences. Three out of five (60%) UK CISOs now predict a rise in cyber attacks as a direct result of DeepSeek, with another 60% saying this AI technology is already complicating privacy and governance frameworks, making their jobs more difficult. These concerns reflect a clear shift in mindset, with 42% of CISOs now seeing AI as a bigger threat than a help to cybersecurity. The readiness gap is just as concerning, with nearly half (46%) of security leaders admitting their teams are not prepared to handle AI-driven threats, such as those posed by tools like DeepSeek. The rapid development of DeepSeek is outpacing their defences, according to survey findings, creating a growing risk that many believe can only be managed through government regulation. Andy Ward, SVP International of Absolute Security, comments, “Our research highlights the significant risks posed by emerging AI tools like DeepSeek, which are rapidly reshaping the cyber threat landscape. "As concerns grow over their potential to accelerate attacks and compromise sensitive data, organisations must act now to strengthen their cyber resilience and adapt security frameworks to keep pace with these AI-driven threats. That’s why four in five UK CISOs are urgently calling for government regulation. They’ve witnessed how quickly this technology is advancing and how easily it can outpace existing cybersecurity defences. "These are not hypothetical risks. The fact that organisations are already banning AI tools outright and rethinking their security strategies in response to the risks posed by LLMs like DeepSeek demonstrates the urgency of the situation. "Without a national regulatory framework - one that sets clear guidelines for how these tools are deployed, governed, and monitored - we risk widespread disruption across every sector of the UK economy. The time for debate is over. We need immediate action, policy, and oversight to ensure AI remains a force for progress, not a catalyst for crisis.” Despite the risks, investment in AI talent is accelerating. 84% of organisations are prioritising the hiring of AI specialists in 2025, and 80% have committed to AI training at the C-suite level, hoping that upskilling AI talent can outweigh any increasing threats. Most companies don’t intend to retreat from AI; they want to face it head-on. To use AI safely, CISOs say they need clear rules, stronger government oversight, a skilled AI workforce, and a national plan to deal with the specific risks of DeepSeek and similar tools.

72% of organisations faced IT disruption in past year
New research released today uncovers a worrying truth: despite years of digital transformation, IT resilience remains a critical vulnerability for UK enterprises. According to the latest research commissioned by Asanti, a UK colocation data centre provider, 72% of senior IT decision makers reported experiencing significant disruption or downtime in the past year due to IT resilience issues, with only 31% expressing extreme confidence in their current disaster recovery and business continuity plans. The research, conducted by Vanson Bourne, surveyed 100 senior IT leaders across public and private sector organisations. The findings reveal a concerning disconnect between perceived and actual resilience performance. Key highlights from the study • Gaps in recovery preparedness — Only 56% of organisations surveyed have fully defined and regularly tested Recovery Time Objectives (RTOs), and just 36% say the same for Recovery Point Objectives (RPOs), which are the core thresholds set for acceptable downtime and data loss. • Significant operational fallout — 60% of businesses struggled to return to normal operations after a major resilience disruption, while 58% admitted to suffering substantial financial losses. • Confidence crisis in risk recovery — Over half of respondents report only low or medium confidence in handling major risks like cybersecurity breaches (54%), data centre outages (61%), or unauthorised physical access (62%). The research also identifies a “resilience competency gap,” where critical planning, testing, and investment decisions are lagging behind the complexity and frequency of modern IT threats. Despite widespread cloud adoption, 51% still view cloud service outages as one of the top risks to operations - surpassing even traditional IT system failures (49%). “Too many organisations assume they’re more resilient than they actually are,” comments Stewart Laing, CEO of Asanti. “This research makes clear that real resilience isn’t about where your systems live, it’s about how well you’ve prepared to keep them running. "Without clearly defined recovery objectives, rigorous testing, and a culture of proactive risk management, even the most advanced infrastructure can fail. Business leaders must move beyond surface-level confidence and embed resilience into every layer of operations.” The human factor remains a weak link The study found that 89% of respondents believe human oversight is a critical vulnerability in their resilience strategy, while 91% agreed that operational failures due to human error could compromise backup power capabilities. While 59% of those respondents said that they test their business continuity and disaster recovery plans at least every six months, these exercises often lack the depth required to reveal systemic resilience weaknesses. Only 31% of respondents felt extremely confident in their current business continuity and disaster recovery plans - a sobering indicator of widespread fragility. Businesses are not measuring the true impact of downtime Although most firms track downtime (77%) and financial impact (73%) of resilience incidents, softer yet critical indicators like reputational impact (54%) and impact on digital transformation goals (57%) are often overlooked. “Measurement is the foundation of resilience,” continues Stewart. “If you’re only tracking outages and costs, you’re missing the true business impact. "Resilience must be strategic, tested, and integrated across infrastructure, operations, and leadership thinking.” For more from Asanti, click here.

Infoblox unveils 2025 DNS Threat Landscape Report
Infoblox, a provider of cloud networking and security services, today released its 2025 DNS Threat Landscape Report, revealing a dramatic surge in DNS-based cyberthreats and the growing sophistication of adversaries leveraging AI-enabled deepfakes, malicious adtech, and evasive domain tactics. Based on pre-attack telemetry and real-time analysis of DNS queries from thousands of customer environments - with over 70 billion DNS queries per day - the report offers a view into how threat actors exploit DNS to deceive users, evade detection, and hijack trust. "This year's findings highlight the many ways in which threat actors are taking advantage of DNS to operate their campaigns, both in terms of registering large volumes of domain names and also leveraging DNS misconfigurations to hijack existing domains and impersonate major brands," says Renée Burton, Head of Infoblox Threat Intel. "The report exposes the widespread use of traffic distribution systems (TDS) to help disguise these crimes, among other trends security teams must look out for to stay ahead of attackers." Research background Since its inception, Infoblox Threat Intel has identified a total of over 660 unique threat actors and more than 204,000 suspicious domain clusters, meaning a group of domains believed to be registered by the same actor. Over the past 12 months, Infoblox researchers have published research covering 10 new actors. They have uncovered the breadth and depth of malicious adtech, which disguises threats from users through TDS. The report brings together findings from the past 12 months to illuminate attack trends. Particularly, the report sheds light on adtech's role in these attacks. Top findings • 100.8 million newly observed domains in the past year, with 25.1% classified as malicious or suspicious• 95% of threat-related domains observed in only one customer environment• 82% of customer environments queried domains associated with malicious adtech, which rotate a massive number of domains to evade security tools and serve malicious content• Nearly 500k traffic distribution system (TDS) domains were seen in the last 12 months within Infoblox networks• Daily detection of DNS Tunneling, exfiltration, and command and control, including Cobalt Strike, Sliver, and custom tools, which require ML algorithms to detect Uptick in newly observed domains Over the year, threat actors continuously registered, activated, and deployed new domains, often in very large sets through automated registration processes. By increasing their number of domains, threat actors can bypass traditional forensic-based defences, which are built on a "patient zero" approach to security. This reactive approach relies on detecting and analysing threats after they have already been used somewhere else in the world. As attackers leverage increasing levels of new infrastructure, this approach becomes ineffective, leaving organisations vulnerable. Actors are using these domains for an array of malicious purposes, from creating phishing pages and deploying malware through drive-by downloads to engaging in fraudulent activities and scams, such as fake cryptocurrency investment sites. The need for preemptive security These findings underscore a pressing need for organisations to be proactive in the face of AI-equipped attackers. Investing in preemptive security can be the deciding factor in successfully thwarting threat actors. Proactive protection, paired with consistent radar on emerging threats, tips the scales in favour of security teams — allowing them to pull ahead of attackers and interrupt their unlimited supply of domains.



Translate »