Computing security is a vital element to consider when choosing a San Francisco data center for remote storage. While most SF data centers deliver adequate protection for most corporate needs, understanding the various elements of computing security can often help companies to decide among competing firms for their storage needs. Security measures typically fall into the following three categories, each of which provides necessary protection for valuable company information:


  1. Protection against unauthorized access
  2. Secure log-on technology
  3. Physical security for the premises


Preventing Unauthorized Access

Most facilities maintain firewalls to prevent unauthorized access to the sensitive and proprietary information stored on their servers. Firewalls serve as secure perimeters, restricting access to the information contained within and ensuring its security against intrusion, theft and unauthorized access. This provides a solid first layer of protection, but constant monitoring and analysis of the traffic patterns is necessary in order to identify deliberate intrusion or distributed denial-of-service attempts and to block these attacks effectively when they occur. State-of-the-art authentication and authorization methods are also necessary.

Secure Methods

In order to provide safe and secure access for clients, remote log-on methods should incorporate the latest encryption techniques to prevent interception and misuse of corporate log-ons and passwords. Strict password policies should also be enforced; strong passwords that include a mix of numbers, capitalized letters and lowercase letters offer better protection against blunt-force intrusion attempts. Staff members should be warned against using easy-to-guess passwords.


Social engineering methods are frequently used by hackers; by avoiding these personally significant passwords, employees can help to ensure safety. The corporate computing policy should also include recommendations against using the same password for both personal and corporate accounts. This can prevent the domino effect in which one security breach can result in numerous other occasions of unauthorized access.

Physical Security

The building or complex in which the corporate servers will be housed should be secured and monitored around the clock to prevent physical intrusion and theft. Closed circuit television cameras are often used to provide a visual record of the activities surrounding corporate servers. Additionally, high level security systems are generally in place both at the perimeter of the building and at every entrance and exit to the server rooms themselves.

Companies like Digital Realty Trust, Windstream and others in this marketplace offer secure storage solutions for business needs. By considering the security measures in place to protect data, companies can make a more informed decision when selecting the right facility for their storage needs.