Skip to content

TechRepublic

  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Cloud
  • 5G
  • Big Data
  • TechRepublic Premium
  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Cloud
  • 5G
  • Big Data
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Data Centers

How Google secures its data centers (photos)

By Sonja Thompson April 28, 2011, 10:45 PM PDT

Image
1
of 9

01google-datacentre-build-server.jpg
01google-datacentre-build-server.jpg
How Google secures its data centers (photos)

ntGoogle has opened the doors to one of its data centers to show how it protects customer data in this report from silicon.com.

n

ntA video released by Google on YouTube shows how it guards its data centers using a range of security measures – from biometric IDs for staff to the complete destruction of defunct hard drives.

n

ntGoogle’s data centers handle information relating to everything from a search on Google.com to an e-commerce transaction through Google Checkout.

n

ntThe security process starts with the design of Google’s servers – with the machines custom-built to Google’s specifications and running a specialized, stripped-down version of the Linux OS.

n

ntGoogle claims that the customized hardware and software limits the vulnerabilities of the machines.

n

ntPhoto credit: Google/YouTube.com

How Google secures its data centers (photos)

ntGoogle staff have to go through a series of identity checks to gain access to the data center building and different parts of the facility.

n

ntStaff at the datacenters carry identity badges that are made using lenticular printing, which makes them difficult to forge.

n

ntIn some of Google’s datacenters, staff identity is checked by scanning their irises, as seen here.

n

ntPhoto credit: Google/YouTube.com

How Google secures its data centers (photos)

ntGoogle takes a variety of steps to protect customer data stored on its data center hard drives, a rack of which are seen here.

n

ntCustomer data is stored in multiple locations, the files that store the data are given random file names and are not written in clear text, so they are not easily readable by people.

n

ntIf there is a fire or any other disruption at the data center, customers are able to access their data from another data center location.

n

ntPhoto credit: Google/YouTube.com

How Google secures its data centers (photos)

ntGoogle tracks the location and status of each hard drive in its data centers.

n

ntIf there is a problem with a hard drive, it’s reformatted and retested. If the drive does not pass these tests it’s then removed, and the data on the drive is overwritten and verified to make sure it contains no customer data.

n

ntPhoto credit: Google/YouTube.com

How Google secures its data centers (photos)

ntDrives that are no longer in use at the datacenter are destroyed in a multistep process to ensure that the data they contained is not recoverable.

n

ntThe first step is putting drives into the crusher, where a steel piston is pushed through the drive deforming the drive’s platters and making them unreadable.

n

ntPhoto credit: Google/YouTube.com

How Google secures its data centers (photos)

ntThe next stage of the destruction process is putting the drives through a shredder that reduces the drives into fragments.

n

ntPhoto credit: Google/YouTube.com

How Google secures its data centers (photos)

ntInformation stored on hard drives inside the data centers is also backed up on magnetic tapes, such as the banks of tapes seen here.

n

ntPhoto credit: Google/YouTube.com

How Google secures its data centers (photos)

ntVideo surveillance allows Google staff to monitor datacenters, with the help of video analytics software that can detect anomalies in the video and tip off security staff.

n

ntSome data centers also have thermal imaging cameras to identify the heat signature of potential intruders.

n

ntPhoto credit: Google/YouTube.com

How Google secures its data centers (photos)

ntEach data center has emergency back-up generators, which are capable of powering the data centers in the event of a power failure.

n

ntData centers are connected to the internet via high-speed fibre optic cable, with multiple redundant connections to provide access to the data center in the event of the failure of a single connection.

n

ntPhoto credit: Google/YouTube.com

  • Data Centers
  • Account Information

    Share with Your Friends

    How Google secures its data centers (photos)

    Your email has been sent

Share: How Google secures its data centers (photos)
Image of Sonja Thompson
By Sonja Thompson
My name is Sonja Thompson. I've worked for TechRepublic since October of 1999, starting with the enewsletter team, then with the Premium Products group (creating books and CDs), as well as programming some of the elements on the site. After leading t
  • Account Information

    Contact Sonja Thompson

    Your message has been sent

  • |
  • See all of Sonja's content

TechRepublic Premium

  • TechRepublic Premium

    Diversity and inclusion policy

    The importance of diversity and inclusion in any given organization cannot be overstated. It establishes a level playing field, brings together people with different backgrounds, perspectives, traditions and ideas and enriches company culture by ensuring fairness and tolerance. This helps build a more effective and collaborative workforce which enables the business to run in a ...

    Downloads
    Published:  June 5, 2023, 4:00 PM EDT Modified:  June 6, 2023, 9:27 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Development lifecycle policy

    Software development is a complex process that involves a specific series of steps (known as the development lifecycle) to transform a concept into a deliverable product. The steps involved with creating the finished product must be carefully adhered to yield the best results, reduce inefficiencies and maximize customer satisfaction. The purpose of this policy from ...

    Downloads
    Published:  June 5, 2023, 4:00 PM EDT Modified:  June 6, 2023, 9:15 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Checklist: Network and systems security

    Cybersecurity demands and the stakes of failing to properly secure systems and networks are high. While every organization’s specific security needs form a unique and complex blend of interconnected requirements, numerous security fundamentals almost always apply to each of these groups. It stands to reason that cybersecurity pros who effectively identify network and systems risks ...

    Published:  June 1, 2023, 4:00 PM EDT Modified:  June 2, 2023, 7:48 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to host multiple websites on Linux with Apache

    In this guide from TechRepublic Premium we’re going to explore the various things you can do with a Linux server. We won’t leave out any steps, so you won’t have to refer to another tutorial to complete the process. The only step we will leave out is the installation of Linux, as we’ll assume you ...

    Downloads
    Published:  May 31, 2023, 4:00 PM EDT Modified:  June 1, 2023, 7:45 AM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice