Search
  • Videos
  • Windows 10
  • 5G
  • Best VPNs
  • Cloud
  • Security
  • AI
  • more
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Windows 10
    • 5G
    • Best VPNs
    • Cloud
    • Security
    • AI
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

Photos: How Google protects its datacentres

6 of 9 NEXT PREV
  • 40154307-1-google-datacentre-build-server.jpg

    Behind the scenes peek inside search giant's datacentre

    Google has opened the doors to one of its datacentres to show how it protects customer data.

    A video released by Google on YouTube shows how it guards its datacentres using a range of security measures - from biometric IDs for staff to the complete destruction of defunct hard drives.

    Google's datacentres handle information relating to everything from a search on Google.com to an e-commerce transaction through Google Checkout.

    The security process starts with the design of Google's servers - with the machines custom-built to Google's specifications and running a specialised, stripped-down version of the Linux OS.

    Google claims that the customised hardware and software limits the vulnerabilities of the machines.

    Published: April 26, 2011 -- 16:38 GMT (09:38 PDT)

    Photo by: Google/YouTube.com

    Caption by: Nick Heath

  • 40154307-2-google-iris-scan-datacentre.jpg

    Google staff have to go through a series of identity checks to gain access to the datacentre building and different parts of the facility.

    Staff at the datacentres carry identity badges that are made using lenticular printing, which makes them difficult to forge.

    In some of Google's datacentres, staff identity is checked by scanning their irises, as seen here.

    Published: April 26, 2011 -- 16:38 GMT (09:38 PDT)

    Photo by: Google/YouTube.com

    Caption by: Nick Heath

  • 40154307-3-google-server-datacentre.jpg

    Google takes a variety of steps to protect customer data stored on its datacentre hard drives, a rack of which are seen here.

    Customer data is stored in multiple locations, the files that store the data are given random file names and are not written in clear text, so they are not easily readable by people.

    If there is a fire or any other disruption at the datacentre, customers are able to access their data from another datacentre location.

    Published: April 26, 2011 -- 16:38 GMT (09:38 PDT)

    Photo by: Google/YouTube.com

    Caption by: Nick Heath

  • 40154307-4-google-datacentre-secure-hard-drives.jpg

    Google tracks the location and status of each hard drive in its datacentres.

    If there is a problem with a hard drive, it's reformatted and retested. If the drive does not pass these tests it's then removed, and the data on the drive is overwritten and verified to make sure it contains no customer data.

    Published: April 26, 2011 -- 16:38 GMT (09:38 PDT)

    Photo by: Google/YouTube.com

    Caption by: Nick Heath

  • 40154307-5-google-datacentre-hard-drive-crusher.jpg

    Drives that are no longer in use at the datacentre are destroyed in a multistep process to ensure that the data they contained is not recoverable.

    The first step is putting drives into the crusher, where a steel piston is pushed through the drive deforming the drive's platters and making them unreadable.

    Published: April 26, 2011 -- 16:38 GMT (09:38 PDT)

    Photo by: Google/YouTube.com

    Caption by: Nick Heath

  • 40154307-6-google-datacentre-drive-shredder3.jpg

    The next stage of the destruction process is putting the drives through a shredder that reduces the drives into fragments.

    Published: April 26, 2011 -- 16:38 GMT (09:38 PDT)

    Photo by: Google/YouTube.com

    Caption by: Nick Heath

  • 40154307-7-google-datacentre-magnetic-tapes.jpg

    Information stored on hard drives inside the datacentres is also backed up on magnetic tapes, such as the banks of tapes seen here.

    Published: April 26, 2011 -- 16:38 GMT (09:38 PDT)

    Photo by: Google/YouTube.com

    Caption by: Nick Heath

  • 40154307-8-google-datacentre-monitoring-station2.jpg

    Video surveillance allows Google staff to monitor datacentres, with the help of video analytics software that can detect anomalies in the video and tip off security staff.

    Some datacentres also have thermal imaging cameras to identify the heat signature of potential intruders.

    Published: April 26, 2011 -- 16:38 GMT (09:38 PDT)

    Photo by: Google/YouTube.com

    Caption by: Nick Heath

  • 40154307-9-google-datacentre-power-generator.jpg

    Each datacentre has emergency back-up generators, which are capable of powering the datacentres in the event of a power failure.

    Datacentres are connected to the internet via high-speed fibre optic cable, with multiple redundant connections to provide access to the datacentre in the event of the failure of a single connection.

    Published: April 26, 2011 -- 16:38 GMT (09:38 PDT)

    Photo by: Google/YouTube.com

    Caption by: Nick Heath

6 of 9 NEXT PREV
Nick Heath

By Nick Heath | April 26, 2011 -- 16:38 GMT (09:38 PDT) | Topic: Security

  • 40154307-1-google-datacentre-build-server.jpg
  • 40154307-2-google-iris-scan-datacentre.jpg
  • 40154307-3-google-server-datacentre.jpg
  • 40154307-4-google-datacentre-secure-hard-drives.jpg
  • 40154307-5-google-datacentre-hard-drive-crusher.jpg
  • 40154307-6-google-datacentre-drive-shredder3.jpg
  • 40154307-7-google-datacentre-magnetic-tapes.jpg
  • 40154307-8-google-datacentre-monitoring-station2.jpg
  • 40154307-9-google-datacentre-power-generator.jpg

Behind the scenes peek inside search giant's datacentre

Read More Read Less

The next stage of the destruction process is putting the drives through a shredder that reduces the drives into fragments.

Published: April 26, 2011 -- 16:38 GMT (09:38 PDT)

Caption by: Nick Heath

6 of 9 NEXT PREV

Related Topics:

Security TV Data Management CXO Data Centers
Nick Heath

By Nick Heath | April 26, 2011 -- 16:38 GMT (09:38 PDT) | Topic: Security

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • OnlyKey hardware security key

    This is the ultimate security key for professionals.

  • SoloKeys Solo V2

    Durable, fully reversible connectors, encapsulated in epoxy resin, and with updatable firmware.

  • iVerify: Added security for iPhone and iPad users

    I'm usually wary of security apps, but iVerify by Trail of Bits is different. It comes highly recommended and offers a lot of features in a small download. ...

  • iStorage datAshur BT hardware encrypted flash drive

    FIPS 140-2 Level 3 compliant storage drive with wireless unlock feature and remote management. IP57 rated for dust and water resistance.

  • Netgear BR200 small-business router

    The Netgear BR200 Insight Managed Business Router has been designed to be easy to set up, and features a built-in firewall, VLAN management, and remote cloud monitoring, and can be ...

  • YubiKey 5C NFC: The world’s first security key to feature dual USB-C and NFC connections

    The YubiKey 5C NFC can be used across a broad range of platforms -- iOS, Android, Windows, macOS and Linux -- and on any mobile device, laptop, or desktop computer that supports USB-C ...

  • Apricorn Aegis Secure Key 3NXC

    The new Aegis Secure Key 3NXC builds on Apricorn's Secure Key 3z and Aegis Secure Key 3NX, taking the same proven form-factor and physical keypad, and adding something that users have ...

ZDNet
Connect with us

© 2021 ZDNET, A RED VENTURES COMPANY. ALL RIGHTS RESERVED. Privacy Policy | Cookie Settings | Advertise | Terms of Use

  • Topics
  • Galleries
  • Videos
  • Sponsored Narratives
  • Do Not Sell My Information
  • About ZDNet
  • Meet The Team
  • All Authors
  • RSS Feeds
  • Site Map
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In
  • Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums