This resource is no longer available
As secure as you think your data center is, there are certain threats that can elude traditional methods of monitoring. This paper outlines these threats and suggests approaches to deploying monitoring devices and reducing downtime. Learn more about distributed physical threats, sensor placement, aggregating sensor data and more.