Design versus Construct
The Tier III Certification of Facility Design Documents only covers the blueprint of the data centre, and it does not cover the eventual data centre built. Most importantly, this certification expires two years after the award date if the data centre does not progress to Tier III Certification of Constructed Facility. This will mean that that particular data centre could construct the data center differently from the design specifications which is certified by Uptime Institute. Without the next stage of certification, the Tier Certification of Facility Design Documents will just be a plan without action. In fact, many data centers in the region are not certified under the Uptime Institute Tier III Certification of Design Document. In Singapore, there are only two data centres are certified under this level of certification.
In comparison,the Tier III Certification of Constructed Facility is more difficult to achieve as it ensures the facility has been constructed as designed and has the demonstrated capability to meet the target Tier objectives and requirements
From our conversations with our customers and understanding of the market, customers who are keen on data centres withTier III Certification of Facility Design Documents and Tier III Certification of Constructed Facility are mainly from the finance, government and media verticals.
Most customers would want their data centres designed, constructed and operated as well as maintained for maximum reliability. The data centres need to be concurrently maintainable, which permits systems to be bypassed, without impacting the availability of the computing equipment. This is important for them because their applications require high availability.
To further address our customers' needs, especially those in the finance services industry, we are also working to complete a Threat and Vulnerability Risk Assessment (TVRA), in line with Monetary Authority of Singapore's Technology Risk Management Guidelines for the financial industry.
The purpose of a TVRA is to identify security threats to and operational weaknesses in a data center in order to determine the level and type of protection that should be established to safeguard it.Therefore, data centres increasingly aim to go through the TVRA assessment which will be based on various possible scenarios of threats which include theft, explosives, arson, unauthorized entry, external attacks and insider sabotage. The scope of the TVRA review also includes the perimeter and surrounding environment, building and data center facility. The review takes into account daily security procedures, critical mechanical and engineering systems, building and structural elements as well as physical, operational and logical access controls.
Thanks to the Internet and social media, there is a growing consumption of rich digital data in Southeast Asia. Research from ComScore's Southeast Asia Digital Future in Focus 2013 points out that the region ranks higher than the global average when it comes to music, movies and entertainment consumption.
Sign up for CIO Asia eNewsletters.