Macquarie Telecom to open $14M security data centre 'Bunker'
- 11 December, 2012 08:44
An artist's impression of the entry to Macquarie Telecom's IC4 security data centre in Canberra. The facility will be completed by mid-2013.
A $14 million Canberra security data centre dubbed the 'Bunker' by Macquarie Telecom (ASX: MAQ) will be opened in mid-2013 to help protect government Internet gateways.
Officially known as Intellicentre 4 (IC4), the facility is the result of the telco and data centre provider’s decision to invest in hosting, network and security for the Australian federal government’s Lead Agency Gateway (LAG) program.
The program, which covers all government agencies managed by the Financial Management and Accountability Act of 1997, has a goal of reducing the number of Internet gateways used by agencies from 124 down to eight. This is intended to reduce the risk of cyber attacks against government bodies.
Macquarie Telecom won the first gateway contract in October 2012 and signed a five-year agreement with the Department of Agriculture, Fisheries and Forestry.
According to the vendor’s government and security executive Glen Noble, IC4 will be built to ASIO T4 intruder and Payment Card Industry (PCI) ISO 27001 security standards as well as the Uptime Institute's Tier III data centre design standards.
“Being based in Canberra, the IC4 Bunker marks a dedicated investment in secure hosting for government and one which reaffirms our commitment to be the trusted provider connecting the public sector in Australia to the World Wide Web,” he said in a statement.
Noble added that additional infrastructure to support the LAG program will be deployed in the $60 million IC2 Sydney data centre for “increased resiliency and customer access options".
Macquarie Telecom has been contacted for additional information by CIO Australia.
Follow Hamish Barwick on Twitter: @HamishBarwick
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- Security, BI 'critical' for Australian CIOs in 2013: Telsyte
- Avoiding the data centre property trap
- SCADA systems in Australia easy target for malware: Security expert
- Department of Agriculture boosts resiliency with Internet gateway project
- Macquarie Telecom’s data centres get SAP cloud tick
- Twitter: @HamishBarwick
- Twitter: @CIO_Australia
- Facebook: CIO Australia
- LinkedIn: CIO Australia
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Maximising productivity without sacrificing security
Advances in mobility and client computing technology combined with the ubiquity of the Internet and social media are creating a culture and desire for constant connectivity and anywhere access to information. As these trends extend from the home into the work place, IT managers should consider seriously the opportunities for increased productivity and communication with customers and constituents, as well as understand the increased security risks posed by online, anytime access to private networks and data. Read more.
In Control at Layer 2: A Tectonic Shift in Network Security
Network hacking and corporate espionage are on the rise and set to intensify. Information security risks remain commonplace, and most organisations need to increase vigilance. This paper has analyses the realistic threats to fibre optic Ethernet networks – both at the LAN and WAN level. Read now.
New Demands for Real-time Threat Management
Many organisations are evaluating a new security model based upon IT risk management best practices. This is a good idea, but not enough for today’s dynamic and malevolent threat landscape. To keep up with IT changes and external threats, large organisations need to embrace two new security practices: real-time risk management for day-to-day security adjustments and real-time threat management to detect and remediate sophisticated, stealthy, and damaging security breaches (i.e., advanced persistent threats, or APTs). Learn more.