Data Center Security

Information Technology Management

Data centers are subject to four threats that
are usually overlooked; these are forms of
Radiation-Based Data Destruction (RBDD)

Active systems like EMP burst devices

A portable, battery-powered EMP burst device can generate extremely powerful magnetic-field waves for a few milliseconds, comparable to a nuclear electromagnetic pulse (NEMP).
One such burst can be enough to damage all servers and other (safety) electronics in your location.

On the internet you can easily find instructions for making an EMP burst device. A handyman can construct one in a few hours with commonly available components. For people who have difficulty reading the texts, there is even an instruction video on YouTube.
And a lazy or less technically skilled criminal can rent a portable device, afully anonymously, for less than US $ 1000, from several sources all over the world. It is a real industry, an entirely new type of crime.

Through the air these NEMP waves will propagate for hundreds of meters, nd concrete walls are no obstacle. The waves can also travel through existing cables, through the metallic protection around cables or even common pipelines for gas and water, bringing the data-killing power burst to its intended target: your data center.

Military NEMP/EMP

More and more nations and organizations have access to nuclear materials and thus present a risk of nuclear explosions.
To give you an idea of the distances involved: a nuclear burst in the stratosphere above Moscow will create a NEMP field over all of Western Europe, including London. Such a NEMP field can destroy all unprotected data.

Electronic theft

Electronic theft is defined as illegally gathering
radiated information by criminals resulting in electronics theft and/or alteration or other manipulation of data.

With sensitive equipment that is currently on the market, data transferred through the air can be read from hundreds of meters away, so in places where a large secured zone cannot be created, like for instance city offices in public buildings, confidential information can be stolen or manipulated.

Solar storms

High levels of solar activity, known as a solar-wind shock wave, cause a geomagnetic storm that interacts with the Earth’s magnetic field. This temporary disturbance of the Earth’s magnetosphere can destroy data.

In 1989, a geomagnetic storm energized ground-induced currents thatdisrupted electric power distribution throughout most of the province of Quebec and caused aurorae as far south as Texas. Another example is the solar storm which only very nearly missed the earth in 2012.

Key words

  • Tampering and Altering Information
  • Cyber warfare, Cyber crime
  • Compromising Emanations
  • EMP Bunkers and Shelters
  • Datacenter Shielding
  • HEMP / NEMP Protection
  • Data theft
  • Eavesdropping
  • Forensic Investigation
  • Sabotage
  • Electromagnetic

New solutions for protecting your data

In collaboration with several universities we have developed, tested and
implemented an electromagnetically shielded Faraday cage for data centers.
With the integrated filtered cables and shielded pipelines, this creates a
radiation-protection wall around your sensible data equipment.
The electromagnetic barrier will withstand any attack or pulse up to a million times.


Protection against:

  • EMP busters - operated by terrorist groups, frustrated employees, lone wolves
  • electronics theft - alteration/manipulation of data by cyber criminals
  • collection of radiated information - by cyber criminals
  • risk of solar storm - like the one that almost hit the Earth in 2012
  • military EMP – e.g. a nuclear burst in the stratosphere above Moscow creating an EMP field stretching as far as London


Protective measures are no longer the exclusive domain of military, intelligence, forensic and governmental bodies. The high-performance shielding products made by Holland Shielding Systems are available for any company or legal entity taking its data protection seriously.

Together with you, Holland Shielding engineers will work out the optimal solution for your protection needs. We start by making a threat and risk analysis of your data center as the foundation of the Faraday cage protection system.

Conductive rubber 5750 series can be cut into any desired shape and according to drawings
Active systems like EMP burst devices
Conductive rubber 5750 series can be made as small as the tip of a pen
Military NEMP/EMP
Conductive rubber 5750-S series cut according to customer drawing
Electronic theft
Conductive rubber 5750-S series cut according to customer drawing
Solar storms
Conductive rubber 5750-S series cut according to customer drawing 
Key words
Conductive rubber 5750-S series cut according to customer drawing
New solutions for protecting your data

Conductive rubber 5750-S series cut according to customer drawing
Extra advantages of the data-shielding Faraday cage

Conductive rubber 5750-S series cut according to customer drawing


Would you like to...

General documentation

New FREE engineering manual

Reservation in 5 sec.

Make a reservation for our new 300+ pages engineering manual coming next month

New EMC engineering manual