-
Featured services
Think beyond the robots
The successful integration of AI and IoT in manufacturing will depend on effective change management, upskilling and rethinking business models.
Read the blog -
Services
Leverage our capabilities to accelerate your business transformation.
-
Services
Network Services
Popular Products
-
Services
Cloud
Popular Products
-
Cloud Architecture and Modernization
Discover how to achieve your business goals through cloud modernization practices, that deliver improved agility, reusability and scalability.
-
Cloud Optimization
Discover how to maximize operational excellence, business continuity and financial sustainability through our cloud-advanced optimization services.
-
-
Services
Consulting
-
-
Services
Data and Artificial intelligence
-
Services
Technology Solutions
Client stories
-
Services
Global Data Centers
-
Services
CX and Design
-
Services
Application Services
-
Services
Sustainability Services
-
Services
Digital Workplace
-
Services
Business Process Services
Master your GenAI destiny
We’ll help you navigate the complexities and opportunities of GenAI.
Explore GenAI -
-
-
Insights
Recent Insights
-
The Future of Networking in 2025 and Beyond
-
Using the cloud to cut costs needs the right approach
When organizations focus on transformation, a move to the cloud can deliver cost savings – but they often need expert advice to help them along their journey
-
Make zero trust security work for your organization
Make zero trust security work for your organization across hybrid work environments.
-
-
Master your GenAI destiny
We’ll help you navigate the complexities and opportunities of GenAI.
Explore GenAI -
-
Master your GenAI destiny
We’ll help you navigate the complexities and opportunities of GenAI.
Explore GenAI -
Discover how we accelerate your business transformation
-
About us
CLIENT STORIES
-
Liantis
Over time, Liantis – an established HR company in Belgium – had built up data islands and isolated solutions as part of their legacy system.
-
Randstad
We ensured that Randstad’s migration to Genesys Cloud CX had no impact on availability, ensuring an exceptional user experience for clients and talent.
-
-
CLIENT STORIES
-
Liantis
Over time, Liantis – an established HR company in Belgium – had built up data islands and isolated solutions as part of their legacy system.
-
Randstad
We ensured that Randstad’s migration to Genesys Cloud CX had no impact on availability, ensuring an exceptional user experience for clients and talent.
-
-
Sponsorships
CLIENT STORIES
-
Liantis
Over time, Liantis – an established HR company in Belgium – had built up data islands and isolated solutions as part of their legacy system.
-
Randstad
We ensured that Randstad’s migration to Genesys Cloud CX had no impact on availability, ensuring an exceptional user experience for clients and talent.
-
Everest Group PEAK Matrix® Assessment
NTT DATA is a Leader and Star Performer in the Everest Group Sustainability Enablement Technology Services PEAK Matrix® Assessment 2024.
Get the Everest report -
- Careers
Topics in this article
Leveraging technology for security, safety and health
As COVID-19 still spreads throughout the world, there is mounting evidence that the social distancing measures that public entities, private enterprises, and individuals have embraced, are having an effect on flattening the curve. However, there is still much to learn and do, yet at the same time, we still need to protect frontline staff within essential service industries better, such as those in healthcare, food services and yes, data centers.
The data center industry has always required the highest levels of security on multiple fronts to keep client equipment, and ultimately their businesses, operating without interruption. It’s important to mitigate all types of risk and this is often achieved through the combination of people, technology and integrated processes to keep data centers safe and secure. With the COVID-19 pandemic, we must also make data centers healthier environments to protect specialized field technicians, office employees and necessary visitors who need to come to the data center as we work to reduce the spread of the disease.
At our Global Data Centers Frankfurt 1 campus, also home to a Technology Experience Lab, we’re now testing an enhanced visitor management solution. We’re using a self-registration visitor kiosk that uses passport control level ID verification and facial matching. In addition to secure registration features, we’re using components that can measure the temperature of all visitors. The aim is to identify, in real-time, potential carriers of COVID-19 or other flu-like viruses. The kiosk is also being programmed to ask visitors if they have been in contact with infected people or if they have recently returned from a COVID-19 hotspot. When a user, whether this is a visiting guest or full-time employee, passes both criteria satisfactorily, he or she is allowed further access within the building by main reception. The entire process is very quick for individuals and ensures that privacy concerns and regulations are strictly adhered to.
The visitor management kiosk with thermal monitoring functionality
As we start our testing, we do realize that there are some limitations in that the kiosk cannot flag all infected visitors because of:
- asymptomatic people who do not show any signs of a fever and/or;
- people who knowingly or unknowingly answer COVID-19 related questions on the kiosk inaccurately.
But we’re just at the beginning of leveraging technology to identify a percentage of infected users better, in order to protect a larger population group. This is the first step in the process to make our work areas safer while improving the security and facility processes. We’re currently testing the kiosk on two floors with the intention of rolling it out to additional entrances and sites where security personnel, technicians, other essential workers and visitors will be using it. In addition, we plan to make use of features that essentially provide a contactless experience by allowing mobile devices to pre-register visits, and where phones can be used as temporary key cards but without compromising overall security.
We plan a follow-up blog to discuss our tests and future plans to make data centers even more secure and healthy.