View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Cybersecurity
November 15, 2013

Guest blog: Defending the border enterprise

Sam Curry, CTO and chief technologist for security firm RSA, tells CBR why employees are the frontline in the battle for cyber security.

By Cbr Rolling Blog

New business and IT trends are causing serious disruptions in how we approach information security. With corporate identities under siege, a single successful login is no longer a sufficient way to attain trust. While in the past there was a defined perimeter around important information, today that perimeter is virtually non-existent.

Cloud, workforce mobility, BYOD and SaaS platforms have dissolved the traditional boundaries while adding to the headache of potential points of breach IT departments have to work out in securing assets they don’t own or operate.

A different type of defence must be implemented to adapt to this new normal and secure a borderless enterprise from an ever-changing threat landscape. More specifically, as an organisation’s employees become the front line of cyber attacks, IT departments today need a system of identity access management (IAM) that is more dynamic, agile, intelligent and risk-aware: in short, adaptive IAM.

Whereas traditional IAM approaches guarded stationary perimeters around data largely in one, centralised location, adaptive IAM creates a dynamic "situational perimeter" that patrols and safeguards against attacks by enforcing security wherever users interact with corporate data and resources – not only across various devices and platforms, but throughout the entire process of interaction.

Today’s advanced threats and multi-vector attacks (the different methods in which employees can be targeted, i.e. through malicious emails, accessing wireless networks on smartphones, chatting on social network sites etc,)can strike at any moment during the user experience, and many of today’s IAM solutions are too primitive to spot suspicious behaviour. IAM systems today assume that users providing correct credentials at first login can be trusted, but the fact is that establishing trust cannot just be a one-time thing.

While convenience must be placed at the centre of the operations, users are acclimating to the idea of signing onto multiple websites when using online ‘passports’, such as their Facebook ID, Google sign-in or Microsoft account. It’s just a matter of time before people expect similar or even greater levels of integration when signing into corporate IT services.

So how do we achieve this new level of responsive, adaptive, intelligent security? The concept rests on four basic principles:

1. Creating rich user profiles
drawn from many attributes that can independently corroborate the trustworthiness of users and their activities in real-time against a historical baseline, with significant deviations from ‘normal’ behaviour signalling security problems.

Content from our partners
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape
Green for go: Transforming trade in the UK

2. Providing intelligence through big data analytics that can assess risk, detect problems and interrupt users attempting unsafe activities.

3. Monitoring and risk-based intervention should be implemented to keep track of what users do after initial authentication, and adjust access controls to measured risk levels.

4. Consumer-level convenience must always be top of mind, meaning identity controls and risk assessments must occur behind the scenes, intruding upon corporate end users only when necessary.

While these principles are fairly straightforward, the path to adaptive IAM will not necessarily be a quick or easy one. Companies must rethink the way they think about security to take into account the way their employees are interacting with company data. Employees are no longer accessing information on one central server from the PC. They are interacting with it at home, on the go and from a pool of devices that grows every day.

In reality, we are likely a few years from this IAM ideal, but progress is being made and more importantly, the charge has been set forth. IAM solutions must adapt as fast as the rapidly changing threat scenarios they protect against. By implementing an IAM solution that is adaptable, intelligent and dynamic, we can establish effective, situational perimeters around the borderless enterprise and arm ourselves for the frontlines of today’s cyber security battle.

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU