Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access ManagementIdentity Management

Closing the Intelligence Gap with Identity-Powered Security

By Travis Greene
February 10, 2014

Something has gone horribly wrong in the world of security.

While security investment has continued at a steady pace, so have devastating data breaches – and the future trends don’t look any better.  Yet, perplexingly, we continue to behave as though simply spending more money and devoting more resources to what has failed in the past will yield a different result in the future.

In no other part of the business would such an approach be acceptable or tolerated.

The challenge is that for the security industry, any advances in keeping data safe are almost immediately offset by equivalent advances in the skills and tools of the attackers.  Worse, the very ground on which security is built – the infrastructure of business computing – is undergoing convulsive change, driven by cloud, mobility and social media.   Even treading water has become an all but unattainable goal.

So how does the security industry move past the spiral of chasing after new magic cure-alls while watching success drift even further away?  The answer is to broaden the use of information sources to better inform the security processes we already have.

The most basic question that any security team must answer revolves around the concept of what is “normal.” Is the behavior of this system, this service, or this person “normal” and “safe?”  Or is what we are seeing an indication of suspicious or malicious behavior?  The ability to answer this question, with what is termed “security intelligence,” is fundamental to understanding whether your organization is under attack. So much that it would be easy to imagine the capability to answer it is commonplace.  It isn’t.

Instead, organizations often struggle to understand who people really are, let alone whether they are behaving in a way that might suggest they were an insider with intent to damage, or perhaps that an outsider has compromised a privileged account.

This identity challenge – understanding who a user is, what is normal for them, what access they need, and what is business-appropriate for them fuels the security intelligence gap we continue to fail to close.

Another contributing factor to our intelligence gap is lack of monitoring and management of privileged users who have overly broad access rights to systems and data. As a result, organizations continue to experience avoidable data breaches, compliance failures and unnecessary risk.  Worse, when a privileged account is compromised and used as a vector for an attack – or that privileged user decides to behave maliciously – it’s often difficult to determine what they are doing and why.

Organizations must integrate “identity” into their security practices so that users with inappropriate access rights can be identified, monitored and managed to avoid unnecessary risk from internal and external attackers.   

Far too often, identity is relegated to operational tasks like provisioning access to business tools. Yet your “identity” carries invaluable information that could enrich and inform security teams who need to understand whether your access to a sensitive database is part of your job, or part of a plan to steal from your employer.

As more and more of the computing environment moves out of the control of the corporate IT function – out into the cloud or onto mobile devices – so too has the need to integrate a deep understanding of who the user really is, and what is normal for them becomes a foundational part of effective security monitoring.

Integrating identity into security monitoring will empower security teams to cut through the noise of activity and quickly identify if what they are seeing is normal and acceptable, or unusual and damaging. For example, when an employee exhibits unusual behavior, such as accessing a sensitive data store from a remote location on a mobile device rather than the usual method from the office, security teams can appropriately respond.

2014 needs to be the year security teams begin to embrace the notion that deeper identity context is required to improve security and incident response. This is the year for “identity-powered” security that provides the deeper identity context through integration with security monitoring to meet the demands of our complex and changing security landscape, closing the intelligence gap.

Without such identity-powered security, the fact is that we are going to see security teams continue to struggle to understand what behavior they are seeing, and most importantly, what the events they are monitoring really mean – and that is ultimately a recipe for continued failure, and more and more damaging data breaches.

KEYWORDS: cyber risk mitigation identity-powered security insider threats security intelligence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

As NetIQ’s Sr. Solution Strategist for Identity Management, Travis Greene works directly with customers, industry analysts, partners and others to define identity management solutions based on the NetIQ product and service base. After a 10-year career as a U.S. Naval Officer, Greene spent time as an IT manager and later National Director of Data Center Operations for an application development and hosting firm. During his time with a managed service provider, he began working with the ITIL framework and is ITIL Expert Certified. Greene is a regular speaker at Local Interest Groups and national conferences. He holds a BS in Computer Science from the U.S. Naval Academy.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • School bus drives down street

    Closing the gap between student safety and security in K-12 school transportation

    See More
  • Two women working together on couch

    International Women’s Day 2024: Closing the gender gap in security

    See More
  • office building windows

    Disparate systems: The importance of closing the gap

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing