Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Identity Management

Telecoms Move Toward Predictive Security Intelligence

By Ajay Jain
tvnews
February 23, 2016

Telecom facilities are home to a number of critical and highly valuable assets, and given the sensitive nature of a large number of these locations, it’s vital that telecoms be able to recognize potential threats as soon as possible. Additionally, a number of mergers and acquisitions within the telecom industry have shined a light on the need for future-proof solutions that offer the flexibility of incorporating multiple systems from multiple manufacturers to facilitate growth without requiring costly rip-and-replace projects.

These factors highlight telecoms’ need for strong physical access and identity management to enhance overall security, which has traditionally been reactive in nature, enabling response to issues or events after they have occurred. Unfortunately, by that time, any negative impact has already been felt. And while there has been significant progress with integrating a variety of systems to establish more robust security platforms, until now there has been little progress integrating operations systems like vendor/contractor management, visitor management, HR, compliance and others. As a result, there have been a number of security breaches for which enough relevant data had been stored within multiple disparate systems and sources to warn of a possible risk; however, with no way to extrapolate actionable intelligence from that data, the risk went undetected until it was too late.

This occurs because simply collecting and organizing the vast quantity of security-and incident-related data is a major challenge for telecoms. And that doesn’t include the monumental task of analyzing that data and applying the resulting intelligence to make smart decisions. Until now, the amount of available data has proven too great for organizations to utilize properly, and without a comprehensive approach to collecting and analyzing all this data, organizations’ security processes begin to break down. That’s just not acceptable for telecoms.

New Physical Identity Access Management (PIAM) solutions with predictive capabilities can address these needs by helping telecoms manage multiple identity types for employees, contractors, visitors and others, while simultaneously identifying abnormalities in behaviors and events to alert security and management to potential problems. Capable of being deployed across an enterprise, PIAM solutions create a holistic, auditable environment that provides actionable intelligence enabling a more proactive approach to security.

Predictive solutions collect and analyze data from disparate security and non-security systems, applying operational- and risk-based analytics to the data to provide a clear understanding of security operations and risks. This analysis uncovers indicators of compromise (IOCs) that could signify a potential incident or security risk. Using the actionable intelligence gleaned through this process, telecoms can take proactive steps and potentially prevent an incident or event from occurring. An added benefit is that predictive systems can learn and improve over time and are often able to identify patterns that were never expected or that most likely would not have been uncovered without that level of processing and automation.

PIAM solutions employ metrics to paint a picture of what “normal” looks like, and from there create useful information out of mountains of data. For example, determining the effectiveness of security and operational policies might require a telecom to know how many visitors enter a facility at certain times, how long it takes to process them and how that affects meeting start times. Combining these metrics allows lobby staffing levels to be adjusted accordingly. For operations, the length of time needed for new hires to receive access approval can identify areas where automation would deliver the highest ROI.

Insider threat is an increasingly prevalent concern for telecoms and other organizations, but it can be difficult to understand and predict given the complex psychology behind it. Predictive analysis can overcome this challenge by creating a profile for each person’s access, time of employment, time since their last access audit, background check or other mitigation control to determine an individual’s inherent risk to a telecom. A triggering event, such as a bad performance review or missed promotion, might increase the possibility of an insider breach and generate an initial red flag about that person’s potential rising threat. The profile is further augmented with patterns of behavior in the various security systems – perhaps this person is now trying to access a new, higher-security location or coming in at odd hours. When you are able to look at multiple indicators of compromise from numerous sources, it allows you to get a more complete picture of what is happening with that particular identity and what actions to take.

These varying types of data provide different perspectives that, when combined, can be used to proactively reduce potential risk and improve understanding. Access audits can be focused on individuals with high scores in multiple areas, including high levels of access, and can also be used to remove unused and/or unnecessary access privileges.

The ability to utilize technology with predictive capabilities also enforces access- and physical security-related compliance with government and other regulations and standards and allows telecoms to more easily demonstrate compliance using a single automated policy and reporting infrastructure.

The ability of PIAM solutions to not only collect but to analyze massive amounts of data to identify connections that may or may not be obvious between data and events can not only increase security, but can also allow telecoms to find novel applications for the resulting intelligence as part of their day-to-day operations, identifying potential opportunities to streamline and improve security and business processes. Simply put, PIAM solutions provide actionable intelligence to give telecoms the power to proactively guard against potential incidents or breaches, strengthen identity management and improve inefficient and error-prone processes. 

KEYWORDS: identity (ID) management tools PIAM (physical identity and access management) predictive security Situational Awareness

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Quantumsecureajayjain2011
Ajay Jain is President and CEO of Quantum Secure

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 2014 Security 500 cover

    Security 500: The Predictive Revolution

    See More
  • American Airlines moves to mobile ID credentials for touchless experience

    American Airlines trials mobile ID verification; moving toward touchless experience

    See More
  • physical security technology systems migration to the cloud

    Now is the time to move your physical security to the cloud

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!