Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Identity Management

Telecoms Move Toward Predictive Security Intelligence

By Ajay Jain
tvnews
February 23, 2016

Telecom facilities are home to a number of critical and highly valuable assets, and given the sensitive nature of a large number of these locations, it’s vital that telecoms be able to recognize potential threats as soon as possible. Additionally, a number of mergers and acquisitions within the telecom industry have shined a light on the need for future-proof solutions that offer the flexibility of incorporating multiple systems from multiple manufacturers to facilitate growth without requiring costly rip-and-replace projects.

These factors highlight telecoms’ need for strong physical access and identity management to enhance overall security, which has traditionally been reactive in nature, enabling response to issues or events after they have occurred. Unfortunately, by that time, any negative impact has already been felt. And while there has been significant progress with integrating a variety of systems to establish more robust security platforms, until now there has been little progress integrating operations systems like vendor/contractor management, visitor management, HR, compliance and others. As a result, there have been a number of security breaches for which enough relevant data had been stored within multiple disparate systems and sources to warn of a possible risk; however, with no way to extrapolate actionable intelligence from that data, the risk went undetected until it was too late.

This occurs because simply collecting and organizing the vast quantity of security-and incident-related data is a major challenge for telecoms. And that doesn’t include the monumental task of analyzing that data and applying the resulting intelligence to make smart decisions. Until now, the amount of available data has proven too great for organizations to utilize properly, and without a comprehensive approach to collecting and analyzing all this data, organizations’ security processes begin to break down. That’s just not acceptable for telecoms.

New Physical Identity Access Management (PIAM) solutions with predictive capabilities can address these needs by helping telecoms manage multiple identity types for employees, contractors, visitors and others, while simultaneously identifying abnormalities in behaviors and events to alert security and management to potential problems. Capable of being deployed across an enterprise, PIAM solutions create a holistic, auditable environment that provides actionable intelligence enabling a more proactive approach to security.

Predictive solutions collect and analyze data from disparate security and non-security systems, applying operational- and risk-based analytics to the data to provide a clear understanding of security operations and risks. This analysis uncovers indicators of compromise (IOCs) that could signify a potential incident or security risk. Using the actionable intelligence gleaned through this process, telecoms can take proactive steps and potentially prevent an incident or event from occurring. An added benefit is that predictive systems can learn and improve over time and are often able to identify patterns that were never expected or that most likely would not have been uncovered without that level of processing and automation.

PIAM solutions employ metrics to paint a picture of what “normal” looks like, and from there create useful information out of mountains of data. For example, determining the effectiveness of security and operational policies might require a telecom to know how many visitors enter a facility at certain times, how long it takes to process them and how that affects meeting start times. Combining these metrics allows lobby staffing levels to be adjusted accordingly. For operations, the length of time needed for new hires to receive access approval can identify areas where automation would deliver the highest ROI.

Insider threat is an increasingly prevalent concern for telecoms and other organizations, but it can be difficult to understand and predict given the complex psychology behind it. Predictive analysis can overcome this challenge by creating a profile for each person’s access, time of employment, time since their last access audit, background check or other mitigation control to determine an individual’s inherent risk to a telecom. A triggering event, such as a bad performance review or missed promotion, might increase the possibility of an insider breach and generate an initial red flag about that person’s potential rising threat. The profile is further augmented with patterns of behavior in the various security systems – perhaps this person is now trying to access a new, higher-security location or coming in at odd hours. When you are able to look at multiple indicators of compromise from numerous sources, it allows you to get a more complete picture of what is happening with that particular identity and what actions to take.

These varying types of data provide different perspectives that, when combined, can be used to proactively reduce potential risk and improve understanding. Access audits can be focused on individuals with high scores in multiple areas, including high levels of access, and can also be used to remove unused and/or unnecessary access privileges.

The ability to utilize technology with predictive capabilities also enforces access- and physical security-related compliance with government and other regulations and standards and allows telecoms to more easily demonstrate compliance using a single automated policy and reporting infrastructure.

The ability of PIAM solutions to not only collect but to analyze massive amounts of data to identify connections that may or may not be obvious between data and events can not only increase security, but can also allow telecoms to find novel applications for the resulting intelligence as part of their day-to-day operations, identifying potential opportunities to streamline and improve security and business processes. Simply put, PIAM solutions provide actionable intelligence to give telecoms the power to proactively guard against potential incidents or breaches, strengthen identity management and improve inefficient and error-prone processes. 

KEYWORDS: identity (ID) management tools PIAM (physical identity and access management) predictive security Situational Awareness

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ajay Jain is President and CEO of Quantum Secure

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Surveillance, video wall

    Advances in deep learning & predictive analytics will significantly increase video intelligence capabilities in 2021

    See More
  • Predictive Intelligence

    How AI-Driven PIAM+ Unlocks Predictive Intelligence for the Modern Enterprise

    See More
  • stadium_enews

    6 Steps Toward Effective Security Training

    See More

Related Products

See More Products
  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • 9780367667887.jpg

    Surveillance, Privacy and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing