Applying a Data Centric Approach to the Future

By AMAG Technology, President, Kurt Takahashi

Kurt Takahashi_photo.jpg

According to Gartner, the Cyber Security market will reach over $100B by 2018. According to IDC, growth will occur: 10% Security Information and Event Management (SIEM), 10% Threat Intelligence, 18% Mobile Security and 50% in Cloud Security.  As the security industry continues trending towards managed and cloud services, how will companies stay ahead of the constant barrage of  Cyber and physical security threats?

The vastly untapped data compiled by physical security systems, like access control, video surveillance, incident management and burglar alarm systems have a story to tell about any individual’s usual behavior. Certain deviations from those norms should be of absolute concern for security professionals. For example, why is one person entering a restricted area several times a day or at strange hours?  Is the person just having a busy day? Or is there something else going on? When correlating someone’s physical behavior patterns with their logical activities, one can change how we interpret an individual’s intentions. We can suddenly see threats that are easily overlooked in separate cyber and physical worlds as valid concerns when they are viewed together.

When the outsider threats are blocked, the next step is to find an insider to achieve results.  Analysis of cyber security and physical security will allow companies to identify early warning signs of internal and external threats.

How do you do that?

The only true way to address risk is to manage people and the systems they use. Organizations must analyze their data not only to better secure their business, but to make better business decisions and manage business requirements.

An organization must determine what systems and data should be analyzed.  It could be an access control system, computer log-in system, HR system, or building system. Or all of them!

Funneling that data to a single dashboard or monitor will provide a data centric approach that will help identify behaviors and manage risk to create a safer environment.  A dashboard will streamline business operations showing all relevant data in one place, narrowing the gap between physical and cyber security and help predict behavior and patterns.

End users who can predict behavior via a data centric approach based on analysis from system intelligence will better mitigate risk, save money and improve their bottom line.  Demonstrating this cost savings through a dashboard will change security from a cost center to a proactive, valuable way to show return on investment.

Managing Identities

Companies can no longer ignore visitor management, and must understand who is coming into a building and the risks they represent. Employees, contractors and visitors represent different levels of threat, and properly vetting each identity is important to mitigate risk. Employees are highly vetted because they undergo background checks. Organizations depend on a contractor’s company to vet them thoroughly when hired. Visitors represent the biggest threat because they are difficult to vet, if at all.

Because of the vast difference in identities, companies need to implement a web-based visitor management system to collect the data needed before allowing an identity into a building. A web-based visitor management system initiates employee involvement in the vetting of a visitor, collecting the necessary data to schedule a meeting while reducing risk. In today’s world, an organization can never be too safe, and companies will move away from the pen and notebook visitor management to web-based visitor management that collects information, controls exactly where a visitor can go and automatically terminates access when the time allotted expires. The data will help companies meet audit and compliance requirements, saving them money and mitigating risk.