January 10, 2017 By Nick Oropall 2 min read

Crown jewels like Colonel Sanders’ secret recipe, Google’s search algorithm and the formula for Coca-Cola are all protected under lock and key against the dreaded insider threat. Your organization’s crown jewels might include customer data, proprietary algorithms, supply chain optimization tactics, your own secret recipes and more. Do you know how to protect them?

To answer that question, you must first know where they are and who has access to them. Are you alerted when they are accessed? Do you keep track of whether they have been downloaded, altered or moved? The key is to know your users and your data.

The Right Tools to Identify the Insider Threat

All access is not created equal; the same is true of risk. An employee logging into your network from home during the day is not the same as a former contractor logging in from a coffee shop after midnight. Today, passwords aren’t enough, and context is vital. The ability to dynamically authenticate users, assess the situation and block risky action is critical. Leading security solutions provide the insight and control you need, with capabilities such as:

  • Business-centric identity governance, which enables you to grant access privileges and prevent entitlement creep, the process by which users accumulate access privileges over time without shedding the ones they no longer need. It also enables you to provide information regarding user access in ordinary language to help managers understand what access they are granting and why.
  • Dynamic access management, which enables you to control access to resources as users seek entry into your data environment and determines whether the users in question legitimately need that access.
  • Comprehensive data security, a solution designed to monitor access, analyze risk, prevent unauthorized or suspicious activities, protect sensitive data and fix vulnerabilities in sensitive data repositories. Such a solution can discover and classify sensitive data and uncover compliance risks automatically.
  • Intelligent integration of security solutions that work together to take a more aggressive stance against the insider threat in a smarter, safer environment.
  • Meaningful insight that enables you to distinguish between normal and anomalous behavior and to support preventive action by creating a baseline of previously executed access commands.

Keep Your Crown Jewels Safe

IBM can help in each of these areas to enable you to protect your crown jewels from inadvertent actors, malicious insider threats and external fraudsters. Watch the on-demand webinar to find out how.

More from Identity & Access

Another category? Why we need ITDR

5 min read - Technologists are understandably suffering from category fatigue. This fatigue can be more pronounced within security than in any other sub-sector of IT. Do the use cases and risks of today warrant identity threat detection and response (ITDR)? To address this question, we work backwards from the vulnerabilities, threats, misconfigurations and attacks that IDTR specializes in providing visibility into. As identity threat detection and response (ITDR) technology evolves, one of the most common queries we get is: “Why do we need…

Access control is going mobile — Is this the way forward?

2 min read - Last year, the highest volume of cyberattacks (30%) started in the same way: a cyber criminal using valid credentials to gain access. Even more concerning, the X-Force Threat Intelligence Index 2024 found that this method of attack increased by 71% from 2022. Researchers also discovered a 266% increase in infostealers to obtain credentials to use in an attack. Family members of privileged users are also sometimes victims.“These shifts suggest that threat actors have revalued credentials as a reliable and preferred…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today