January 10, 2017 By Nick Oropall 2 min read

Crown jewels like Colonel Sanders’ secret recipe, Google’s search algorithm and the formula for Coca-Cola are all protected under lock and key against the dreaded insider threat. Your organization’s crown jewels might include customer data, proprietary algorithms, supply chain optimization tactics, your own secret recipes and more. Do you know how to protect them?

To answer that question, you must first know where they are and who has access to them. Are you alerted when they are accessed? Do you keep track of whether they have been downloaded, altered or moved? The key is to know your users and your data.

The Right Tools to Identify the Insider Threat

All access is not created equal; the same is true of risk. An employee logging into your network from home during the day is not the same as a former contractor logging in from a coffee shop after midnight. Today, passwords aren’t enough, and context is vital. The ability to dynamically authenticate users, assess the situation and block risky action is critical. Leading security solutions provide the insight and control you need, with capabilities such as:

  • Business-centric identity governance, which enables you to grant access privileges and prevent entitlement creep, the process by which users accumulate access privileges over time without shedding the ones they no longer need. It also enables you to provide information regarding user access in ordinary language to help managers understand what access they are granting and why.
  • Dynamic access management, which enables you to control access to resources as users seek entry into your data environment and determines whether the users in question legitimately need that access.
  • Comprehensive data security, a solution designed to monitor access, analyze risk, prevent unauthorized or suspicious activities, protect sensitive data and fix vulnerabilities in sensitive data repositories. Such a solution can discover and classify sensitive data and uncover compliance risks automatically.
  • Intelligent integration of security solutions that work together to take a more aggressive stance against the insider threat in a smarter, safer environment.
  • Meaningful insight that enables you to distinguish between normal and anomalous behavior and to support preventive action by creating a baseline of previously executed access commands.

Keep Your Crown Jewels Safe

IBM can help in each of these areas to enable you to protect your crown jewels from inadvertent actors, malicious insider threats and external fraudsters. Watch the on-demand webinar to find out how.

More from Identity & Access

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

From federation to fabric: IAM’s evolution

15 min read - In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that process (technically possible, not always advisable). But what is the next step in our evolution towards greater interoperability between our applications, services and systems?Identity and…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today