What’s Trending in 2018 – Continued

February 26, 2018 Security, Trends

If you have not yet read my last post you may want to go back for a quick scan before proceeding. In my last post we discussed some views and thoughts on an article published by Gartner titled “Gartner Top 10 Strategic Technology Trends for 2018,” Specifically:

Intelligent: AI, Intelligent Apps, Intelligent Things

Digital: Digital Twins, Cloud to the Edge, Conversational Platform, Immersive Experience

Mesh: Block Chain, Event Driven, Continuous Adaptive Risk and Trust (Security)

In an effort to keep things digestible, I held off on addressing Continuous Adaptive Trust in security. Now it’s time to tackle that lofty topic.

The root of the article’s thoughts on adaptive security are that in an ever changing, complex, and evolving IT footprint, traditional ownership and control security models not based on trust and adaptive models are not optimal. The concept “Continuous Adaptive Risk and Trust Assessment” or CARTA is introduced. CARTA covers runtime protections, ecosystems and surrounding technologies as well as governance and planning.

To simplify, you as a business owner or IT leader need to be focused on security technologies that are trust based and can adapt and respond in real time based on behavioral analytics and real time information for known threats with little to no “manual” intervention.

Skip this paragraph if you are techie! If not, read on…… When explaining this to non-technical people, I always go back to children. If I had a security system in my house at Christmas that could keep the kids from finding presents, it would need to have the same characteristics I describe above. First the system would need to make sure only people I trust and know can get in the house. Second, once in the house I would want to be sure that they are staying out of the closets with the presents (control). Third, I would want it to know when they are getting things together to try and break into the closets and take action to prevent it (adapt). The last piece is important. The system could trend their activities and intelligently understand that they have gone to the toolbox, removed a screw driver and flashlight while Mom & Dad are not home, and are near the present closet. In that case the system could lock some doors and keep them isolated until Mom & Dad say what to do, as well remove their access to the toolbox and the room containing the closet with the presents.

Breaking down what this really means is that at the core of the modern security platforms needs to be identity and trust services. You must know who and what is on or accessing your network and to then be able to classify the users and devices immediately and apply appropriate policies and profiles to them in real time. That covers trust.

Adaptive risk requires a security platform that is continuously monitoring and analyzing behavior data, both for users and devices that can make policy based decisions to quarantine or isolate users/devices that are not behaving in an expected fashion.

Lastly, your security platform must have access to external databases that identify and allow for fingerprinting/signature reporting of malicious attacks going on across the globe and implement policies to stop them before they happen.

The good news is that there are a number of platforms that can do these things today. The bad news is that most businesses are not accounting for these investments or how to best phase these security capabilities into their environments while accounting for interoperability with applications and new tools. If you are, you are ahead of most!

Noel-Barber-11Noel Barber is a veteran of the IT industry and serves as the Vice President of Professional Services at ABS. In addition to staying on top of industry trends and changes, Noel works to ensure ABS continuously brings the best technology solutions to our clients.