ADOPTING INTELLIGENCE DRIVEN SECURITY
A Security Strategy to Help Build Trust in the Digital World
RSA Whitepaper
INTELLIGENCE DRIVEN SECURITY
Today’s changing business requirements, exciting IT innovations, and the dynamic
threat landscape underscore the need for a modern security strategy that updates
security processes to achieve a more effective approach to cyber-defense. This paper
provides guidance for how to adopt an Intelligence Driven Security strategy that delivers
three essential capabilities; visibility, analysis, and action. These capabilities can help
detect, investigate, and respond to advanced threats, confirm and manage identities,
and prevent online fraud and cybercrime. This strategy empowers organizations to
effectively address the challenges they have today and those still beyond the horizon.
Adopting Intelligence Driven Security
INTRODUCTION
It’s a classic example of a double-edged sword -- the very same IT innovations that
increased enterprise efficiency over the past decade have created opportunities for
dangerous, nuanced cyber threats to damage the organization. As enterprise processes
grew in sophistication, so too did attacker tactics; evolving beyond rudimentary mass
malware into precisely targeted, devastatingly advanced attacks. As IT plays an
increasingly central role in fundamentally transforming business operations and
creating new opportunities and advantages, IT risk and security challenges have never
been more important to address.
RSA’s Intelligence Driven Security strategy helps organizations mitigate the risk of
operating in a digital world. Organizations can employ this strategy to deliver the
visibility, analysis, and action they need to detect, investigate, and respond to advanced
threats, confirm and manage identities, and prevent online fraud and cybercrime.
THE CHANGING BUSINESS
Not so long ago, IT’s reach was well-defined and well-controlled. Most applications
required a comparatively small amount of access, little or no information was shared
externally, and IT had near-complete control over the infrastructure for applications and
access. Then things changed. Organizations recognized they could lower costs and
increase productivity by granting third-party access to applications, and as a result,
introduced a greater number of digital identities corresponding to employees,
suppliers, and partners. To further complicate matters, the workforce brought a host of
new personal mobile devices (mobile phones, laptops, and tablets) that all required
access. Many business processes, including core functions such as IP development or
financial transaction processing transitioned partially or fully to the cloud. Today, many
former in-house tasks are conducted outside the organization’s traditional “four walls.”
Further, the explosion of digital data created by new applications and new digital
business processes dispersed over multiple silos resulted in a significantly expanded
attack surface. Potential points of vulnerability increased, and the newly hyper-
extended business struggled to adequately secure what it suddenly didn’t own,
manage, or control.
Simultaneously, hackers, politically motivated “hacktivists,” and fraudsters capitalized
on this evolution, developing more advanced attack tactics, such as moving “low and
slow” to mimic the behaviors of a normal user, while their motivations transformed
from largely notoriety-driven to objectives like stealing intellectual property. With more
points of vulnerability and a lethal combination of hacker motivation and know-how,
the possibility of a breach today is unprecedented. In fact, most authorities agree that
yesterday’s goal of preventing every intrusion is impossible, and today’s security
imperative is to detect and stop intruders before they can cause damage or loss to the
organization.
Against this backdrop of a changing business, IT, and threat landscape, there’s a
fundamental disconnect between most organizations’ in-place security processes and
an effective, contemporary approach to cyber-defense. Intelligence Driven Security is
that new strategy.
page 2
Adopting Intelligence Driven Security
“In order to keep pace with the rapidly growing number of users, devices,
and internal and external threats, intelligence driven security has evolved
from a conceptual theory to a must-have strategy for today’s enterprise. This
proliferation of access requirements by people and devices has dramatically
increased security risk; ensuring that the right systems are accessed only by
those who are authorized is driving the need for intelligence around those
behaviors.”
Chris Christiansen, IDC
WHAT MAKES AN INTELLIGENCE DRIVEN SECURITY STRATEGY
INTELLIGENT?
An Intelligence Driven Security strategy delivers three essential capabilities designed to
prevent inevitable breaches from causing damage or loss: visibility, analysis, and action.
Visibility
Organizations gain visibility by collecting data about what matters. But what matters
today and what control points still exist in today’s hyper-extended enterprises?
First is risk -- What are the risks to the organization? What are its vulnerabilities? How
well is it defending against those at any given point in time? Without visibility into risk,
organizations can’t design optimal defense strategies or appropriately prioritize
activities. Second is what’s happening on the network. Network visibility needs to go
beyond what we have today, from logs and events down to the packet and session level
to spot faint signals that indicate advanced threats. Third is digital identities.
Organizations need to understand who/what are on their networks, what they are
doing, and is that behavior appropriate. And finally, transactions – organizations need
to know what’s happening inside key applications that drive the business.
Analysis
All the data gathered to gain visibility is useless without the ability to extrapolate
insight and meaning from it. Analysis involves understanding normal state behavior
and then looking for anomalies. By knowing what is “normal,” an organization can then
spot, investigate, and root out anomalies that result from malicious activity. Once
anomalies are discovered, additional, more detailed, contextual analysis may be
required to determine the appropriate response.
Action
Action is the response to confirmed malicious anomalies. Rapid action allows
organizations to mitigate potential threats by enforcing controls such as access
restrictions or additional authentication. Action also results in remediation processes
and activity. The key to success is keeping action consistent, so each time an analysis
finds something potentially threatening; the organization can “operationalize” the
response.
page 3
Adopting Intelligence Driven Security
WHAT WOULD AN INTELLIGENCE DRIVEN SECURITY STRATEGY
LOOK LIKE?
An Intelligence Driven Security strategy places emphasis on detection, analysis, and
action while deemphasizing static, signature-based, perimeter detection. This “even-
split” approach understands the modern threat landscape and allocates resources
accordingly. This includes creating a better balance between monitoring, response
and prevention.
“Securing today’s global enterprise is a massive undertaking. With the
dissolution of the security perimeter, organizations need to take a more
intelligence-driven approach to security. Using data from systems and users to
drive decision-making can help improve the speed and efficiency of spotting
and responding to attacks and ultimately safeguard an organization’s most
important digital assets.”
William Boni, Corporate Information Security Officer (CISO) and Vice President,
Enterprise Information Security
The following charts demonstrate the difference in priorities between many of today’s
security strategies and an Intelligence Driven Security strategy.
WHAT ARE THE BENEFITS?
Aside from the critical capability to combat today’s increasingly dangerous threat
landscape, an Intelligence Driven Security strategy provides additional benefits:
Focus
Because Intelligence Driven Security drives action based on mitigating the most
pressing risks to the business, it ensures that organizations prioritize activity and
resources appropriately.
page 4
Monitoring
15%
Response
5%
Prevention
80%
Today’s Priorities
Monitoring
33%
Response
33%
Prevention
33%
Intelligence Driven
Security
Source RSA
Adopting Intelligence Driven Security
Operational Benefits
Most organizations’ in-place security systems rely on a significant number of disparate
solutions; malware analysis, identity and access management, governance, risk, and
compliance, etc. Intelligence Driven Security reduces the number of point products and
fuses together otherwise disjointed data sets and tools, increasing both security and
operational efficiency.
Risk Avoidance
With the ability to identify attacks in a more timely fashion, Intelligence Driven Security
reduces bottom line loss that often results from an undetected breach.
Staffing Benefits
It’s no secret that there exists a dearth of needed talent in the IT Security industry. An
Intelligence Driven Security strategy can aid in attracting top performers, empower them
with the right set of technologies and tools, and make their efforts more extensible
throughout the organization. Automation and sophistication aids in freeing already
overburdened employees, focusing them on what matters to defend the organization,
and can elevate average performers into vital components of a winning IT security staff.
CONSEQUENCES OF NOT ADOPTING AN INTELLIGENCE DRIVEN
SECURITY STRATEGY
While the upside is clear, there is also a significant downside for organizations who fail
to adopt an Intelligence Driven Security strategy:
Level of Exposure Rises
Every organization has something of value, including its brand, intellectual property,
and the bottom line. The inability to effectively manage today’s digital risks significantly
increases the potential for damage to this value. One devastating breach can wipe out
years of establishing steady revenue, cutting-edge research, or a trusted brand.
Falling Behind
Even if a breach never occurs, an organization that does not adopt an Intelligence
Driven Security strategy is at serious risk of jeopardizing competitiveness. An
organization that is able to effectively manage its digital risks can confidently channel
resources into growing, expanding, and differentiating via new IT initiatives, leaving
competitors behind.
Getting Started
Regardless of your current technology implementations or organizational security
maturity, a roadmap towards an Intelligence Driven Security strategy can be developed.
Current investments can be used as building blocks to a more sophisticated model.
Nearly every organization has the potential to gain the required capabilities for
visibility, analysis, and action. What’s important is not precisely where you are today,
but what next steps you take to improve. The goal should be a roadmap across people,
process, and technology to comprehensively increase maturity. The key is committing to
adopting a more Intelligence Driven Security strategy.
page 5
EMC2
, EMC, the EMC logo, RSA, Archer, FraudAction, NetWitness and the RSA logo are registered trademarks or
trademarks of EMC Corporation in the United States and other countries. Microsoft and Outlook are registered
trademarks of Microsoft. All other products or services mentioned are trademarks of their respective companies.
© Copyright 2014 EMC Corporation. All rights reserved.
H13235
ABOUT RSA
RSA, The Security Division of EMC, is the premier provider of intelligence-driven
security solutions. RSA helps the world’s leading organizations solve their most
complex and sensitive security challenges: managing organizational risk,
safeguarding mobile access and collaboration, preventing online fraud, and
defending against advanced threats. RSA delivers agile controls for identity
assurance, fraud detection, and data protection, robust Security Analytics and
industry-leading GRC capabilities, and expert consulting and advisory services.
For more information, please visit www.RSA.com.
www.rsa.com
Adopting Intelligence Driven Security
CONCLUSION
The ineffectiveness of perimeter-based security strategies and today’s increasingly
dangerous threat landscape requires a new strategy. RSA’s Intelligence Driven Security
strategy helps organizations mitigate the risk of operating in a digital world. With its
emphasis on visibility, analysis, and action, an Intelligence Driven Security strategy can
help organizations reap extraordinary benefits:
•	A balanced, modern approach to cyber security that mitigates risk
•	Deeper, granular insight into the IT environment
•	The amalgamation of previously disparate data, applications, and solutions
•	Cost savings
•	Increase employee productivity
•	Improve competitiveness
To survive, thrive, and build trust in today’s digital world, organizations need to turn to
an Intelligence Driven Security strategy.

More Related Content

PDF
IT Executive Guide to Security Intelligence
PDF
Before the Breach: Using threat intelligence to stop attackers in their tracks
PPTX
Linked in misti_rs_1.0
PDF
Avoiding The Seven Deadly Sins of IT
PDF
Industry Overview: Big Data Fuels Intelligence-Driven Security
 
PDF
br-security-connected-top-5-trends
PPTX
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
PDF
Protective Intelligence
IT Executive Guide to Security Intelligence
Before the Breach: Using threat intelligence to stop attackers in their tracks
Linked in misti_rs_1.0
Avoiding The Seven Deadly Sins of IT
Industry Overview: Big Data Fuels Intelligence-Driven Security
 
br-security-connected-top-5-trends
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Protective Intelligence

What's hot (20)

PPTX
Sans 20 CSC: Connecting Security to the Business Mission
PDF
A data-centric program
PPTX
Haystax: Actionable Intelligence Platform
PDF
2018 State of Cyber Resilience for Insurance
PDF
2015 Scalar Security Study Executive Summary
PDF
clearswift-adaptive-redaction-brochure
PPTX
Haystax Technology - About Us
PDF
AI-Cyber-Security-White-Papers-06-15-LR
PPTX
Information security governance
PDF
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
PDF
Whitepaper | Cyber resilience in the age of digital transformation
PDF
Internal or insider threats are far more dangerous than the external - bala g...
PDF
Plan for the Worst; Fight for the Best
PDF
Enterprise Strategy Group: The Big Data Security Analytics Era is Here
 
PDF
Next generation security analytics
PDF
State of Security Operations 2016 report of capabilities and maturity of cybe...
PDF
Security, Audit and Compliance: course overview
PDF
Developing Metrics for Information Security Governance
PDF
Protecting Essential Information
Sans 20 CSC: Connecting Security to the Business Mission
A data-centric program
Haystax: Actionable Intelligence Platform
2018 State of Cyber Resilience for Insurance
2015 Scalar Security Study Executive Summary
clearswift-adaptive-redaction-brochure
Haystax Technology - About Us
AI-Cyber-Security-White-Papers-06-15-LR
Information security governance
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Whitepaper | Cyber resilience in the age of digital transformation
Internal or insider threats are far more dangerous than the external - bala g...
Plan for the Worst; Fight for the Best
Enterprise Strategy Group: The Big Data Security Analytics Era is Here
 
Next generation security analytics
State of Security Operations 2016 report of capabilities and maturity of cybe...
Security, Audit and Compliance: course overview
Developing Metrics for Information Security Governance
Protecting Essential Information
Ad

Viewers also liked (20)

PPT
Block mexico conquest
PDF
Wealth creation and academic health science networks emc aridhia and pivotal 0
 
PPTX
Thurs review latin amer and europe
PPTX
Webdays blida mobile top 10 risks
PPTX
TECHNIQUES TO KEEP MEN AND WOMEN YOUNG, SEXY AND HAPPY FOR PEACE AND PROSPERI...
PDF
ISTE Ignite: Educating digital youth
PDF
New Skills for the Service-Oriented IT Organization
 
DOC
Answer f4-learning-area-3-ict
PPT
PPT
Introduction To Maxtable
PPTX
Eq price monday
PDF
Mobile Innovations Workshop
PDF
Seize ICT enabledTransformation
PPTX
Holy Trinity School HSA Overview 2012
PPTX
Spending multipliers
PDF
Analyst Report: EMA - The Industrialization of Fraud Demands a Dynamic Intell...
 
PPTX
Min wage 2014
PDF
13 tipos de_memoria
PDF
The Industrial Internet@Work
 
PDF
Ict policy for Networked Society - GCC Dec 2013
Block mexico conquest
Wealth creation and academic health science networks emc aridhia and pivotal 0
 
Thurs review latin amer and europe
Webdays blida mobile top 10 risks
TECHNIQUES TO KEEP MEN AND WOMEN YOUNG, SEXY AND HAPPY FOR PEACE AND PROSPERI...
ISTE Ignite: Educating digital youth
New Skills for the Service-Oriented IT Organization
 
Answer f4-learning-area-3-ict
Introduction To Maxtable
Eq price monday
Mobile Innovations Workshop
Seize ICT enabledTransformation
Holy Trinity School HSA Overview 2012
Spending multipliers
Analyst Report: EMA - The Industrialization of Fraud Demands a Dynamic Intell...
 
Min wage 2014
13 tipos de_memoria
The Industrial Internet@Work
 
Ict policy for Networked Society - GCC Dec 2013
Ad

Similar to Adopting Intelligence-Driven Security (20)

PDF
Intelligence-Driven Security Strategy
 
PDF
Intelligence Driven Threat Detection and Response
 
PDF
Intelligence-Driven Fraud Prevention
 
PPTX
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
PDF
CS Sakerhetsdagen 2015 IBM Feb 19
PPTX
Accenture Security Services: Defending and empowering the resilient digital b...
PDF
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
PPTX
Enhancing your Organization's Security IQ to Meet Emerging Threats & New Real...
PDF
Building an Intelligence-Driven Security Operations Center
 
PPTX
Why understanding your attack surface matters
PDF
The future of cyber security
PDF
The Need for Efficiency and Effectiveness
PPT
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
PDF
CyRM: Mastering the Management of Cybersecurity (Internal Audit and IT Audit)...
PDF
Intelligence Driven Identity and Access Management
 
PDF
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
PDF
Cyber Security small
PPTX
Operational Security Intelligence
PDF
Strategic Leadership for Managing Evolving Cybersecurity Risks
PDF
7 Best Practices to Protect Critical Business Information [Infographic]
Intelligence-Driven Security Strategy
 
Intelligence Driven Threat Detection and Response
 
Intelligence-Driven Fraud Prevention
 
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
CS Sakerhetsdagen 2015 IBM Feb 19
Accenture Security Services: Defending and empowering the resilient digital b...
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
Enhancing your Organization's Security IQ to Meet Emerging Threats & New Real...
Building an Intelligence-Driven Security Operations Center
 
Why understanding your attack surface matters
The future of cyber security
The Need for Efficiency and Effectiveness
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
CyRM: Mastering the Management of Cybersecurity (Internal Audit and IT Audit)...
Intelligence Driven Identity and Access Management
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Cyber Security small
Operational Security Intelligence
Strategic Leadership for Managing Evolving Cybersecurity Risks
7 Best Practices to Protect Critical Business Information [Infographic]

More from EMC (20)

PPTX
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
PDF
Cloud Foundry Summit Berlin Keynote
 
PPTX
EMC GLOBAL DATA PROTECTION INDEX
 
PDF
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
PDF
Citrix ready-webinar-xtremio
 
PDF
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
PPTX
EMC with Mirantis Openstack
 
PPTX
Modern infrastructure for business data lake
 
PDF
Force Cyber Criminals to Shop Elsewhere
 
PDF
Pivotal : Moments in Container History
 
PDF
Data Lake Protection - A Technical Review
 
PDF
Mobile E-commerce: Friend or Foe
 
PDF
Virtualization Myths Infographic
 
PDF
Intelligence-Driven GRC for Security
 
PDF
The Trust Paradox: Access Management and Trust in an Insecure Age
 
PDF
EMC Technology Day - SRM University 2015
 
PDF
EMC Academic Summit 2015
 
PDF
Data Science and Big Data Analytics Book from EMC Education Services
 
PDF
Using EMC Symmetrix Storage in VMware vSphere Environments
 
PDF
Using EMC VNX storage with VMware vSphereTechBook
 
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
 

Recently uploaded (20)

PDF
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PDF
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
Introduction to MCP and A2A Protocols: Enabling Agent Communication
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
PDF
Auditboard EB SOX Playbook 2023 edition.
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PDF
substrate PowerPoint Presentation basic one
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PDF
EIS-Webinar-Regulated-Industries-2025-08.pdf
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
CEH Module 2 Footprinting CEH V13, concepts
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
Lung cancer patients survival prediction using outlier detection and optimize...
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
Connector Corner: Transform Unstructured Documents with Agentic Automation
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
Introduction to MCP and A2A Protocols: Enabling Agent Communication
giants, standing on the shoulders of - by Daniel Stenberg
Advancing precision in air quality forecasting through machine learning integ...
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
Auditboard EB SOX Playbook 2023 edition.
Basics of Cloud Computing - Cloud Ecosystem
substrate PowerPoint Presentation basic one
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
EIS-Webinar-Regulated-Industries-2025-08.pdf
Module 1 Introduction to Web Programming .pptx
A symptom-driven medical diagnosis support model based on machine learning te...
4 layer Arch & Reference Arch of IoT.pdf
CEH Module 2 Footprinting CEH V13, concepts

Adopting Intelligence-Driven Security

  • 1. ADOPTING INTELLIGENCE DRIVEN SECURITY A Security Strategy to Help Build Trust in the Digital World RSA Whitepaper INTELLIGENCE DRIVEN SECURITY Today’s changing business requirements, exciting IT innovations, and the dynamic threat landscape underscore the need for a modern security strategy that updates security processes to achieve a more effective approach to cyber-defense. This paper provides guidance for how to adopt an Intelligence Driven Security strategy that delivers three essential capabilities; visibility, analysis, and action. These capabilities can help detect, investigate, and respond to advanced threats, confirm and manage identities, and prevent online fraud and cybercrime. This strategy empowers organizations to effectively address the challenges they have today and those still beyond the horizon.
  • 2. Adopting Intelligence Driven Security INTRODUCTION It’s a classic example of a double-edged sword -- the very same IT innovations that increased enterprise efficiency over the past decade have created opportunities for dangerous, nuanced cyber threats to damage the organization. As enterprise processes grew in sophistication, so too did attacker tactics; evolving beyond rudimentary mass malware into precisely targeted, devastatingly advanced attacks. As IT plays an increasingly central role in fundamentally transforming business operations and creating new opportunities and advantages, IT risk and security challenges have never been more important to address. RSA’s Intelligence Driven Security strategy helps organizations mitigate the risk of operating in a digital world. Organizations can employ this strategy to deliver the visibility, analysis, and action they need to detect, investigate, and respond to advanced threats, confirm and manage identities, and prevent online fraud and cybercrime. THE CHANGING BUSINESS Not so long ago, IT’s reach was well-defined and well-controlled. Most applications required a comparatively small amount of access, little or no information was shared externally, and IT had near-complete control over the infrastructure for applications and access. Then things changed. Organizations recognized they could lower costs and increase productivity by granting third-party access to applications, and as a result, introduced a greater number of digital identities corresponding to employees, suppliers, and partners. To further complicate matters, the workforce brought a host of new personal mobile devices (mobile phones, laptops, and tablets) that all required access. Many business processes, including core functions such as IP development or financial transaction processing transitioned partially or fully to the cloud. Today, many former in-house tasks are conducted outside the organization’s traditional “four walls.” Further, the explosion of digital data created by new applications and new digital business processes dispersed over multiple silos resulted in a significantly expanded attack surface. Potential points of vulnerability increased, and the newly hyper- extended business struggled to adequately secure what it suddenly didn’t own, manage, or control. Simultaneously, hackers, politically motivated “hacktivists,” and fraudsters capitalized on this evolution, developing more advanced attack tactics, such as moving “low and slow” to mimic the behaviors of a normal user, while their motivations transformed from largely notoriety-driven to objectives like stealing intellectual property. With more points of vulnerability and a lethal combination of hacker motivation and know-how, the possibility of a breach today is unprecedented. In fact, most authorities agree that yesterday’s goal of preventing every intrusion is impossible, and today’s security imperative is to detect and stop intruders before they can cause damage or loss to the organization. Against this backdrop of a changing business, IT, and threat landscape, there’s a fundamental disconnect between most organizations’ in-place security processes and an effective, contemporary approach to cyber-defense. Intelligence Driven Security is that new strategy. page 2
  • 3. Adopting Intelligence Driven Security “In order to keep pace with the rapidly growing number of users, devices, and internal and external threats, intelligence driven security has evolved from a conceptual theory to a must-have strategy for today’s enterprise. This proliferation of access requirements by people and devices has dramatically increased security risk; ensuring that the right systems are accessed only by those who are authorized is driving the need for intelligence around those behaviors.” Chris Christiansen, IDC WHAT MAKES AN INTELLIGENCE DRIVEN SECURITY STRATEGY INTELLIGENT? An Intelligence Driven Security strategy delivers three essential capabilities designed to prevent inevitable breaches from causing damage or loss: visibility, analysis, and action. Visibility Organizations gain visibility by collecting data about what matters. But what matters today and what control points still exist in today’s hyper-extended enterprises? First is risk -- What are the risks to the organization? What are its vulnerabilities? How well is it defending against those at any given point in time? Without visibility into risk, organizations can’t design optimal defense strategies or appropriately prioritize activities. Second is what’s happening on the network. Network visibility needs to go beyond what we have today, from logs and events down to the packet and session level to spot faint signals that indicate advanced threats. Third is digital identities. Organizations need to understand who/what are on their networks, what they are doing, and is that behavior appropriate. And finally, transactions – organizations need to know what’s happening inside key applications that drive the business. Analysis All the data gathered to gain visibility is useless without the ability to extrapolate insight and meaning from it. Analysis involves understanding normal state behavior and then looking for anomalies. By knowing what is “normal,” an organization can then spot, investigate, and root out anomalies that result from malicious activity. Once anomalies are discovered, additional, more detailed, contextual analysis may be required to determine the appropriate response. Action Action is the response to confirmed malicious anomalies. Rapid action allows organizations to mitigate potential threats by enforcing controls such as access restrictions or additional authentication. Action also results in remediation processes and activity. The key to success is keeping action consistent, so each time an analysis finds something potentially threatening; the organization can “operationalize” the response. page 3
  • 4. Adopting Intelligence Driven Security WHAT WOULD AN INTELLIGENCE DRIVEN SECURITY STRATEGY LOOK LIKE? An Intelligence Driven Security strategy places emphasis on detection, analysis, and action while deemphasizing static, signature-based, perimeter detection. This “even- split” approach understands the modern threat landscape and allocates resources accordingly. This includes creating a better balance between monitoring, response and prevention. “Securing today’s global enterprise is a massive undertaking. With the dissolution of the security perimeter, organizations need to take a more intelligence-driven approach to security. Using data from systems and users to drive decision-making can help improve the speed and efficiency of spotting and responding to attacks and ultimately safeguard an organization’s most important digital assets.” William Boni, Corporate Information Security Officer (CISO) and Vice President, Enterprise Information Security The following charts demonstrate the difference in priorities between many of today’s security strategies and an Intelligence Driven Security strategy. WHAT ARE THE BENEFITS? Aside from the critical capability to combat today’s increasingly dangerous threat landscape, an Intelligence Driven Security strategy provides additional benefits: Focus Because Intelligence Driven Security drives action based on mitigating the most pressing risks to the business, it ensures that organizations prioritize activity and resources appropriately. page 4 Monitoring 15% Response 5% Prevention 80% Today’s Priorities Monitoring 33% Response 33% Prevention 33% Intelligence Driven Security Source RSA
  • 5. Adopting Intelligence Driven Security Operational Benefits Most organizations’ in-place security systems rely on a significant number of disparate solutions; malware analysis, identity and access management, governance, risk, and compliance, etc. Intelligence Driven Security reduces the number of point products and fuses together otherwise disjointed data sets and tools, increasing both security and operational efficiency. Risk Avoidance With the ability to identify attacks in a more timely fashion, Intelligence Driven Security reduces bottom line loss that often results from an undetected breach. Staffing Benefits It’s no secret that there exists a dearth of needed talent in the IT Security industry. An Intelligence Driven Security strategy can aid in attracting top performers, empower them with the right set of technologies and tools, and make their efforts more extensible throughout the organization. Automation and sophistication aids in freeing already overburdened employees, focusing them on what matters to defend the organization, and can elevate average performers into vital components of a winning IT security staff. CONSEQUENCES OF NOT ADOPTING AN INTELLIGENCE DRIVEN SECURITY STRATEGY While the upside is clear, there is also a significant downside for organizations who fail to adopt an Intelligence Driven Security strategy: Level of Exposure Rises Every organization has something of value, including its brand, intellectual property, and the bottom line. The inability to effectively manage today’s digital risks significantly increases the potential for damage to this value. One devastating breach can wipe out years of establishing steady revenue, cutting-edge research, or a trusted brand. Falling Behind Even if a breach never occurs, an organization that does not adopt an Intelligence Driven Security strategy is at serious risk of jeopardizing competitiveness. An organization that is able to effectively manage its digital risks can confidently channel resources into growing, expanding, and differentiating via new IT initiatives, leaving competitors behind. Getting Started Regardless of your current technology implementations or organizational security maturity, a roadmap towards an Intelligence Driven Security strategy can be developed. Current investments can be used as building blocks to a more sophisticated model. Nearly every organization has the potential to gain the required capabilities for visibility, analysis, and action. What’s important is not precisely where you are today, but what next steps you take to improve. The goal should be a roadmap across people, process, and technology to comprehensively increase maturity. The key is committing to adopting a more Intelligence Driven Security strategy. page 5
  • 6. EMC2 , EMC, the EMC logo, RSA, Archer, FraudAction, NetWitness and the RSA logo are registered trademarks or trademarks of EMC Corporation in the United States and other countries. Microsoft and Outlook are registered trademarks of Microsoft. All other products or services mentioned are trademarks of their respective companies. © Copyright 2014 EMC Corporation. All rights reserved. H13235 ABOUT RSA RSA, The Security Division of EMC, is the premier provider of intelligence-driven security solutions. RSA helps the world’s leading organizations solve their most complex and sensitive security challenges: managing organizational risk, safeguarding mobile access and collaboration, preventing online fraud, and defending against advanced threats. RSA delivers agile controls for identity assurance, fraud detection, and data protection, robust Security Analytics and industry-leading GRC capabilities, and expert consulting and advisory services. For more information, please visit www.RSA.com. www.rsa.com Adopting Intelligence Driven Security CONCLUSION The ineffectiveness of perimeter-based security strategies and today’s increasingly dangerous threat landscape requires a new strategy. RSA’s Intelligence Driven Security strategy helps organizations mitigate the risk of operating in a digital world. With its emphasis on visibility, analysis, and action, an Intelligence Driven Security strategy can help organizations reap extraordinary benefits: • A balanced, modern approach to cyber security that mitigates risk • Deeper, granular insight into the IT environment • The amalgamation of previously disparate data, applications, and solutions • Cost savings • Increase employee productivity • Improve competitiveness To survive, thrive, and build trust in today’s digital world, organizations need to turn to an Intelligence Driven Security strategy.