The Vanishing Security Perimeter
With the advent of growing complex on-premises and hybrid cloud environments, BYOD and IoT, the security perimeter has disappeared. Identity is the new threat vector. The emergence of evolving advanced security analytics solutions represents Borderless Behavior Analytics – a comprehensive answer to address this growing challenge. In "Borderless Behavior Analytics – Who's Inside? What're They Doing?" – now in its second edition – twelve CISO and CIO leaders share their insights on this next generation of technology evolution and the challenges behind it.
"Existing security defenses were built to protect an enterprise architecture that no longer exists."
Joe Sullivan – Former Uber CSO, Past Facebook CISO
Author & Contributors
“Borderless Behavior Analytics" identifies the challenges behind a critical new class of security threat which CISOs should be aware of. The experts provide informative and insightful information. This book should be a standard reference for security leaders.
- Renee Guttmann-Stark, CISO
“This book represents one of the important new entries in the CIO and CISO’s library."
- Vishal Salvi, CISO, Infosys
Buy the Book
In her Borderless Behavior Analytics chapter, entitled Identity, Access Risks and Access Outliers, CIO at Large Teri Takai offers a number of relevant observations.
The range of predictive security analytics use cases a UEBA-IdA (user and entity behavior analytics – identity analytics) vendor offers fundamentally defines the maturity of their solution...