Welcome! Subscribe Here

Your email:

Courion Corporation

Current Articles | RSS Feed RSS Feed

What Drives the Need for Identity Management in Manufacturing?


Jim SperedelozziWith Target and Neiman Marcus and other recent breaches, ‘retail’ is the flavor of the month among identity and access management solution providers. Similarly, HIPAA and other privacy regulations keep the healthcare folks top of mind for us identity specialists, and the thousands of regulations driving the need for financial services firms to invest in access governance and provisioning solutions keep these organizations front and center for IAM providers.

But why aren’t we talking more about manufacturing?  In fact, almost 20% of Courion customers are manufacturers. What is it about manufacturing that drives the need for user provisioning, access certification and password management capabilities?manufacturing

It’s a vast industry – larger than healthcare, financial services and retail combined. The size and scope of manufacturing as an industry dictates that nearly every software category is used by manufacturers. I’ve read (here) that manufacturing in the U.S. would be the 8th largest economy in the world. So that’s a large addressable market. But these companies are also typically older and more conservative firms that do not like to waste money on unnecessary projects, so there is more to the story.

Like every other industry, manufacturers will invest in IAM to achieve one of three goals:

  • Increase operational efficiency 
  • Ensure compliance with regulations
  • Reduce risk

Courion’s manufacturing customers are concerned with all three of these issues. From an efficiency standpoint, with thin margins and overseas competition, anything that creates efficiency is worth considering. By automating provisioning or providing self-service password management and access request and approvals, manufacturers become more efficient in three ways:

  • IT resources, like the help desk, handle fewer password reset or account provisioning and de-provisioning tickets
  • When employees and contractors start or change roles, they have day-one access to the systems they need to perform their jobs
  • Users who forget their passwords can easily reset them and get back to work in less time

As far as compliance is concerned, Sarbanes-Oxley (SOX), or the “American Competitiveness and Corporate Accountability Act of 2002” as this regulation is officially called, has had a huge effect on manufacturing firms. It is the most commonly cited regulatory concern for manufacturing CIOs that we speak with.

SOX has a number of provisions around information security, specifically in terms of who can access financial data, and segregation of duties (SOD) policy. Many CIOs and CISOs have interpreted these provisions to mean a need for access certification, especially around systems involving financial data. More tactically, password management solutions can make it easier to enforce password reset policies that many interpret SOX to require. Many of Courion’s manufacturing customers deploy password management first because of this.

While the SEC encourages organizations to review controls based on risk, compliance in and of itself does not necessarily reduce risk. In fact, most data breaches involve organizations that are compliant with the regulatory regimes they are expected to adhere to.

For manufacturing firms, managing risk is not the top priority when it comes to IT access and identity management. However, for those with significant intellectual property concerns – managing access risk is paramount to survival. Consider the case of Nortel, now defunct, where hackers had widespread access to computer systems for over 10 years. No technology product manufacturer can compete when their unreleased product plans become available to their competition or the highest bidder. Similarly, look at American Superconductor, where source code was stolen and sold to their largest customer for pennies on the dollar.

Frankly, manufacturers should take a closer look at their risk profile as it relates to access by starting with a discussion around what assets are critical to protect, such as product designs, future plans, or manufacturing processes. They should include the expected impact of a breach exposing these assets and from there, consider the likelihood that a breach event would occur. The likelihood and impact together paints the true risk picture.

While “impact” can only be derived from internal discussions and analysis, Courion customers’ leverage Access Insight, an identity and access intelligence or analytics solution, to gain a view into the likelihood of whether legitimate access could be used to steal a manufacturer’s “crown jewels”.

Access Insight has been used by IT security executives across many industries to justify IAM investments, as it quickly exposes the reality that no matter how “compliant” an organization may appear to be – there may be gaping holes in  risk posture that must be remediated.

Whether your firm is looking to become more efficient, ensure compliance, reduce risk or accomplish all three, it can be valuable, particularly as a manufacturer, to consider how IAM can help.  As one example, Associated Materials, talks in depth about accomplishing these goals in this case study:

Case Study: Associated Materials speeds up account provisioning, reduces audit prep time, accomplishes 100% password compliance, and eliminates orphan account risk with Courion.

Re-set Your Passwords, Early & Often


Jason MutschlerOn Monday April 7th, OpenSSL disclosed a bug in their software that allows data, which can include unencrypted usernames and passwords, to be collected from memory remotely by an attacker.  OpenSSL is the most popular open source SSL (Secure Sockets Layer) implementation and the software is used by many popular websites such as Yahoo, Imgur, Stackoverflow, Flickr and Twitpic.  Many of these popular websites have been patched. However as of this writing some, including Twitpic, remain vulnerable.

HeartbleedSeveral tools have become available to check whether an individual website is vulnerable. We recommend that you double-check whether websites that you use are affected before logging in.  If the website you are logging into is not vulnerable, you should reset your password since the password may have been captured if the server was previously vulnerable.  The bug is also present in some client software and a malicious web server could be used to collect data from memory on client machines running these pieces of software.

httpsThis particular vulnerability has been present since 2012 and underscores the need to look beyond typical perimeter defenses and continuously monitor for unusual behavior within your network.  Persistent attackers will continue to find creative ways to breach the perimeter and detecting abnormal use of valid credentials is becoming extremely important.

By the way, Courion websites, including the Support Portal and the CONVERGE registration page remain unaffected by this vulnerability.

Seminar April 10th to Discuss Integrated Solution for Managing Identities & Access In Cloud, On-Premises


Doug Mow

UPDATE: Due to unforeseen circumstances, security correspondent Frank Gardner will not be participating in this seminar.

If you reside in or near London, consider joining us on Thursday April 10th at 9:00 a.m. at the Milbank Tower for what promises to be an interesting seminar.

Courion and Ping Identity executives will discuss how an integrated solution for managing user identities and access to resources both in the cloud and on-premises can provide the ability to quickly and properly authenticate users and provide access, while still enabling you to manage risk and maintain compliance.

The event will conclude with a panel of experts available to address your questions and discuss strategies and solutions.

To register for the event, click here.

For live updates, follow @CourionEMEA.

Kobayashi Maru – Target Breach Rewind of a Different Sort


Doug MowLearn how using an identity and access intelligence solution such as Access Insight may help you to avoid finding yourself in a Kobayashi Maru no-win situation like Target. in this IT Security Guru post titled,
Kobayashi Maru – Target Breach Rewind of a Different Sort.

10 Years of Retail Data Breaches: Will Consumers Revolt?


Jim SperedelozziHouston, do we have a problem?”

Are the retail and payment card industries facing a catastrophic collapse in consumer confidence? With the 24/7 news cycle constantly reporting breaches at the largest retail firms, involving hundreds of thousands of customer’s data: it’s hard to argue otherwise. The news that Target’s CIO recently “resigned” shortly after Target disclosed the loss of 40 million or more credit card numbers just illustrates how serious the problem is.

Now, it seems like breaches are happening more often and many involve the brick and mortar store’s point of sales system. While the increase may be partially explained by disclosure laws and aggressive news outlets, that’s cold comfort for companies already struggling to compete with the convenience and price advantages of online-only firms like Amazon.com.

What happens to the retail industry when consumers’ perception shifts to one where shopping online is safer than shopping at retail stores? The answer must have Jeff Bezos smiling, but it also must have him asking his CISO – are we at risk?Disgruntled shopper

With that, in mind, let’s review some top retail breach disclosures involving payment card data from the past 10 years, with links:

2005: DSW Shoes loses 1.4 million customer’s credit card numbers.

2006: OfficeMax loses 200,000 debit card numbers with PINs.

2007: TJX – the grand-daddy of all retail data breaches, 100 million+ accounts stolen.

2008: Forever 21 discloses a three-year long data breach and 100,000 credit card numbers stolen.

2009: Mitsubishi parts ways with 52,000 customer accounts and credit card data.

Of note: from 2005 to 2009, according to www.privacyrights.org, there were 50 retail breach disclosures related to either a hack, an insider abusing access or other credit card fraud such as POS skimming devices. From 2010 to 2013 there were 260, a 5X increase.

2010: Proving small retail shops are not immune; Bear and Wine Hobby in Woburn, MA had 35,000 credit card numbers compromised.

2011: Proving the world’s largest companies and brands are not immune, Sony was hacked and thieves got away with the data of more than 100 million users, including over 12 thousand unencrypted credit card numbers.

2012: Hactivist group “The Consortium” exfiltrates 40 Million plain text credit card numbers from porn site operator Digital Playground (don’t worry, that link goes to a news story).

2013: Double feature? Target is stunned by a Black Friday attack that nets hackers more than 40 million card numbers from more than 100 million consumers while high end retailer Niemen Marcus is hit at the same time.

2014: While not yet confirmed, it appears Sears may have been breached in an attack that appears similar to the Target and Niemen Marcus incidents. Meanwhile, HR employees at The Home Depot were caught stealing employee data from 20,000 individuals (abusing legitimate access) and using that data to open up fraudulent credit card accounts.

In regards to 2014, it’s still only March!Breach problems?
Are we learning a lesson?

If you invest the time to read about these breaches, some common themes emerge:

1. Companies with locked down perimeters still leave their organizations vulnerable to illegitimate use of legitimate access

2. Attacks often go unnoticed for months and years and organizations typically don’t understand the full scope of their breach even years after they are disclosed

3. Hackers are becoming more organized and sophisticated every year

    So what can be done?

    Of course, Courion and other IAM solution providers have some good ideas. Start by shifting resources into securing and monitoring the “new” perimeter: user access. As Chris Sullivan points out in “Inside Out Thinking”, if 50% of your risk is from the insider threat or “access as the new perimeter”, then consider why 50% of your IT budget is not focused there. As further confirmation, Kurt Johnson’s post on “Intelligent Intelligence” cites the Verizon Data-Breach Report’s statistics that of 76% of breaches leverage user access in some way.  

    Once you have that budget shifted, start by using it on end user education. The people you let into your network (employees, contractors and customers) are often the soft underbelly of your security program. Most of them don’t want to be, but they may lack the knowledge or sophistication needed to be an IT security asset. Don’t assume they know what phishing, malware or password best practices mean to your ability to protect critical resources.

    Next, review your core IAM program. Is it just a tool to make IT more efficient or does it provide the intelligence to help spot attacks as they are happening? As an example, are you reviewing or recertifying access entitlements every six months, or do you have the capability to look for problem access on a continuous basis and require managers to review access as it becomes risky?

    Finally, make sure you have a 24x7 monitoring capability – just like you do for your perimeter – that will alert you to attacks as they happen. And when you see these attacks – shut off the offending access immediately.

    You can ask questions later, but you don’t want to be on the “top 10 breaches” list next year.

    The Dark Arts of Rugby and Data Breaches


    Nick BerentsAnyone who has played or watched rugby closely knows about the dark arts of the rugby scrum (not to be confused with the software development method!)

    These are dirty tricks and illegal moves that are committed in the scrum out of sight of the referee to gain an unfair advantage.

    The casual fan has no idea when this happens, and many players on the field don’t recognize it either, unless they are on the receiving end. But they see and feel the results as their offense gets disrupted and the whole team is now at a disadvantage.

    Kind of like data breaches. You don’t know where it Verizon Breach Report 2013is coming from or when it happens, but when the damage is done, it is too late. As this image from the Verizon data breach report shows, the time lag from initial compromise to discovery and successful containment can be weeks, months or even years.

    Now we know that the Target Corporation’s data breach was not discovered for about 31 days, well after the damage was done to customers. It also resulted in a near term revenue decline and the latest casualty from the fall-out is the CIO who recently resigned.

    So what are your defenses against the dark arts? Rugby players love to debate this topic at post-match social functions. But business professionals have to treat it far more seriously. Don’t let your scrum collapse, get in touch with Courion to understand how to answer the critical questions “Who has access to what resources?” and “Are they using that access appropriately?”

    For additional insight on the Target data breach, I highly recommend viewing Courion’s recent webinar. And if you are in London the week of March 17 please visit Courion at Gartner’s Identity & Access Management Summit.

    Big Data Volume, Variety and Velocity Drives Need for Intelligence


    Vikram ChellappaThe 3 V’s (Volume, Variety and Velocity) of Big Data have become more relevant in the complex world of Identity and Access Management than ever before. In the midst of dealing with the high volume, variety and velocity of information, organizations not only have to streamline the process of how access is granted and revoked and ensure a high level of productivity, but they also have to reduce risks and maintain high security standards.

    Volume: Data seems to be around forever. Many organizations still use data that was created 15 years ago or more. Considering that there is so much information from applications and systems that have been around for a long time, do organizations have all of the information they need? Has the need for new information diminished? The obvious answer to both of these questions is No! In fact it is quite the opposite. The amount of new information has increased exponentially and many if not most organizations have petabytes of information in storage.

    Variety: Very few organizations have a single platform, a single source or a single format for information. Operating systems, directories, databases, applications and unstructured data sources such as file shares, social media feed such as Linked-in Facebook, and Twitter all form sources and destinations for information. Each system processes Information in a variety of formats such as text files, word documents, presentations, images, videos, or messages.

    Velocity: The popularity of mobile devices and the explosion of social media have completely changed the way we obtain and consume information. Information is available to us at our fingertips and organizations are increasingly providing their employees with mobile capabilities. 

    All of these elements present a very challenging situation for organizations. It has become increasingly difficult to answer questions such as3 Vs of Big Data

    – Who has access to applications and what level of access do they have?

    – Do the right people have the right level of access?

    – What information is being accessed and who is accessing it?

    – What are the riskiest applications?

    These are just a few examples of the types of questions that organizations seek answers for. But the factors already discussed in this post have made it extremely difficult, if not impossible, to manually find answers to these questions. Organizations struggle to get a handle on what causes risk and to act upon those risk factors in a timely fashion.

    The key is to be able to harness relevant information such as identities, policies, and access rights from any data source, analyze the information obtained and embed the intelligence gained thereof in provisioning, de-provisioning and compliance reviews. Information on privileged accounts, abandoned accounts, orphaned accounts, users who have excessive access when compared to their job role or their peers; unused entitlements, riskiest applications and policy violations are some examples of information that needs to be analyzed to effectively implement a secure, robust and an intelligent IAM solution.

    Fix the Leak, Don’t Paint the Wall


    Joel McNameeMy previous blog was about weather – well, that weather caused an ice dam, and that ice dam caused a small roof leak. When I saw the small outline of water on the wall in my home, my first thought was not, “Well, it looks like I need to paint the wall.” My first thought was, “Well, I better find and fix that leak before I have a serious problem.”

    That water stain got me thinking about other warning signs, and what people do about them:

    – Tire pressure light: Put air in your tires

    – Pants too tight: Go on a diet, and workout

    – Chest pain, nausea, and pain in your arm: Go to the emergency room

    All of these signs are time sensitive. They may turn out to be nothing, but you don’t want to wait until you have a flat, your buttons pop, or you’re unconscious before doing something.Roof leak

    I bet Target, the NSA, RSA, and countless other organizations wish they had a real-time warning that a breach was imminent. Do you wish you had a warning indicator when hackers are trying to exploit vulnerable accounts? Well, one exists. Unfortunately, you may not have implemented yet.

    Traditional compliance is like painting over a water stain on a wall once a quarter, while Access Insight is like monitoring for the leak minute-by-minute and fixing the roof at the first drip of water.

    Prevention: Even Better than Cyber Insurance


    Deb DantesMost of us are familiar with purchasing insurance to protect ourselves from unforeseen events and potential loss of our valuable assets. Sometimes, insurance is mandated in order to secure financing for the purchase of a home or a car. In other cases, we may opt to carry insurance to protect our families against loss of income should something happen to us. Alternatively, we may possess valuable assets such as rare pieces of art, precious jewelry, or expensive electronics and we may want to have the ability to replace the cost of those treasured items if there was an intruder who knew how and when to break in and steal our property.

    The same is true for companies that want to protect themselves against the liability that occurs if, or when, protected health information, intellectual property, company confidential financial data, or other personally identifiable information is compromised through unauthorized access to company assets. Interestingly, the need for insurance against such threats, or “cyber attacks”, has been recognized for a decade as reported by the Boston Globe in an article published on February 17, 2014.insurance policy

    The article cites that Liberty Mutual Insurance has had a 30% increase in sales of cyber insurance policies in the past year. That statistic emphasizes the trend that what used to be optional is now becoming a necessity. Companies cannot afford the risks associated with the loss of information, damage to their brand, and costs associated with violation of federal regulations. The cost of purchasing insurance is more predictable and helps protect the company.

    Let’s consider the fact that purchasing insurance helps to mitigate the costs after a breach as occurred. The damage has already been done and there is no guarantee, as pointed out in the article, that insurance will cover all of the costs associated with the cyber attack. Insurance is essentially a backup plan in the event that a breach occurs. It may protect against some of the costs, but it won’t repair a damaged reputation.

    Now let’s consider the possible things that a company can do to prevent attacks from occurring in the first place. There are different areas of vulnerabilities for which there have been long-standing methods to combat threats to networks, data, and security.

    Acknowledging the increasing risk of a cyber attack is a huge stride towards making sure that your company is ahead of the curve and leveraging the tools available to minimize the risk of potential threats. The latest area that is emerging to combat against cyber threats is intelligent IAM. Intelligent IAM uses information collected from your infrastructure to reduce the threat surface, detect aberrations in real-time and help to insure that company security policies are met on an ongoing basis.

    Educate Employees: Priority One in Your Prevention Plan


    Chris SullivanWe now know that Edward Snowden used security credentials provided unwittingly by colleagues at a base in Hawaii to access some of the classified material he leaked to the media.

    This news provides a case in point for my October 2013 blog post, which shared this statistic from a recent Forrester Research report: 36% of information losses are due to inadvertent misuse of data by employees. Insider threats are just that, threats, and should be treated with just as much gravitas as defend and detect strategies for external cyber threats.

    If you don’t think the inside threat of a data breach by employees is important, consider the results of a survey Courion conducted in collaboration with Harris interactive in May of 2013:

    —Nearly 1 in 5 employees (19 percent) age 18-34 who work in an office setting would take company information like customer data, price lists or product plans with them if they knew they were about to be terminated.

    —Nearly 1 in 6 employees (16 percent) in an office setting have been able to use old user IDs and passwords to access a former employer’s computing systems.

    Education and training of employees should be your first move, and you should make it now.  While we do not endorse any specific employee education resource, you may find the information provided by the non-profit National Cyber Security Alliance here a useful starting point.

    After employee education, what else should you do? With the media heralding every new data breach as a “the sky is falling!” event, most CISOs are ready to take action to reduce the risk of an inside threat, but just how, exactly? In a late January post on this blog, my colleague Kurt Johnson outlined a few steps you can take right now:

    —Look outside AND In. First, hackers are not limited to external parties trying to break into systems via unauthorized ways. A lot of very serious harm can occur by people with legitimate access doing some bad things with it.

    —Re-examine access privileges in light of the fact that many breaches involve insiders. Second, it points out how much harm can be done from unauthorized access.  Critical data is not just that governed by regulation. There is more and more critical company information available and accessible that could cause an organization significant harm if stolen.

    —Examine user access behavior relative to role, relative to peers and relative to historical behavior. Third, user activity is a key ingredient to overall authorized vs. unauthorized access and is something that needs to be examined in context of identity. Most likely the computer activity done these employees was atypical from what they usually do and atypical for people in their job functions and roles. A routine user certification review certainly would not have indicated any threat given the accounts were valid. This is exactly where an identity and access intelligence tool such as Access Insight comes in handy.

    —Create strong employment policies so you have a legal leg to stand on.

    —Finally, effective policy creation and communication is critical.

    All Posts