Page 45 - Security Today, February 2017
P. 45

employees can make changes directly from their phone or tablet. As an example, at the 2016 Summer Games held in Rio, Bra- zil, mobile PIAM was deployed to manage the identities and track the movements of approximately 500,000 credentialed in- dividuals, allowing them to come and go from the various venues. During the events, security and event staff used handheld devices to verify identities nearly 3 million times, ensuring that every badge was authentic. By connecting to the PIAM system, all of these mobile devices were assured of having the latest, up-to-the- minute information, and discrepancies could be investigated and
resolved immediately.
In all, the solution deployed at the Games flagged about a
dozen problems with badges, most of which were minor, as well as one more serious incident in which a number of people at- tempted to falsify others’ credentials to enter a basketball game. Thanks to the software and mobile capabilities, these anomalies were caught instantly.
Actionable Intelligence
As mentioned earlier, PIAM software uses risk profiles to ana- lyze data from physical security and logical/IT systems across an organization. Using this analysis, PIAM systems can detect and identify irregular behaviors based on set policies and parameters that have been predetermined by management. If a behavior anomaly is identified, the PIAM software provides an alert to security management with the information they need to investi-
gate and if appropriate, take action. Mobile PIAM takes this one step further to deliver alerts in real time to the designated security staff, including not only management, but also to security officers in the field and on site.
As an example, consider what might happen if an individual is using credentials to enter restricted areas they are not authorized to access. A PIAM software system could correlate these events and alert security to look for abnormal network activity. If the flagged physical and IT access activities are connected, security can immediately and automatically respond by deactivating the individual’s ID badge and access privileges to company digital in- formation. A mobile alert can also be sent to the security officers on duty to investigate and take appropriate action, such as re- moving the person from the premises, or detaining the individual until police arrive. In either case, providing the officers on scene with access to the PIAM system information equips them to bet- ter evaluate the situation and take appropriate actions.
As advanced PIAM solutions continue to improve their abil- ity to detect anomalies and provide actionable intelligence, it becomes ever more important to get that intelligence quickly into the hands of the security staff that will put it to use. Mobile PIAM offers a powerful, efficient and cost-effective way for orga- nizations to capitalize on the strengths of PIAM from anywhere, at any time.
Don Campbell is the vice president of products at Quantum Secure.
Online Security Technology Training
Take charge of your security technology training with our online training courses. Train as an individual or implement a companywide program with a Corporate Account.
and
Our courses are suitable for everyone in the security industry. They are available 24/7, making it the most convenient and cost-effective solution for anyone who wants to improve security knowledge or skills. Approved for Continuing Education (CE) by various security associations and government bodies, the courses include:
• CCTV + Digital Video
• IP Networking
• Access Control
• Biometrics Technology
• Fiber Optics
• Basic Electricity
• Wireless Technology
Learn more at securitytodayacademy.com
Untitled-9 1
1/5/17 2:38 PM
Go to sp.hotims.com and enter 203 for product information.
WWW.SECURITYTODAY.COM NS15









































































   43   44   45   46   47