Page 19 - Security Today, September/October 2023
P. 19

                                 identity intelligence, and a comprehensive approach to manage the rules associated with every worker’s profile and attributes to allow or disallow facility access. It in- volves real-time access management aspects considering the dynamic nature of access requirements, evolving roles and responsi- bilities,andchangingorganizationalneeds. PIAM 2.0 does not rely on hard-coded business rules and rigid structure as is the case of legacy PIAM offerings. It relies on data and dynamic rules to manage access. Access management also incorporates aspects of identity management, which in- Shutterstock.com/ Good dreams - Studio volves maintaining accurate and up-to-date information about individuals and their as- sociated privileges, thus creating Physical Identity Access Management (PIAM). Dynamic Workplace; Dynamic Workers Post COVID-19, organizations often struggle to manage access to different doors at various locations for workers who may have a fixed office schedule or may work remotely many times in a month. There is a clear shift from regular office access to purpose-based access in a hy- brid work model. This shift demands that PIAM 2.0 is smart enough for office plan- ning, occupancy, and accommodation of the hybrid workforce access routine. At the same time, organizations are looking to optimize their existing office space globally. As office spaces grow and old leases come to end, facility planners are looking for accurate data on how to efficiently allocate space amongst a hybrid workforce. PIAM 2.0 can enable individu- al level analysis of historical and real-time data with predictive capability to ensure office workspaces are constantly opti- mized in such environments. This helps organizations reduce costs and increase utilization of the space they have. Data-driven Security Threat Intelligence Decentralization of office spaces, a hybrid workforce and site-level manual manage- ment of physical access create security gaps. When an identity is not connected with ap- propriate access permissions and logical rules, a security gap exists. This security gap creates a false sense of security wherein an organization believes it is protected by their access control system, but in reality, the access control system is introducing new risks, such as insider threats, access anoma- lies and suspicious behavior of access. PIAM 2.0 leverages purpose-built artificial intelligence and machine learn- ing algorithms to learn from millions of identity access actions, behaviors and anomalies to detect incidents of poten- tial breaches in security. Such behaviors could manifest as physical access card/ badge cloning, to access phishing exercise to tailgating to gain inappropriate access. By combining and correlating various data streams, such as badge access, video, IT & networking systems data, organiza- tions can thwart an unpleasant security incident in advance. Moreover, PIAM 2.0 automation al- lows organizations to autonomously manage every identity over their entire lifecycle across the enterprise. This in- cludes gaining key insights into potential risks while also promoting operational ef- ficiency through the automation of tasks related to onboarding and offboarding. In WWW.SECURITYTODAY.COM 19 


































































































   17   18   19   20   21