Skip to main content

User Patterns: The Real Hole in Threat Detection

by Greg Pierce
Chief Cloud Officer, Concerto,

The ability to detect and prevent threats stands at the center of most organizations' security posture. Gartner recently announced that companies now see technology security and compliance as a strategic item, no longer relegated to the tactical. This is with good reason.  

Average Security Breach: 263 Days Undetected!

The average breach goes 263 days before detection (no, that's not a misprint). That same breach (again, on average) costs a cool $3.5 million per incident based on lost revenue, productivity, remediation costs and penalties. Worldwide, this represents a $500 billion problem.

Given the gravity of the financial repercussions, companies are scrambling to pour money into preventive technology and compliant systems, process and procedures. It's hard for a CFO to say no these days to plugging a real or perceived gap in security. There's a hole that many are missing, however, and it's an area that is starting to move to the forefront of security conversations.

Trusted vs. Untrusted

We've all heard the story of the HVAC technician's admin password being stolen and used.  There are countless other breaches just like this one. How to stop it? Typical procedures and process include better management of subcontractors and more rigid password expiration policies. But that really is just the tip of the iceberg.

Eighty percent of incursions happen using regular, generic IT tools and a stolen password. Smaller companies that work with larger ones are used as a beachhead to gain access.  What we need is much deeper investments and technology around predictive pattern analytics.

Consider this. Would you design a physical security system allowing ...

FREE Membership Required to View Full Content:

Joining MSDynamicsWorld.com gives you free, unlimited access to news, analysis, white papers, case studies, product brochures, and more. You can also receive periodic email newsletters with the latest relevant articles and content updates.
Learn more about us here

About Greg Pierce

A 20-year technology consultant, Greg Pierce is considered one of the foremost experts on cloud computing trends, systems integration and deployment strategies. Greg develops the strategic direction, vision and product offerings for Concerto and manages sales, service and delivery for all customers.

Greg specializes in helping businesses understand, select and deploy innovative cloud solutions that leverage on-premise, hosted, third party and hybrid models. He was influential in the formation of Concerto Cloud Services and its virtual private cloud infrastructure, and under his leadership, Concerto has become one of the leading cloud services providers in the country, including recognition from Microsoft as the U.S. Independent Software Vendor (ISV) of the Year for Cloud Solutions.

Prior to founding Concerto, Greg held management positions in Tribridge's Cloud, Security and Infrastructure, and Managed Services practices. Before joining Tribridge in 2008, Greg owned and operated two companies that provided a variety of IT managed services and cloud computing solutions for customers throughout the U.S., including platforms for the delivery of ERP and other core business applications via private cloud since 2004. He has also served as a CIO.

Greg is an avid speaker for Fortune 500 enterprises, industry conferences and user groups. He serves on the Advisory Board for the University of South Florida (USF) College of Business, the Advisory Board for USF's Executive MBA Program and on the Executive Advisory Council at the Donald R. Tapia School of Business at Saint Leo University. He is a member of Microsoft's Infrastructure Partners Advisory Council and that organization's Cloud Economics Subcommittee. He holds an MBA from USF and a Bachelor of Arts degree from Eckerd College.

More about Greg Pierce