May 16, 2020
Artificial Intelligence

How could artificial intelligence help in avoiding data breaches?

Archit headshot
Archit Lohokare Chief Product Officer

Artificial intelligence powered security systems learn from historical activities, incidents, breaches to build their own models autonomously, without constant human supervision.

AI avoid data breach

As organizations grow further, workforce becomes global, diverse, distributed, and enterprises adopt new cloud, on-prem systems and deploy intelligent devices, the old model of static policies based on a fixed set of contexts (for e.g. in the case of access management Time, geo-location, device OS, etc.) starts breaking down. Policies grow in number; context does not show account for past history of users and it becomes arduous to protect against future attack vectors.

This is where AI-powered security starts truly showing value. These types of security systems learn from historical activities, incidents, breaches to build their own models autonomously, without constant human supervision. They are intelligent, in terms of making decisions on their own, and insightful in terms of their ability to look at data both broadly and deeply. They constantly learn and evolve by leveraging new data, so they’re easy to maintain and proactive in nature. This area has evolved by leaps and bounds in the past few years and is critical in the detection and prevention of attacks and breaches. Some of the use cases outlined below.

  1. AI /w ML has been applied very effectively in sifting through gargantuan amounts of data to establish identity profiles, which are then used for detecting not just anomalous but also malicious behavior. Based on this, administrators can deploy “adaptive” authentication policies for instance or just in time privileges/rights in order to de-risk access related attacks, which permanent/longer lasting policies are vulnerable to.
  2. AI is all about quality of data, its comprehensiveness and the data science that drives how well it is analyzed (also known as the Model). Quality refers to how well cleaned, prepared, and wrangled the data is for downstream consumption. Comprehensiveness refers to the various contexts and sources from which the tool collects data from. For example, when a user accesses an app, he/she uses an endpoint device (such as a mobile phone), from a location, traverses a network comprising firewalls, gets authenticated, assumes a role, and then performs some activity. A good IAM tool is able to gather information from all of these contexts (device, location, time, network, directory services, roles-based access, etc.) and then “learns” about access patterns over a period of time. The learnings are then applied through adaptive/proactive policies to the critical resources. This approach goes a long way in avoiding data breaches.
  3. Evolving from being prescriptive (providing broad recommendations) on how to mitigate cyberthreats) to being directive (providing definite steps and automating them) on mitigating threats
  4. AI is actually, counter to its basic tenets of being completely autonomous, evolving from siloed, in many cases unsupervised learning to hybrid – combining human intelligence and inputs (supervised) along with unsupervised. This results in more robust policies which in turn means lesser false positives!
  5. AI is being used to orchestrate the configuration of adjacent and impacted systems to reduce the propagation and impact of breaches.
  6. Automated notifications and mitigation steps (for e.g. blocking access or reducing to least privilege). Robotic Process Automation (RPA) also brings in efficiencies in this area.
  7. Leveraging AI for roles engineering and identity governance use cases. Some of these include automated implementation of separation of duties and risk aware access workflow management.

 

This post originally appeared in a Quora Q&A session hosted in January 2020. Our CPO Archit Lohokare was asked to discuss the state of cybersecurity, Zero Trust, artificial technology and machine learning and working in the security field, among other things. Stay tuned as we share more of his answers in our blog!

Archit Lohokare

Archit headshot
Archit
Lohokare
Chief Product Officer

Archit Lohokare is Chief Product Officer at Idaptive, where he is responsible for product strategy, driving innovation, and bringing new products and services to market. He transitioned over to Idaptive as it was spun-out from Centrify, where—as Vice President of Product Management—he led the Identity-as-a-Service (IDaaS) and Unified Endpoint Management product portfolio. Prior to Centrify, Archit was Vice President of Products at Optymyze, where he led the product management team responsible for the company’s Sales Performance Management and Sales Platform-as-a-Service SaaS and PaaS solutions, securing a Leadership position in the first Gartner Magic Quadrant report on Sales Performance Management along the way. 

Earlier in his career, Archit led Symantec's Cloud Information Protection Security-as-a-Service offering, and IBM's Access Management product line, comprised of Web Access Management, Identity Federation, Enterprise Single Sign-On, and Risk-based Access and Entitlements Management products. Archit joined IBM through the acquisition of Encentuate, a leading Bay Area start-up in the security software space; as an early employee, he had the opportunity to contribute to its successful exit. 

Archit has an MBA from UC Berkeley-Haas School of Business, and a bachelor’s degree in Computer Engineering from NTU, Singapore, where he was awarded the SIA-NOL undergraduate scholarship by the Ministry of Education, Singapore.

Archit is an avid history buff, enjoys reading in his spare time and running breathlessly after his one-year-old, hyperactive son.

CHAMELEON-LIKE SUPERPOWER

If Archit could have any Chameleon-like superpower, it would be the ability to change colors quickly and adapt. “Actually, it would be like the ability of our IAM solutions to adapt instantaneously to a customer’s environment and user behavior. Anomalous user access? A snap! Presto, change-o – like a chameleon from green to red in an instant, adapt to the change in user behavior and request user to assure their identities using multi-factor authentication...”