Network security and automation: Why you need user identity analytics now

Published on April 14th, 2020

This article was published by Telecom Reseller

In multi-cloud IT environments, detailed information about the identity of each network user is more important than ever, because it serves as the key evidence helping teams ferret out unauthorized data access, security breaches, and privacy invasions. Moreover, identity-based user analytics are a central ingredient for today’s advanced security strategies like micro-segmentation, granular perimeter enforcement, and Zero Trust, which are known to make the network more resilient to attacks.

The problem is this: SD-WAN management portals don’t always provide this critical data. Here’s a guide to understanding the value of user analytics and why these details are an increasingly important element for both your security today and for your network automation tomorrow.

What is identity and access management?

Identity is who you are, the way you are viewed by your organization, and the characteristics and behavior that define you. A common example of identity on a corporate network is a person’s name and email address stored in Microsoft Active Directory. It can also be a coded name, number, or password. Other sources of identity include the device name, location, time of day, the risk and trust of the user’s device, and even the application and data sensitivity being accessed.

These are primary ways of verifying that a person or user is who they say they are. This information is used for data governance and identity access management (IAM), which is a method for restricting information and network access based on the roles of individual users. When digital enterprises must provide secure information access based on the identity of a person or based on the identity of a device (or both), IAM delivers the information and methods for decision making at the source of the connection. Specific IAM technologies include centralized authentication, single-sign-on (SSO), session management, and authentication or authorization enforcement and are typically integrated into cloud applications and network services. 

Why user analytics take central stage in advanced security

The concept of granularity helps explain why identity is now taking a central role in security strategies. This detailed information acts as a prerequisite for micro-segmentation, granular perimeter enforcement, and Zero Trust because it give IT teams:

All of this explains why user analytics are increasingly important according to Gartner’s “Magic Quadrant for Access Management,” which reported:

With more devices, services, and users to manage today, enterprises face more security risk, as these are targets for unauthorized access. Ineffective access management is risky for compliance (especially the increasing domestic and international privacy regulations) as well as security. Missing or poor access management can lead to damages from both external and internal threats. So, it’s clear to see why per-user analytics are sought-after security tools.

Unknown benefits: User analytics essential for the autonomous network

Security is such a hot topic today that IT leaders often miss the lesser known advantages of per-user analytics. As the data set that feeds network decision making and automated control, identity information is considered one prerequisite for intent-based networking policies and the autonomous (“self-driving”) networks. They serve as a foundational element for the future. 

When autonomous networks (and their centralized management portals) include per-user analytics, you will be able to give the network your high-level business needs and it will “understand” your intent regarding identity access management and bandwidth priorities per user. Moreover, the network will be able to monitor itself and modify underlying actions in ways that tune itself to your changing needs–and all in real time. Network service providers aiming to deliver on autonomous networking are focused today on checking these boxes. They are incorporating all the data analytics features needed to lay each stepping stone on a path toward total autonomy. Masergy serves as one such company.

Masergy’s SD-WAN includes per-user analytics

Masergy includes Identity-Based WAN Analytics in its comprehensive SD-WAN management portal. Whereas traditional SD-WAN offerings are limited to tracking IP traffic for entire sites, Masergy makes per-user analytics a standard offering inside its SD-WAN management portal.

Learn more about Masergy’s Managed SD-WAN solution.

Gary Audin

With more than 40+ years of computer, communications, and security consulting and implementation experience, Gary Audin is a celebrated author and IT thought leader with regular articles published by Telecom Reseller, No Jitter, TechTarget, and Webtorials. Gary has operated and managed data, LAN, and telephone networks including local area, national and international networks as well as VoIP and IP convergent networks both in the U.S. and across the globe. As a trusted consultant, he has advised domestic and international venture capital and investment bankers in communications, VoIP, and microprocessor technologies.

Related Content

Professional Services: Planning your move to digital, remote work with UCaaS + SD-WAN

Law firms and other service firms are streamlining digital transformation by addressing UC, the network, and security in one unified strategy.

Read more

The 12 Days of Cloudmas: 7 “sWANs” a-swimming

On Day Seven of Cloudmas, Zeus Kerravala, Principal Analyst at ZK Research, looked around but seven swans a-swimming were in short supply, so he talked with Rudy Tibuni, Director of Product Management at Masergy, about seven software-defined "sWANs."

Read more

How does Cloud Access Security Broker (CASB) fit into the SASE paradigm?

CASB serves as of one of SASE’s fundamental purposes. Here’s how it works within a SASE framework to mitigate security risks.

Read more