The compromise and misuse of identity is at the core of modern threats and data breaches. This has been documented for years and continues to escalate. As a result, we are rapidly approaching the end of life for password-based security and centralized access. Legacy controls and architecture are due for replacement. So, what should replace them?There\u2019s no one silver bullet. However, one approach appears to be bubbling up to the surface. It\u2019s the shift from Identity- to behavior-based security.Identity Access Management (IAM) infrastructures were originally built to enable user convenience, with few security features built in. They moved us from the barbaric manner of connecting individual users to applications via IP attributes to provisioning access to multiple users across vast networks of systems. At one time, identity was the new security frontier where we threw money and energy to exert control. And, now, that\u2019s so yesterday.Our organically cobbled IAM systems have run their course. We can no longer solely use identity-based security to determine who are the attackers and who are the victims. Furthermore, we have limited control over what users are doing on the network, and often lack the ability to determine what they have access to and under what context. The current IT environment has evolved far beyond the point where it can be managed via identity-based security policies and tools.We\u2019ve entered a new era of fragmented components of users, applications, data lakes, hybrid environments \u2013 where the network perimeter has faded. As a result, we must rethink our current practices to embrace the next security paradigm that lies beyond identity, and instead focuses on behaviors.This new model establishes a perimeter that relies on the behavior of individuals and their peers to determine both identity and integrity. As an example, at the last NH-ISAC conference, Facebook demonstrated how it is currently implementing this brave new approach. The company now assumes users\u2019 passwords and devices are already compromised and analyzes over 80 attributes to determine the identity of the user prior to authentication. Meanwhile, this year\u2019s winner of the 2017 RSAC Innovation Sandbox competition, UnifyID, combines 100+ sensor data attributes from everyday devices (smart phones, smart watch, etc.) to authenticate users, achieving a more than 99.999 percent true positive rate.Another promising development is private block chains which can provide key advantages for data integrity. Blockchain technology helps facilitate digital trust by building tamper-proof digital vaults to protect connected users and devices, define their access permissions and bring redundancy into the system. Authentications are implemented on a device-to-device basis, without reliance on a central authority or passwords. The October 2016 DDoS attack on Dyn brought down a large number of websites via a botnet attack called Mirai, which hijacked over 100,000 vulnerable IoT devices. This incident forced the security issues with IoT security to the frontline and could have been prevented by using blockchain technology.At the government level, the US Department of Homeland Security (DHS) is working with an emerging company, Factom, to determine whether blockchain can be used to limit would-be hackers' abilities to corrupt the past records for a device, making it more difficult to spoof. Factom\u2019s technology secures data for private and public organizations by publishing encrypted data or a cryptographically unique fingerprint of the data to their immutable, distributed blockchain. Analyst firm Gartner has identified blockchain as one of 2016\u2019s hype cycle emerging technologies that organizations should track to gain competitive advantage.The opportunity to know more, and to know it much more quickly, is upon us. Organizations are already storing large volumes of users\u2019 digital footprints in data lakes. These resources can be mined to identify user behavior patterns and reduce access risk. This knowledge can dramatically improve the veracity of authenticating users and enable detection of anomalous events and potential threats. Powerful machine learning models when applied to relevant data attributes can provide the answers needed for implementing a behavior-based security perimeter now.Behavioral fingerprinting of user and entity activities and access is a huge leap forward from the current declarative defenses that rely on rules, signatures and patterns for detecting known bads. \u00a0Let us know your thoughts, head to our Facebook page.