It\u2019s hardly a secret that the increasing use of mobile devices has vastly complicated the lives of IT and security leaders. It\u2019s bad enough that the traditionally defined security perimeter is leaky as a sieve, but CSOs must now contend with growing numbers of devices that reside outside that perimeter and can connect to the enterprise network or cloud at will.\n\nEnterprises have invested in cyber defense tools such as antivirus, firewalls, and more. It\u2019s not enough. What enterprises need are a combination of visibility, intelligence, and proactive security in a seamless, integrated architecture.\n\nA recent study from Dimensional Research indicates that almost two-thirds of enterprise security professionals doubt their organizations could prevent a mobile cyber-attack. A stunning 94% of those surveyed expect mobile attacks to increase, and 79% say it is growing more difficult to protect mobiles devices.\n\nMobile dependency\n\nMany enterprises are now in a mobile-first world, heavily dependent on the mobile devices in use by their employees, while accessing assets hosted by third parties such as salesforce.com.\n\nBut it\u2019s not just the growing numbers of smartphones, tablets, and laptops that enterprises must confront. As SearchCIO points out in a recent report, \u201cProtecting the mobile enterprise today means dealing with augmented reality and virtual reality devices and wearables, from smart watches to industry-specific technologies (i.e., connected medical monitors used in healthcare and smart glasses used in utilities).\u201d And that is just the tip of the Internet of Things (IoT) Iceberg or an increasingly connected enterprise.\n\nWith that many moving parts, it\u2019s virtually certain that enterprises are going to get hacked. Not only were traditional tools constructed to protect a physical perimeter that in the main no longer exists, but it turns out those tools aren\u2019t designed for the planned, targeted attacks that are making today\u2019s headlines.\n\n\u201cThreats are getting more advanced, more insidious, and more expensive, and they will doubtlessly continue to do so\u2014in order to combat this, businesses really do have to be secure from the edge, to the core, and up into the cloud,\u201d technology analyst Patrick Moorhead writes in Forbes.\n\nRising to the challenge\n\nMany enterprises are operating under the pretense that security information and event management (SEIM) solutions provide the last line of defense through the constant monitoring and analysis of the alerts produced by network devices and security software. But these solutions don\u2019t scale very well in a world of mobile and cloud, and can produce \u201calarm fatigue\u201d as staff respond to non-threatening incidental events.\n\nDon\u2019t lose hope, though. Help is on the way.\n\n\u201cWe are in the midst of an artificial intelligence security revolution,\u201d says Dimitrios Pavlakis, industry analyst at ABI Research. According to ABI, \u201cUser and Entity Behavioral Analytics (UEBA) along with Deep Learning algorithm designs are emerging as the two most prominent technologies in cybersecurity offerings.\u201d\n\nUEBA, writes Gartner\u2019s Anton Chuvakin, \u201coffers profiling and anomaly detection based on a range of analytics approaches, usually using a combination of basic analytics methods (e.g., rules that leverage signatures, pattern matching and simple statistics) and advanced analytics (e.g., supervised and unsupervised machine learning).\u201d\n\nUEBA complements SEIM\u2019s ability to monitor what is going on by adding context and insight into the who, how, and why of that activity. It is the realization of the Active Cyber Defense (ACD) goals of \u201csensing, sense making, decision making, and action\u201d that is crucial for an effective security architecture in a mobile-first world.\n\nTo learn more, visit Aruba.