Three out of four intrusions exploit weak or stolen (but otherwise legitimate) credentials, and another 13 percent result from misuse of information by privileged users, according to Verizon’s 2013 Data Breach Investigation Report. The solution is harnessing the big data in the trillions of access relationships — the ever-changing information related to who is accessing what resources for what purpose — to better understand what is really going on. As Gartner says, “[Big Data] is a class of information processing problem that, due to the volume, velocity, variety and complexity of the data, requires different approaches to support analytics to derive cost-effective, timely, business-relevant insight.” While big data has been used effectively by line of business to analyze customer purchase behavior, inventory turns, or other critical data, it also offers tremendous promise for IT security to manage business better.