Traditional security tools focus on the network perimeter, leaving user and service accounts vulnerable to hackers.