Cobalt Iron Patents Dynamic Infrastructure Optimization Technology For Cyberthreat Response
Cobalt Iron, a provider of SaaS-based enterprise data protection based in Kansas, USA, has been granted a patent on its technology for dynamic IT infrastructure optimization in response to cyberthreats.
The patent describes new capabilities for Cobalt Iron Compass, the firm’s enterprise SaaS backup platform, enabling automatic reconfiguration of IT infrastructure when it detects cyberthreats, such as a ransomware attack.
Cybercriminal activities increasingly threaten the availability and integrity of critical business data in ways that are hard to detect in a timely manner, and even then, often leave businesses unsure of what steps to take to limit the impact of an attack and remediate any damage. The fact most IT infrastructures are statically configured and completely unresponsive to changing conditions and cyberthreats is a particular problem in many cases.
The newly patented techniques introduce new ransomware analytics and automated optimizations that respond to cyberthreats. They will dynamically adjust access to backup infrastructure and data to reduce exposures to cyberattacks. They can also provide analytics-based insights into an attack and automatically perform various operations to secure data further.
The techniques disclosed in this patent monitor metrics, events, and conditions continuously for indications of a cyberattack in the network. They identify infrastructure components and data that could be impacted by or be vulnerable to a cyberattack, while automatically restricting access to vulnerable infrastructure components and data that have been affected.
The techniques also create an audit report of impacted infrastructure components or data and initiate remediation operations automatically. Such remediation operations might include initiating data replication of a previous clean backup version of the data to an off-site location, or recovery and validation of affected data into a safe storage location.
As an example, Compass could detect the event, conduct impact analysis to determine which data and hardware components might be affected, restrict access to those data and components, perform other operations to remediate exposures, and generate an audit report associated with the event.
You might also like...
The Big Guide To OTT: Part 2 - Content Origination
Part 2 of The Big Guide To OTT is a set of three articles which dig into the key issues of OTT content origination, the unique demands of OTT content storage, and the role of CDN selection in achieving broadcast grade…
Serverless Computing: What, How, Why, When?
For many people the idea of “serverless” software applications might seem counter-intuitive, or even confusing. Software surely needs to run on some kind of computer system somewhere? Isn’t that always called a “server”? So what does it mean when we talk a…
Network Technologies Reaching Maturity At 2023 NAB Show
Vendors at the 2023 NAB Show will present a diverse array of new technology that smooths the transition through hybrid SDI/IP systems into fully IP based workflows and onwards towards next generation cloud infrastructures.
The Big Guide To OTT: Part 1 - Back To The Beginning
Part 1 of The Big Guide To OTT is a set of three articles which take us back to the foundations of OTT and streaming services; defining the basic principles of the OTT ecosystem, describing the main infrastructure components and the…
Learning From The Experts At The BEITC Sessions at 2023 NAB Show
Many NAB Shows visitors don’t realize that some of the most valuable technical information released at NAB Shows emanates from BEITC sessions. The job titles of all but one speaker in the conference are all related to engineering, technology, d…