Cobalt Iron Earns Patent For ML-Driven Authentication Control
Machine-learning-driven authentication control patent for Cobalt Iron.
Cobalt Iron, a provider of SaaS-based enterprise data protection, has announced that it has been granted a patent on its technology for machine learning (ML) optimization of authentication control.
Issued on April 19, U.S. Patent 11310237 describes new capabilities for Cobalt Iron Compass, an enterprise SaaS backup platform. Compass already has the patented ability to optimize user authentication and access to IT resources dynamically based on what’s happening in the environment. This new patent extends that capability by applying new ML techniques — adding yet another layer of intelligence and security to enterprise IT resources and operations.
Controlling authorization and access to IT resources such as data, data centers, hardware devices, and applications is a critical part of securing any enterprise business. Yet authentication controls in practice today are static, seldom changed, and unresponsive to changing conditions and events. Often these controls are not monitored or analyzed to determine whether they are effective or optimized to achieve company security and safety objectives. And sometimes security administrators must change user authentication roles temporarily to ensure business security and safety under unusual circumstances, such as a fire or major weather event. The result is security holes that leave enterprise data, operations, and infrastructure vulnerable to attack.
The techniques disclosed in this patent are:
- Collect training data, including environmental event data, permission access patterns of users, access control duration data, security events and alerts, project data, cyber event information, security event logs, data protection operational results, and such.
- Analyze training data to determine the effectiveness of authentication controls during previous conditions and events.
- Generate ML rules to potentially adjust authentication controls during future conditions and events.
- Monitor for various conditions and events, including environmental events.
- Dynamically adjust user authentication privileges based on generated ML rules.
- Modify durations of user authentication privilege adjustments responsive to generated ML rules.
Security administrators and other IT professionals who are responsible for maintaining security, authentication, and access control in their environments may be able to leverage Cobalt Iron’s new patented techniques to, for example, restrict physical access automatically and temporarily to data center buildings or rooms during a fire or flood. In another example, access privileges for key IT personnel to data, data centers, or applications may be temporarily increased prior to a weather event to expedite emergency backup procedures.
You might also like...
The Big Guide To OTT: Part 2 - Content Origination
Part 2 of The Big Guide To OTT is a set of three articles which dig into the key issues of OTT content origination, the unique demands of OTT content storage, and the role of CDN selection in achieving broadcast grade…
Serverless Computing: What, How, Why, When?
For many people the idea of “serverless” software applications might seem counter-intuitive, or even confusing. Software surely needs to run on some kind of computer system somewhere? Isn’t that always called a “server”? So what does it mean when we talk a…
Network Technologies Reaching Maturity At 2023 NAB Show
Vendors at the 2023 NAB Show will present a diverse array of new technology that smooths the transition through hybrid SDI/IP systems into fully IP based workflows and onwards towards next generation cloud infrastructures.
The Big Guide To OTT: Part 1 - Back To The Beginning
Part 1 of The Big Guide To OTT is a set of three articles which take us back to the foundations of OTT and streaming services; defining the basic principles of the OTT ecosystem, describing the main infrastructure components and the…
Learning From The Experts At The BEITC Sessions at 2023 NAB Show
Many NAB Shows visitors don’t realize that some of the most valuable technical information released at NAB Shows emanates from BEITC sessions. The job titles of all but one speaker in the conference are all related to engineering, technology, d…