Take the Worry Out of Authorization Control

By August 11, 2022 IP

Our customers have told us that one of the many reasons they choose Compass is because nearly everything happens automatically without them having to think about it. You’re busy, and when you have to keep track of a thousand business and technology details at once, things can fall through the cracks (Updates and security patches, we’re looking at you!). Nobody has time to manually monitor the health and security of the entire environment and tweak things here and there every time something changes or a new threat appears in the market.

We get it. That’s why we work so hard to make automation a cornerstone of the Compass solution ... and to improve it all the time.

For proof, look no further than our patent portfolio. In the past year alone we’ve earned seven patents, which is another way of saying that we’re always looking for new and better ways of doing things to make your job easier.

In this blog series, we’ll look at just a few of the patented techniques being injected into Compass and what they mean for you.

First up ... dynamic authorization control based on conditions and events.

Why You Need It

Authorization controls are how you validate who has proper security authentication and permissions to do something against some resource, such as accessing an operations center or moving and deleting data. In most environments today, authentication roles and associated permissions often remain in place for way too long — sometimes years — without further validation or adjustment. As job responsibilities, projects, applications, architectures, and business needs change, these old roles and permission assignments often expose the enterprise to security risks.

What It Does

Through patented dynamic authorization control techniques, Compass will:

  • Monitor for various conditions and events, such as a change in a state of a project, a change in a security alert level, or a change in the location of data or resources.
  • Dynamically modify user authorization control, level, or duration based on the condition or event.
  • Apply machine learning analytics to determine the condition or event.
  • Establish and refer to a cloud security profile to determine any user authorization modifications.

Importantly, those techniques will improve over time based on machine learning.

What It Means for You

If you are responsible for maintaining security, authentication, and access control in your backup environment, then you can rest easy knowing Compass has authorization control covered. In addition, Compass is improving its robust authentication control with these new automated techniques.   Compass is evolving its analytics and machine learning to adjust user authentication and access to IT resources automatically and on the fly — thereby eliminating the pervasive security exposures of outdated, obsolete, and unresponsive authorization controls.

Cobalt Iron has many other patented ways to reduce security risk while making backup operations run more smoothly and efficiently. We’ll talk about those in future blogs.

Until then, please contact us if you’d like more information.

< Back to Blog