LAWRENCE, Kan. — July 27, 2021 — Cobalt Iron Inc., a leading provider of SaaS-based enterprise data protection, today announced that it has received a patent on its technology for automated network traffic shaping for data protection operations. Issued on July 13, U.S. Patent 11063907 describes new capabilities for Cobalt Iron Compass®, an enterprise SaaS backup platform, that enable dynamic adjustments to networks and storage networks in response to cyberthreats and other high-security alert conditions.
This technology qualified for a patent because, unlike similar technologies, it uses analytics and user-defined policies to shape network and storage throughput levels dynamically to restrict security exposures and to optimize available resources during times of possible security exposures.
Today’s backup, data, security, and other IT professionals who are responsible for maintaining network or storage security and performance have a constantly changing need to respond to ever more sophisticated cyberattacks. However, amidst these changes, IT infrastructure and operations remain relatively static, leading to suboptimized resources and security vulnerabilities, particularly in the area of networks and storage networks. These resources are typically pre-allocated and are not adjusted in response to changes in the environment, such as ransomware attacks. This patent fills a need for a more advanced means of monitoring and optimizing these resources.
The techniques disclosed in this patent, which are being implemented in the Cobalt Iron Compass SaaS platform, will:
“IT infrastructure, such as IP and storage networking, is typically statically configured and unresponsive to constantly changing conditions in the environment. High-security alert conditions in particular suggest the need for infrastructure that is more responsive,” said Greg Tevis, vice president of strategy at Cobalt Iron. “With this patent, Cobalt Iron continues to innovate around analytics-based optimizations of IT infrastructures. This patent discloses techniques to shape network and storage traffic levels dynamically when security alerts arise, which minimizes security vulnerabilities while expediting required IT operations.”