Cobalt Iron’s cyber inspection technology

Cobalt Iron Inc., a leading provider of SaaS-based enterprise data protection, today announced it has received a patent on its adaptive, policy-driven data cyber inspection technology. U.S. patent 11663362, granted on May 30, introduces new policy-based approaches for effectively validating data integrity using multiple cyber inspection tools. The technology will be available as part of the company’s Compass® enterprise SaaS backup platform.

In particular, two novel factors qualify this technology for a patent:

· It introduces policy-based control to cyber inspection that responds to various times or events in the life cycle of a data object.

· It includes policy-driven cyber inspection that leverages multiple cyber inspection tools and multiple cyber inspection levels:

  • at different times or events in the life cycle of a data object
  • for different types of data
  • or for different types of cyber events

While cyber threats and attacks continue to accelerate, operational responses to these attacks remain reactive, disjointed, and manual. During cyber attacks, companies are typically panicked and scrambling to understand the scope of data damage and what they can do to validate the integrity of their data.

The newly patented capabilities will allow CIOs, security officers, and other data custodians to proactively monitor and validate data using whatever cyber inspection tools are most appropriate and effective for given data or cyber threats. They also allow businesses to establish cyber inspection security policies that ensure their data is being monitored and validated consistently across the enterprise — as opposed to the manual, reactive, haphazard approaches employed today. These cyber inspection security policies provide data security consistency and can prove data custody discipline to the business.

The techniques disclosed in this patent are:

1. Monitor for various times and events in the life cycle of data objects, such as creation, modification, backup, recovery, security audit, and cyber attack.

2. Apply an inspection-class policy to determine what cyber inspection and level of inspection to perform on a data object upon occurrence of a specific time or event.

3. Perform an inspection-class operation and a level of cyber inspection on the data object.

4. Restore a copy of a data object within a security zone upon occurrence of a specific time or event involving the data object.

5. Perform a data protection operation on a data object upon occurrence of a specific time or event involving the data object.

For example, these techniques could detect indications of a cyber attack and perform specific types and levels of virus-scanning against specific data objects or types of data. They might also perform specific types and levels of cyber scans for specific types of attacks.

In another example, this patent allows businesses to establish cyber security policies for using different data-inspection tools — such as virus or malware scans — for different data objects or data types or for different types of attacks. In this manner, Compass will automatically use the most current, best-of-breed inspection tools in the most effective way for given data and for a given event, all directed by consistent policy.

“In the data protection landscape, using the optimal inspection techniques responsive to particular events is critical to today’s enterprises. A single vendor and simple policy miss the mark,” said Richard Spurlock, founder and CEO, Cobalt Iron. “With this patent, Cobalt Iron positions companies to leverage best-in-class inspection tools proactively, with policy-driven optimization and governance.”

Read more exclusives and news in our latest issue here.

Never miss a story… Follow us on:
Security Buyer
 @SecurityBuyer
 @Secbuyer

Media Contact
Rebecca Morpeth Spayne,
Editor, Security Portfolio
Tel: +44 (0) 1622 823 922
Email: [email protected]

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Image provided by Veeam

AI and Ransomware: Cutting Through the Hype

Rick Vanover, Vice President Product Strategy, Veeam discusses how It might be the great paradox: Artificial Intelligence (AI)….
Copyright: Security Buyer

AmiViz Partners with Titania

AmiViz announced a strategic distribution agreement with Titania. This collaboration underscores a shared commitment to enhancing…
Oil and Gas

Navigating Africa’s Oil & Gas Industry

A comprehensive analysis of security strategies in Africa’s oil and gas industry, covering physical, cyber, and remote surveillance measures.
blackhat

Black Hat Europe Starts Soon

Black Hat Europe starts Monday and now is the perfect time to start planning your experience. With a full lineup of Keynotes…

VIVOTEK’s All-in-One Software Boosts Operational Efficiency for Enterprises

As demand for high-efficiency security systems rises among large enterprises, the global leading…
Assa Abloy website

WTC Amsterdam enhances security and efficiency with digital access solution

The World Trade Center (WTC) Amsterdam, home to over 300 companies, has upgraded its building security with a streamlined, digital access solution from ASSA ABLOY.
John Maddison website

Fortinet launches Lacework FortiCNAPP to enhance cloud-native security

In an advancement in cybersecurity, Fortinet has announced Lacework FortiCNAPP, providing organisations with visibility and security.
GITEX Global 2024 website

GITEX GLOBAL 2024: AI revolution drives strategic tech innovation

GITEX GLOBAL 2024 concluded on Friday, showcasing artificial intelligence (AI) as a transformative force driving business and economic growth
Security Mircon website

Edge Storage Powers Cloud Security

Micron Technology, alongside International Security Buyer, conducted a survey of installers, integrators, distributors, and security managers
Scroll to Top