BitDepthFeatured

Flexxon introduces silicon-level cybersecurity protection to TT

3 Mins read

Above: Irene Yeo and Nelson Chia present Flexxon’s cybersecurity solutions at the Mariott. Photo by Mark Lyndersay.

BitDepth#1459 for May 20, 2024

On Tuesday, Pinaka Consulting hosted an enterprise-level introduction to Flexxon’s® X-PHY® cybersecurity products.

Pinaka has previously been involved in blockchain and central bank digital currencies consulting along with ransomware tracking on the blockchain before taking this new step into hardware protection solutions.

Pinaka CEO Shiva Bissessar called on local businesses to begin taking the role of Chief Information Security Officer (CISO) more seriously, and to consider integrating the position into upper-level executive level decision-making. The company will represent Flexxon® locally and in the Caribbean region.

“Pinaka has traditionally focused on information security based consultancy,” said Bissessar.
“In stepping into the cybersecurity solution provider role, we sought to bring unique innovation to the local and wider regional Caribbean market.”

Flexxon was represented by Irene Yeo, who gave an explanatory keynote on behalf of the female founded and led Singapore cybersecurity company.

Shiva Bissessar (far left) at the Flexxon presentation with invited guests.

Flexxon began business in 2007 under the leadership of CEO Camellia Chan with a line of products that targeted niche industrial, medical, automotive and aerospace sectors before making a change in 2017 to static security solutions.

By 2019, those solutions had evolved into the company’s first X-Phy secure solid state drive (SSD) with embedded artificial intelligence.

Flexon introduced its newest hardware protection systems last week, a NAND flash memory solution that’s available in an NVME form factor as well as a one-slot PCI-E card for enterprise installations.

The new X-PHY product provides hardware level security that doesn’t conflict with other software solutions save for drive level encryption products, since the cyber secure drive does its own encryption as part of its protection regime.

The SSD-based hardware protection delivers a broad range of security responses by first creating a single access point through which data flows.

The resulting data stream is monitored by software that’s embedded in a chip that’s part of the drive hardware itself, providing a continuous review of access patterns using AI in the chip controller that monitors for possible malware intrusions with real-time detection and response to suspicious activity or patterns of attack consistent with known malware.

The on-chip AI intelligence can lock out new threats by isolating unusual patterns of access.

Regarding updates to the software embedded in the X-PHY, Flexxon responded via messaging that, “We do not need constant updates like software [solutions].
Our [infrequent] updates are for firmware or feature updates only. Detection is based on read/write/overwrite [patterns] within the drive and all commands need to bypass the firmware on our chipset for analysis and detection through the one door access [implemented using] the PCIE and NVME protocols.”

Flexon’s X-Phy NVME solution.

Yeo noted that an increasingly critical vector for data breaches and leaks is lost or stolen devices. Flexon’s drive level security measures for SSDs and other flash media storage devices offer a defence against intrusions even when hardware is no longer under the control of a company or its agents.

Flexxon has established partnerships with Lenovo, Asus, Dynabook and HP to deliver what they describe as “AI-Augmented laptops” that implement the X-PHY security solutions in a ready-made package. Flexon made no announcements about the availability of this laptop series on the local market.

By 2025, the company plans to expand into enterprise level server and data center installations with Enterprise Server Defender, which will introduce its own stand-alone operating system and applications to the cybersecurity mix, building on drive level protections with live, AI powered detection of data stream anomalies and protection across all seven layers of operating system interconnection.

Server Defender promises multi-level protections on chip, including its patented Matrix Shield technology, proactive live anomaly detection, real-time incident, response, uninterrupted instant restoration and unidirectional assessment.

According to Flexxon’s promotional materials, “Server Defender lies outside the process integration stack but tracks all hardware computations happening between the CPU, Platform Controller Hub (PCH), host processor chipsets and the motherboard itself.”

“We constructed a barrier isolation wrapper that monitors operations between Direct Memory Access (DMA) and the host processors, eliminating any extraneous operations in the cache and thereby nullifying the potential for DMA attacks.”

“The reception from the market so far has recognised the unique nature of these solutions in examining the execution of read, write and overwrite instructions at the SSD level,” Bissessar said after the morning’s presentations to local IT professionals.

Both X-PHY products are immediately available from Pinaka Consulting. The Server Defender product is available but is currently in beta.

What keeps regional cybersecurity experts awake at night

What keeps regional cybersecurity experts awake at night

Whether the attack comes from a successful external attempt, exploiting a vulnerability or from inside, perhaps a disgruntled employee, an exploit needs just one vulnerability.
Read More
Where hackers begin

Where hackers begin

Digital nation strategies have been released by 170 countries and regions and more than 60 countries have elevated AI in their national strategy.
Read More
Blue skies for microblogging?

Blue skies for microblogging?

Bluesky hit its current high of 23 million users faster than expected, but it’s way behind X.
Read More
The apps that thrive in Apple’s ecosystem

The apps that thrive in Apple’s ecosystem

By Apple's own yardstick an app that shares usable data across three devices is acceptable one that synchronises with four is a winner.
Read More
America’s open mic moment

America’s open mic moment

What made online pundits so effective in the US election?
Read More
The press and the president-elect

The press and the president-elect

Beyond the president-elect's often-expressed intent to retaliate against journalists he believes are unfairly attacking him is the agenda of Project 2025.
Read More
All washed up

All washed up

Dirt on its own will simply shake out of fabric. What keeps it in place is oil and grease, readily generated by human skin.
Read More
The state of Caribbean digital transformation

The state of Caribbean digital transformation

Despite 87 per cent believing that digital will disrupt their industry, 87 per cent acknowledged that they don't have the right leaders
Read More
The WordPress War

The WordPress War

WPEngine and the websites of its customers were blocked from the WordPress log-in system theme and plug-in updates and other background processes that enable a Wordpress website.
Read More
A budget of concrete and asphalt

A budget of concrete and asphalt

Four years after Hassel Bacchus took up the pioneering role of Digital Transformation Minister, the 2025 budget could not identify any completed transformation project that's positively affected citizens.
Read More
Arima’s first step toward becoming a smart city

Arima’s first step toward becoming a smart city

The public WiFi was officially activated on September 28 at the hospital, and it's fast. A local ping registered 250 megabits of download speed and 126 for upload.
Read More
Now hear this!

Now hear this!

Budget headsets will effectively dampen ambient sounds, but tend to be an all or nothing solution.
Read More
A taxing time for all

A taxing time for all

Tax collection began using the least customer-friendly interface imaginable, lines outside a government building.
Read More
Mobile devices, a war of increments

Mobile devices, a war of increments

Mixing and matching the two rival ecosystems is essentially impossible, so it's the utility of the products combined that makes the biggest difference.
Read More
Why cash is king in Trinidad and Tobago

Why cash is king in Trinidad and Tobago

In 2017, 16 per cent of users owned a credit card, a figure that dropped to 15 per cent by 2023.
Read More
I shopped at Temu!

I shopped at Temu!

Temu is great fun to explore and offers many bargains but product quality can be wildly variable.
Read More
What’s needed to make e-Governance happen?

What’s needed to make e-Governance happen?

“If we look at successful governments that have achieved a certain level in of success in these programs, some things stand out."
Read More
Changing the education conversation

Changing the education conversation

There are local schools that aspire to continuous improvement and others that struggle to make it through a working day without bloodshed.
Read More
Practical steps to reducing cybersecurity risks

Practical steps to reducing cybersecurity risks

The process, to be effective, must be ongoing and managed to ensure that vendors meet required standards.
Read More
The consequences of careless code

The consequences of careless code

The cruel reality of Crowdstrike is that it wasn't a cybersecurity attack. It was a quality of service lapse and the incident puts IT professionals in an odd space.
Read More
What keeps regional cybersecurity experts awake at night What keeps regional cybersecurity experts awake...
Where hackers begin Where hackers begin
Blue skies for microblogging? Blue skies for microblogging?
The apps that thrive in Apple’s ecosystem The apps that thrive in Apple’s...
America’s open mic moment America’s open mic moment
The press and the president-elect The press and the president-elect
All washed up All washed up
The state of Caribbean digital transformation The state of Caribbean digital transformation
The WordPress War The WordPress War
A budget of concrete and asphalt A budget of concrete and asphalt
Arima’s first step toward becoming a smart city Arima’s first step toward becoming a...
Now hear this! Now hear this!
A taxing time for all A taxing time for all
Mobile devices, a war of increments Mobile devices, a war of increments
Why cash is king in Trinidad and Tobago Why cash is king in Trinidad...
I shopped at Temu! I shopped at Temu!
What’s needed to make e-Governance happen? What’s needed to make e-Governance happen?
Changing the education conversation Changing the education conversation
Practical steps to reducing cybersecurity risks Practical steps to reducing cybersecurity risks
The consequences of careless code The consequences of careless code

🤞 Get connected!

A once weekly email notification of new stories on TechNewsTT. Just that. No spam.

Possible UI Glitch. Click top right corner to dismiss 👉

Get Connected!

A once weekly email notification of new stories on TechNewsTT.

Just that. No spam.

Related posts
BitDepthFeatured

What keeps regional cybersecurity experts awake at night

4 Mins read
Whether the attack comes from a successful external attempt, exploiting a vulnerability or from inside, perhaps a disgruntled employee, an exploit needs just one vulnerability.
BitDepthFeatured

Where hackers begin

3 Mins read
Digital nation strategies have been released by 170 countries and regions and more than 60 countries have elevated AI in their national strategy.
Press Releases

Samsung extends Knox security to its home appliances

2 Mins read
Knox Matrix is a security solution that comprehensively protects connected devices and networks using private blockchain technology.
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

1 Comment
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
trackback
6 months ago

[…] Trinidad and Tobago – On Tuesday, Pinaka Consulting hosted an enterprise-level introduction to Flexxon’s® X-PHY® cybersecurity products… more […]

×
BitDepthFeatured

Ransomware report reveals Caricom-wide attacks

1
0
Share your perspective in the comments!x
()
x