BitDepthFeatured

Flexxon introduces silicon-level cybersecurity protection to TT

3 Mins read

Above: Irene Yeo and Nelson Chia present Flexxon’s cybersecurity solutions at the Mariott. Photo by Mark Lyndersay.

BitDepth#1459 for May 20, 2024

On Tuesday, Pinaka Consulting hosted an enterprise-level introduction to Flexxon’s® X-PHY® cybersecurity products.

Pinaka has previously been involved in blockchain and central bank digital currencies consulting along with ransomware tracking on the blockchain before taking this new step into hardware protection solutions.

Pinaka CEO Shiva Bissessar called on local businesses to begin taking the role of Chief Information Security Officer (CISO) more seriously, and to consider integrating the position into upper-level executive level decision-making. The company will represent Flexxon® locally and in the Caribbean region.

“Pinaka has traditionally focused on information security based consultancy,” said Bissessar.
“In stepping into the cybersecurity solution provider role, we sought to bring unique innovation to the local and wider regional Caribbean market.”

Flexxon was represented by Irene Yeo, who gave an explanatory keynote on behalf of the female founded and led Singapore cybersecurity company.

Shiva Bissessar (far left) at the Flexxon presentation with invited guests.

Flexxon began business in 2007 under the leadership of CEO Camellia Chan with a line of products that targeted niche industrial, medical, automotive and aerospace sectors before making a change in 2017 to static security solutions.

By 2019, those solutions had evolved into the company’s first X-Phy secure solid state drive (SSD) with embedded artificial intelligence.

Flexon introduced its newest hardware protection systems last week, a NAND flash memory solution that’s available in an NVME form factor as well as a one-slot PCI-E card for enterprise installations.

The new X-PHY product provides hardware level security that doesn’t conflict with other software solutions save for drive level encryption products, since the cyber secure drive does its own encryption as part of its protection regime.

The SSD-based hardware protection delivers a broad range of security responses by first creating a single access point through which data flows.

The resulting data stream is monitored by software that’s embedded in a chip that’s part of the drive hardware itself, providing a continuous review of access patterns using AI in the chip controller that monitors for possible malware intrusions with real-time detection and response to suspicious activity or patterns of attack consistent with known malware.

The on-chip AI intelligence can lock out new threats by isolating unusual patterns of access.

Regarding updates to the software embedded in the X-PHY, Flexxon responded via messaging that, “We do not need constant updates like software [solutions].
Our [infrequent] updates are for firmware or feature updates only. Detection is based on read/write/overwrite [patterns] within the drive and all commands need to bypass the firmware on our chipset for analysis and detection through the one door access [implemented using] the PCIE and NVME protocols.”

Flexon’s X-Phy NVME solution.

Yeo noted that an increasingly critical vector for data breaches and leaks is lost or stolen devices. Flexon’s drive level security measures for SSDs and other flash media storage devices offer a defence against intrusions even when hardware is no longer under the control of a company or its agents.

Flexxon has established partnerships with Lenovo, Asus, Dynabook and HP to deliver what they describe as “AI-Augmented laptops” that implement the X-PHY security solutions in a ready-made package. Flexon made no announcements about the availability of this laptop series on the local market.

By 2025, the company plans to expand into enterprise level server and data center installations with Enterprise Server Defender, which will introduce its own stand-alone operating system and applications to the cybersecurity mix, building on drive level protections with live, AI powered detection of data stream anomalies and protection across all seven layers of operating system interconnection.

Server Defender promises multi-level protections on chip, including its patented Matrix Shield technology, proactive live anomaly detection, real-time incident, response, uninterrupted instant restoration and unidirectional assessment.

According to Flexxon’s promotional materials, “Server Defender lies outside the process integration stack but tracks all hardware computations happening between the CPU, Platform Controller Hub (PCH), host processor chipsets and the motherboard itself.”

“We constructed a barrier isolation wrapper that monitors operations between Direct Memory Access (DMA) and the host processors, eliminating any extraneous operations in the cache and thereby nullifying the potential for DMA attacks.”

“The reception from the market so far has recognised the unique nature of these solutions in examining the execution of read, write and overwrite instructions at the SSD level,” Bissessar said after the morning’s presentations to local IT professionals.

Both X-PHY products are immediately available from Pinaka Consulting. The Server Defender product is available but is currently in beta.

Unfinished symphonies

Unfinished symphonies

The market viability of creative projects often can't be realistically assessed until the work is done.
Read More
Do you know who your child is talking to?

Do you know who your child is talking to?

That gorgeous, soft-spoken Swedish girl who admires your boy-child might a retired Nigerian prince looking for a new revenue stream.
Read More
Windows on a Mac, 2025

Windows on a Mac, 2025

Software virtualisation solutions were a great solution for users who just needed to run one or two apps on Windows that weren't processor intensive.
Read More
An Affinity for Canva

An Affinity for Canva

Professionally oriented software that integrates seamlessly with a consumer grade design tool is next level gamesmanship.
Read More
When the cloud bursts

When the cloud bursts

Hyperscalers typically operate networks of hundreds of data centers with millions of servers distributed globally.
Read More
Encryption, privacy and public safety

Encryption, privacy and public safety

Without encryption, that data can be read, copied or changed in transit. Encryption makes that data unreadable to outsiders
Read More
Big budget for tech, unclear spending strategy

Big budget for tech, unclear spending strategy

ICT is now the single largest line item under economic infrastructure spending in the 2026 PSIP with almost a third of that budget at $400 million.
Read More
Caribbean cryptocurrency concerns

Caribbean cryptocurrency concerns

In a pause with a defined timeline, operators may move outside the jurisdiction or take government to court and hope it drags on.
Read More
Suddenly, 30 years later…

Suddenly, 30 years later…

It’s really difficult to get excited over shiny and new when you’ve seen how quickly that gloss gets tarnished and eventually rots.
Read More
A blanket ban on cryptocurrency is a Luddite’s strategy

A blanket ban on cryptocurrency is a Luddite’s strategy

The government has not made it clear to what extent the new bill is intended to deepen compliance requirements with the FATF.
Read More
The parable of the rake

The parable of the rake

The first school reopening that included rake distribution was, predictably, somewhat chaotic.
Read More
AI and the jobs of the future

AI and the jobs of the future

Of the three broad classes of jobs, making, thinking, and caring, the ones that are likely to survive will be those that are driven by thinking and caring.
Read More
What Barbados’ Banyan acquisition teaches us

What Barbados’ Banyan acquisition teaches us

Our continuing national mistake in art, culture and journalism has been to treat the final product as the only product.
Read More
Is the M4MacMini a workstation?

Is the M4MacMini a workstation?

This computer can't be upgraded after purchase. You have to choose your specs on purchase and live with it
Read More
Jamaica’s digital transformation journey

Jamaica’s digital transformation journey

"Failure to share the vision and mission can lead to misalignment of that business or ministry with the IT plan."
Read More
How USB-C failed us

How USB-C failed us

USB-C cables shipped with smartphones were often cheap and delivered power, but limited or no data transfer at all.
Read More
How AI summaries will break knowledge

How AI summaries will break knowledge

Google has been indexing the collective wisdom of the open internet for the last two-and-a-half decades.
Read More
Drifting to data-driven decisions

Drifting to data-driven decisions

"Many organizations are collecting data, but few are converting it into action."
Read More
What .POST means for secure communications

What .POST means for secure communications

Posts are not just offering digital postal services, they are offering digital services across multiple sectors.
Read More
Samsung launches new Z series Flip, Fold

Samsung launches new Z series Flip, Fold

A foldable phone looks like a standard smartphone when shut and usually has a functional screen on its face.
Read More
Unfinished symphonies Unfinished symphonies
Do you know who your child is talking to? Do you know who your child...
Windows on a Mac, 2025 Windows on a Mac, 2025
An Affinity for Canva An Affinity for Canva
When the cloud bursts When the cloud bursts
Encryption, privacy and public safety Encryption, privacy and public safety
Big budget for tech, unclear spending strategy Big budget for tech, unclear spending...
Caribbean cryptocurrency concerns Caribbean cryptocurrency concerns
Suddenly, 30 years later… Suddenly, 30 years later…
A blanket ban on cryptocurrency is a Luddite’s strategy A blanket ban on cryptocurrency is...
The parable of the rake The parable of the rake
AI and the jobs of the future AI and the jobs of the...
What Barbados’ Banyan acquisition teaches us What Barbados’ Banyan acquisition teaches us
Is the M4MacMini a workstation? Is the M4MacMini a workstation?
Jamaica’s digital transformation journey Jamaica’s digital transformation journey
How USB-C failed us How USB-C failed us
How AI summaries will break knowledge How AI summaries will break knowledge
Drifting to data-driven decisions Drifting to data-driven decisions
What .POST means for secure communications What .POST means for secure communications
Samsung launches new Z series Flip, Fold Samsung launches new Z series Flip,...

🤞 Get connected!

A once weekly email notification of new stories on TechNewsTT. Just that. No spam.

Possible UI Glitch. Click top right corner to dismiss 👉

Get Connected!

A once weekly email notification of new stories on TechNewsTT.

Just that. No spam.

Related posts
BitDepthFeatured

Encryption, privacy and public safety

4 Mins read
Without encryption, that data can be read, copied or changed in transit. Encryption makes that data unreadable to outsiders
Opinion

How AI is transforming KYC for businesses

3 Mins read
The contribution of AI to KYC is in its early developmental stage.
BitDepthFeatured

AI and the jobs of the future

3 Mins read
Of the three broad classes of jobs, making, thinking, and caring, the ones that are likely to survive will be those that are driven by thinking and caring.
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

1 Comment
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
trackback
1 year ago

[…] Trinidad and Tobago – On Tuesday, Pinaka Consulting hosted an enterprise-level introduction to Flexxon’s® X-PHY® cybersecurity products… more […]

×
BitDepthFeatured

Ransomware report reveals Caricom-wide attacks

1
0
Share your perspective in the comments!x
()
x