BitDepthFeatured

Flexxon introduces silicon-level cybersecurity protection to TT

3 Mins read

Above: Irene Yeo and Nelson Chia present Flexxon’s cybersecurity solutions at the Mariott. Photo by Mark Lyndersay.

BitDepth#1459 for May 20, 2024

On Tuesday, Pinaka Consulting hosted an enterprise-level introduction to Flexxon’s® X-PHY® cybersecurity products.

Pinaka has previously been involved in blockchain and central bank digital currencies consulting along with ransomware tracking on the blockchain before taking this new step into hardware protection solutions.

Pinaka CEO Shiva Bissessar called on local businesses to begin taking the role of Chief Information Security Officer (CISO) more seriously, and to consider integrating the position into upper-level executive level decision-making. The company will represent Flexxon® locally and in the Caribbean region.

“Pinaka has traditionally focused on information security based consultancy,” said Bissessar.
“In stepping into the cybersecurity solution provider role, we sought to bring unique innovation to the local and wider regional Caribbean market.”

Flexxon was represented by Irene Yeo, who gave an explanatory keynote on behalf of the female founded and led Singapore cybersecurity company.

Shiva Bissessar (far left) at the Flexxon presentation with invited guests.

Flexxon began business in 2007 under the leadership of CEO Camellia Chan with a line of products that targeted niche industrial, medical, automotive and aerospace sectors before making a change in 2017 to static security solutions.

By 2019, those solutions had evolved into the company’s first X-Phy secure solid state drive (SSD) with embedded artificial intelligence.

Flexon introduced its newest hardware protection systems last week, a NAND flash memory solution that’s available in an NVME form factor as well as a one-slot PCI-E card for enterprise installations.

The new X-PHY product provides hardware level security that doesn’t conflict with other software solutions save for drive level encryption products, since the cyber secure drive does its own encryption as part of its protection regime.

The SSD-based hardware protection delivers a broad range of security responses by first creating a single access point through which data flows.

The resulting data stream is monitored by software that’s embedded in a chip that’s part of the drive hardware itself, providing a continuous review of access patterns using AI in the chip controller that monitors for possible malware intrusions with real-time detection and response to suspicious activity or patterns of attack consistent with known malware.

The on-chip AI intelligence can lock out new threats by isolating unusual patterns of access.

Regarding updates to the software embedded in the X-PHY, Flexxon responded via messaging that, “We do not need constant updates like software [solutions].
Our [infrequent] updates are for firmware or feature updates only. Detection is based on read/write/overwrite [patterns] within the drive and all commands need to bypass the firmware on our chipset for analysis and detection through the one door access [implemented using] the PCIE and NVME protocols.”

Flexon’s X-Phy NVME solution.

Yeo noted that an increasingly critical vector for data breaches and leaks is lost or stolen devices. Flexon’s drive level security measures for SSDs and other flash media storage devices offer a defence against intrusions even when hardware is no longer under the control of a company or its agents.

Flexxon has established partnerships with Lenovo, Asus, Dynabook and HP to deliver what they describe as “AI-Augmented laptops” that implement the X-PHY security solutions in a ready-made package. Flexon made no announcements about the availability of this laptop series on the local market.

By 2025, the company plans to expand into enterprise level server and data center installations with Enterprise Server Defender, which will introduce its own stand-alone operating system and applications to the cybersecurity mix, building on drive level protections with live, AI powered detection of data stream anomalies and protection across all seven layers of operating system interconnection.

Server Defender promises multi-level protections on chip, including its patented Matrix Shield technology, proactive live anomaly detection, real-time incident, response, uninterrupted instant restoration and unidirectional assessment.

According to Flexxon’s promotional materials, “Server Defender lies outside the process integration stack but tracks all hardware computations happening between the CPU, Platform Controller Hub (PCH), host processor chipsets and the motherboard itself.”

“We constructed a barrier isolation wrapper that monitors operations between Direct Memory Access (DMA) and the host processors, eliminating any extraneous operations in the cache and thereby nullifying the potential for DMA attacks.”

“The reception from the market so far has recognised the unique nature of these solutions in examining the execution of read, write and overwrite instructions at the SSD level,” Bissessar said after the morning’s presentations to local IT professionals.

Both X-PHY products are immediately available from Pinaka Consulting. The Server Defender product is available but is currently in beta.

The state of TT broadband, 2024

The state of TT broadband, 2024

In 2022, mobile internet penetration it had risen to 62.9 per 100 citizens, almost twice the penetration rate of fixed wireless.
Read More
Apple’s plan for device domination

Apple’s plan for device domination

Siri, at 13, gets an upgrade with Apple Intelligence, promising a significant upgrade on Siri’s smarts in a small language model that functions on device.
Read More
Adobe’s terms of disservice

Adobe’s terms of disservice

The activation servers for Adobe's CS, CS2 and CS3 products were shut down between 2013 and 2017. In May last year, Adobe stopped its customer support from deactivating perpetual licenses...
Read More
Going virtual with medical diagnosis

Going virtual with medical diagnosis

In developing its own OMNI artificial intelligence agent, Patient Connect is training the large language model locally on selected resources, including information from NGOs and care providers.
Read More
How the police became a media outlet

How the police became a media outlet

Former CoP Gary Griffith authorised an increase in the unit from four officers to 23 emphasising a direct engagement with the public using social media, with an emphasis on Facebook.
Read More
Microsoft ARMs up

Microsoft ARMs up

Since the company was founded, its OS and apps have been almost exclusively coded for chips manufactured by Intel.
Read More
Flexxon introduces silicon-level cybersecurity protection to TT

Flexxon introduces silicon-level cybersecurity protection to TT

Flexon began business in 2007 under the leadership of CEO Camellia Chan with a line of products that targeted niche industrial, medical, automotive and aerospace sectors before making a change...
Read More
Will the iPad Pro humble the Mac Pro?

Will the iPad Pro humble the Mac Pro?

A premium configuration of the M4 iPad Pro, which is clearly being positioned as a laptop replacement, costs US$2,700.
Read More
Question Mark’s Baptiste founds creative group, plans arts magazine

Question Mark’s Baptiste founds creative group, plans arts magazine

There are no real publications that speak to who we are as creatives, who we are in the world and really takes advantage of the IP [we create]
Read More
Post News is dead

Post News is dead

"At the end of the day, our service is not growing fast enough to become a real business or a significant platform."
Read More
Reaching the youth media audience

Reaching the youth media audience

Credibility has become personal. Who is delivering the news and what is understood about them is becoming as important as the journalism itself
Read More
Next-gen news consumers. What do they want?

Next-gen news consumers. What do they want?

It's no longer simply enough to keep producing the same news menu for an aging demographic and milking that diminishing audience.
Read More
Let’s talk backup. Again

Let’s talk backup. Again

Computers have a functional life of around five years, and most media will last roughly that long before either becoming more prone to failure or simply running out of room.
Read More
The United States vs Apple

The United States vs Apple

Apple's services, including AppleTV, Apple Music and Apple Pay, account for 22 per cent of the company's revenue and it's drawing the lion's share of the concern articulated in the...
Read More
The state of Trinidad newsrooms

The state of Trinidad newsrooms

"In a developing country like Trinidad and Tobago where there are no specifications for a tertiary education to be a journalist."
Read More
Reggie’s gone. What we lost

Reggie’s gone. What we lost

The public service he retired from had drifted far from even those post-Colonial dreams
Read More
The Meta fail: Why you should be a digital homeowner

The Meta fail: Why you should be a digital homeowner

Facebook has not explained how its services, used by an estimated three billion people around the world, stopped working.
Read More
Ransomware report reveals Caricom-wide attacks

Ransomware report reveals Caricom-wide attacks

The Lockbit3, 8Base, RansomEXX, Royal and Hive ransomware groups are all international criminal businesses who do not discriminate based on company size, business sector or location.
Read More
Carnival: ritual, tradition and events

Carnival: ritual, tradition and events

Carnival needs is a serious rethinking of its entrenched competition economy.
Read More
Professional perspectives on new cybercrime laws

Professional perspectives on new cybercrime laws

The Digital Transformation Plan still isn't published. The consultation hasn't put a green paper out yet.
Read More
The state of TT broadband, 2024 The state of TT broadband, 2024
Apple’s plan for device domination Apple’s plan for device domination
Adobe’s terms of disservice Adobe’s terms of disservice
Going virtual with medical diagnosis Going virtual with medical diagnosis
How the police became a media outlet How the police became a media...
Microsoft ARMs up Microsoft ARMs up
Flexxon introduces silicon-level cybersecurity protection to TT Flexxon introduces silicon-level cybersecurity protection to...
Will the iPad Pro humble the Mac Pro? Will the iPad Pro humble the...
Question Mark’s Baptiste founds creative group, plans arts magazine Question Mark’s Baptiste founds creative group,...
Post News is dead Post News is dead
Reaching the youth media audience Reaching the youth media audience
Next-gen news consumers. What do they want? Next-gen news consumers. What do they...
Let’s talk backup. Again Let’s talk backup. Again
The United States vs Apple The United States vs Apple
The state of Trinidad newsrooms The state of Trinidad newsrooms
Reggie’s gone. What we lost Reggie’s gone. What we lost
The Meta fail: Why you should be a digital homeowner The Meta fail: Why you should...
Ransomware report reveals Caricom-wide attacks Ransomware report reveals Caricom-wide attacks
Carnival: ritual, tradition and events Carnival: ritual, tradition and events
Professional perspectives on new cybercrime laws Professional perspectives on new cybercrime laws

🤞 Get connected!

A once weekly email notification of new stories on TechNewsTT. Just that. No spam.

Possible UI Glitch. Click top right corner to dismiss 👉

Get Connected!

A once weekly email notification of new stories on TechNewsTT.

Just that. No spam.

Related posts
Press Releases

iGovTT launches Cybersecurity Investment Tax allowance system

2 Mins read
The introduction of the new Cybersecurity Investment Tax Allowance presents a significant advantage to the business sector, underscoring the imperative of digital protection.
Press Releases

Samsung's ProVisual engine improves capture tools in S24 series smartphones

3 Mins read
In the Editor app, any given frame from the Motion Photo can be selected and saved as a standalone image.
Press Releases

Flexxon introduces upgrade to its cybersecurity hardware system

4 Mins read
Through big data analytics, Server Defender can identify even the most subtle attack patterns that may go unnoticed when looking at just one server.
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

1 Comment
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
trackback
1 month ago

[…] Trinidad and Tobago – On Tuesday, Pinaka Consulting hosted an enterprise-level introduction to Flexxon’s® X-PHY® cybersecurity products… more […]

×
BitDepthFeatured

Ransomware report reveals Caricom-wide attacks

1
0
Share your perspective in the comments!x
()
x