AI-Driven Hardware-Enabled Platform Security
Residing in the lowest layer of the hardware stack and integrating all security functions within a single SoC or module, the Axiado TCU effectively acts as a “last line of defense,” even when all other network functions have been compromised. The TCU detects and stops ongoing attacks and recovers the system from an attack with AI intelligence.
- Axiado’s single-chip TCU control plane innovation is a hardware-based solution rooted in real-time and proactive AI with preemptive threat detection and prevention.
- The world’s first purpose-built, fully integrated AI-driven hardware security platform designed to help prevent cyber, side-channel, supply chain and ransomware attacks for the cloud and edge markets.
- Axiado’s TCU is a proactive and intelligent security solution that engages a combination of multiple axes of innovation: silicon, AI & data collection, and software.
Transcript
Gopi Sirinenu:
Hi, my name is Gopi Sirinenu. President and CEO of company Axiado. We are a cybersecurity hardware company. We make chips and also the cards and to data centers networking market. We’re around 100 people company and five year old, and we are complying through pretty much every standard in the market. Headquarters in San Jose and offices in Hyderabad in India, and also Taiwan.
What are we solving? There is a big problem of ransomware in the market. What is ransomware? Ransomware is nothing but somebody bad actor came into your system, however, the way he came into it and he takes over your system as a super user and asks for ransom or he encrypts your hard disk and looks for ransom again. In both cases, he’s touching the most of the hardware systems, hardware control, and management side.
Present solutions, all of them, 99% of the companies, if not hundreds or thousands, all of them are addressing to protect at the port of entry of the system. Means bad actor coming into your system, whether it’s a kernel level, whether firmware level, they’re trying to protect that port of entry. What we do? We are complimentary to that even after the port of entry is not able to stop it and we are the last line of defense standing at the platform and which is last line of defense, the bad actor coming to us we just talked about to the hardware platform or hard disk. That’s where we detect and protect right while it is happening, not after the fact. Today’s most of the software solutions are after the fact something happen we can detect and stop. That’s the company back. There are trillions of dollars spent on this one and I don’t need to deliver these numbers.
So in these conditions, what happened just after one attacks? If there is a ransomware attack, unfortunately, there is no recovery. If you care about the content and a platform, you had to pay the money to the guy, and you got the system back. Once you got the system back, unfortunately, this was a super user attack, and you don’t know what exactly happened, how the bad actor came in. So the 99% of the times you had to throw away the whole system, and then not only the productivity lost, system cost, replacement costs, all that money happens. And as we talked about, there is no forensic data how we came in so that these systems cannot be protected in the future on whatever the way these guys came in because you don’t have a data. After even recovery, there is a lot of delayed patch. You have to file to the federal government, and everybody has to be aware of what exactly happened or some level of that and you had to share with everybody.
With all that information to come to every person, let’s say there’s an attack happen in an X company for me to be as a CISO to knowing that company happened, the reporting process and all that takes around 90 days and I will know the attack type in 90 days as a CISO for my company. But the patches and everything it takes another 90 days for it to fix it. Means, I’m vulnerable for close to 180 days or more. Present solutions are all piecemeal and discreet and the only solution something in the market today is against these are called zero trust. These zero trust means that you don’t trust the application or any platform every time you run an application you want to be tested again, authenticated again. Unfortunately, if there is your so-called root of trust or main key itself is compromise. It doesn’t matter how many times you ask as a zero trust model, you’ll be able to answer bad actor. It will be able to answer.
That’s where we come into the picture. We make that so-called hardware root of trust. Through immutable hardware root of trust make sure that that’s protected high. That’s where our company comes in and we are complimentary. Again, we’re complimenting to every solution in the market. Palo Alto, the word CrowdStrike, the word Snowflake, the word… We are complimentary to that.
Here is a pictorial view of what we do because, we end of the day, we make silicon and cards. If you look on the left side, there are… Pay attention to my cursor. There are network ports and also the management ports. Just to give the history, these network ports are connected behind a firewall. And your user, let’s say if this is a Yahoo server, www.yahoo.com, a cloud will do a name mapping, so will convert you into this firewall, and you come to this data particular server through that network port.
For the last decade or so, firewall is proven to be not enough security, or it’s a perimeter security only. Then everybody in the industry decided to create something called DPUs on the data port, and that does the DPI deep packet inspection et cetera, to protect those data ports. In the world of already accepted on this DPU, let’s focus on the management port. Those management ports used to be only on intranet only means your IT guy is sitting within the house, within the building, within the premises, within the intranet subnet itself. But the world changed for last half a decade to a little more than that, and especially pandemic mean more that your IT guy is also on the cloud now and he’s also coming through the same firewall or similar firewall technology.
Our premises of company is simple. If the world accepted the firewall is not good enough security to be network ports protection and we created another DPU in there, how in world we are okay with a management port which is more sacred for you to be exposed to the same firewall technology and pray God that it will take care of itself. You need a DPU like device on the control and management side. That’s where we come into picture. Our product is called trusted control and compute units called TCUs. We do similar of a DPU functions, but a lot more because this is a key management attestation, all that stuff works.
Today, you see that there are discrete components who addressing this solution today. I won’t say solving, but addressing TPM, trusted platform audio. You see the red dots on the left side picture. BMC, baseboard management controller. ROT, root of trust. LAN on motherboard and possibly FPGA and firmware combination. All these chips comes from a different companies and these are all on the motherboard. If there is an attack happens, you have to get the patch from all of these guys and this is an old school legacy at a Band-Aid solution.
At Axiado, we came up with a company TCU. We integrate functionally all these five or four chips and a Vesta FPGA combination plus the firmware into a single chip as a TCU. We also work with the industry standard, the open compute platform guys, everybody logos are enlisted here. All of these guys are advocated to a modular management NIC, similar to the data NIC, you need a management NIC that’s called now DC-SCM, Data Center Secure Control Module. And you can see the right side picture that’s Intel based DC-SCM. You can see that’s double stack card itself. Our card is smaller. You can see in there functionally we integrated. I’ll jump to the image of that and come back in here.
So if you look at this is what the present card looks like and which is double stacked and bigger. In physical comparison to the scale. You can see how our card looks that’s our chip. Where one third the power, one third the size, but 20X powerful on a computing. Plus, I have AI engines on top. I’ll talk about the AI engines what we saw. Jumping back to what problem we are solving? We give a platform security, I’ll talk about the AI, how we do with that and how we protect against side channel attacks, supply chain attacks, ransomware attacks, image manipulation attacks, and infiltration attacks, and lifecycle management. All that stuff will go through that. So we make a platform security because we residing on the platform physically, not the cloud-based. We can still authenticate through the cloud HSM, but we are on the platform at the boot time at the runtime. And network security, the ethernet ports on the control and management port what is exposed behind the firewall.
Today, unfortunately, there is no firewall security we have in a hardware firewall security booster by AI able to detect even insider attacks. Means your IT guy turns into the bad actor. I’ll be able to detect that based on the behavior and learnings, and what the behavior, what he’s touching, how that attacks are coming, and all that we’ll be able to detect that. Means we’re the only company in the market today can tell you that where there is no physical security, we’ll be able to detect based on what’s happening there and then you can put the rules engine on top as a system vendor, whether you want to stop or just collect the forensic data.
Boot time security. Today, when it’s booting up, today’s BMC and every other solution is down CPUs that was meant for done for 25 years ago. When they’re booting up itself, there’s hackers are becoming smarter. They share these things to be outside and how you manipulate the image, how are you able to give a side channel glitches, et cetera.
But you need an intelligent processor, intelligent technology to be able to accelerate the computing level. So we have an AI-driven boot time security. We’re able to monitor every single on the board, every attestation. A contextual awareness, we know based on that we can detect that. And then all that zero trust security provided by everybody else, we become an authentication attestation for that, making it a true zero trust on that. And operational security, lifecycle management. Anytime these devices, every platform has a social security number type, which is your route of trustee, manufacturing time it was programmed, and that is for the management of lifecycle. Pretty much that is used for authentication of your system every time.
The problem it is it’s programmed by somebody at a manufacturing time. It’s not trustworthy completely, and every deployer CSP cloud service products wanted another level of lifecycle management ownership transfers. We have a proprietary way of doing it paid algorithm with a secure way how we can do the operational device cycle management. Ransomware attacks, as I talked about, ransomware attack is nothing but somebody taking a hardware over. We trained our AI engine, completely going through the existing CVU database reported vulnerabilities to all of them and we collect the hardware traces, the datasets. How does the bad actor look in each attack in hardware traces. That’s trained to our AI engine and it’s able to detect any time that kind of blacklister pattern is happening and we’ll be able to stop that.
Again, there’s nobody can do this today, and it continues to be learnable means we can teach more, update these models, we do the inferencing on the chip and collect the cloud and then able to do the models training on the cloud, and push it back. So this is the on chip inferencing for us, and it has the neural engines inside, so anything of so-called, there is no true zero-day attack. We should be able to learn based on the what is being trained already and predict something close to it and based on the neurals, and we could stop more than what has been already trained. Can I say 100%? Obviously, nobody can say that but we’re much better than the human trying to do a logical engines or software doing it versus a Neural Engine doing it here. That’s accelerator computing advantage being used in here.
So we can do the last two of them. Dynamic thermal management and rack level. If we are on each blade or each server on a rack, we have a proprietary rack level management that if one person detects something and one blade detects something happened bad in anomaly detection, it’s able to share between the full rack, and we can detect to share through the network switches top of the rack switches are firewall based in that we can detect everybody. You can isolate. So every CISO would allow to have this. The detection and isolation normally takes close to 30 to 40 days. We can do it in 30 to 40 seconds. Okay.
And the last one is the dynamic thermal management. Today, whole rack, if you know the POE total dollar spent more than 50 cents or 45 cents has spent on the power management of the rack and the whole server itself. All the server fan controls and thermal management happens based on a thermal sensory today. We can add on top of the thermal sensor based on the load management. We can change the fans and fan controls. This way, we presented in one of the forums recently, and it’s public data. We can get around 18 plus percent of PUE efficiency in that. This should save a lot of money for the overall CISO deployment.
With that said, I will leave it to these. We have a multiple different form factor cards. You can see on the left side this is we showed at the GTC conference. These are Nvidia IFF internal form factor card on the left side of the right version. That’s for all Nvidia MGX platforms and further. And we contributed the second card, which we showed 3001 that’s contributed to the OCP. It’s available for anybody to download in implement themself. And third one, which is 3002 in here, and that’s a standard DC-SCM horizontal card that’s available. You can swap an existing systems with this, and 3003 is the smallest form factor card for us. What I showed a comparison that functionality was everybody does exactly the same thing. It’s a different form factor.
The last one, not the least customers came up and asked for the PCI based card also, so this is being used as a data security completely all the way to the edge system. Whether it’s a medical IoT, industrial IoT, just swap the plugin card, we will provide the security all the way to the end. We’re working with all the companies on the top able to get their security expansion software all the way to the edge device.
Finally, to summarize, what we do is we give a forensic data, which is not available today by anybody, and we can detect the anomaly and isolation within 30 to 40 seconds compared to 30 to 40 days. We can do the key management and ownership provisioning. This will help us the modularity and also, sharing the systems, and reusability, and also shifting one to other for co-locate data center guys. Resiliency as we talked about, we can recover, we can update these models and it’s a future-proof. It’s an AI models which can be attested runtime to also, we can work through that. That means it’s future enabled proof. I won’t say 100%, but we can make a lot better than what is today hardcore. And we talked about thermal management that we can give you a lot of PUE improvement.
So thank you. If you need to learn more about it, you can reach out to us or send us an email, reach us at any of the forums, meetings, conferences. Reach out to me and my number. I’ll leave it here. We don’t have a direct competition in the market today. It’s all discrete components, and most of the NIH type, everybody’s built their own solutions. Everybody believes that they have their own solution, but until we prove plugin card swapping to show our value and they can see so far has been our customers or partners have been great. They see a value. We’ll continue to work. We’re looking for more customers obviously, and also we are hiring be part of the industry changing technology. Please do reach out to us. Thank you.