The revolutionary solution is built upon Flexxon’s patented algorithms that enable independent, full-stack security for real-time monitoring and response against Zero Day threats, as well as instant data restoration in the unlikely event of a breach.
Hardware cybersecurity pioneer, Flexxon, has unveiled the third addition to its X-PHY cybersecurity ecosystem of solutions.
Server Defender is one of the world’s first standalone and fully independent cybersecurity module that enables full-stack monitoring and defense from the hardware and firmware layers. The solution also introduces a much-needed capability to the cybersecurity ecosystem – full system reversion in the unfortunate event of a breach.
The early access programme for Server Defender is now open to qualified customers, granting privileged access as new capabilities are introduced over the course of 2024.
“We are excited to unveil Server Defender today, building on the success of our hardware-based X-PHY endpoint solutions,” said Camellia Chan, CEO and Co-founder of Flexxon. “Server Defender is built upon truly revolutionary technology that will change the cyberwar landscape in our favour by addressing the greatest needs of end users and service providers.
“Not only does it boast real-time monitoring and response capabilities, but Server Defender can also reduce downtime by at least 50% and instantly restore lost or compromised data. Cyberattacks can bring operations to a grinding halt, jeopardising customer relationships and costing businesses millions in downtime and recovery efforts. That’s why Server Defender has been meticulously designed to mitigate these risks by delivering industry-leading recovery time objectives (RTO) and recovery point objectives (RPO),” added Chan.
“This ground-breaking platform ensures businesses can maintain seamless service delivery even in the event of a breach, while facilitating lightning-fast data recovery and providing granular recovery points with negligible data loss,” said Chan. “With Server Defender, our customers can drive their core operations forward, secure in the knowledge that their data and services are safeguarded against sophisticated cyberthreats.”
The current landscape: Defenders are losing
Reports of escalating breaches and ransomware attacks in the last year alone demonstrate the glaring vulnerabilities in our current cybersecurity standards and the dire need for action. An April 2024 survey report found that the biggest risk associated with data breaches was to business continuity, with 43% of respondents reporting unplanned downtime as a result of the cyberattack.
Attacks span financial and reputational losses, prolonged periods of downtime and interruptions, the inability to recover lost data and even, the palpable impact to end-users such as clients of financial institutions and healthcare services. With each successful attack, hackers grow bolder and greedier.
Patented Matrix Shield technology: A multiplier for security
Server Defender was developed to address the spectrum of issues pre-emptively, during and post-attack. Its capabilities are built upon Flexxon’s multi-patented Matrix Shield technology, which achieves constant monitoring of attack vectors targeting the PCIe system protocol, memory subsystem, kernel level, OS level and network layers.
The algorithm transforms all objects and files into fundamental numeric representations to offer real-time threat detection and seamless, live reversion, delivering minimal downtime even in the face of file or system corruption. To achieve comprehensive detection, response and recovery, the Matrix Shield security vault uses a combination of matrices, neural networks and a validation system to ensure that data is stored and monitored securely.
Armed with the Matrix Shield, Server Defender provides centralised security monitoring across multiple servers and data centres. With a single, user-friendly dashboard, users can keep an eye on server security spanning:
- A single server at one location
- A pod of multiple servers grouped at one site
- Servers distributed across different cities or regions
This unified view delivers a complete, real-time picture of a user’s server security status everywhere, functioning like a command centre for total oversight. This allows the true power of Server Defender to be unlocked, analysing large amounts of security data gathered from monitoring multiple servers. Through Big Data analytics, Server Defender can identify even the most subtle attack patterns that may go unnoticed when looking at just one server.
Step 1: Prioritising attack surface reduction
Phase 1 of Server Defender’s rollout emphasises full architecture attack surface reduction, effectively minimising weak spots and risks to set a strong foundation for threat detection and response against sophisticated attacks.
Delivering true Zero Day protection, it is capable of identifying, prioritising and closing attack paths leading to Tier 0 assets – the most critical and sensitive resources within an organisation’s IT infrastructure. Given the mission-critical nature of these assets, their immediate prioritisation and protection are essential first steps for any organisation or service provider.
Capabilities and features that early access partners can expect include:
- Enhanced data security through the patented Data Bus Sentinel, which monitors read and write operations to RAM
- Threat detection through real-time data acquisition and security verification
- Direct Memory Access (DMA) attack monitoring via a user-friendly web portal to track and monitor at all times
- Business Continuity assurance through the recovery engine and automated rollback guardian
Initial testing has yielded impressive results with improvements being implemented on a continuous basis, including:
- 90% reduction in false positives
- 50% faster threat detection
- 50% downtime reduction
- 35% faster threat resolution
A phased rollout toward truly holistic server security
In the following months, additional features will be tested and integrated to further strengthen security capabilities across the entire network, remedy software vulnerabilities and shut down an ever-evolving barrage of emerging cyberattacks.
Phases 2 and 3 will deliver:
- Full architecture threat detection and response, such as monitoring and response to a wide range of malware threats, including Fuzzers, Analysis, Backdoors, Denial of Service (DoS), Exploits, Generic, Reconnaissance, Shellcode and Worms
- Application layer security, by leveraging the physical hardware layer to fortify all seven layers of the OSI model and five layers of TCP/IP model, ensuring a collaborative defence that leaves no room for threats to penetrate any external or internal layer for a truly comprehensive security posture
It is scheduled for full release by the end of 2024.