Firmware Security at its finest
Why Exein Core
Exein has the innovative feature of being autonomous. This means it is able to run directly on the device. It controls the device while it is running, ensuring it is performing in the expected manner.
Detects unknown threats
Exein controls devices’ behavior, comparing it with that which is considered normal. In both scenarios, these anomalies are detected by Exein Core and actions are taken in order to solve the problem and make the device safe again.
All firmware types
Exein Core has the main objective of protecting as many different types of firmware as possibile. This is why we have developed several versions of our product, always ensuring the best performance and, in turn, the maximum level of security.
How Exein Core works
Extracts relevant analytical data
Exein Core automatically extracts and analyzes large amounts of data about device behavior. This data is firstly used to identify a model representing the device's correct behavior. Once Exein has familiarized itself with the model, it can distinguish anomalies.
ML-driven firmware security solution
Exein core uses Convolutional Neural Networks to learn the expected behavior of a device and uses this understanding to constantly monitor its functioning and protect it from cyber-threats, both known and unknown.
Detects suspicious activities or behavior
Depending on its configuration and firmware type, Exein can take actions against the misbehaving device, such as reboot it or, when the underlaying technology allows it, terminate the misbehaving thread.
Advanced cutting-edge technology
Effective behavior data extraction
Exein uses a firmware type-specific behavior data extraction system where this produces advantages. In contrast, it uses general binary hooking for all those firmware where no HAL is provided.
Exein deploys state-of-the-art machine learning technology to spot anomalies in device behavior with unparalleled accuracy and reactiveness.
Closing the knowledge gap in firmware security
Traditional solutions make use of hand-written rules and vulnerabilities, specific techniques to detect known threats and attacks. However, this approach doesn't protect the device from any new, undiscovered threats.
Exein Core advanced approach
Exein core, instead, uses Convolutional Neural Networks to learn the regular behavior of a device and uses this understanding to constantly monitor its functioning and protect it from cyber-threats, both known and unknown.