Transcript
A (0:00)
Foreign. Welcome to Reshaping Workflows with Dell Pro
B (0:07)
Precision and Nvidia, where innovation meets real world impact in high performance computing.
A (0:19)
This is Logan Reshaping Workflows GTC 2026, Day 3. We are here with Pankesh from Mirror Security in the Nvidia inception area, which is my favorite because these are the new companies doing things that have never been done or maybe doing them better than they were done before. But Pankesh, let's get started with, tell us a little bit about you, Mirror Security to kind of start us off.
B (0:43)
Yeah, so I'm the co founder and CEO with Mirror Security. I take care of sales, partnerships, product management and what Mirror does. We are basically solving one of the biggest challenge with AI which is the data exposure risk. And basically, I mean if you have to derive intelligence from these AI models, you will have to share the data. So regulatory industry, I mean so the data is very close to their heart. So what we do is basically encrypt the complete AI workloads. Your prompts, your context, your documents are all encrypted and these models are able to do the operations and inferencing on the encrypted data itself. So we call this encrypted AI inference. And also we take care of the context memory. So encrypted AI memory. So those are the two major breakthrough capabilities we bring to the AI ecosystem.
A (1:34)
Okay, so I got a lot of questions and like I said, maybe solving problems have never been done because I've never really heard of this. So. Okay, let me give you a hypothetical. I work at Dell, we have tons of data and we like our stuff to kind of run locally. But at the end of the day you're right, like exposing it to outside models etc. And don't give away any IP or secrecy. I don't want that. But maybe walk me through like a workflow of where you fit. Like where do you fit in the workflow of like a RAG chat application for example.
B (2:04)
Yeah. So basically we offer SDK. So if you are building a RAG application, right. So we are compatible with all the vector databases, you will use one of these AI stack to build your RAG application. So using this SDK when you are ingesting any documents, so it will be encrypted and our technology enables encrypted semantic search. So that's the breakthrough. Which means so never in the pipeline. I mean these documents sit in the encrypted space. So even if it is an air gapped environment, one of the biggest challenge is the ransomware attacks or the insider threat. So somebody can dump all your embeddings and reconstruct. Now people are using AI to basically attack your systems. So with 92% accuracy they will be able, they are able to reconstruct your document. So big threat. So even if it is air gap environment, as you said.
