Physical Unclonable Function (PUF) in the Data Center Fungible's firmware uses hardware fingerprints to check that it's running on the system it's supposed to be running on. That helps protect against attacks on the software supply chain, like in the case of the SolarWinds breach. Fungible hard-partitions its servers, which removes vectors for side-channel attacks in multi-tenant environments. "Security at the lowest level is built into the architecture, the DNA of our solution," said Kikkeri. Its composable architecture and security make the platform a good fit for financial workloads, big data analytics, edge computing, high performance computing, and AI and machine learning, he said.