Saksham represents a cohort of security-focused innovators who understand that traditional cybersecurity approaches are fundamentally broken. At the Agentic AI Founders Hackathon—Zero to One Hack with Uttar Pradesh—these students from WITS Maharashtra identified a critical vulnerability in how organizations detect and respond to digital threats: centralized systems create single points of failure.
While many hackathon projects chase consumer applications, Saksham chose to engineer the infrastructure layer that protects digital ecosystems. Their mission is uncompromising: to decentralize threat detection and intelligence, enabling organizations to collectively defend against cyber threats through distributed, autonomous AI agents.
What are they building
Axion is a decentralized AI-powered threat detection platform that reimagines cybersecurity through distributed intelligence and collaborative defense. Rather than relying on centralized threat intelligence hubs, Axion deploys autonomous AI agents across organizational networks to detect, analyze, and respond to threats in real time.
Unlike traditional cybersecurity systems—which depend on centralized monitoring, delayed threat intelligence, and siloed defenses—Axion enables organizations to participate in a collective threat intelligence network while maintaining data sovereignty and operational independence.
Key Components of Axion:
Distributed AI Agents: Autonomous threat detection systems deployed across organizational infrastructure, operating independently while contributing to network-wide intelligence.
Decentralized Threat Intelligence Network: Organizations share sanitized threat data through blockchain-based verification, building collective intelligence without compromising confidential information.
Agentic Threat Response: AI agents that autonomously investigate suspicious activity, correlate threat indicators, and recommend or execute mitigation strategies.
Real-Time Threat Correlation: Machine learning models analyzing patterns across the decentralized network to identify sophisticated, coordinated attacks that individual systems might miss.
Zero-Trust Architecture: Autonomous verification of every access request and data transmission through continuous behavioral analysis and risk assessment.
Blockchain-Verified Intelligence: Immutable records of threat data ensuring data integrity and enabling forensic analysis of security incidents across participants.
This isn't just defense—it's collective immunity against cyber threats.
Tech Stack
Decentralized Infrastructure: Blockchain, peer-to-peer networking, distributed consensus mechanisms
AI/ML: Anomaly detection, threat pattern recognition, behavioral analysis, autonomous response systems
Cybersecurity: Zero-trust architecture, threat correlation, incident response automation
IoT & Network Security: Protocol analysis, traffic pattern detection, endpoint monitoring
Cloud & Edge Computing: Distributed processing, federated learning, edge-based threat detection
Why are they building or to solve what?
The cybersecurity industry faces an existential paradox: while threats grow more sophisticated and coordinated, defenses remain fragmented and siloed. Organizations operating independently cannot detect sophisticated attacks that span multiple networks. Centralized threat intelligence creates honeypots for attackers. Zero-day exploits spread unchecked because threat information flows too slowly through traditional channels.
Saksham recognized a fundamental truth: cybersecurity in the age of interconnected systems demands decentralized, collaborative defense.
Axion inverts the traditional security model. By distributing threat detection and enabling organizations to collectively defend against threats, the platform creates a network effect where security improves for every participating organization. The more organizations join, the better threat detection becomes for all—a virtuous cycle of collective resilience.
Scope
Axion: Building the Immune System for Digital Ecosystems
Axion envisions a future where cybersecurity is decentralized, collaborative, and fundamentally more resilient than centralized models. The team is not just building a cybersecurity tool—they're architecting a new paradigm for how organizations defend against digital threats.
The platform's future iterations aim to:
Enable Cross-Sector Participation: Expand beyond technology companies to banks, healthcare, critical infrastructure, and government agencies—creating sector-specific threat intelligence networks.
Integrate Autonomous Response: Enable Axion agents to autonomously execute mitigation strategies through pre-authorized response protocols, reducing mean time to remediation from hours to seconds.
Develop Predictive Threat Modeling: Leverage network-wide data to forecast emerging attack patterns and proactively harden infrastructure before threats materialize.
Build Regulatory Compliance Integration: Automatically generate compliance reports and audit trails, helping organizations meet cybersecurity regulations across jurisdictions.
Create Industry Standards: Establish protocols for decentralized threat intelligence sharing, enabling interoperability across different security platforms and organizations.
In doing so, Axion doesn't just defend against threats—it fundamentally reimagines how digital security operates at scale.
Get Event Updates
For more information, check out our Privacy Policy and Terms of Service. You can unsubscribe at any time.
© 2025 CUBE. All rights reserved | Cookie preferences

