Onsite AI avoids cloud challenges

Issue 6 2025 Editor's Choice, Infrastructure, AI & Data Analytics

AI is everywhere and in everything these days; whether it is reliable or not, you have to mention it – and your AI strategy – or you are ‘behind the times’. The catch is that when using AI, we generally rely on a cloud-based system, which we know is not private nor secure. If you are asking the AI to update your CV, that may not be an issue, but when doing ‘work stuff’, we often expose private or sensitive information without knowing it.

Anyone involved in business security will know that there are risks in simply trusting your customer data or financial information to cloud systems, including cloud-based AI systems. Moreover, if you are going to rely on AI for business operations, you need to be sure that you do not lose connectivity, which loses access to your AI system.

US-based BlueFin has another plan for those looking to bring more AI in-house. “Most AI programs today depend on Wi-Fi or constant cloud connections, which can be a real liability for companies operating in secure or high-risk environments like airports, defence facilities, or healthcare systems. That reliance not only exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops,” says Chris Chib, CEO of BlueFin Solves.

According to the company, BlueFin Solves is “dedicated to building AI that ships, scales, and delivers real impact”. Its portfolio includes Privora, a private GPT built for enterprises; Loopy, an AI sales rep that drives revenue; and VisionFleet, an enterprisegrade, scalable licence-plate recognition platform.

The company partners with organisations to “design and deploy advanced AI systems, from modern Agentic AI architectures to custom solutions tailored to unique workflows and data landscapes. Because not every enterprise trusts the cloud, its solutions are built to run onpremise, in the cloud, or in hybrid environments, delivering the flexibility and control of business demands.” SMART Security Solutions asked Chib for more information on what the company does and how it works.

How BlueFin Solves operates

SMART Security: An AI system that does not require a permanent connection to a remote data centre run by the service provider sounds secure, but what server/ data centre resources are needed to make this happen in a secure environment like an airport? Are clients required to invest in specialised technology? Is your solution designed to run on existing infrastructure or proprietary edge devices?

Chris Chib: We designed BlueFin’s architecture to run securely without a permanent internet connection because many of our clients – airports, defence facilities, and banks – require full data sovereignty. The solution does not depend on specialised servers. Instead, we deploy modular edge devices that integrate with a client’s existing IT infrastructure or can be installed as standalone secure nodes.

This approach removes the need for constant cloud connectivity, while retaining performance and security parity with centralised systems. For larger clients, we can also integrate with existing on-premises data centres using encrypted APIs, ensuring no sensitive information ever leaves the facility.

SMART Security: How would the customer ensure its AI is properly trained on its data? Most companies have both structured and unstructured data, and it is not always indexed or managed efficiently – it may even be physical documents. Also, how do you approach the initial training and customisation of your AI models for a new customer when their sensitive data cannot leave their facility for processing on your systems?

Chris Chib: BlueFin deploys a base AI model pre-trained on generalised business logic, then fine-tunes it locally using the client’s data: structured, unstructured, and even scanned physical documents. We integrate with existing document management systems, or, if needed, we provide tools to digitise and index physical archives.

All training and adaptation occur entirely within the client’s secure perimeter. Our engineers never access the raw data; instead, we provide encrypted training pipelines that run onsite. This ensures full compliance with data residency laws, internal governance, and confidentiality requirements, while still achieving a high degree of model accuracy and relevance.


Chris Chib.

SMART Security: What does BlueFin do to create the ‘basic AI’ which can learn about different companies’ data and processes? A bank can have an almost endless number of processes and process categories. How do you incorporate these into the AI? How much is automated and how much needs human supervision?

Chris Chib: Our foundational AI is built on a modular ontology that maps common enterprise processes such as finance, HR, customer support, and compliance to adaptable templates. These serve as the base layer that our system can then specialise through unsupervised and supervised learning.

Automation drives about 80% of this adaptation. The AI observes workflows, identifies document types, learns classification patterns, and builds relational context autonomously. The remaining 20% involves human-in-the-loop supervision to validate critical interpretations, particularly in regulated industries such as banking and healthcare. This hybrid approach balances autonomy with oversight, ensuring accuracy and reliability across complex enterprise ecosystems.

SMART Security: Is BlueFin’s vision to serve a specific high-security niche, or do you believe this localised model can challenge the cloud-centric paradigm in the broader market?

Chris Chib: We absolutely see BlueFin as more than a niche security solution. While our current deployments are in high-security sectors, airports, government facilities, defence, and finance, the long-term vision is to make localised AI mainstream.

As data privacy regulations tighten and cloud computing costs escalate, organisations are rethinking the economics of centralised AI. Localised AI delivers control, predictability, and compliance without sacrificing intelligence. We believe this model can complement, and eventually challenge, the cloud-first paradigm, especially as edge hardware becomes more powerful and affordable.

SMART Security: What specific security measures are in place to protect the physical devices at the client’s premises and the data it holds from internal threats, and of course, from malicious cybersecurity threats?

Chris Chib: Every device includes encrypted storage, tamper detection, and secure boot processes. We use AES-256 encryption for data at rest and TLS 1.3 for data in motion within the facility.

Beyond that, each deployment has layered access controls, multi-factor authentication, role-based permissions, and detailed audit logging. The system operates in a Zero-Trust framework: even if a network is compromised, AI models and data remain sandboxed and inaccessible.

SMART Security: Does the AI provide a chat interface, or can customers build custom interfaces for various business functions – sales, HR, IT, etc.?

Chris Chib: We enable customers to create their own custom interfaces tailored to department-specific needs. For example, HR might use a dashboard with document summarisation and compliance verification tools, while IT might use predictive maintenance interfaces. This modularity ensures the same AI intelligence can support multiple functions across the enterprise, all while operating locally and securely.

SMART Security: What services does BlueFin provide to get a customer up and running, and what happens when AI models/algorithms change or are updated?

Chris Chib: We provide end-to-end onboarding: hardware installation, system integration, and AI calibration with the client’s data. Once operational, updates and retraining are handled through encrypted update packages, approved and deployed by the client’s IT administrators, to avoid external data transfer.

When foundational models evolve, BlueFin releases modular updates that can be applied locally without disrupting operations. Our support team also provides lifecycle management, ensuring every client stays up to date with the latest algorithms while retaining full data control.

Find out more at www.bluefinsolves.com


Credit(s)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Surveillance & AI roundtable
DeepAlert Lytehouse Refraime SMART Security Solutions Technews Publishing Editor's Choice Surveillance Integrated Solutions AI & Data Analytics
SMART Security Solutions held an online roundtable with a few surveillance experts to explore the intersection of surveillance and AI, gaining insights into the market and how control rooms are evolving.

Read more...
SMARTpod talks about HomeSec Expo 2026
SMART Security Solutions Technews Publishing News & Events Residential Estate (Industry) Videos
SMARTpod, the podcast from SMART Security Solutions, finds out more about the upcoming HomeSec Expo happening at Gallagher Estate on 4 & 5 March 2026.

Read more...
New commercial and technical appointments at Veeam
News & Events Infrastructure
Veeam Software has announced two senior appointments in its South African business as it continues to invest in local market growth and partner and customer engagement.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.