Skip links

With trust to automation in the IoT.

Use identities for your devices and IoT projects to meet IT security requirements and save 90% of configuration time.

With trust to automation in the IoT.

Use identities for your devices and IoT projects to meet IT security requirements and save 90% of configuration time.
KEYNOA-Dashboard mit Roboterarm und Drohnen

Selected customers

News & Events

Power Up Event

Wednesday, May 8 at 16:30 at the Innovation Campus Lemgo
The Power Up event focuses on the topics of industrial automation, AI, smart work, new beverages and social entrepreneurship. Over 30 start-ups and projects will be presenting their solutions. In keeping with the theme of industrial automation, we will be presenting our KEYNOA solution. Get your free tickets

On-demand webinar: Building a Secure IoT Ecosystem

Together with Software AG and Phoenix Contact, we gave deep insights into the process of building an interoperable IoT security solution in our webinar "Building a Secure IoT Ecosystem". In the panel discussion we talk about:

✔ Common challenges to holistic cybersecurity
✔ Current cybersecurity standards and regulations
✔ Identifying suitable ecosystem partners
✔ Managing and implementing cybersecurity technologies Secure tickets for free

Power Up Night

Mittwoch, der 8. Mai um 16:30 am Innovation Campus Lemgo

Im Fokus des Power Up Events stehen die Themen industrielle Automation, AI, Smart Work und Social Entrepreneurship. Über 30 Startups und Projekte präsentieren ihre Lösung. Passend zum Thema industrielle Automation werden wir unsere Lösung KEYNOA vorstellen.

Kostenlose Tickets sichern

On-Demand-Webinar: Building a Secure IoT Ecosysytem

Gemeinsam mit der Software AG und Phoenix Contact haben wir im Rahmen unseres Webinars "Building a Secure IoT Ecosystem" tiefe Einblicke in den Prozess zum Aufbau einer interoperablen IoT-Sicherheitslösung gegeben. In der Panel Discussion sprechen wir über:

✔ Häufige Herausforderungen für eine ganzheitliche Cybersicherheit
✔ Aktuelle Cybersicherheitsstandards und -vorschriften
✔ Identifizierung passender Ökosystempartner
✔ Management und Implementierung von Cybersecuritytechnologien

Jetzt anschauen

If you can't trust the device, how can you trust the data?

Trust has never been more important and more complex than in a time with more devices, interactions and regulations.
Do you meet the latest IT security requirements?
Standards such as IEC 62443, NIS 2 or the Cyber Resiliance Act increase the technical requirements for protection against cyberattacks. Meet the security-by-design requirements without compromising on user-friendliness!
Are you using IT security for devices correctly?
92% of all industrial devices are configured insecurely. We help all users of the latest protocols such as MQTT and OPC UA to securely authenticate devices and automatically maintain encrypted connections!
Are you ready for hyperautomation?
On average, a technician needs 20 minutes to install a device. The costs often exceed those of the hardware. Inspire your customers with a very easy setup!

KEYNOA - Your companion for digital trust in industrial value creation

IT security is a must. Flexibility, user experience and scalability are optional extras. With KEYNOA you get it right.
KEYNOA uses digital identities to provide device manufacturers with secure authentication, encryption and integrity for connected sensors, applications and machines, revolutionizing the onboarding process.
Strong device protection

Digital identities are the basis for a secure product life cycle. KEYNOA supports you every step of the way.

Interoperable value creation

With KEYNOA, you can proactively make supply chains trustworthy and interoperable for your customers.

Automatic Onboarding

KEYNOA makes tedious and expensive configurations a thing of the past. Entire device fleets can be onboarded in just a few clicks.

Great projects are created when there is trust.

We support established companies in the implementation of IoT projects with the help of digital identities. KEYNOA is the perfect solution if you want to connect sensors, controllers, machines and systems securely and quickly.

Industry 4.0

Energy

Smart Building

Healthcare

KEYNOA for the entire value chain.

(Geräte-) Hersteller arbeitet an Förderband zur Komponentenherstellung

As a device manufacturer, you want your devices to be user-friendly and secure. To achieve this, IT security must already be taken into account during product design.

Use device identities now.

Integratoren implementieren Maschinen

As an integrator, you want to set the latest technological standards for operators. Recurring tasks should be reliably automated to increase efficiency.

Scale now.

 

 

Betreiber verwendet Maschine über den PC

As an operator, you can increase your overall system effectiveness with the latest automation technology. To ensure system availability, it is important to minimize the risk of a cyber attack.

Embed IT security now.

Preparing components for the digital age

Preparing components for the digital age

SPS Magazine 02/23
Integrate many IoT devices quickly and securely

Integrate many IoT devices quickly and securely

IT&Production 09/23
5 questions for...

5 questions for...

Industrial automation 01/23
Secure provision of components

Secure provision of components

VDMA 02/21
Podcast episode 23 | IT security in production

Podcast episode 23 | IT security in production

IPH 11/22
Digital identities: Requirement for protection against cyberattacks

Digital identities: Requirement for protection against cyberattacks

MaschinenMarkt 11/23

Customized solutions for future-oriented IoT projects and products

KEYNOA is an orchestration software that serves as a platform and API for managing identities and configurations. Integrators and operators use KEYNOA as a user for the onboarding and maintenance. Manufacturers protect their devices with the KEYNOA Engine.

KEYNOA ENGINE

Client for devices for issuing unique identities. Protects the integrity of the device in the supply chain and serves as an initiator for a trustworthy configuration.
ARMv6/ ARMv7/ x86_64

SDK in C

Open standards

KEYNOA

Platform for the secure and efficient transfer of trust within the supply chain and management of device security and configurations.

API first

Docker

SaaS or
On-Premises

Your added value with KEYNOA.

The advantages of KEYNOA at a glance.

Time saving

The onboarding costs of industrial components and IoT devices are reduced by up to 90%.

Compliance

With strong device identities, you meet basic requirements for IEC 62443, NIS2 and the Cyber Resilience Act.

Scalability

The devices can be configured by IT teams anywhere in the world, regardless of location. Whether for 5 or 10,000 devices.

Untrusted Installer

Installers do not need access to sensitive infrastructure to add a device to a network.

Flexibility

Owners can decide at a very late stage - namely during installation - what the devices are to be used for.

Simplicity

The onboarding processes can be carried out quickly and efficiently by people with any level of experience.

Simple implementation thanks to standardization.

KEYNOA is designed to easily integrate with your existing security infrastructure, including PKI solutions, data platforms and device management systems.

This inspires our customers and partners

By bundling expertise in the field of hardware and research-related IT security, KEYNOA creates strong synergies for customers in industrial automation.

Ulrich Lütke-Entrup
Key Account Manager, Janz Tec AG

Customer benefit and customer satisfaction are our top priorities. Our claim is the highest quality in technology and service. KEYNOA allows us to focus on exactly that.

Marvin Fortkord
Managing Director, marvIT GmbH

The cooperation between DENIOS and DEVITY is always reliable, characterized by a very high level of technical expertise and an agile, trusting relationship.

Udo Roth
Project Manager Digital Solutions, Denios SE
KEYNOA
Get to know KEYNOA in action.
Our services
Take advantage of DEVITY's know-how.
About us
Find out more about DEVITY.
Blog & News
Don't miss any news.

Talk to our experts.

Get to know us in a non-binding demo appointment.
Project inquiries
info@devity.eu
Telephone
0159 01049052
WordPress Cookie Notice by Real Cookie Banner