With trust to automation in the IoT.
Use identities for your devices and IoT projects to meet IT security requirements and save 90% of configuration time.
With trust to automation in the IoT.
Use identities for your devices and IoT projects to meet IT security requirements and save 90% of configuration time.
News & Events
Power Up Event
Wednesday, May 8 at 16:30 at the Innovation Campus Lemgo
The Power Up event focuses on the topics of industrial automation, AI, smart work, new beverages and social entrepreneurship. Over 30 start-ups and projects will be presenting their solutions. In keeping with the theme of industrial automation, we will be presenting our KEYNOA solution. Get your free tickets
On-demand webinar: Building a Secure IoT Ecosystem
Together with Software AG and Phoenix Contact, we gave deep insights into the process of building an interoperable IoT security solution in our webinar "Building a Secure IoT Ecosystem". In the panel discussion we talk about:
✔ Common challenges to holistic cybersecurity
✔ Current cybersecurity standards and regulations
✔ Identifying suitable ecosystem partners
✔ Managing and implementing cybersecurity technologies Secure tickets for free
✔ Common challenges to holistic cybersecurity
✔ Current cybersecurity standards and regulations
✔ Identifying suitable ecosystem partners
✔ Managing and implementing cybersecurity technologies Secure tickets for free
Power Up Night
Mittwoch, der 8. Mai um 16:30 am Innovation Campus Lemgo
Im Fokus des Power Up Events stehen die Themen industrielle Automation, AI, Smart Work und Social Entrepreneurship. Über 30 Startups und Projekte präsentieren ihre Lösung. Passend zum Thema industrielle Automation werden wir unsere Lösung KEYNOA vorstellen.
Kostenlose Tickets sichern
On-Demand-Webinar: Building a Secure IoT Ecosysytem
Gemeinsam mit der Software AG und Phoenix Contact haben wir im Rahmen unseres Webinars "Building a Secure IoT Ecosystem" tiefe Einblicke in den Prozess zum Aufbau einer interoperablen IoT-Sicherheitslösung gegeben. In der Panel Discussion sprechen wir über:
✔ Häufige Herausforderungen für eine ganzheitliche Cybersicherheit
✔ Aktuelle Cybersicherheitsstandards und -vorschriften
✔ Identifizierung passender Ökosystempartner
✔ Management und Implementierung von Cybersecuritytechnologien
If you can't trust the device, how can you trust the data?
Trust has never been more important and more complex than in a time with more devices, interactions and regulations.
Do you meet the latest IT security requirements?
Standards such as IEC 62443, NIS 2 or the Cyber Resiliance Act increase the technical requirements for protection against cyberattacks. Meet the security-by-design requirements without compromising on user-friendliness!
Are you using IT security for devices correctly?
92% of all industrial devices are configured insecurely. We help all users of the latest protocols such as MQTT and OPC UA to securely authenticate devices and automatically maintain encrypted connections!
Are you ready for hyperautomation?
On average, a technician needs 20 minutes to install a device. The costs often exceed those of the hardware. Inspire your customers with a very easy setup!
KEYNOA - Your companion for digital trust in industrial value creation
IT security is a must. Flexibility, user experience and scalability are optional extras. With KEYNOA you get it right.
KEYNOA uses digital identities to provide device manufacturers with secure authentication, encryption and integrity for connected sensors, applications and machines, revolutionizing the onboarding process.
Strong device protection
Digital identities are the basis for a secure product life cycle. KEYNOA supports you every step of the way.
Interoperable value creation
With KEYNOA, you can proactively make supply chains trustworthy and interoperable for your customers.
Automatic Onboarding
KEYNOA makes tedious and expensive configurations a thing of the past. Entire device fleets can be onboarded in just a few clicks.
Great projects are created when there is trust.
We support established companies in the implementation of IoT projects with the help of digital identities. KEYNOA is the perfect solution if you want to connect sensors, controllers, machines and systems securely and quickly.
KEYNOA for the entire value chain.
As a device manufacturer, you want your devices to be user-friendly and secure. To achieve this, IT security must already be taken into account during product design.
As an integrator, you want to set the latest technological standards for operators. Recurring tasks should be reliably automated to increase efficiency.
As an operator, you can increase your overall system effectiveness with the latest automation technology. To ensure system availability, it is important to minimize the risk of a cyber attack.
Customized solutions for future-oriented IoT projects and products
KEYNOA is an orchestration software that serves as a platform and API for managing identities and configurations. Integrators and operators use KEYNOA as a user for the onboarding and maintenance. Manufacturers protect their devices with the KEYNOA Engine.
KEYNOA ENGINE
Client for devices for issuing unique identities. Protects the integrity of the device in the supply chain and serves as an initiator for a trustworthy configuration.
ARMv6/ ARMv7/ x86_64
SDK in C
Open standards
KEYNOA
Platform for the secure and efficient transfer of trust within the supply chain and management of device security and configurations.
API first
Docker
SaaS or
On-Premises
On-Premises
Your added value with KEYNOA.
Time saving
The commissioning costs of industrial components and IoT devices are reduced by up to 90%.
Compliance
With strong device identities, you meet basic requirements for IEC 62443, NIS2 and the Cyber Resilience Act.
Scalability
The devices can be configured by IT teams anywhere in the world, regardless of location. Whether for 5 or 10,000 devices.
Untrusted Installer
Installers do not need access to sensitive infrastructure to add a device to a network.
Flexibility
Owners can only decide at a very late stage - namely during installation - what the devices are to be used for.
Simplicity
Commissioning processes can be carried out quickly and efficiently by people with any level of experience.
The advantages of KEYNOA at a glance.
Time saving
The onboarding costs of industrial components and IoT devices are reduced by up to 90%.
Compliance
With strong device identities, you meet basic requirements for IEC 62443, NIS2 and the Cyber Resilience Act.
Scalability
The devices can be configured by IT teams anywhere in the world, regardless of location. Whether for 5 or 10,000 devices.
Untrusted Installer
Installers do not need access to sensitive infrastructure to add a device to a network.
Flexibility
Owners can decide at a very late stage - namely during installation - what the devices are to be used for.
Simplicity
The onboarding processes can be carried out quickly and efficiently by people with any level of experience.
Simple implementation thanks to standardization.
KEYNOA is designed to easily integrate with your existing security infrastructure, including PKI solutions, data platforms and device management systems.
This inspires our customers and partners
By bundling expertise in the field of hardware and research-related IT security, KEYNOA creates strong synergies for customers in industrial automation.
Ulrich Lütke-Entrup
Key Account Manager, Janz Tec AG
Customer benefit and customer satisfaction are our top priorities. Our claim is the highest quality in technology and service. KEYNOA allows us to focus on exactly that.
Marvin Fortkord
Managing Director, marvIT GmbH
The cooperation between DENIOS and DEVITY is always reliable, characterized by a very high level of technical expertise and an agile, trusting relationship.
Udo Roth
Project Manager Digital Solutions, Denios SE
Project inquiries
info@devity.eu
Telephone
0159 01049052