With trust to automation in the IoT.
Use digital identities for your devices and IoT projects to meet IT security standards while saving up to 90% of configuration time.

If you can't trust the device, how can you trust the data?
Trust is more crucial and complex than ever in an era of increasing devices, interactions, and regulations.
Do you meet the latest IT security requirements?
Standards like IEC 62443, NIS-2 or the Cyber Resilience Act increase the technical requirements for protection against cyberattacks. Meet the security-by-design requirements without compromising on user-friendliness!
Are you using IT security for devices correctly?
92% of all industrial devices are configured insecurely. We help all users of the latest protocols such as MQTT and OPC UA to securely authenticate devices and automatically maintain encrypted connections!
Are you ready for hyperautomation?
On average, a technician takes 20 minutes to install a device.The installation costs often exceed the hardware costs. Impress your customers with an effortless setup!

KEYNOA - Your companion for digital trust in industrial value creation.
IT security is essential. Flexibility, user experience, and scalability are the extras. With KEYNOA, you’re making the right choice.
KEYNOA uses digital identities to provide device manufacturers with secure authentication, encryption and integrity for connected sensors, applications and machines, revolutionizing onboarding.
Strong protection of the devices
Digital identities are the basis for a secure product life cycle. KEYNOA supports you every step of the way.
Interoperable value creation
With KEYNOA, you can proactively make supply chains trustworthy and interoperable for your customers.
Automatic onboarding
KEYNOA makes tedious and expensive configurations a thing of the past. Entire device fleets can be onboarded in just a few clicks.

Great projects begin with trust.
We support established companies in implementing IoT projects with the power of digital identities. KEYNOA is the perfect solution to securely and quickly network sensors, controllers, machines, and systems.
KEYNOA for the entire value chain.

As a device manufacturer, you strive to make your devices both user-friendly and secure. Achieving this requires integrating IT security from the very beginning of the product design process.
As an integrator, you aim to set the latest technological standards for operators. To boost efficiency, recurring tasks should be reliably automated.
As an operator, you can enhance the overall effectiveness of your system with the latest automation technology. To ensure system availability, it's crucial to minimize the risk of cyberattacks.
Customized solutions for future-oriented IoT projects and products.
KEYNOA is an orchestration software that serves as a platform and API for managing identities and configurations. Integrators and operators use KEYNOA as a user for onboarding and maintenance. Manufacturers protect their devices with the KEYNOA Engine.

KEYNOA ENGINE
Client for devices for issuing unique identities. Protects the integrity of the device in the supply chain and serves as an initiator for a trustworthy configuration.
ARMv6/ ARMv7/ x86_64
SDK in C
Open standards

KEYNOA
A platform designed for the secure and efficient transfer of trust within the supply chain, as well as the management of device security and configurations.
API first
Docker
SaaS or
On-Premises
On-Premises
Advantages of KEYNOA at a glance.
Time savings
The onboarding costs of industrial components and IoT devices are reduced by up to 90%.
Compliance
With strong device identities, you meet basic requirements for IEC 62443, NIS-2 and the Cyber Resilience Act.
Scalability
The devices can be configured by IT teams anywhere in the world, regardless of location. Whether for 5 or 10,000 devices.
Untrusted installer
Installers do not need access to sensitive infrastructure to add a device to a network.
Flexibility
Owners can only decide at a very late stage - namely during installation - what the devices are to be used for.
Simplicity
The onboarding processes can be carried out quickly and efficiently by people with any level of experience.
Simple implementation based on standardization.
KEYNOA seamlessly integrates with your existing security infrastructure, including PKI solutions, data platforms, and device management systems.

This inspires our customers and partners.
By bundling expertise in the field of hardware and research-related IT security, KEYNOA creates strong synergies for customers in industrial automation.

Ulrich Lütke-Entrup
Key Account Manager, Janz Tec AG
Customer benefit and customer satisfaction are our top priorities. Our claim is the highest quality in technology and service. KEYNOA allows us to focus on exactly that.

Marvin Fortkord
Managing Director, marvIT GmbH
The cooperation between DENIOS and DEVITY is always reliable, characterized by a very high level of technical expertise and an agile, trusting relationship.

Udo Roth
Project Manager Digital Solutions, Denios SE
Project inquiries
info@devity.eu
Telephone
0159 01049052