With trust to automation in the IoT.
Use identities for your devices and IoT projects to meet IT security requirements and save 90% of configuration time.
With trust to automation in the IoT.
Use identities for your devices and IoT projects to meet IT security requirements and save 90% of configuration time.
News & Events
Power Up Event
Wednesday, May 8 at 16:30 at the Innovation Campus Lemgo
The Power Up event focuses on the topics of industrial automation, AI, smart work, new beverages and social entrepreneurship. Over 30 start-ups and projects will be presenting their solutions. In keeping with the theme of industrial automation, we will be presenting our KEYNOA solution. Get your free tickets
On-demand webinar: Building a Secure IoT Ecosystem
Together with Software AG and Phoenix Contact, we gave deep insights into the process of building an interoperable IoT security solution in our webinar "Building a Secure IoT Ecosystem". In the panel discussion we talk about:
✔ Common challenges to holistic cybersecurity
✔ Current cybersecurity standards and regulations
✔ Identifying suitable ecosystem partners
✔ Managing and implementing cybersecurity technologies Secure tickets for free
✔ Common challenges to holistic cybersecurity
✔ Current cybersecurity standards and regulations
✔ Identifying suitable ecosystem partners
✔ Managing and implementing cybersecurity technologies Secure tickets for free
Power Up Night
Mittwoch, der 8. Mai um 16:30 am Innovation Campus Lemgo
Im Fokus des Power Up Events stehen die Themen industrielle Automation, AI, Smart Work und Social Entrepreneurship. Über 30 Startups und Projekte präsentieren ihre Lösung. Passend zum Thema industrielle Automation werden wir unsere Lösung KEYNOA vorstellen.
Kostenlose Tickets sichern
On-Demand-Webinar: Building a Secure IoT Ecosysytem
Gemeinsam mit der Software AG und Phoenix Contact haben wir im Rahmen unseres Webinars "Building a Secure IoT Ecosystem" tiefe Einblicke in den Prozess zum Aufbau einer interoperablen IoT-Sicherheitslösung gegeben. In der Panel Discussion sprechen wir über:
✔ Häufige Herausforderungen für eine ganzheitliche Cybersicherheit
✔ Aktuelle Cybersicherheitsstandards und -vorschriften
✔ Identifizierung passender Ökosystempartner
✔ Management und Implementierung von Cybersecuritytechnologien
Wenn man dem Gerät nicht trauen kann, wie kann man dann den Daten trauen?
Nie war Vertrauen wichtiger und komplexer als in einer Zeit mit mehr Geräten, Interaktionen und Regularien.
Do you meet the latest IT security requirements?
Standards such as IEC 62443, NIS 2 or the Cyber Resiliance Act increase the technical requirements for protection against cyberattacks. Meet the security-by-design requirements without compromising on user-friendliness!
Are you using IT security for devices correctly?
92% of all industrial devices are configured insecurely. We help all users of the latest protocols such as MQTT and OPC UA to securely authenticate devices and automatically maintain encrypted connections!
Are you ready for hyperautomation?
On average, a technician needs 20 minutes to install a device. The costs often exceed those of the hardware. Inspire your customers with a very easy setup!
KEYNOA - Ihr Begleiter für digitales Vertrauen in der industriellen Wertschöpfung
IT-Sicherheit ist die Pflicht. Flexibilität, User Experience und Skalierbarkeit die Kür. Mit KEYNOA machen Sie es richtig.
KEYNOA uses digital identities to provide device manufacturers with secure authentication, encryption and integrity for connected sensors, applications and machines, revolutionizing commissioning.
Strong protection of the devices
Digital identities are the basis for a secure product life cycle. KEYNOA supports you every step of the way.
Interoperable value creation
With KEYNOA, you can proactively make supply chains trustworthy and interoperable for your customers.
Automatic commissioning
KEYNOA makes tedious and expensive configurations a thing of the past. Entire device fleets can be commissioned in just a few clicks.
Great projects are created when there is trust.
We support established companies in the implementation of IoT projects with the help of digital identities. KEYNOA is the perfect solution if you want to network sensors, controllers, machines and systems securely and quickly.
KEYNOA for the entire value chain.
Als Gerätehersteller streben Sie an, dass Ihre Geräte benutzerfreundlich und sicher betrieben werden können. Dafür muss IT-Sicherheit bereits während des Produktdesigns beachtet werden.
Als Integrator möchten Sie neuste technologische Standards für Betreiber setzen. Wiederkehrende Aufgaben sollten zuverlässig automatisiert werden, um Effizienzen zu steigern.
Als Betreiber steigern Sie Ihre Gesamtanlageneffektivität durch neuste Automatisierungstechnik. Um die Anlagenverfügbarkeit sicherzustellen, gilt es die Gefahr eines Cyberangriffs zu minimieren.
Customized solutions for future-oriented IoT projects and products
KEYNOA is an orchestration software that serves as a platform and API for managing identities and configurations. Integrators and operators use KEYNOA as a user for commissioning and maintenance. Manufacturers protect their devices with the KEYNOA Engine.
KEYNOA ENGINE
Client für Geräte zur Ausstellung von eindeutigen Identitäten. Schützt die Integrität des Geräts in der Lieferkette und dient als Initiator für eine vertrauenswürdige Konfiguration.
ARMv6/ ARMv7/ x86_64
SDK in C
Offene Standards
KEYNOA
Plattform zur sicheren und effizienten Übertragung von Vertrauen innerhalb der Lieferkette und Verwaltung von Gerätesicherheit und -konfigurationen.
API first
Docker
SaaS oder
On-Premises
On-Premises
Your added value with KEYNOA.
Time saving
The commissioning costs of industrial components and IoT devices are reduced by up to 90%.
Compliance
With strong device identities, you meet basic requirements for IEC 62443, NIS2 and the Cyber Resilience Act.
Scalability
The devices can be configured by IT teams anywhere in the world, regardless of location. Whether for 5 or 10,000 devices.
Untrusted Installer
Installers do not need access to sensitive infrastructure to add a device to a network.
Flexibility
Owners can only decide at a very late stage - namely during installation - what the devices are to be used for.
Simplicity
Commissioning processes can be carried out quickly and efficiently by people with any level of experience.
The advantages of KEYNOA at a glance.
Zeitersparnis
The commissioning costs of industrial components and IoT devices are reduced by up to 90%.
Compliance
With strong device identities, you meet basic requirements for IEC 62443, NIS2 and the Cyber Resilience Act.
Skalierbarkeit
The devices can be configured by IT teams anywhere in the world, regardless of location. Whether for 5 or 10,000 devices.
Untrusted Installer
Installers do not need access to sensitive infrastructure to add a device to a network.
Flexibilität
Owners can only decide at a very late stage - namely during installation - what the devices are to be used for.
Einfachheit
Commissioning processes can be carried out quickly and efficiently by people with any level of experience.
Simple implementation thanks to standardization.
KEYNOA is designed to easily integrate with your existing security infrastructure, including PKI solutions, data platforms and device management systems.
This inspires our customers and partners
By bundling expertise in the field of hardware and research-related IT security, KEYNOA creates strong synergies for customers in industrial automation.
Ulrich Lütke-Entrup
Key Account Manager, Janz Tec AG
Customer benefit and customer satisfaction are our top priorities. Our claim is the highest quality in technology and service. KEYNOA allows us to focus on exactly that.
Marvin Fortkord
Managing Director, marvIT GmbH
The cooperation between DENIOS and DEVITY is always reliable, characterized by a very high level of technical expertise and an agile, trusting relationship.
Udo Roth
Project Manager Digital Solutions, Denios SE
Project inquiries
info@devity.eu
Telephone
0159 01049052