Skip links
KEYNOA features

Scalable device networking with KEYNOA.

With KEYNOA, you can connect any device to any data platform in seconds — thousands of times over.

The features of KEYNOA

Configuration

Integrations

Device management

Identity management

Onboarding

Operation

Central configuration

KEYNOA enables the configuration to be automated.

From defining profiles and configuration templates to remote user diagnostics, software management, and security.

Centralized configuration and management of all devices and device groups.

Configurations can be modified up until just before physical installation.

No access to critical networks is required by the service technician.

Diverse integration options

Different devices, diverse purposes, and infrastructures – no problem with KEYNOA.

KEYNOA interacts seamlessly with existing infrastructures such as IoT clouds, SCADA systems and public key infrastructures. Encrypted data exchange is possible with proven protocols.

KEYNOA supports on-premises data platforms as well as all major hyperscaler clouds, including Azure, AWS, Cumulocity, Google Cloud, and ThingsBoard.

Encrypted communication with certificate-based authentication via standardized protocols (e.g. OPC UA, MQTT, HTTPS, BACnet/SEC and IEC 60870-5-104).

Simple connection and management of existing access to third-party systems.

API-first architecture.

Device management

Devices and data must be safeguarded against unauthorized access. Authorization should be granted only to individuals and systems that absolutely require it to perform their tasks, and only with the permissions necessary for their work. Permanent authorizations (such as standard passwords) should never be granted.

With KEYNOA's identity and access management, you can grant external service technicians access to devices while ensuring that only authorized individuals have access to the appropriate tools. This helps protect you from social engineering attacks. Additionally, KEYNOA ensures that available updates are never overlooked or forgotten.

Manage access to installed devices centrally and enable secure remote access.

Seamless integration with existing IAM systems, such as Microsoft Active Directory (Entra ID).

Manage and automate updates via a central dashboard.

Identity management

KEYNOA implements state-of-the-art security mechanisms in the IoT

At the core of KEYNOA are trusted devices and IoT security, which minimize vulnerabilities both from external and internal threats.
Automatic certificate management.

Secure revocation of device identities.

Mutual authentication of device and data platform.

Automatic onboarding

In automation or IoT projects, it is common to deploy hundreds of devices. Service technicians must authenticate, configure, and install software on each device, a process that typically takes around 20 minutes per device. This same task must be repeated for every additional device.

Complex and distributed systems make device onboarding more than just a matter of network parameters. With KEYNOA, you can easily automate workflows tailored to specific devices, customers, locations, applications, and integrations.
Zero-touch deployment in less than two minutes.

The untrusted installer approach allows installation by individuals without trust credentials.

Mutual authentication supports zero trust concepts.

Operating

Keep an overview of your IoT devices

KEYNOA allows you to manage all devices at every step of their use case. The intuitive KEYNOA dashboards are used to manage IoT device metadata such as the connection status to IoT clouds, update versions, IT security features and access authorizations.

Create a single source of truth (SSOT) for your fleet management with KEYNOA

All connections at a glance

Individual monitoring and flexible adjustments can be made for each device.

Learn how KEYNOA is implemented

We integrate KEYNOA into any device. Just let us know your requirements.

What makes KEYNOA unique?

Each device is given a unique identity during production

No-Code Platform for device management and IT security

Flexibility for every application

WordPress Cookie Notice by Real Cookie Banner