Skip links

Scalable networking of devices with KEYNOA.

With KEYNOA, you can connect any IoT device to any data platform. In seconds. Thousands of times.

The features of KEYNOA

Onboarding

Cloud connection

Fleet management

User management

Updates

IT security

Onboarding

It is not uncommon for hundreds to thousands of devices to be used, which need to be authenticated, configured and provided with software. To make this process as efficient as possible, secure automation of onboarding is important.

Scale the onboarding process using predefined templates. With KEYNOA, new devices can be added to the IoT in just a few clicks. This makes deployment easy.
Scalable provision of IoT devices

Configurations can be changed until shortly before physical installation

No access to critical networks required by the service technician

Cloud connection

Different devices, different cloud providers - no problem with KEYNOA

With KEYNOA, any device can be connected to any IoT cloud or data platform. This is done intuitively and quickly by defining reusable cloud connectors. These make the cloud connection of devices scalable.

Supports all hyperscaler clouds and on-premises data platforms (MQTT, OPC UA)

Encrypted connections directly after switching on the devices using x.509 certificates

Simple management of cloud access

Fleet management

Keep an overview of your IoT devices

KEYNOA allows you to manage all devices at every step of their use case. The intuitive KEYNOA dashboards are used to manage IoT device metadata such as the connection status to IoT clouds, update versions, IT security features and access authorizations.

Create a single source of truth (SSOT) for your fleet management with KEYNOA

All connections at a glance

Individual monitoring and flexible adjustments possible for each device

User management

Devices and data must be protected against unauthorized access. Only those persons and systems should be granted authorization who absolutely need it to carry out their work and then only those authorizations that they really need. Permanent authorizations (e.g. using standard passwords) should never be granted.

With KEYNOA's identity and access management, you can also give external service technicians access to devices and ensure that only authorized persons have access to the right tools. This protects you against social engineering attacks.

Manage the access of people, systems and software

Automate the renewal and lifetime of authorization certificates

Seamless connection to existing IAM systems such as Microsoft Active Directory

Updates

With KEYNOA, no device misses an update

With KEYNOA, available updates are no longer overlooked or forgotten. KEYNOA reminds you of pending firmware updates and expiring certificates that are necessary for IT security.

Manage and automate updates via a central dashboard

Reminder about pending updates

Avoidance of outdated configurations

IT security

KEYNOA implements state-of-the-art security mechanisms in the IoT

The cloud trust and securing the IoT is at the heart of KEYNOA. The entire PKI of your IoT is secured with state-of-the-art X.509 certificates. This reduces points of attack from outside and inside.
State-of-the-art X.509 certificates

Stringent use of authorization certificates

Reduce points of attack and protect your IoT

Try KEYNOA now!

In cooperation with Janz Tec AG, we will send you a suitable IoT device based on your ideas and requirements. You will also receive access to the KEYNOA platform from DEVITY. You have the opportunity to test and get to know the demo kit free of charge for 4 weeks.
In 3 steps

How to connect devices to KEYNOA

Play Video

Step 1: Select
data platform

The first step is to select the data platform to which you want to connect devices. KEYNOA supports onboarding to all hyperscaler clouds as well as on-premises data platforms.

Step 2: Define
configurations

In the second step, configurations are defined for either OPC UA or MQTT. Rules for encrypted data exchange, access rights or updates can also be set up.
Play Video
Play Video

Step 3: Define
templates

In the third step, the template parameters are defined and saved. This allows devices with the same properties to be rolled out in a scalable manner.

Book a demo now!

WordPress Cookie Notice by Real Cookie Banner