Scalable networking of devices with KEYNOA.
With KEYNOA, you can connect any IoT device to any data platform. In seconds. Thousands of times.
The features of KEYNOA
Onboarding
It is not uncommon for hundreds to thousands of devices to be used, which need to be authenticated, configured and provided with software. To make this process as efficient as possible, secure automation of onboarding is important.
Scale the onboarding process using predefined templates. With KEYNOA, new devices can be added to the IoT in just a few clicks. This makes deployment easy.
Scalable provision of IoT devices
Configurations can be changed until shortly before physical installation
No access to critical networks required by the service technician
Cloud connection
Different devices, different cloud providers - no problem with KEYNOA
With KEYNOA, any device can be connected to any IoT cloud or data platform. This is done intuitively and quickly by defining reusable cloud connectors. These make the cloud connection of devices scalable.
Supports all hyperscaler clouds and on-premises data platforms (MQTT, OPC UA)
Encrypted connections directly after switching on the devices using x.509 certificates
Simple management of cloud access
Fleet management
Keep an overview of your IoT devices
KEYNOA allows you to manage all devices at every step of their use case. The intuitive KEYNOA dashboards are used to manage IoT device metadata such as the connection status to IoT clouds, update versions, IT security features and access authorizations.
Create a single source of truth (SSOT) for your fleet management with KEYNOA
All connections at a glance
Individual monitoring and flexible adjustments possible for each device
User management
Devices and data must be protected against unauthorized access. Only those persons and systems should be granted authorization who absolutely need it to carry out their work and then only those authorizations that they really need. Permanent authorizations (e.g. using standard passwords) should never be granted.
With KEYNOA's identity and access management, you can also give external service technicians access to devices and ensure that only authorized persons have access to the right tools. This protects you against social engineering attacks.
Manage the access of people, systems and software
Automate the renewal and lifetime of authorization certificates
Seamless connection to existing IAM systems such as Microsoft Active Directory
Updates
With KEYNOA, no device misses an update
With KEYNOA, available updates are no longer overlooked or forgotten. KEYNOA reminds you of pending firmware updates and expiring certificates that are necessary for IT security.
Manage and automate updates via a central dashboard
Reminder about pending updates
Avoidance of outdated configurations
IT security
KEYNOA implements state-of-the-art security mechanisms in the IoT
The cloud trust and securing the IoT is at the heart of KEYNOA. The entire PKI of your IoT is secured with state-of-the-art X.509 certificates. This reduces points of attack from outside and inside.
State-of-the-art X.509 certificates
Stringent use of authorization certificates
Reduce points of attack and protect your IoT
Try KEYNOA now!
In cooperation with Janz Tec AG, we will send you a suitable IoT device based on your ideas and requirements. You will also receive access to the KEYNOA platform from DEVITY. You have the opportunity to test and get to know the demo kit free of charge for 4 weeks.
In 3 steps
How to connect devices to KEYNOA
Play Video
Step 1: Select
data platform
The first step is to select the data platform to which you want to connect devices. KEYNOA supports onboarding to all hyperscaler clouds as well as on-premises data platforms.
Step 2: Define
configurations
In the second step, configurations are defined for either OPC UA or MQTT. Rules for encrypted data exchange, access rights or updates can also be set up.
Play Video
Play Video
Step 3: Define
templates
In the third step, the template parameters are defined and saved. This allows devices with the same properties to be rolled out in a scalable manner.