Skip links
KEYNOA for users

Automated processes for devices you need to protect.

KEYNOA simplifies device onboarding within your system architecture. Eliminate the need for time-consuming configuration efforts for each device.
90%
Less effort required to configure IoT devices
95%
Saves time when managing connection security
100%
Flexibility in the choice of data platform and infrastructure

Digitize and automate your infrastructure with KEYNOA

All devices are centrally managed, configured and rolled out via KEYNOA, which uses industry standards such as MQTT or OPC UA to connect modern devices. Both the device and the accessing entity authenticate themselves with a unique identity, and we offer KEYNOA both as a SaaS solution and as an on-premises variant.

Basic requirement according to IEC 62443

„Bevor der Zugriff auf Informationen, Geräte oder Systeme ermöglicht wird, muss die Identität der zugreifenden Entität (Gerät, System, Software oder Mensch) festgestellt und deren zulässige Aktionen überprüft werden. Damit soll unautorisierter Zugriff vermieden werden.“
(IEC 62443)

Integrators

KEYNOA supports integrators in the automation of recurring processes in the configuration and IT security of devices.

Die Konfiguration der Geräte kann standartortunabhängig von IT-Teams überall auf der Welt stattfinden. Dabei wird die Anbindung von Geräten an IoT-Clouds wie Azure, AWS oder Cumolcity über OPC-UA oder MQTT abgebildet. Zusätzlich bietet KEYNOA eine Anbindung an externe PKI-Systeme oder Gerätemanagement-Lösungen. Folglich kann der Nutzer zu jedem Zeitpunkt die vollständige Unabhängigkeit und Datenhoheit bewahren.

Integratoren können erst sehr spät – nämlich bei der Installation entscheiden, in welche Datenplattformen sie Geräte einbinden wollen. So können Geräte eingelagert und später konfiguriert werden. Die Individualisierung der Geräte erfolgt variabel.

Geräte können - ohne vorheriges Auspacken - mithilfe der zuvor ausgestellten Identität mit den für den Betrieb notwendigen Informationen und Konfigurationen versorgt werden. Unsere Vorlagen- Logik erwirkt, dass dieser Schritt für Geräte mit den gleichen Eigenschaften nur einmal durchgeführt werden muss.

Personen ohne Fachkenntnisse können Geräte dank Zero-Touch Technologie in unter zwei Minuten installieren.Dadurch werden die Installationskosten stark verringert und die Implementierung von Zero-Trust Konzepten unabhängig vom Datenprotokoll vereinfacht.

Mit KEYNOA erfolgt eine sichere Weitergabe der digitalen Identiäten entlang der Wertschöpfungskette. Bevor Geräte zu einem Netzwerk hinzugefügt werden, erfolgt eine beidseitige Authentifizierung zwischen dem Gerät und der zugreifenden Entität.

Maschinenbauer_03-1_s

Operator

KEYNOA ensures the smooth replacement of devices. In addition, the operating process is optimized through automation in device management.

KEYNOA supports a so-called “Untrusted Installer” approach. This means that the installer no longer needs to have access to sensitive infrastructures (e.g. PKI/certificate management) to add a device to a network. This means that devices can be installed and replaced securely.

Locked devices reduce the risk of a supply chain attack. During operation, the hardening of applications is enabled via special authentications and authorizations for configuration changes, software modifications and to maintain IT security (e.g. updates and patches). Secure network segmentation is also supported by enabling encrypted communication between zones via conduits with secure communication protocols.

With our automated identity management, this complex task becomes child's play. Our innovative system enables seamless integration and management of various PKI systems, allowing you to focus on your core business.

Centralized device management with remote updates, cloud connectivity, access management and automatic certificate management allow the components used to be used flexibly and securely in the long term.

KEYNOA
compatible devices

Together with leading manufacturers, DEVITY is revolutionizing the onboarding of trusted devices. Find out which device is already compatible with KEYNOA. The DEVITY team will be happy to help you make the right choice for your application.

Find out how KEYNOA can be used optimally.

Integrators

Improve your value proposition by leveraging verifiable trust and automating recurring activities.

Operator

Increase the protection of your infrastructure and implement the components of IEC 62443. KEYNOA fits in seamlessly.

Hosting option

Whether cloud solution or on-premises hosting, security is our top priority.
We offer tailor-made solutions that meet your individual requirements.
KEYNOA Cloud

KEYNOA Cloud

As part of the cloud setup, KEYNOA is hosted in our cloud infrastructure. This gives you full access to all KEYNOA functions while we take care of all tasks related to operation, maintenance, backups and updates. For your company, this means a reduction in internal IT effort and the certainty of an optimally maintained IT infrastructure. We only use German data centers that are certified according to ISO 27001 and thus guarantee 100% compliance with the GDPR.

KEYNOA on premises

KEYNOA on premises

For an on-premises implementation, KEYNOA is set up in your own IT environment. You receive the software you need from us and take on all tasks relating to updates, infrastructure operation, maintenance and updates yourself. This offers the advantage that your data always remains in your own infrastructure and you retain full control over it. We guarantee maximum data security.


Test KEYNOA now!

In cooperation with Janz Tec AG, we will send you a suitable IoT device based on your ideas and requirements. You will also receive access to the KEYNOA platform from DEVITY.
WordPress Cookie Notice by Real Cookie Banner