Skip links
KEYNOA for users

Automated processes for protecting your devices.

KEYNOA simplifies device onboarding within your system architecture. Eliminate the need for time-consuming configuration efforts for each device.
90%
Less effort required to configure IoT devices.
95%
Saves time when managing connection security.
100%
Flexibility in the choice of data platform and infrastructure.

Digitize and automate your infrastructure with KEYNOA.

All devices are centrally managed, configured and rolled out via KEYNOA using industry standards such as MQTT or OPC UA to connect modern devices. Both the device and the accessing entity authenticate themselves with a unique identity, and we offer KEYNOA both as a SaaS solution and as an on-premises variant.

Basic requirement according to IEC 62443

„Before access to information, devices or systems is enabled, the identity of the accessing entity (device, system, software or person) must be established and its permitted actions checked. This is to prevent unauthorized access."
(IEC 62443)

Supporting integrators

KEYNOA supports integrators automate recurring processes configuration and IT security in the device.

Devices can be configured by IT teams worldwide, regardless of location. Connections to IoT clouds like Azure, AWS, or Cumulocity are established using OPC-UA or MQTT protocols.

KEYNOA also supports integration with external PKI systems and device management solutions, ensuring users retain full independence and data sovereignty at all times.

Integrators can only decide at a very late stage - namely during installation - which data platforms they want to integrate devices into. This means that devices can be stored and configured later. The individualization of the devices is variable.

Devices can be pre-configured with the necessary information and settings for operation—without the need for unpacking—using their pre-assigned identity. With our template logic, this process only needs to be performed once for devices with similar characteristics.

Thanks to zero-touch technology, devices can be installed in under two minutes by individuals without specialized knowledge. This significantly reduces installation costs and simplifies the implementation of zero-trust concepts, regardless of the data protocol used.

With KEYNOA, digital identities are securely transferred throughout the value chain. Before a device is added to a network, mutual authentication is performed between the device and the accessing entity.

Maschinenbauer_03-1_s

Supporting operator

KEYNOA ensures seamless device replacement and optimizes operations through automated device management.

KEYNOA enables an “Untrusted Installer” approach, eliminating the need for installers to access sensitive infrastructures, such as PKI or certificate management, when adding devices to a network. This ensures devices can be securely installed and replaced without compromising security.

Locked devices help mitigate the risk of supply chain attacks. During operation, applications are hardened through advanced authentication and authorization mechanisms for configuration changes, software updates, and IT security maintenance (e.g., updates and patches). 

Additionally, secure network segmentation is supported by enabling encrypted communication between zones using conduits with secure communication protocols.

Our automated identity management streamlines this complex process, making it effortless. With seamless integration and efficient management of various PKI systems, you can stay focused on your core business.

Centralized device management, including remote updates, cloud connectivity, access management, and automatic certificate management, ensures that components can be used flexibly and securely over the long term.

KEYNOA
compatible devices.

Together with leading manufacturers, DEVITY is revolutionizing the onboarding of trusted devices. Explore which devices are already compatible with KEYNOA. The DEVITY team will gladly assist in finding the right solution for your needs.

Find out how KEYNOA can be used optimally.

Integrators

Enhance your value proposition with verifiable trust and by automating repetitive tasks.

Operator

Increase infrastructure security and seamlessly implement IEC 62443 components with KEYNOA.

Hosting option.

Whether you choose a cloud solution or on-premises hosting, security remains our top priority. We provide customized solutions tailored to your specific needs.
KEYNOA Cloud

KEYNOA Cloud

Hosted within our certified German data centers (ISO 27001), KEYNOA Cloud ensures full access to all functions while we handle operations, maintenance, backups, and updates. This reduces internal IT workload and ensures GDPR compliance.

KEYNOA On-Premises

KEYNOA On-Premises

For complete control, deploy KEYNOA within your IT environment. You manage updates, infrastructure operations, and maintenance, keeping all data securely in-house.

Test KEYNOA now!

In cooperation with Janz Tec AG, we will send you a suitable IoT device based on your requirements. You will also receive access to the KEYNOA platform from DEVITY.
WordPress Cookie Notice by Real Cookie Banner