Introducing IoTAS:
Internet of Things Advanced Security

Learn More

Purpose-Built IoT Security for Low Power Devices

CENTRI’s Internet of Things Advanced Security – IoTAS, is a platform enabling companies to easily implement private data encryption and optimization into their products and services. IoTAS is embedded on endpoints, applications, network servers, and the Cloud to secure and compress all data in motion and at rest. IoTAS operates in cache memory resulting in 20% less CPU utilization, less heat, and less use of power with IoT devices. Increase protection, get to market faster with pre-configured software, and replace insufficient open source security tools with a patented, complete solution for encryption you can trust.

Page-Home-Bad-Gears-1-SFW

Traditional IT Security
Doesn’t Work

Traditional IT security solutions for your enterprise don’t work to protect your IoT devices and data. IoT “things” outside your network are the new playground for hackers. Common encryption technologies present significant problems for small, battery operated IoT devices. Multiple rounds of encryption increase time and load on processors. Added network traffic can exhaust battery life for mission-critical devices and clog Cloud storage. Key management becomes scary, expensive, and cannot scale. Security layers that you build can burden your development effort with time and cost.


Page-Home-Good-Gears-1-SFW

You Need IoT Security
That Does Work

Your expertise is developing IoT devices and software to exchange data – let us protect it for you. CENTRI’s IoTAS is Internet of Things Advanced Security, purpose-built for IoT. Supports low-powered IoT devices to the largest pieces of equipment. Provides 100% protection of IoT data in motion and at rest on devices or the Cloud. Designed for IoT developers like you to simplify development efforts and speed time-to-market minus the pitfalls of open source tools. Offers complete visibility of your data with user management, audit, and forensics. Mitigate the risk of data theft, your own damaged reputation, or the industry’s next lawsuit with IoT security that works.


Your Advantages

  • Icon-Endpoints-1-Red

    Complete Security

    IoTAS secures IoT data in motion and at rest. Write 50% less calls with twice the efficiency and a complete handshake 50x faster. SSL/TLS only provides in transit security 

  • Icon-Data-Integrity-1

    Data & Device Integrity

    IoTAS never sends a single byte in the clear and works with a trusted endpoint-server model to authenticate all devices. SSL/TLS was designed for the anonymous web with greater risk of exposure

  • circle-01

    Mission-Critical Uptime

    Operates in cache memory. Designed to keep battery powered IoT devices up and running – less heat, use 20% less CPU utilization, up to 30% more uptime

  • circle-02

    Simplified Key Vault Management

    Patented “vault-less” technology removes the hassle and expense of key management or a Hardware Security Module for data at rest. Save $20,000/year on average for an HSM

  • Icon-Integration-1-Red

    Developer-Centric Experience

    Unlike SSL/TLS, IoTAS comes pre-configured for faster integration to your endpoints, applications, and Cloud. Reduce internal development time from months to days

  • Icon-Data-Optimization-1-Red

    Handles the Data Spike

    The increase in data traffic from IoT squeezes networks and Cloud storage. IoTAS compresses the data up to 80% to save bandwidth and Cloud storage costs. 

IoT Security Use Cases

  • Secure Things

    img-03
  • Secure Central Command

    img-04
  • Secure IoT Big Data

    img-05
Accelerate Your Advanced IoT Security

Free Download for IoT Developers

Security for Internet of Things Applications and Devices

White Paper

Simplifying IoT Security for Developers:
5 New Rules for Success

You’re in Good Company

  • Best-Company
  • Culture-Tech-Award
  • Fierce-Innovastion-Awards
  • Red-Hering-Award
  • Award-Gartner-CoolVendor-2013
  • Tech-Impact-Awards
  • Geekwire-200