Introducing IoTAS:
Internet of Things Advanced Security

Learn More

Purpose-Built IoT Security for Low Power Devices

CENTRI Internet of Things Advanced Security – IoTAS – is a platform enabling companies to easily implement private data encryption and optimization into their IoT products and services. IoTAS is embedded on endpoints, applications, network servers, and the Cloud to secure and compress all data in motion and at rest. IoTAS operates in cache memory resulting in 20% less CPU utilization, less heat, and less use of power with IoT devices to maximize uptime. Increase protection, get to market faster with pre-configured software, and replace insufficient open source security tools with a patented, complete solution for encryption you can trust. Download free trial.

Three gears from an old wood lathe

Traditional IT Security Doesn’t Always Work

Traditional IT security solutions for your enterprise weren’t designed to protect your IoT devices and data. IoT “things” outside your network are the new playground for hackers. Common encryption technologies present significant problems for small, battery operated IoT devices. Multiple rounds of encryption increase time and load on processors. Added network traffic can exhaust battery life for mission-critical devices and clog Cloud storage. Key management becomes difficult, expensive, and cannot scale. Security layers that you build can burden your development effort with time and cost.


You Need IoT Security That Does Work

Your expertise is developing IoT devices and software to exchange data – let us protect it for you. CENTRI IoTAS is Internet of Things Advanced Security, purpose-built for IoT. Supports low-powered IoT devices to the largest pieces of equipment. Provides 100% protection of IoT data in motion and at rest on devices or the Cloud. Designed for IoT developers like you to simplify development efforts and speed time-to-market minus the pitfalls of open source tools. Offers complete visibility of your data with user management, audit, and forensics. Mitigate the risk of data theft, your own damaged reputation, or the industry’s next lawsuit with IoT security that works.  Spend more time innovating and less time securing!

Your Advantages

  • Icon-Endpoints-1-Red

    Complete Security

    IoTAS secures IoT data in motion and at rest. Write 50% less calls with twice the efficiency and a handshake 50x faster. SSL/TLS only provides transport security 

  • Icon-Data-Integrity-1

    Data & Device Integrity

    IoTAS never sends a single byte in the clear and works with a trusted endpoint-server model to authenticate all devices. Your IoT data is always secure

  • circle-01

    Mission-Critical Uptime

    Operates in cache memory. Designed to keep battery powered IoT devices up and running – less heat, use 20% less CPU utilization, up to 30% more uptime

  • circle-02

    Simplified Key Vault Management

    Patented “vault-less” technology removes the hassle and expense of key management or a Hardware Security Module for data at rest. Save $20,000/year on an HSM

  • Icon-Integration-1-Red

    Developer-Centric Experience

    Unlike open source, IoTAS is pre-configured for faster integration to your endpoints, applications, and Cloud. Reduce internal development time from months to days

  • Icon-Data-Optimization-1-Red

    Handles the Data Spike

    The increased data traffic from IoT squeezes networks and Cloud storage. IoTAS compresses the data up to 80% to save bandwidth and Cloud storage costs