CENTRI | Eliminate IoT Security Risk | Proven Protection from Chip to Cloud 2017-08-22T15:19:11+00:00

Eliminate IoT Security Risk

Proven Protection from Chip to Cloud

Video: Advanced Security for IoT

DIY security fails the test

  • Incompleteness exposes data

  • Patching point solutions

  • Key management issues

  • Identity and Trust

  • Risk mitigation

  • No visibility or intelligence

IoT needs purpose-built security

  • Device authentication

  • Simplified key management

  • Data integrity

  • Handles the data spike

  • Speed and efficiency

  • Developer-centric experience

Why Choose CENTRI

“The best IoT security is the one that is the most elegant and the easiest… like CENTRI.”

Head of R&D and IoT Security, Global Contract Manufacturer

CENTRI IoTAS – Internet of Things Advanced Security

COMPLETE

COMPLETE

IoTAS provides complete IoT security from devices to data. IoTAS establishes trusted device integrity, and secures and optimizes IoT data in transit and at rest.

FLEXIBLE

FLEXIBLE

Many IoT endpoints are severely limited with software space. With a 50kB footprint, IoTAS provides ultimate flexibility to fit on the smallest endpoints and platforms.

INTELLIGENT

INTELLIGENT

IoTAS provides insights and intelligence to all activity with GUIs for user administration and analytics. Gain visibility of all data and device activity from forensics and anomalies.

The critical need for effective IoT security

The Internet of Things is growing massively.

Securing billions of IoT devices already deployed is a top concern – everything from home appliances, to insulin pumps, to implanted pacemakers, to sensors deployed throughout manufacturing, to the spectrum of devices out in the wild controlling the power grid, water supply, and other utilities and services essential to daily life.

IoT security should have a flexible design so you can incorporate it into your solution stack, complete security including encryption of data in motion, in use and at rest, and data intelligence to monitor and react to IoT security incidents across your IoT ecosystem.

  • Some 5.5 million new IoT devices come online every day – Gartner estimates that by 2020 the IoT will include more than 20 billion devices.

  • The U.S. Department of Homeland Security recently reported – while the benefits of the IoT are undeniable, so too is the reality that security is not keeping up with the pace of innovation.

  • Roopinder Tara, following the IoT Tech Expo North America in 2016, wrote: DIY is a bad idea – you have to pick an expert to take on IoT, if you are not one already… there are too many fast-moving pieces, each requiring a certain expertise.

What’s New at CENTRI

Device Makers, Choose Your Weapon!

September 21, 2017  |  Grant Asplund There’s a ton of excitement in the embedded industry [...]

Read more posts…

Upcoming Events

9/28/17 – IoT Device Security Summit

IoT Device Security Summit September 28, 2017 - Santa Clara, CA The Internet of Things [...]

Meet us in person…

Technology Deep Dive

The Need for IoT Advanced Security: Why Do-It-Yourself Isn’t Enough for IoT

In the current Wild West of IoT, putting both the right security strategy and solution […]

More free downloads…

CENTRI Video Series

Makeup of a Secure Device Handshake

Mike Mackey, CENTRI CTO and VP of Engineering, explains the components of a secure device handshake. […]

Subscribe & watch…

Schedule a Call

Need more information? We’d be happy to talk with you about your specific IoT issues and how IoTAS might fit with your project.






Call or Chat

Our sales and service team is available weekdays between 8am – 5pm Pacific time. Just give us a call or click the icon in the lower-right corner of your screen to get connected.

Call Us
Main: +1 206.395.2793