CENTRI | Eliminate IoT Security Risk | Proven Protection from Chip to Cloud 2017-11-10T11:27:23+00:00

Eliminate IoT Security Risk

Proven Protection from Chip to Cloud

Video: Advanced Security for IoT

DIY security fails the test

  • Increased data exposure

  • Patching point solutions

  • Key management issues

  • Device spoofing threat

  • Greater risk

  • No visibility or intelligence

IoT needs purpose-built security

  • Device authentication

  • Simplified key management

  • Data integrity

  • Handles the data spike

  • Speed and efficiency

  • Developer-centric tools

Why Choose CENTRI

“The best IoT security is the one that is the most elegant and the easiest… like CENTRI.”

Head of R&D and IoT Security, Global Contract Manufacturer

CENTRI IoTAS – Internet of Things Advanced Security

COMPLETE

COMPLETE

IoTAS provides complete IoT security from devices to data. IoTAS establishes trusted device integrity, and simultaneously encrypts and compresses IoT data anywhere.

FLEXIBLE

FLEXIBLE

Many IoT endpoints are severely limited with software space. With a 65kB footprint, IoTAS provides ultimate flexibility to fit on the smallest endpoints and platforms.

INTELLIGENT

INTELLIGENT

IoTAS provides insights and intelligence to all activity with GUIs for user administration and analytics. Gain visibility of all security activity from forensics and anomalies.

The critical need for effective IoT security

The Internet of Things is growing massively.

Securing billions of IoT devices already deployed is a top concern – everything from home appliances, to insulin pumps, to implanted pacemakers, to sensors deployed throughout manufacturing, to the spectrum of devices out in the wild controlling the power grid, water supply, and other utilities and services essential to daily life.

IoT security should have a flexible design so you can incorporate it into your solution stack, complete security including encryption of data in motion, in use and at rest, and data intelligence to monitor and react to IoT security incidents across your IoT ecosystem.

  • Some 5.5 million new IoT devices come online every day – Gartner estimates that by 2020 the IoT will include more than 20 billion devices.

  • The U.S. Department of Homeland Security recently reported – while the benefits of the IoT are undeniable, so too is the reality that security is not keeping up with the pace of innovation.

  • Roopinder Tara, following the IoT Tech Expo North America in 2016, wrote: DIY is a bad idea – you have to pick an expert to take on IoT, if you are not one already… there are too many fast-moving pieces, each requiring a certain expertise.

What’s New at CENTRI

CENTRI Supports the Armv8-M architecture and new Platform Security Architecture (PSA) from Arm

CENTRI IoT Advanced Security Solution to Support PSA Upon Availability of Arm Trusted Firmware-M SEATTLE, [...]

Read more posts…

Upcoming Events

10/24-26/17 – ARM TechCon

ARM TechCon October 24-26, 2017 - Santa Clara, CA CENTRI joins embedded systems specialists for [...]

Meet us in person…

Technology Deep Dive

Analyst Report: Frost & Sullivan 2017 Best Practices Award – North American IoT Cyber Security Entrepreneurial Company of the Year

Based on its analysis of the Internet of Things (IoT) cybersecurity market, Frost & Sullivan […]

More free downloads…

CENTRI Video Series

Makeup of a Secure Device Handshake

Mike Mackey, CENTRI CTO and VP of Engineering, explains the components of a secure device handshake. […]

Subscribe & watch…

Schedule a Call

Need more information? We’d be happy to talk with you about your specific IoT issues and how IoTAS might fit with your project.






Call or Chat

Our sales and service team is available weekdays between 8am – 5pm Pacific time. Just give us a call or click the icon in the lower-right corner of your screen to get connected.

Call Us
Main: +1 206.395.2793