Menu

IoT FEATURE NEWS

CENTRI Wins Inaugural IoT Breakthrough Award

By Ken Briodagh January 11, 2017

CENTRI, a provider of advanced security for the Internet of Things, has announced that the IoT Breakthrough Awards has named it as IoT Enterprise Security Platform of the Year in the Industrial and Enterprise IoT category.

The IoT Breakthrough Awards recognizes IoT innovators, leaders and visionaries from around the world in a range of categories, including Connected Home and Home Automation, Connected Car, IoT Security, Wearables, Industrial IoT, M2M, Enterprise IoT and many more. More than 2,000 award nominations from organizations and individuals representing 15 nations were submitted to the awards this year for consideration.

CENTRI Internet of Things Advanced Security, or IoTAS, offers companies looking to secure their IoT devices and data, a complete, developer-friendly solution that meets the unique performance and scale requirements of the IoT. IoTAS is a standards-based security platform, purpose-built for IoT using certificate-less device identity technology and vault-less key management technology.

It solves the security challenge for enterprises as it protects IoT data in the endpoint, across the network and within the cloud. The solution also optimizes data on-the-fly using cache mapping technology resulting in lower latency, less processor capabilities, reduced heat and ultimately longer device uptime. Unlike legacy security tools designed for the anonymous Web, IoTAS delivers a platform that is designed for the trusted, known endpoints of IoT.

“We are thrilled to be recognized by the IoT Breakthrough Awards as the IoT Enterprise Security Platform of the Year,” said Vaughan Emery, CEO and President, CENTRI Technology. “CENTRI IoTAS answers a tremendous need for a purpose-built solution for the Internet of Things that removes the risks associated with build-it-yourself options or alternative products built on legacy technologies that are the wrong fit for IoT security. IoTAS provides device authentication, data encryption and data optimization as well as complete visibility of device and data activities all within a single platform.”




Edited by Alicia Young

Editorial Director

SHARE THIS ARTICLE
Related Articles

IoT Zombie Apocalypse and Post-Quantum Crypto: A Q&A with Infineon's Steve Hanna

By: Paula Bernier    2/23/2018

Steve Hanna has seen it all. But one thing Infineon's senior principal has not seen - and doesn't want to see - is the IoT zombie apocalypse.

Read More

Sustainable Smart Cities and How Natalia Olson-Urtecho Leads with Passion

By: Cynthia S. Artin    2/23/2018

Natalia Olson-­Urtecho is a city planner by education, a technologist by life­long learning, and a visionary strategist in the brave new world of conn…

Read More

IoT Accelerators on the Rise

By: Ken Briodagh    2/22/2018

Everyone in the IoT is looking for the best way to grow the industry, while also finding partners that will help their own companies grow. At the mome…

Read More

IoT for The Aging: You're Never Too Old To Innovate

By: Special Guest    2/22/2018

In the digital era of smarter cities and smarter homes, one of the biggest potential markets for IoT solutions is enabling aging people to remain inde…

Read More

Haltian Delivers Devices and Data to Lindstrom Textile Company

By: Ken Briodagh    2/22/2018

Finnish Internet of Things (IoT) device manufacturer Haltian reportedly is supplying Lindström with more than 100,000 IoT devices and a managed IoT da…

Read More