Menu

IoT FEATURE NEWS

CENTRI Wins Inaugural IoT Breakthrough Award

By Ken Briodagh January 11, 2017

CENTRI, a provider of advanced security for the Internet of Things, has announced that the IoT Breakthrough Awards has named it as IoT Enterprise Security Platform of the Year in the Industrial and Enterprise IoT category.

The IoT Breakthrough Awards recognizes IoT innovators, leaders and visionaries from around the world in a range of categories, including Connected Home and Home Automation, Connected Car, IoT Security, Wearables, Industrial IoT, M2M, Enterprise IoT and many more. More than 2,000 award nominations from organizations and individuals representing 15 nations were submitted to the awards this year for consideration.

CENTRI Internet of Things Advanced Security, or IoTAS, offers companies looking to secure their IoT devices and data, a complete, developer-friendly solution that meets the unique performance and scale requirements of the IoT. IoTAS is a standards-based security platform, purpose-built for IoT using certificate-less device identity technology and vault-less key management technology.

It solves the security challenge for enterprises as it protects IoT data in the endpoint, across the network and within the cloud. The solution also optimizes data on-the-fly using cache mapping technology resulting in lower latency, less processor capabilities, reduced heat and ultimately longer device uptime. Unlike legacy security tools designed for the anonymous Web, IoTAS delivers a platform that is designed for the trusted, known endpoints of IoT.

“We are thrilled to be recognized by the IoT Breakthrough Awards as the IoT Enterprise Security Platform of the Year,” said Vaughan Emery, CEO and President, CENTRI Technology. “CENTRI IoTAS answers a tremendous need for a purpose-built solution for the Internet of Things that removes the risks associated with build-it-yourself options or alternative products built on legacy technologies that are the wrong fit for IoT security. IoTAS provides device authentication, data encryption and data optimization as well as complete visibility of device and data activities all within a single platform.”




Edited by Alicia Young

Editorial Director

SHARE THIS ARTICLE
Related Articles

IoT Evolution Expo: Wrap up

By: Ken Briodagh    7/20/2017

We've just concluded the IoT Evolution Expo at Caesars Palace in Las Vegas and it's been an incredible event.

Read More

The Best of the Best: IoT Evolution Names Best in Show

By: Ken Briodagh    7/20/2017

The editors of IoT Evolution World announce the winners of the Best in Show awards from the IoT Evolution Expo

Read More

IoT Evolution Expo Day 2 Recap

By: Ken Briodagh    7/19/2017

Hello again, my friends. This is another dispatch from the front line at the IoT Evolution Expo, where Tuesday, day two, brought us insights on Smart …

Read More

IoT Time Podcast S.2 Ep.40 IoT Evolution Expo

By: Ken Briodagh    7/18/2017

In this special live episode from the IoT Evolution Expo, Ken Briodagh sits himself down to talk at you about some of the awesome stuff going on at th…

Read More

IoT Evolution Expo Day One Recap

By: Ken Briodagh    7/18/2017

We had an incredible first day here at IoT Evolution Expo. It was 113 degrees out on the strip in Las Vegas, but we were full of nothing but icy cool …

Read More