Menu

IoT FEATURE NEWS

CENTRI Wins Inaugural IoT Breakthrough Award

By Ken Briodagh January 11, 2017

CENTRI, a provider of advanced security for the Internet of Things, has announced that the IoT Breakthrough Awards has named it as IoT Enterprise Security Platform of the Year in the Industrial and Enterprise IoT category.

The IoT Breakthrough Awards recognizes IoT innovators, leaders and visionaries from around the world in a range of categories, including Connected Home and Home Automation, Connected Car, IoT Security, Wearables, Industrial IoT, M2M, Enterprise IoT and many more. More than 2,000 award nominations from organizations and individuals representing 15 nations were submitted to the awards this year for consideration.

CENTRI Internet of Things Advanced Security, or IoTAS, offers companies looking to secure their IoT devices and data, a complete, developer-friendly solution that meets the unique performance and scale requirements of the IoT. IoTAS is a standards-based security platform, purpose-built for IoT using certificate-less device identity technology and vault-less key management technology.

It solves the security challenge for enterprises as it protects IoT data in the endpoint, across the network and within the cloud. The solution also optimizes data on-the-fly using cache mapping technology resulting in lower latency, less processor capabilities, reduced heat and ultimately longer device uptime. Unlike legacy security tools designed for the anonymous Web, IoTAS delivers a platform that is designed for the trusted, known endpoints of IoT.

“We are thrilled to be recognized by the IoT Breakthrough Awards as the IoT Enterprise Security Platform of the Year,” said Vaughan Emery, CEO and President, CENTRI Technology. “CENTRI IoTAS answers a tremendous need for a purpose-built solution for the Internet of Things that removes the risks associated with build-it-yourself options or alternative products built on legacy technologies that are the wrong fit for IoT security. IoTAS provides device authentication, data encryption and data optimization as well as complete visibility of device and data activities all within a single platform.”




Edited by Alicia Young

Editorial Director

SHARE THIS ARTICLE
Related Articles

IoT Evolution World Week in Review: IBM, Honeywell, Samsung

By: Ken Briodagh    2/25/2017

Hey there, my friends! It's IoT Evolution Week in Review time once again. We've had some big stories and some cool stuff happening here, and it's time…

Read More

IoT Lab for Innovation Announced in Indiana

By: Ken Briodagh    2/23/2017

In a recent announcement, Indiana Governor Eric Holcomb, top tech leaders, higher education partners and Scott Fadness, Mayor of Fishers, said they wi…

Read More

Why Aren't IoT Manufacturers Doing More to Prevent Botnet Attacks?

By: Special Guest    2/23/2017

Malicious hackers seeking out unsecured devices to add to their botnet armies is not new, but the the Internet of Things (IoT) revolution is making th…

Read More

Web 3.0 Revolution: Former FCC Chairman Tom Wheeler Joins Actility Board

By: Ken Briodagh    2/23/2017

Actility, a provider of low power wide area networking (LPWAN), has announced that Tom Wheeler, former chair of the U.S. Federal Communications Commis…

Read More

Honeywell Announces Energy Management, Carbon Reduction Project in Denmark

By: Ken Briodagh    2/23/2017

Honeywell recently announced a major energy management project with Coop Denmark, the country's largest retailer of consumer goods, to help reduce ene…

Read More