Menu

IoT FEATURE NEWS

CENTRI Wins Inaugural IoT Breakthrough Award

By Ken Briodagh January 11, 2017

CENTRI, a provider of advanced security for the Internet of Things, has announced that the IoT Breakthrough Awards has named it as IoT Enterprise Security Platform of the Year in the Industrial and Enterprise IoT category.

The IoT Breakthrough Awards recognizes IoT innovators, leaders and visionaries from around the world in a range of categories, including Connected Home and Home Automation, Connected Car, IoT Security, Wearables, Industrial IoT, M2M, Enterprise IoT and many more. More than 2,000 award nominations from organizations and individuals representing 15 nations were submitted to the awards this year for consideration.

CENTRI Internet of Things Advanced Security, or IoTAS, offers companies looking to secure their IoT devices and data, a complete, developer-friendly solution that meets the unique performance and scale requirements of the IoT. IoTAS is a standards-based security platform, purpose-built for IoT using certificate-less device identity technology and vault-less key management technology.

It solves the security challenge for enterprises as it protects IoT data in the endpoint, across the network and within the cloud. The solution also optimizes data on-the-fly using cache mapping technology resulting in lower latency, less processor capabilities, reduced heat and ultimately longer device uptime. Unlike legacy security tools designed for the anonymous Web, IoTAS delivers a platform that is designed for the trusted, known endpoints of IoT.

“We are thrilled to be recognized by the IoT Breakthrough Awards as the IoT Enterprise Security Platform of the Year,” said Vaughan Emery, CEO and President, CENTRI Technology. “CENTRI IoTAS answers a tremendous need for a purpose-built solution for the Internet of Things that removes the risks associated with build-it-yourself options or alternative products built on legacy technologies that are the wrong fit for IoT security. IoTAS provides device authentication, data encryption and data optimization as well as complete visibility of device and data activities all within a single platform.”




Edited by Alicia Young

Editorial Director

SHARE THIS ARTICLE
Related Articles

Pros and Cons of IoT: Why Some Businesses Are Slow to Adopt

By: Special Guest    9/22/2017

Why won't business leaders recognize the boons of IoT and bring IoT devices into the workplace? The answer seems to be: Speed.

Read More

IoT Evolution Health: Areta Health in South Africa to Use Medsphere Healthcare Solutions

By: Ken Briodagh    9/22/2017

Network of Areta Specialist Day Hospitals supported by remote clinics and in-home monitoring brings Medsphere's EHR and services to the African contin…

Read More

Marc Brungger Joins Tourmaline Labs as CEO

By: Ken Briodagh    9/21/2017

Twenty-year telematics and technology industry veteran and former CEO of Spireon to lead Tourmaline Labs, driving behavior and artificial intelligence…

Read More

IoT Time Podcast S.2 Ep. 48 Dialexa

By: Ken Briodagh    9/21/2017

In this episode of IoT Time Podcast, Ken Briodagh sits down with Scott Harper, CEO, Dialexa (dialexa.com).

Read More

Aruba Modernizes Network Security Reduce Risk for Mobile, Cloud, and IoT

By: Ken Briodagh    9/20/2017

Aruba 360 Secure Fabric delivers new analytics-driven, advanced cyber protection with continued innovation in UEBA to simplify enterprise security

Read More