CENTRI Wins Inaugural IoT Breakthrough Award

By Ken Briodagh January 11, 2017

CENTRI, a provider of advanced security for the Internet of Things, has announced that the IoT Breakthrough Awards has named it as IoT Enterprise Security Platform of the Year in the Industrial and Enterprise IoT category.

The IoT Breakthrough Awards recognizes IoT innovators, leaders and visionaries from around the world in a range of categories, including Connected Home and Home Automation, Connected Car, IoT Security, Wearables, Industrial IoT, M2M, Enterprise IoT and many more. More than 2,000 award nominations from organizations and individuals representing 15 nations were submitted to the awards this year for consideration.

CENTRI Internet of Things Advanced Security, or IoTAS, offers companies looking to secure their IoT devices and data, a complete, developer-friendly solution that meets the unique performance and scale requirements of the IoT. IoTAS is a standards-based security platform, purpose-built for IoT using certificate-less device identity technology and vault-less key management technology.

It solves the security challenge for enterprises as it protects IoT data in the endpoint, across the network and within the cloud. The solution also optimizes data on-the-fly using cache mapping technology resulting in lower latency, less processor capabilities, reduced heat and ultimately longer device uptime. Unlike legacy security tools designed for the anonymous Web, IoTAS delivers a platform that is designed for the trusted, known endpoints of IoT.

“We are thrilled to be recognized by the IoT Breakthrough Awards as the IoT Enterprise Security Platform of the Year,” said Vaughan Emery (News - Alert), CEO and President, CENTRI Technology. “CENTRI IoTAS answers a tremendous need for a purpose-built solution for the Internet of Things that removes the risks associated with build-it-yourself options or alternative products built on legacy technologies that are the wrong fit for IoT security. IoTAS provides device authentication, data encryption and data optimization as well as complete visibility of device and data activities all within a single platform.”




Edited by Alicia Young


Original Page