Applications
System configuration management
The system configuration is the sum of all individual assets in a system.
Therefore, a change in a system component (asset) will result in a detected and updated system configuration.
- Actual system configuration available at all time
- System configuration online available
- Higher serviceability
- Better uptime due to lower MTBI/MTTR
Safe and secure – no matter what application
We provide a universal authentication platform for any connective device.
Today, cyber-attacks are a real concern. We believe in restoring trust and piece of mind in an ever-changing and expanding Internet-of-Things.
We have created a unique solution that can be applied universally to any connective device within the Internet-of-Things. It combines the best of both worlds: a secure cloud platform linked to a token physically attached to the device.
CyberRock
The secure cloud platform providing state-of-the-art cyber security and required software services.
- Generates, assigns, and issues unique identities for hardware tokens
- Validates authentication requests from tokens in de field.
- State-of-the Art cyber-security
- Infinitely scalable
Find out more
Physically Unique ID
An immutable, hardwired, token that cannot be hacked.
- A small IC that can be attached on the end-node of any IoT device
- Immutable and extremely robust
- Unique codes that are hard-coded on the IC using patented SandGrain technology
- Communicates with CyberRock for authentication.
Find out more