Applications

System configuration management

The system configuration is the sum of all individual assets in a system.
Therefore, a change in a system component (asset) will result in a detected and updated system configuration.

  • Actual system configuration available at all time
  • System configuration online available
  • Higher serviceability
  • Better uptime due to lower MTBI/MTTR

 

Safe and secure – no matter what application

We provide a universal authentication platform for any connective device.

Today, cyber-attacks are a real concern. We believe in restoring trust and piece of mind in an ever-changing and expanding Internet-of-Things.

We have created a unique solution that can be applied universally to any connective device within the Internet-of-Things. It combines the best of both worlds: a secure cloud platform linked to a token physically attached to the device.

CyberRock

The secure cloud platform providing state-of-the-art cyber security and required software services.

  • Generates, assigns, and issues unique identities for hardware tokens
  • Validates authentication requests from tokens in de field.
  • State-of-the Art cyber-security
  • Infinitely scalable

Find out more

Physically Unique ID

An immutable, hardwired, token that cannot be hacked.

  • A small IC that can be attached on the end-node of any IoT device
  • Immutable and extremely robust
  • Unique codes that are hard-coded on the IC using patented SandGrain technology
  • Communicates with CyberRock for authentication.

Find out more