View

Sorting

Products found: 1

logo
Offer a reference bonus
0.00

Centri Protected Sessions

Secure your IoT data from creation to consumption, through every mile along the way. Protected Sessions changes the game by giving you data security for bi-directional communications while freeing you from the limitations of multiple network protocols and a mixed IoT topology. Session lifecycles are IoT-friendly by design – by working within the constraints of low-power MCU devices using low-power networks that may have intermittent network access, Protected Sessions can maintain the security of your communications channel through lifespans from seconds to months! Using heavyweight industry-standard encryption, CENTRI Protected Sessions is optimized for lightweight devices with data compression and a tiny footprint, providing both security and efficiency between the endpoint device and the back of the cloud. Features: Secure Data on Your Endpoint Device Low power, small devices, even without TCP/IP stacks – Protected Sessions keeps your data secured within any communications environment. Data can be protected immediately following creation before it even hits the first network leg. True first mile security. Secure Transmission Within Communications Channel Regardless of which network(s) exist in-between your IoT device and application server, your data is protected both in transit and while it is being transferred between networks at gateways, mid-points and compute engines. True every mile security for the entire journey. Secure Delivery Inside Your Application Server Data is decrypted and decompressed in the CENTRI library that resides inside your application server. No unencrypted data goes across any network link – not even the loopback on your server! True last mile security. Advantages of Protected Sessions Every Mile Security Protected Sessions secures bi-directional communications between your IoT devices and your application server/cloud. Keep your data safe while it is in transition through gateways, compute engines, and midpoint/fog devices in-between encrypted network segments. Network Agnostic Runs across ANY network or combination of different networks/protocols. And because it only requires integration at the two ends, the device and the application server, you can change out network topologies without re-coding your Protected Sessions implementation. IoT-Sized Small footprint libraries and session lifecycles that fit the unique requirements of IoT devices and networks with intermittent connectivity. Set your session length to seconds, minutes, hours, days, months, or even the total number of data transmissions – flexible variables coupled with low-latency help extend battery life. For IoT Developers Simple, straight forward security. Endpoint libraries for your embedded device and session manager libraries for your application server provide flexible, easy-to-use, consistent interfaces in multiple C-based languages.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
2
3

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.