A hybrid between a centralized and decentralized architecture.
A device to install at your building co-administers your encryption keys.
Every operation is verified by both the central server and the device at your building.
Hacking only one of them doesn't compromise the security.
Your data always encrypted on origin.
We don't have access to your data. Your data belongs to you.
Personal data regulations (GDPR & HIPAA) compliance.
In an extreme case you can even switch off your device and your data in the network is off.
Setup an IoT project easily just following our tutorials.
Complete flexibility for your IoT project. You can integrate any third-party available technology.
Build easily your own gateways with any micro-controller and our software.
Compatibility with any additional IoT platform through open standards.
Start a project for free, then pay by use if you need more resources.