The IoT Security Layer · E4

E4 lets you deploy strong data protection that works on all platforms and scales to millions of devices.

E4 simplifies and automates key management, eliminating the cost and risk of traditional PKIs.

UI
CLI

E4: Security Designed for IoT

HIGHEST SECURITY. Data secrecy and integrity is protected end-to-end, with different keys for different data type.

DYNAMIC KEY SERVER. Key management is the biggest pain with encryption. We solve it thanks to a simple interface and APIs and key distribution automation.

MAXIMIZED PERFORMANCE. E4 is faster and smaller than any competing solution. We minimize resources usage and bandwidth costs thanks to meticulous design choices.

SIMPLIFIED INTEGRATION. Agentless and lightweight, the E4 client library works on all platforms. E4 requires no change to your IoT network or message brokers.

COMPLIANCE AND DATA CONTROL. Use any cloud or third-party servers without having to worry about data security, since your data is protected end-to-end.

MULTI-PLATFORM. E4 is optimized for MQTT, and compatible with the IoT platforms of AWS, Azure, Google, and IBM, and works with many other protocols (HTTP, Kafka, AMQP, RabbitMQ, etc.).

Fully open-source

E4's library and server are available for free (under APLv2 license) to protect data with managed keys over MQTT networks. Please contact us if you require integration or operation support.


Client library

End-to-end cryptographic protection
Go and C language versions
Symmetric key and public-key modes
Command-line client software
Transport protocol-agnostic
Unlimited per-topic keys

Key server

Remote key distribution and rotation
Web console, command-line interface
APIs (HTTP/JSON, gRPC/protobuf)
Automation of key rotation policies
Compliance and security monitoring
Encrypted database records

Use Cases

E4 supports both "many-to-one" and "many-to-many" IoT architectures, and is suitable for various applications such as automotive, smart city/building, healthcare, or access control.

Many to many Many to one

Examples of applications of E4 include:

SECURE UPDATES. Remotely provision new software or configurations without risks of replay of sabotage.

PRIVACY-PRESERVING APPLICATIONS. Personally identifiable information or other privacy-sensitive data is protected against eavesdropping and surveillance.

ENCRYPTED REMOTE STORAGE. Access and copy sensitive data in large filesystems or databases from any IoT device, for secure sharing, back-up, or just work around IoT platforms' limited memory.

ON-PREM TO CLOUD TRANSITION. Migrating to a cloud model and need to keep full data control, for privacy or regulatory compliance? E4 helps you get the best of both models.


About

Teserakt was founded in September 2018 in Lausanne, Switzerland, and is an internationally recognized company, that was notably featured in Wired.

Teserakt's team is composed of senior persons with experience on globally impactful projects, and whose previous engineering work is now used in the Linux kernel and in Google software:

  • JP Aumasson, Founder & CEO – Lausanne, Switzerland
  • Antony Vennard, Chief Engineer – Lausanne, Switzerland
  • Flavien Binet – Chief Architect – Luxembourg
  • Emmanuel Odeke, Technical Advisor – Palo Alto, CA, USA

Please don't hesitate to get in touch for any question:  [email protected]