Teserakt's E4 is the first and only end-to-end encryption and key management solution for machine-to-machine messaging protocols. E4 is optimized for MQTT, the most popular machine-to-machine protocol, supported by all leading cloud platforms.
E4's encryption allows you to transmit sensitive data without worrying about the message relay server security. Your messages remain secret even if the relay server is compromised by an insider or remote attacker.
E4's key management eliminates the need for complex PKIs and provides greater security and flexibility, thanks to our capability to automatically enforce custom key rotation policies.
Adding E4 security to your IoT protocol does not incure any performance hit, nor extra network latency. A single instance of the E4 back-end server can support millions of devices.
Teserakt AG is an international company co-founded in 2018 in Switzerland by noted cryptographer JP Aumasson and serial entrepreneur Alan Duric.
We want to make strong encryption the default for IoT and machine-to-machine communications.
We rely on our experience building secure communication software and industrial cryptography systems. Security protocols and algorithms that we designed are now deployed in millions of devices, and some have become international standards.
We have customers in diverse sectors, such as aerospace and law enforcement technology.
Cryptography is our core expertise. We designed algorithms now used in the Linux kernel and Apple devices.
We design secure software. A security product should improve your security posture, not diminish it.
No bells and whistles. We are not ashamed to say that our solution is simple and only supports a handful of parameters.
"Complexity is the enemy of security" is cliché but true.
Many security companies prioritize marketing over engineering and security. We don't.
No superlatives such as "military-grade", no claims of using machine learning when we don't use it.
Our open-source repositories:
To learn more about MQTT and its security, we recommend the following external resources: