RaimaDB
RaimaDB, an embedded time series database that can be used for Edge and IoT devices, can run in-memory. It is a lightweight, secure, and extremely powerful RDBMS. It has been field tested by more than 20 000 developers around the world and has been deployed in excess of 25 000 000 times.
RaimaDB is a high-performance, cross-platform embedded database optimized for mission-critical applications in industries such as IoT and edge computing. Its lightweight design makes it ideal for resource-constrained environments, supporting both in-memory and persistent storage options. RaimaDB offers flexible data modeling, including traditional relational models and direct relationships through network model sets. With ACID-compliant transactions and advanced indexing methods like B+Tree, Hash Table, R-Tree, and AVL-Tree, it ensures data reliability and efficiency. Built for real-time processing, it incorporates multi-version concurrency control (MVCC) and snapshot isolation, making it a robust solution for applications demanding speed and reliability.
Learn more
HiveMQ
The HiveMQ Platform provides a scalable, reliable data backbone with an event-driven MQTT architecture. Here are a few highlights:
1. MQTT Broker: At the heart of the HiveMQ platform is a fully MQTT-compliant broker purpose-built for fast, reliable, bi-directional data movement between IoT devices and enterprise systems.
2. Edge Data Integration: HiveMQ Edge seamlessly integrates edge data by converting industrial protocols into standardized MQTT, enabling an interoperable IIoT infrastructure.
3. IoT Streaming Governance: Data Hub transforms data in flight, passing only the most relevant, contextualized data to cloud and enterprise systems.
4. UNS & IT/OT convergence Enabler: Commonly used as the backbone for Unified Namespace architectures and seamlessly connects OT devices with IT systems for full visibility and interoperability.
5. Distributed Data Intelligence: HiveMQ Pulse unifies and contextualizes data across the enterprise for smarter decisions exactly where they matter most.
6. Maximum Interoperability: Runs anywhere on-premises or in public or private clouds. Efficiently connects to streaming applications, databases and data lakes with a Java SDK to build your own
7. Scalability to Support Growth: Elastic scaling with automatic data balancing and smart message distribution. Proven benchmark of up to 200M active clients with 1.8B messages/hour
8. Business Critical Reliability: Zero message loss with persistence to disk and offline queuing. No single point of failure due to masterless cluster architecture and zero downtime upgrades
Learn more
BK Software
The rapid growth of the Internet of Things (IoT) introduces an increasingly complex threat landscape. As the number of connected devices continues to surge, it is crucial to establish strong identities as the cornerstone of trust, ensuring that security measures can be effectively implemented and expanded. BK offers a secure root key generation and management solution specifically designed for IoT security, enabling device manufacturers to provide their products with a unique identity generated internally, eliminating the need for expensive, security-focused silicon. Serving as a software implementation of SRAM PUF, BK stands out as the only hardware entropy source that can be integrated without requiring changes during silicon fabrication. This flexibility allows for its installation further along the supply chain and even enables retrofitting on devices that are already in use. Such capabilities facilitate an unprecedented remote implementation of a hardware root of trust, laying a solid foundation for scaling IoT infrastructure to accommodate billions of devices while maintaining security integrity. Consequently, BK not only addresses current security challenges but also positions the IoT ecosystem for sustainable growth in the future.
Learn more
Intrinsic ID
Intrinsic ID stands out as the premier digital authentication firm globally, delivering hardware-based root-of-trust security for the Internet of Things through unique, unclonable identities for various IoT-connected devices. Leveraging the patented SRAM PUF technology, their security solutions can be seamlessly integrated into either hardware or software environments. The security offerings from Intrinsic ID can be applied at any phase of a product’s lifecycle, serving critical roles in validating payment systems, securing connectivity, authenticating sensors, and safeguarding sensitive systems used by governments and military sectors. With their technology now implemented in over 150 million devices, the company has garnered numerous accolades, including the Cyber Defense Magazine InfoSec Award, the IoT Breakthrough Award, and the IoT Security Excellence Award, among others. Additionally, Intrinsic ID's security solutions have been validated in millions of devices that meet the stringent standards of Common Criteria, EMVCo, Visa, and various governmental entities, solidifying their reputation in the industry. Their ongoing commitment to innovation and security continues to drive advancements in the field of digital authentication.
Learn more