Not sure on what Connhex version suits you best? Here's a complete side-by-side comparison:
Standard
Enterprise
Authentication
How users can register and sign in.
Automated registration flow through email verification
Check against breached passwords
Besides the minimum safety requirements of length and characters, we also check if the selected password can be found in data breaches.
Username and password
Email verification code
Customized email templates
2-factor authentication (2FA)
Recovery codes
Hardware token
Device Management
Create, register and monitor devices.
Supported devices
10.000
Unlimited
Factory provisioning
Remote initialization
Double-factor device registration
In order for a device to be registered by a user, you can specify two factors (one is typically the serial number). This is done in order to prevent malicious associations.
Back-office admin UI
Device registries and inventory
Issue and revoke certificates
Resources management and historicization
Data ingestion and storage
How data is collected from devices and safely stored.
MQTT(s), HTTP(s), Websockets, CoAP
Retrieval-optimized storage schemas
Dedicated data cluster
Dedicated messages cluster
Messages compression
Timeseries-optimized messages database
Segregated users database
Data retention controller
Mapper (normalization layer)
Connect any device regardless of the message format it uses. Typical use case: connecting legacy devices.
Background export service
Asynchronous data export. Typical use case: creating PDF reports by processing large amounts of data that make synchronous elaboration impossible.
Segregated app data clusters
Users and IAM
Users, Identity and Access Management.
Manageable users
Unlimited
Unlimited
Roles
User-unique policies and permissions
ACL
Users management UI
Teams
Groups of users, that share some common traits or permissions.
Multi-tenancy
Multiple realms
Rules Engine
Apply rules and transform incoming data.
Alarms
Threshold and comparison rules
Time-based processing
Specify the event duration and the window in which it must occur for the rule to be processed.
Events historicization
On trigger, a snapshot of the rule and boundary conditions is stored.
Integration with external data sources
Custom functions execution
Notifications
How your apps can notify users.
Email
Telegram
SMS
Based on Twilio: a separate API key is needed.
Discord
Slack
Firebase Cloud Messaging
A.I.
AI and data analysis.
Time-series forecasting
Anomaly detection
Automated model selection
Periodical re-training, evaluation and re-deployment
Hosting
Hosting and deployment.
On-premise
Cloud
Any provider with a managed Kubernetes service (tested on Google GKE, Amazon EKS and Microsoft AKS).
ISO-27001
ISO-27001 compliant hosting infrastructure.
Custom Domain
Multi-region and high-availability
Auto-scaling
Monitoring
Monitoring, logging and controls.
Automatic monitoring of devices connection status
Infrastructure health monitoring
Per-service customizable logging
Backups
Automated data and messages backups.
Local WAL backup
Rolling window retention
Remote WAL backup
Backup to archiving services (e.g. AWS S3, GCS) or on-premise remote clusters.
Archive service integration
Integrates with cold-storage services to minimize backup archiving costs (e.g GCP Nearline/Coldline/Archive Storage, AWS S3 Glacier).
Security
Devices and infrastructure security.
X.509 SSL certificates with TLS termination
Dedicated certificate for each device
Certificates management and automated renewal
Cryptographically-secure secrets storage
Double device auth
Device segregation
Should one attacker get access to a device’s credentials, it would be limited to publish data impersonating that device - without accessing other devices' data.
Device blacklist
Prevent a device from connecting in case it is compromised.
availability of all successive updates at a discount
support included
Addons
Addons need to be paired with a Connhex Edge license. We charge an additional 20% of the license cost for every addon, so with your current tier it would be an additional 2.40 € each.