How users can register and sign in.
Automated registration flow through email verification
Check against breached passwords
Besides the minimum safety requirements of length and characters, we also check if the selected password can be found in data breaches.
Username and password
Email verification code
Customized email templates
2-factor authentication (2FA)
Create, register and monitor devices.
Double-factor device registration
In order for a device to be registered by a user, you can specify two factors (one is typically the serial number). This is done in order to prevent malicious associations.
Back-office admin UI
Device registries and inventory
Issue and revoke certificates
Resources management and historicization
Data ingestion and storage
How data is collected from devices and safely stored.
MQTT(s), HTTP(s), Websockets, CoAP
Retrieval-optimized storage schemas
Dedicated data cluster
Dedicated messages cluster
Timeseries-optimized messages database
Segregated users database
Data retention controller
Mapper (normalization layer)
Connect any device regardless of the message format it uses. Typical use case: connecting legacy devices.
Background export service
Asynchronous data export. Typical use case: creating PDF reports by processing large amounts of data that make synchronous elaboration impossible.
Segregated app data clusters
Users and IAM
Users, Identity and Access Management.
User-unique policies and permissions
Users management UI
Groups of users, that share some common traits or permissions.
Apply rules and transform incoming data.
Threshold and comparison rules
Specify the event duration and the window in which it must occur for the rule to be processed.
On trigger, a snapshot of the rule and boundary conditions is stored.
Integration with external data sources
Custom functions execution
Background bulk export of collected data.
Multiple format support
Supported file formats: CSV, XLSX, PDF, JSON.
Exported file formatting options
Highly customizable file layout (e.g. map column names and device metrics, specify a target timezone, select a custom filename...)
Time-based data aggregation
Receive exports as attachments
Get notified once an export is completed and receive it via a supported notification method (e.g. Email, Slack, Telegram, Discord, ...).
Automatically export data with a customizable periodicity.
How your apps can notify users.
Based on Twilio: a separate API key is needed.
Firebase Cloud Messaging
How users can pay for products and services.
One-time and recurring payments
Trial periods, discounts and coupons
Credit card, Paypal, bank transfer and more
For a complete list of supported payment methods, see the docs.
Offline payments, reconciliation
Users can buy new products and upgrade their subscriptions without your intervention.
Automated permissions grant on purchase
Configurable product-permissions map
AI and data analysis.
Automated model selection
Periodical re-training, evaluation and re-deployment
Hosting and deployment.
Any provider with a managed Kubernetes service (tested on Google GKE, Amazon EKS and Microsoft AKS).
ISO-27001 compliant hosting infrastructure.
Multi-region and high-availability
Monitoring, logging and controls.
Automatic monitoring of devices connection status
Infrastructure health monitoring
Per-service customizable logging
Automated data and messages backups.
Local WAL backup
Rolling window retention
Remote WAL backup
Backup to archiving services (e.g. AWS S3, GCS) or on-premise remote clusters.
Archive service integration
Integrates with cold-storage services to minimize backup archiving costs (e.g GCP Nearline/Coldline/Archive Storage, AWS S3 Glacier).
Devices and infrastructure security.
X.509 SSL certificates with TLS termination
Dedicated certificate for each device
Certificates management and automated renewal
Cryptographically-secure secrets storage
Double device auth
Should one attacker get access to a device’s credentials, it would be limited to publish data impersonating that device - without accessing other devices' data.
Prevent a device from connecting in case it is compromised.
Support, updates and maintenance.
Security updates and fixes
Preventive anomaly detection
Dedicated support team
On top of your provider of choice’s SLA.