We want Connhex to be perfectly tailored to your requirements: that's why we offer a free 1-hour consultation, to understand your company's IoT needs.You can also simply request a custom quote.
Not sure where to start? These are quite typical configurations:
Experiment
Production
Mission Critical
Authentication
How users can register and sign in.
Automated registration flow through email verification
Username and password
Email verification code
Check against breached passwords
Besides the minimum safety requirements of length and characters, we also check if the selected password can be found in data breaches.
Customized email templates
Guest users
Single sign-on (SSO)
2-factor authentication (2FA)
Recovery codes
Hardware token
Devices
Manifacture, register and monitor devices.
Supported devices
2.000
20.000
Unlimited
Factory provisioning
Remote initialization
Manufacturing information management
Back-office admin UI
Device registries and inventory
Issue and revoke certificates
Custom manufacturing fields
SnapLink connection
Data ingestion and storage
How data is collected from devices and safely stored.
MQTT(s), HTTP(s), Websockets, CoAP
Retrieval-optimized storage schemas
Dedicated data cluster
Dedicated messages cluster
Timeseries-optimized messages database
Segregated users database
Messages compression
Background export service integration
Asynchronous data export. Typical use case: creating PDF reports by processing large amounts of data that make synchronous elaboration impossible.
Data retention controller
Mapper (normalization layer)
Connect any device regardless of the message format it uses. Typical use case: connecting legacy devices.
Segregated app data clusters
Resources
Create and manage resources.
Resources management
Resources relationships historicization
Client modules
UI components to speed up your frontend development process. For further information, check out the docs.
Double-factor device registration
In order for a device to be registered by a user, you can specify two factors (one is typically the serial number).
Users and IAM
Users, Identity and Access Management.
Manageable users
1.000
5.000
Unlimited
Roles
User-unique policies and permissions
Users management UI
ACL
Teams
Groups of users, that share some common traits or permissions.
Multi-tenancy
Multiple realms
Rules Engine
Apply rules and transform incoming data.
Alarms
Threshold and comparison rules
Time-based processing
Specify the event duration and the window in which it must occur for the rule to be processed.
Delta rules
Create rules based on how fast a given metric changes over time.
Events historicization
On trigger, a snapshot of the rule and boundary conditions is stored.
Integration with external data sources
Custom functions execution
Exporter
Background bulk export system.
Multiple format support
Supported file formats: CSV, XLSX, PDF, JSON.
Receive exports as attachments
Get notified once an export is completed and receive it via a supported notification method (e.g. Email, Slack, Telegram, Discord, ...).
Exported file formatting options
Highly customizable file layout (e.g. map column names and device metrics, specify a target timezone, select a custom filename...)
Resources export
Time-based data aggregation
Recurring exports
Automatically export data with a customizable periodicity.
Notifications
How your apps can notify users.
Email
SMS
Based on Twilio: a separate API key is needed.
Telegram
Discord
Slack
Firebase Cloud Messaging
Microsoft Teams
Payments
How users can pay for products and services.
One-time and recurring payments
Trial periods, discounts and coupons
Credit card, Paypal, bank transfer and more
For a complete list of supported payment methods, see the docs.
Offline payments, reconciliation
Customer portal
Users can buy new products and upgrade their subscriptions without your intervention.
Automated permissions grant on purchase
Configurable product-permissions map
Through Connhex Control.
A.I.
AI and data analysis.
Compatible with Connhex AI Lightweight
Compatible with Connhex AI Full
Connhex Copilot
Hosting
Hosting and deployment.
On-premise
Cloud
Any provider with a managed Kubernetes service (tested on Google GKE, Amazon EKS and Microsoft AKS).
ISO-27001
ISO-27001 compliant hosting infrastructure.
Custom Domain
Multi-region and high-availability
Auto-scaling
Monitoring
Monitoring, logging and controls.
Automatic monitoring of devices connection status
Infrastructure health monitoring
Per-service customizable logging
Cloud bill minimizer
Continuous assessment of cloud bills and dynamic infrastructure tuning, to minimize hosting fees.
Backups
Automated data and messages backups.
Local WAL backup
Rolling window retention
Remote WAL backup
Backup to archiving services (e.g. AWS S3, GCS) or on-premise remote clusters.
Archive service integration
Integrates with cold-storage services to minimize backup archiving costs (e.g GCP Nearline/Coldline/Archive Storage, AWS S3 Glacier).
Security
Devices and infrastructure security.
X.509 SSL certificates with TLS termination
Dedicated certificate for each device
Certificates management and automated renewal
Cryptographically-secure secrets storage
Double device auth
Device segregation
Should one attacker get access to a device’s credentials, it would be limited to publish data impersonating that device - without accessing other devices' data.
Device blacklist
Prevent a device from connecting in case it is compromised.
Support
Support, updates and maintenance.
Email
Security updates and fixes
Feature updates
Phone
Continuous monitoring
Jump-start pack
Up to 10 hours per year of consulting to support your IoT journey. Split in one hour blocks, without carry-over to following years.