Upcoming Webinar: MQTT over QUIC: A New Standard for Connected Vehicles
Upcoming Webinar: MQTT over QUIC: A New Standard for Connected Vehicles
Register Now →

Benifits

Ensure data security based on TLS/SSL

Based on the native TLS/SSL encryption technology, EMQX ensures the data transmission security of client data transmission, message communication between cluster nodes, and enterprise system integrations.

Multiple authentication and permission mechanisms

EMQX supports multiple authentication methods such as username and password, LDAP, JWT, PSK, and X.509 certificate based authentication for per-machine passwords or per-type passwords. EMQX also provides dynamic permission management with different granularity such as single device, grouping device, IP address, and topic, which can be flexibly integrated with the existing authentication/authorisation systems.

Enterprise IT Security

It supports cluster overload protection to limit abnormal clients and network attacks, supports integrated indicator monitoring and alarm system, and realizes seamless security upgrade with unique hot patch and hot upgrade technology.

Compliance and Security

Data privacy protection complies with the EU's GDPR act, with open and transparent code. It is fully responsible for product safety and quality risk management in cooperation with the world's leading security companies.

Capabilities

Out-of-the-box security functions, zero development investment

EMQX implements the authentication development work through simple built-in configuration and realizes various levels of security configuration without coding, which greatly improves the efficiency of operation and development.

Out-of-the-box security functions, zero development investment

Flexible and diverse authentication methods to adapt to more enterprise solutions

It supports multiple authentication methods of HTTP API, JWT, LDAP, X.509 certificates and various databases, provides a more fine-grained security level and permission control scheme, which can be flexibly and seamlessly integrated with the third-party enterprise security system.

Flexible and diverse authentication methods to adapt to more enterprise solutions

Carrier-level product architecture, unique security technology

With the unique hot patch and hot upgrade technology, it supports non-stop vulnerability update and security reinforcement, to minimize the impact of security issues. With perfect overload protection, attack protection, and indicator monitoring capabilities, it can help enterprises find risks in operation in time.

Carrier-level product architecture, unique security technology

Top-level security and compliance, unimpeded global deployment

The products comply with industry and national security certifications. Data privacy protection complies with the EU's GDPR act and meets the overseas regulations and policies for equipment and business. With a set of solutions, it can be deployed unimpeded all over the world.

Top-level security and compliance, unimpeded global deployment