Welcome to our brand new website. Our launch is close so keep an eye here for updates.

Unleash Post-Quantum Encryption

Kinus provides simplified and highly secure communication for manufacturing companies, eliminating the need for device-based keys.

Make security your business advantage

Kinus offers an optimized Post-Quantum Cryptography (PQC) security solution for all (manufacturing) companies that use communication between devices, such as servers and robots. This communication can be both wired or wireless.

This communication is often not secured at all. Where it is the case that it is secured, it concerns asymmetric encryption. The device has the key to read the message that has been sent.

Kinus uses a patented PQC security solution. Two Kinus devices (hardware) are placed, one on the transmitting side and one on the receiving side.
By placing these devices between the transmitter and receiver, no key is present on the equipment itself. The encryption is done entirely on the Kinus devices, which continuously generate new keys. One encrypts every bit of the message, the other translates it back to the original message.

The Kinus devices are easy to install yourself. Maintenance and service are part of the offering.

Enjoy these benefits when you secure your infrastructure with Kinus

Plug and play device: fast & simple setup.
Expand your secured network easily
Monitor your security setup 24/7
Kinus care protects your devices with premium support
Works with all current IT security solutions
Enjoy direct premium support from our specialists

How Kinus shields IT vulnerabilities

In the face of escalating threats to data security and the vulnerability of today's standard cryptographic keys, discover how Kinus offers a pioneering solution to safeguard your sensitive information.

Attackers may attempt to gain unauthorized access to sensitive data stored in the cloud or on premise. This can include customer data, financial records, intellectual property, and more.
Cybercriminals may attempt to steal or extract cryptographic keys used for encryption or digital signatures. This can be done through various means, including exploiting vulnerabilities in key storage systems or using techniques like side-channel attacks.
Kinus uses a patented security solution. Two Kinus devices (hardware) are placed, one on the transmitter side and one on the receiver side. By placing these devices between the transmitter and receiver, no key is present on the equipment itself. The encryption is done entirely on the Kinus devices, which continuously generate new keys.

How Kinus shields IT vulnerabilities

In the face of escalating threats to data security and the vulnerability of today's standard cryptographic keys, discover how Kinus offers a pioneering solution to safeguard your sensitive information.

Attackers may attempt to gain unauthorized access to sensitive data stored in the cloud or on premise. This can include customer data, financial records, intellectual property, and more.
Cybercriminals may attempt to steal or extract cryptographic keys used for encryption or digital signatures. This can be done through various means, including exploiting vulnerabilities in key storage systems or using techniques like side-channel attacks.
Kinus uses a patented security solution. Two Kinus devices (hardware) are placed, one on the transmitter side and one on the receiver side. By placing these devices between the transmitter and receiver, no keyis present on the equipment itself. The encryption is done entirely on the Kinus devices, which continuously generate new keys.

Get in touch for a secure future

To explore the secure way to work, reach out to a Kinus expert. Complete the form below, and we'll be in touch shortly.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.