Sélectionner une page

Encrypt IoT.

Security    Clarity    No-BS

E4 — Securing MQTT

E4 is the first and only end-to-end encryption solution for MQTT, the most popular machine-to-machine protocol.

We solve the hardest problem of MQTT encryption: key management. With E4, you can remotely manage keys of millions of devices with no performance hit (no extra network round-trip, 24-byte per-packet overhead).

E4 is compatible with leading IoT cloud platforms: AWS IoT Core , Azure IoT Hub, and Google Cloud IoT Core.

Seamless integration

Minimal software library running between transport layer and business logic

Server deployed as containerized application or virtual appliance

No change to the broker required

End-to-end security

All messages are encrypted, authenticated, protected against replay and spoofing

Protects against malicious or compromised broker servers and infrastructure

Safe against quantum computing

Key management server

Zero-touch automation of key rotation policies for 1-to-1 or N-to-M topologies

Live analytics, anomaly detection, and monitoring service

Web UI, REST, and gRPC interfaces



We want to make encryption a standard for IoT, in the same way that it is now a standard for mobile messaging.

Teserakt AG is an international company incorporated in Switzerland, co-founded in 2018 by JP Aumasson. 
Our HQ is in Lausanne, Switzerland, and we also have staff is based in Croatia and UK.

We have experience with industrial cryptographic systems, have designed security protocols and algorithms deployed in millions of devices, and have contributed to several international standards.

Current customers include companies in diverse sectors, such as aerospace and law enforcement technology. 


Secure software and cryptography is our core expertise—we designed algorithms now used in the Linux kernel and Apple devices.

A security product should improve your security posture, not diminish it through vulnerable applications and the illusion of security.


No bells and whistles; we are not ashamed to say that our solution is simple and only supports a handful of parameters.

A large part of our software is written in Go, which helps maintaining a clear codebase and lean architecture.

« Complexity is the enemy of security » is cliché but true.


Too many security companies prioritize marketing over engineering and security. We don’t.

Instead of superlatives and stock photos, we prefer technical facts and convincing proof-of-concept deployments.

No « military-grade » here, no claims of using « AI » if we don’t.

Reliable Partner

An all-in-one payments partner

Lorem ipsum dolor sit amet, vix an natum labitur eleifend, mel amet a laoreet menandri. Ei justo complectitur duo. Ei mundi solet ut soletu mel possit quo. Sea cu justo laudem.