Detect critical security gaps in your devices before purchase
and throughout their lifecycle.

These companies and many others rely on IoT Inspector:

IoT devices - The blind spot in your enterprise security

67% of all organizations have experienced security incidents related to IoT devices. Yet, there are often insufficient protective measures in place in this area. The reasons:

Lack of awareness of the security issues associated with IoT devices

of the threat

Lack of
possible solutions

Too costly implementation
of security processes

High resource

Dependence on "security promises" from external parties (vendors, etc.)

High costs

Using ONEKEY, you can act now and automate your IIoT/IoT/OT security analytics. Fully integrated into your business processes, or we can perform them for you on your behalf.

The result: you get a clear overview of the security of your connected devices or IoT infrastructure, including recommendations for action.

ONEKEY makes security & compliance transparent
and visible:

Critical vulnerabilities in IIoT/IoT/OT devices immediately visible

Digital-twin analysis, no physical device access or network connection

Transparent software bill of materials (SBOM)

Direct reference to known vulnerabilities (Common Vulnerabilities /

Detects hard-coded passwords

Deep cryptographic analysis

compliance to international standards

Security is a process, not a state

Seamless integration into your existing purchasing processes, security
audits and incident management systems ensures sustainable results and
thus supports your “Continuous Improvement Process”.

ONEKEY supports your “Continuous Improvement Cycle” by seamless integration into your existing procurement process, security audits and incident management systems to ensure sustainable results at minimum efforts..

The result: you acquire and operate only verified, high-quality IoT software – for every device.

Reduce procurement and operational risks by full software supply chain transparency and automated SBOMs within your procurement and auditing process. You will identify and avoid products with critical vulnerabilities and receive auto-alerts about vulnerabilities affecting your important infrastructure and production.

Continuous twin digital monitoring

ONEKEY monitors 24/7/365 all uploaded firmware daily on new vulnerabilities

Full integration with your existing processes and tools:


automated deployment (upload) of each (newly delivered) IoT/OT
firmware version to IoT Inspector


automatic analysis
by IoT Inspector


automatic delivery of results to your IT Security Audit / Incident Management environment

The result: Fully automated security and compliance testing ensures sustainable quality

Your benefits when using IoT Inspector:

You can concentrate entirely on your core competencies. We help you achieve
maximum protection with minimum effort:


safety analyses in /
just a few minutes

Saving of (human) capital/ resources

Critical resources, such as security experts and pentesters, are sustainably relieved by automatic checks.

Ready for action 24/7 at any time

You decide when to have which devices analyzed – and don’t have to depend on pentester availability.

100% reliable analyses

ONEKEY guarantees you consistent quality


You no longer have to rely on security promises from vendors or manufacturers – you can see for yourself the security quality of the equipment


Hiring a pentester for every new update to all your IoT devices is unrealistic. IoT-Inspector enables you to perform highly scalable, unlimited security analysis – no matter how many devices and updates.

Permanent improvement in safety

Gradually test your inventory devices and continuously optimize your security.

Safety from
the beginning

Your enterprise protection starts with the purchase of new IoT devices. With ONEKEY, security analysis BEFORE purchase becomes an automatic implementation process.

Free initial analysis of your IoT devices

Exclusively for companies and government agencies, we offer a free
analysis of your firmware:


SetUp Your Analysis

To ensure perfect results for your initial analysis, we will have a first short meeting. Here we will check your requirements, expectations, and further schedule.


Here, we will be able to discuss potential benefits and how ONEKEY can help you
to optimize your security & compliance testing processes, increase transparency through automated SBOMs and to reduce your effort and costs.


Your Free Analysis & SBOM – Joint Session With Experts

Following to the SetUp and the firmware provided, we will carry out a full security & compliance analysis, including an automated SBOM (Software Bill of Materials).


The results will be presented to you by a security expert in a joint online session, including samples of mitigation advice for selected and found vulnerabilities. You will receive a copy of the report or online access for your own internal review.


Review & Decision

After successful analysis and your internal review, we will discuss jointly the results, your feedback and potential steps moving forward.



Here, we will have the joint opportunity to outline the advantages of automated security & compliance for your products to ensure confidence for your development team.


ONEKEY (aka IoT Inspector) is the leading European firmware analysis platform and available worldwide. The core technology had been developed by world-leading pen-testing experts and has been continuously enhanced since then.
ONEKEY is available as Software-as-a-Service (SaaS), or onPremise for automated security and compliance analysis of connected devices and embedded systems, running IoT/IIoT/OT firmware. ONEKEY does not need any source code, network or physical device access.
The platform provides full supply chain transparency through automated Software Bill Of Materials (SBOM), deep security and compliance analysis and product lifetime monitoring, including 24/7 auto-alerts for new vulnerabilities. ONEKEY platform provides a powerful API for deep process tools integration and an easy-to-use browser interface.
ONEKEY’s security experts are available for implementation, API integration and consultation on your current product security process.