Citrix buys Octoblu

Citrix buys Octoblu

Octoblu is a pioneer in real-time connections and communications management across systems, people and physical devices. The company is a member of the AllSeen Alliance, a nonprofit open source consortium dedicated to driving the widespread adoption of products, systems and services that support the Internet of Everything. Octoblu was founded in early 2014 and was acquired by Citrix in December 2014.

Octoblu easily connect devices, people and systems to a powerful coordination and communications platform. Using Octoblu products, customers are offered numerous methods of connecting people, devices, applications and public and private clouds. These connections can be via direct wired connection, through wireless or Bluetooth Low Energy (BLE) or through API’s. Their cloud solution offers you the option of connecting via our public IoT cloud(s), using a locally deployed private IoT cloud(s) or using a hybrid of public and private services. To ease the connection of your “things” their Microblu Operating System (MOS) can deploy a full cloud on a device with less than 30k of memory.

Octoblu includes built in, customizable tools for rich and deep analytics. All sensor data, device message and API transactions are streamed into Splunk and ElasticSearch running in their cloud. A BigData analytics interface is available for custom user queries and this data can be streamed to the customer data stores in real-time. As part of the dashboard, charts will display the individual node activity metrics. Furthermore, the Splunk and ElasticSearch API’s can be leveraged within the flows to drive an event(s) or provide the ability for machine learning, allowing the system to become autonomous in nature.

Wrapping all these services together is a security package that is unparalleled in the market.

  • Wildcard TLS certificates secure all protocols in transit
  • Message payloads can be encrypted by customer
  • Runtime processes are sandboxed by flows
  • APIs require UUID & Token for all requests
  • Security permissions are managed by UUIDs
  • Devices can be Discovered, Messaged, Subscribed to, & Configured based on security permissions
  • Each UUID has whitelist & blacklist arrays of other UUIDs for each level of permission