Discover Safe and Secure
Updates with

Modino is on-prem & private cloud solution which main goal is to provide software updates for IoT devices in a safe and secure way.

Key aspects

Modino values illustration - universal solution

Universal solution

Whether you want to update software on machines, sensors, robots, smart grid or information systems, measuring stations, IP cameras, medical devices, servers, edge cloud infrastructure, or even toys, is able to handle it all.

Modino values illustration - not hardware bound

Not hardware bound

Software delivery is hardware-independent. containers adapt to the target hardware on IoT devices, enabling updates regardless of the specific hardware architecture and configuration. As long as it runs on a Linux operating system, can update it.

Modino values illustration - safe software delivery

Safe software delivery

Atomic updates even in low network throughput environments. Whether you need to update a remote EV charging station or an ATM located in the countryside, is able to deliver reliable updates even with limited network throughput.

Modino values illustration - ensured software application

Ensured software application

With our automatic rollback procedure, your devices will never go offline, even if something goes wrong during the update process.

Security and quality manifesto means safe

atomic updates platform ensures safe software delivery – data to be delivered are created as atomic updates which makes them possible to be send and receive even with low network throughput

automatic rollback

Never be offline again - if the update fails, an automatic rollback procedure starts. The device restores to the previous, stable software version, and is still operational.

regular updates

With a purchased annual license, each client gets regular updates including security, performance patches, and new releases of the system.

modino UI screenshot

Security is our second name.
Or, actually, the first

security and containers is delivered as a set of interconnected OCI containers running in non-privileged mode or when needed with a specifically created security profile. Internally all communication is done via TLS v1.3.


Users are authenticated and authorized like any other system actor with a "zero-trust" policy in mind. User accounts are manageable with a deployed instance of an OpenID Connect service that can be connected with the organization’s user database (e.g. LDAP).

modino agent Agent installed on endpoint devices does not require administrator privileges to run, and leverages TLS mutual authentication to communicate with services.

enrypted containers

Container images with software updates are encrypted and signed with user keys that does not have access to. No personally identifiable information (PII) is stored.

modino graph

Awards & Recognitions



Our team has more than 15+ years of practical experience in cryptography, encryption and software delivery.


Even if your IoT devices are not natively designed to be updated, can do it to keep your business safe.

Monitoring and detection monitors malicious behaviour and provides an active mitigation.


Your data is yours, can't access it since data is encrypted by your keys.