Built at Deutsche Telekom. Proven in production.

Staex began in 2017 inside Deutsche Telekom Innovation Labs — Europe's largest telco. After four years of R&D in secure machine networking, the founding team executed a management buyout in 2021 to bring the technology to market independently.

Full Story →

2017
Started at T-Labs
2021
Independent via management buyout
2026
Cross-border expansion — India, LATAM, UAE
150+
Buses running live in Germany

One system. Machine to agent to production.

Staex is a single stack that turns raw machine data into autonomous action — capturing at the edge, structuring it into cryptographically verified AI-ready streams, and surfacing real-time insights through your dedicated agentic suite. No separate vendors, no glue code, no data leaving your control. Already running on 150+ buses, telecom towers, and drone corridors.

01Capture

SIMs + MCC Protocol stream encrypted machine data from the edge directly to your systems.

02Analyze

Raw signals structured, verified, and surfaced as real-time insights through your dedicated agentic suite.

03Act

Human input, machine companion, optimized results for production.

Recognized by industry leaders.

Four deep-tech awards and active grant programs across Germany, the EU, and global verification networks. Staex is a certified innovation company under the German Federal Research Allowance Act and an active grantee across multiple ecosystem programs.

HederaTrusted us

Milestone-based grant program — testnet and mainnet deployment delivered on schedule.

BSFZ ForschungszulageTrusted us

German Federal R&D certification — Staex recognized as a certified innovation company.

SolanaTrusted us

Verified data integration program — live telemetry flowing through Solana rails today.

ICP (Internet Computer)Trusted us

Vehicle Tracking System built on ICP canisters — proof of concept delivered, progressing to production.

Your data. AI-ready.

Sits on top of the AWS, SAP and SaaS systems you already own. The MCC Protocol turns them into a working agentic suite — cutting operating cost and unlocking new revenue. No lengthy integration project.

Trusted by

Deutsche TelekomSiemensBosch IoTAWSmaze2iabsiswebthreepedia.comDFVShinraiNexaInternet ComputerSolanaCeloU2UHederaDeutsche TelekomSiemensBosch IoTAWSmaze2iabsiswebthreepedia.comDFVShinraiNexaInternet ComputerSolanaCeloU2UHederaDeutsche TelekomSiemensBosch IoTAWSmaze2iabsiswebthreepedia.comDFVShinraiNexaInternet ComputerSolanaCeloU2UHederaDeutsche TelekomSiemensBosch IoTAWSmaze2iabsiswebthreepedia.comDFVShinraiNexaInternet ComputerSolanaCeloU2UHedera

Connect. Monetize. Automate.

Connect

Devices across operations, partners, and customers without months-long integrations.

Monetize

Trusted device data with AI and verified data tools.

Automate

Device management for efficiency and security.

Everything you need to run a better business.

MCC Protocol & M2M Connectivity

End-to-end encrypted machine connectivity with cryptographically verified data integrity. Industrial SIM cards, global coverage, zero-touch provisioning — every packet authenticated, every transmission verified.

190+Countries covered · 256-bit AES encryption

Agentic AI Platform

Predictive maintenance powered by AI agents. Anomaly detection, failure prediction, automated alerts in real time.

85%Faster anomaly detection

AI Vault

Claude integration with encrypted inference. Your data never leaves the vault — AI comes to your data, not the other way around. GDPR-compliant by design.

0 bytesData leaves your infrastructure

The MCC Protocol.

A cryptographically verified communication protocol that encrypts, verifies, and indexes every packet between your devices. No centralized certificate authority. No VPN appliances. No cloud lock-in.

End-to-End Encryption

Every tunnel gets its own keys and protocol. Traffic stays isolated and verifiable — no lateral movement, no broadcast surface.

Cryptographically Verified Integrity

Metadata is anchored on-chain. Every transmission is tamper-proof and auditable — from sensor to dashboard.

Certificate-Based Security by Default

No head/worker differentiation. Every node is equal in the mesh. Replaces VLANs and IP allowlists with true verified-trust architecture.

Built in Rust

Memory-safe, zero-cost abstractions, 10 MiB executable. Runs on everything from Raspberry Pi Zero to cloud VMs. 12,000 nodes bootstrapped in under 30 seconds.

256-bit
AES encryption
~10 MiB
Total executable size

Built for the machines that run your business.

Mobility & Public Transport

Secure fleets of buses, shuttles, and delivery vehicles. Vehicle-signed data, real-time passenger counting, and distributed operator collaboration.

150+Buses connected via MINT

Industrial Manufacturing

Predictive maintenance, anomaly detection, and automated alerts across factory floors. Connect PLCs, sensors, and edge devices — no VPN required.

85%Less unplanned downtime

Telecom & Infrastructure

Tower operators anchor telemetry on-chain and monetize environmental data. Military-grade encryption for drone corridors and critical infrastructure.

100%End-to-end encrypted

Energy & Smart Grid

Secure communication for distributed energy resources. Real-time grid monitoring, metering, and automated demand response across thousands of endpoints.

10×Throughput increase

Drone Corridors & UAV

The world's first verified-data drone delivery corridor. Drones, towers, and landowners paid in real time for the data they generate.

May 2024Live in Berlin

Verified Data & Trusted Device Networks

Purpose-built infrastructure for distributed physical networks. On-chain anchoring, trustworthy device identity, and data monetization at scale.

1M+Transactions/day capacity

AI agents that improve your operations and grow your revenue.

Autonomous agents that sit on top of the systems you already own. They monitor, decide, and act — cutting operating cost and unlocking new services your customers will pay for.

Predictive Maintenance Agent

Continuously monitors equipment health and predicts failures before they happen. Reduces unplanned downtime by up to 85%.

85%Less downtime
Try now →

Data Pipeline Agent

Orchestrates data collection, cleaning, and indexing across your fleet. Auto-scales with your device count.

10×Throughput increase
Try now →

Alert & Response Agent

Intelligent alert routing with context-aware escalation. Integrates with your existing incident management tools.

0Missed critical alerts
Try now →

Performance you can measure.

100%
Customer satisfaction
Every deployment, every quarter
100%
Platform uptime
Since public launch
<10 ms
Data transmission
End-to-end latency
81%+
Cost reduction
vs. legacy M2M connectivity
190+
Countries covered
Global SIM & eSIM reach
12,000
Nodes in 30 seconds
Bootstrap performance
85%
Less downtime
With predictive maintenance
0 bytes
Data leaves your infra
AI Vault — GDPR by design

Built for engineers who ship.

We had 50 SIMs live in under a day. The MCC Protocol gave us encrypted telemetry without touching our existing infrastructure.

Head of IoT Operations
Industrial manufacturing, Germany

AI Vault is what made us say yes. Our compliance team signed off in one meeting because data never leaves our cloud.

CTO
Energy sector, EU

The predictive maintenance alerts caught a compressor failure 6 hours before it would have shut down our line.

Plant Manager
Automotive supply chain

Monetize Your Devices, Securely and Effortlessly.

Whether you're ready to deploy, explore collaboration, or just curious — let's connect.