Please check our videos for further understanding of the dashboard and how to get used to it If you need further help please contact our Support team, we will setup a demo session. Property manager approval necessary.
No, not at all. Because we use different protocol to connect these IOT devices to our controller.
Z-wave technology sends and receives plenty of data for smart devices like light bulbs, motion detectors and other small appliances, but devices that send lots of information require the larger capacity of a Wi-Fi network.
Z-wave also beats WiFi in terms of network interference.
Like Bluetooth, WiFi devices compete with one another, so signal strength and network speeds suffer when there are many devices connected. However, WiFi can carry more information.
We offer extremely Competitive price than the industry. Also, it depends on how much unit you have at your property. Please contact sales for further details.
Yes, you can manage multiple properties with one login. Please contact our support team to enroll you and setup your profile for multiple property access.
Yes, you can install our product by yourselves. There are tutorials for self-install. Please remember with self-install product warranty and support warranty would affect. Please check with your sales rep for further questions.
But it is recommended that our professional installers install it with proper labelling, network mapping and programming. These ways it is easier for us to help you in future with any problems with your system.
Our VPN firewall addresses this challenge by providing comprehensive centralized management with specialized, full-featured, rugged appliances suitable for harsh environments and supporting industry-specific SCADA protocols.
We use the same encryption measures as online banking.
End-to-end security on application level (communication using command classes).
In-band network key exchange well-known 128-bit zero temporary key.
Single Network Wide Key.
AES symmetric block cipher algorithm using 128-bit key length.
Secure and non-secure nodes can co-exist in the same network.
No security solution on MAC layer and routing layer.
Non-secure nodes can act as repeaters for secure nodes.