ALARM SYSTEMS ETA BETA IN CLOUD
The new technologies of communication for mobile devices, make it necessary connectivity between intrusion detection systems for remote monitoring and control of one or more systems simultaneously. Thanks to cloud technology, developed in-house by Eta Beta, allows you to enjoy a variety of services, simplified user interface, it's dedicated hardware, and you will be able to program the system or to handle it. Everything is managed externally outsourced and made free to the end user.
The CLOUD Eta Beta enables the complete management and control of their security system and/or home automation, providing an immediate response speed, a double-balanced computing power for each user in order to don't create ever bottlenecks; scale allowing the hierarchy of access and the operations of other utilities added; safe because it adopts an encrypted tunnel only to authorized devices; continuity of service in case of hardware failure or natural disaster; redundancy of the system, replicating information instantaneously from one machine to another without leaving any inconvenience to the customer.
Thanks to the plug & play of cards Hicon and HSL, via the cloud users can disarm, enter in whole or in part the alarm system, view the status of the sensors, excluding some sensors, see the alarm memory, the log of the users, manage the living comfort, select notifications. All data between the alarm system / home automation installed are transferred in real time, so that any change of status or event detected will update in real time at your smartphone, tablet or any other device used remotely. The advantage of these system is to wire the system without the need to configure anything on them, and in an instant the whole project will be available to users on the cloud.
Once you have registered your credentials on the cloud, the user will use a web interface with which you can manage your system by entering, your login and password for access to the cloud and the 5-digit code to disarm the system alarm. The username, the password and the alarm cose authentication are in the cloud encryption system.