Service + operation

Support becomes added value

We ensure ongoing operation with comprehensive services. We implement every step systematically and reliably: From setting up the IoT platform to data management incl. the comprehensive visualization of the collected IoT data.

Smart Operations ensure that all elements are optimally integrated into your system environment and that the entire IoT process chain functions smoothly. Process control, updates, invoice management and data security: this saves our customers time and money.

Process control

Automated & reliable

Our customers can rely on every point within the complex IoT process chain to run absolutely silently and error-free. With our comprehensive know-how, we take care of browser-based process control and monitoring.

We keep an eye on every area: Embedded SIM-CHIP management, setup and control of the data rulebook, message management, NFC chip management, dashboard builder & action builder, error management and abuse control, automated contract control, volume monitoring. And we secure all steps with a comprehensive IoT security concept for data security.

Updates

Safety Over-The-Air

The best method against security vulnerabilities: Hardware updates over-the-air and automated software updates in the sense of continuous integration. This is how we optimally protect the infrastructure of an IoT project. Updates provide new functions and important patches. In this way, we actively prevent IoT devices from becoming obsolete and posing a risk for our customers.

Strict control and restriction of user rights in the course of updates is mandatory. In addition, only updates from official manufacturer sources are installed – fake updates can cause major damage within an IoT network. We make sure that this does not happen.

Invoice management

Utilize data

Our payment experts ensure the optimal commercial exploitation of the collected and analyzed IoT data.

We adapt multi-level, dynamically configurable billing systems to customer-specific sales structures. We deliver transparent billing of all IoT services to end customers: Scalable and independent of the type of billing – daily, monthly, usage or event-based. Calculations can be broken down to the lowest booking level: Departments, retailers, partners, end customers, periods, usage, events, etc. And if necessary, we integrate automated micropayment solutions into the billing models.

Data security

Protection with every step

The infrastructure of an IoT project is particularly sensitive: IoT devices, APPs for managing IoT data and applications, transmission paths and the backend for processing data in the cloud.

We ensure that the collected and valuable IoT data is protected at all times – through data security via IP-VPN access, specific heartbeat control (LogFile) and other measures: Multi-factor authentication, end-to-end encryption, least privilege principle, granular control of applications and user activities, security by design, state-of-the-art identity and access management and threat intelligence via machine learning.

Want to start your digitalization project with us?
Feel free to write! We will get in touch with you.