Why Smart-IIoT?

Cloud Based Condition Monitoring

A Safe, Reliable & Trustworthy IIoT Solution.

Smart-IIoT provides easy access to cloud storage for viewing dashboards and reporting tools. All of this data is stored in the cloud via WiFi or 3G/4G connection where it is presented it our customers on our web portal or iOS/Android Apps on their smart devices. Alerts and warning levels can be set, so our customers can act on issues as soon as they occur.

Smart-IIoT provides an excellent opportunity for our customers to analyze historical data trends to help determine more effective maintenance procedures, set user-programmable alarms for different site requirements.

Key Benefits of Using Smart-IIoT

  • Minimize the risk of serious damage to parts and machinery
  • Minimize fluid management costs & prevent breakdowns
  • Continues monitoring of fluid aging, lack of additives or increasing acid numbers (In Oils)
  • Continues monitoring of water content, particle concentration & fluid viscosity
  • Achieve a higher value of every fluid management activity

Fundamentaly Secure

As a cloud solution provider, Smart-IIoT fully understands the security implications of operating in the cloud. All products and services are designed to provide better security than many traditional on-premise solutions.

Encrypted connections are necessary to prevent attacks which can let attackers gain access to accounts and sensitive information. All connections to and from the Smart-IIoT Cloud and between Cloud services are therefore encrypted using HTTPS with TLS 1.2 or higher.

The Smart-IIoT Cloud platform can be accessed via any web browser or the Smart-IIoT app on your mobile device. Users log in with their username and password. If two-factor authentication is enabled, users are also prompted to enter a one-time password. One-time passwords add an extra layer of security to your account. They are generated by an app (e.g. Google Authenticator) on your mobile device and remain valid for 30 seconds.

Unsuccessful login attempts to return the user to the login screen. After five incorrect attempts, the user is locked out of his/her account for several seconds. This time increases exponentially (up to 1 hour) with subsequent incorrect attempts.