Monitoring and control of lighting artifacts in public spaces and large commercial areas.
Functions for power off, on, dimming, time scheduling, and adaptation to external lighting conditions.
Support for control of artifacts in individual or group form.
Real-time monitoring of status and failures.
Online inventory, including luminaires without telemanagement.
Real-time consumption monitoring.
Monitoring of maintainers and repairs.
Availability reports, power consumption, failures, etc.
All from a single web user interface.
External interfaces to other systems.
Because centralized monitoring and optimization of lighting:
Reduce maintenance costs and save energy significantly.
Makes real-time inventory posting possible.
Allows you to apply preventive maintenance actions.
Maximizes infrastructure availability.
It allows to extend the functionality through external systems, such as SCADA systems, accident prevention and treatment, etc.
Beam offers tools for all stages, from maintaining inventories in projects without telemanagement, to the most sophisticated monitoring and control of individual light points.
The interfaces in the core of Beam interact with measurement and performance devices:
Getting real-time data from both their variables and how is it working.
Storing the data obtained for post-processing and classify them for presentation in Dashboards, reports, etc.
Command them manually when necessary.
Commanding them through autonomous logic, which can involve external calendars or subsystems.
Like any component of the Cloud Studio platform, BEAM can interact with a variety of communications technologies:
Wiring / PLC, through the respective gateways.
Wireless (LoRa, Sigfox, ZigBee, 802.15,4, NBIoT, etc.), acting as an application server.
Proprietary technologies, through gateways and hubs to which can be developed specific interfaces.
The architecture of the interfaces makes it possible to incorporate new communications technologies (e.g. NB-IoT) with little effort.
Beam inherits all the features of Configuration and security of the Cloud Studio platform
Configuring users with maximum granularity permissions, at the individual device level if necessary.
2048-bit SSL protection in all communications.
Single-Sign-On (SSL) including the possibility of identification through external vendors (LDAP).
Secure open API, with individual permissions for each application that uses it, using techniques similar to OAuth.
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media. To find out more about the cookies we use, see our Privacy Policy.