What do you like best?
This device manager allows us to raise our security levels in our commercial center, we have hundreds of cameras and mobile devices connected to our network, as well as intelligent security cameras, which perform a constant monitoring of each space of our facilities, with this tool we can control all this type of electronic devices through some applications we have developed, so, we maintain security at optimal levels, because any failure, however minor, our networked systems, under this application, will notify us of any type of failures in the security network that we handled, previously we did not have such an advanced security system, but due to the different events that have transpired in recent years in our country, various attacks, and other types of systems, that we all know, we decided, to raise our security levels to the maximum, and with this application, pod We control and monitor the different devices we use for this service, which we offer for our clients, and for ourselves.
What do you dislike?
the management of some profiles, within the application can be a bit confusing when you start using the application, the truth is not very clear, the levels of control that handle the different roles, within this system, and there is little information that is in the network about this, it can also have some kind of conflicts, with the integration of other applications, which prevents working freely, and must stick to the script, which carries the application.
Recommendations to others considering the product
the configuration of this application may take some time, and should consider the modification of certain sectors of the infrastructure of the place where it will be implemented as help or control of a security system, if necessary, should also be carried out certain changes in the parameters of the computer security, which is being executed.
What business problems are you solving with the product? What benefits have you realized?
It is a tool that helps us to implement a security system, with high levels and standards of protection, it allows us to control the different applications, which manage the different mobile devices that we link to our secure network, this system has allowed us to create a robust but an effective security system, in our facilities.