FeaturesUnified remote management for systems integrators
All your projects, anywhere
All your projects with devices from multiple manufacturers are managed in the same web portal; on desktop, tablet and mobile.
Your brand, your domain
Strengthen your customer relationships by inviting them into your own, branded web portal, accessed at your own Internet domain.
Free construction mode
There's no charge to connect devices - only when you want to control or manage those devices remotely. Connect everything then activate paid up projects remotely.
Easy to specify, simple to setup
Straightforward connection means less time spent understanding IT requirements for different systems and getting permissions from IT departments.
No additional hardware
No extra hardware is required for remote management with SixEye – existing products connect directly – so it's cost effective for even the smallest project.
Get full functionality over a cellular M2M network, anywhere in the world. SixEye only transfers raw data from devices, and only the data you request.
Granular permissions management
Invite site management and marketing into a project site and grant them bespoke access with SixEye's granular permissions.
Run actions across devices from multiple manufacturers. The Control Panel provides a simple end client user interface for each site.
With SixEye's notifications, you'll be alerted about problems on any of your sites automatically.
Schedule actions to run across any devices in your project site. Schedules can repeat at set times, or they can take their cue automatically from the sunrise and sunset times at your project location.
Real time status and logs
Troubleshoot from anywhere with access to playback, output and input status and real time device logs.
Upload new content, configuration and firmware files to your portal. From there they can be transferred to devices at any time.
Security & Privacy
SixEye uses industry-standard network security protocols & encryption algorithms for device connections and your portal. Data is encrypted in motion and at rest.
No inbound connections
No VPN required, no ports to be opened, and no firewalls to be compromised. Works over any Internet connection; devices only make secure outbound connections.
Your data is private, and your data is protected. We will not share it for commercial purposes.