TimeTec has merged all of its solutions into www.timeteccloud.com, click to | Redirect |
Tapping on the readily available technologies The availability of the Internet and Bluetooth Low Energy (BLE) technologies make implementation of i-TimeTec a breeze and feasible. |
Easy & affordable deployment i-TimeTec offers integration with affordable and easy-to-install hardware as well as provides consumers with comprehensive in addition to useful control access features that are constantly upgraded/updated without extra cost. |
Control Made Easy via App The control of your IoT devices is placed on your smartphones and you can view activity logs and much more in real-time together with added convenience. |
Smartphone as Credentials Say goodbye to keys, passwords and codes as your credentials because right now, the smartphone credential has arrived. Smartphones are common, personal, secure, easier to manage and provide accurate location data with GPS feature integration. |
Better Security Application and data in i-TimeTec are hosted in physically secure co-location facilities and we have redundant servers to ensure better uptime and no data lost. All communications are highly encrypted and i-TimeTec deploys our patent-pending two-layer authentication, first in-App verification and followed by a BLE authentication for a secure access. |
Secure Communications All communications from the TimeTec System Server are secured with 256-bit AES encryption, and through the use of Secure Sockets Layer (SSL) protocol. SSL provides end-point authentication and communication privacy - preventing eavesdropping, tampering and message forgery. |
Multi-Level Tenancy With multi Tenancy in place, the application software can be scaled based on load and performance needs, thereby reducing the overall operational cost of the entire infrastructure. One application serves all clients and each client’s data sets are partitioned on the server and kept secure. The application itself serves as the entire ecosystem. The distinct advantage is for security updates – e.g. protecting the operating system that manages the underlying system. Most operating systems are Linux or Windows, which require patches. |
Scalable and on-demand The server used must be flexible to cater to the customer’s demand. If a customer needs to add (or subtract) users or doors, then the system must be able to adapt quickly to those needs, i.e. rapid elasticity, and multi-tenancy will autoscale based on load. Since any customer can use any application tier server, the utilization is maximum keeping the overall cost low. And backup servers are in place in case any error occurs. |