You own all the data. We do not provide access to your data to other parties unless you approve it.
We do not punch holes through firewalls.
We use individual digital certificates to authenticate devices and encrypt communications.
We implement a real-time connection, both ways (to and from the device).
We move any data types, including videos, photographs.
We allow any protocol to be securely tunnelled to the device (similar to a VPN).
We log commands and instructions.
You can use our cloud, or access the device and its data via an API.
We provide software "plugins" that communicate with most modern and old machine protocols.