User Experience

Standard or customized user interface for easy display of predictive analytics and ultimative device control

 

AMI Central

  • Enables users to monitor and control equipment over the cloud
  • Integrates into 3rd. party analytics platform / UI (customer dashboard)
  • Customized for each application to keep clients directly connected to their end-users
  • Fully scalable and transparent
 

AMI Dashboard

Responsive design and scalable elements

 

 

Gateway - vapor X

Gateway solutions for data extraction and device control

 

AMI integrate its extensive IIoT family of gateway products like the Vapor X into desired solutions. The Vapor X represents a versatile, small, cost-effective, and NEMA 4X rated gateway that brings industrial devices and agriculture equipment through the cloud to the end-user.
 

Vapor X features

Connect to any existing machine or sensor
Log in with no need to provision communication
App driven application is sent over the air to the gateway

 
Vapor X. 1.jpg
Vapor X. 2.jpg
 

 

Infrastructure - cloud

Proprietary communication over a secure cloud

 

In defining policies and procedures around the implementation and management of security control, AMI Global uses a series of documented processes that can provide baseline best practices with designed and deployed security controls on cyberthreats.
 
Pertinent standards include the NIST 800-53 cybersecurity framework and ISO/IEC 27000 series for information security, and IEC 62443 for control systems. A security program typically includes the following core components across both the IT and OT environments: Identify, Prevent, Detect, Respond, Recover and Predict. Within each phase, there are specific processes and activities that the organization should follow to ensure the successful execution of the entire framework

AMI Cloud

  • Easy installation over a secure platform
  • Cost-effective service plans
  • Platform scalability
 

 

AMI Cybersecurity Framework

AMI Cybersecurity Framework can be described as a looping process of the following steps:

 
 

1. Identify

Understand threats, their capabilities and risk to systems, assets and data

2. Prevent

Ensure that critical systems are safeguarded and kept continually available  

3. Detect

Identify the occurrence of attack

4. Respond

Take action against the detected incident

5. Recover

Implement plans for resilience and restore affected systems

6. Predict

Plan to anticipate and identify threats from acquired inteligence

 

 

Encrypted Security

Communication over proprietary protocol with an encrypted footprint that is only allowed through the AMI Cloud Infrastructure Firewall.

 
 
1. Industrial machine, sensors, any manufacturer

1. Industrial machine, sensors, any manufacturer

2. Near Cloud, edge machines: customized and branded

2. Near Cloud, edge machines: 
customized and branded

3. Gateway: App driven, AMI Vapor series from embedded to branded Nema 7 certified

3. Gateway: App driven, AMI Vapor series from embedded to branded Nema 7 certified

4. Global satellite coverage and cellular infrastructure within 108 countries

4. Global satellite coverage and cellular infrastructure within 108 countries

5. Support of cellular and satellite infrastructure

5. Support of cellular and satellite infrastructure

6. AMI Cloud and support of the cloud

6. AMI Cloud and support of the cloud

7. Big data analytics and data center management

7. Big data analytics and data center management

components-2@2x.png

8. Custom user interface, ERP connectivity, OEM dashboard

responsive@2x.png

9. Access anywhere anytime  with any device