iVisionmax-TAMS

Telecom Alarm Management System Platform

Features

  • Quick setup
  • Custom scripting and inter-subsystem integration
  • Equipment monitoring and device configuration
  • Network monitoring
  • Alarm management / information correlation
  • Inbuilt cybersecurity features

Quick setup

Easy installation and configuration. Customer just needs to configure the IP address and communication ports at device ends along with the modbus addresses on a simple configuration screen.

Any other programming, coding or configuration is not required. For large number of tags, excel based configuration is possible.

Quick setup

Custom scripting and inter-subsystem integration

iVisiommax-TAMS supports custom scripting using native python to develop custom scripts and logic inside the system.


Inter sub-system integration module allows integration of two subsystems via the TAMS package.


This could be integration of the ANPR system with the access control system, or the telecom system and networking system with the automation system, etc.

Custom scripting and inter-subsystem integration

Equipment monitoring and device configuration

Network elements such as switches, routers, etc. can configured and managed using iVisionmax-TAMS.


The platform communicates to these devices using telnet and/or SSH. This allows an operator ease of access and improves efficiency.

Equipment monitoring and device configuration

Network monitoring

Apart from monitoring the device healthiness, the TAMS system provides detailed diagnostic information of the complete network.
Network monitoring

Alarm management / information correlation

The platform collects information from multiple platforms such network devices, PLCs, RTUs and system diagnostics.


This information can be correlated to thresholds and set points in the process. Any deviation in these values will be flagged as an error or threat to the user.

Alarm management / information correlation

Inbuilt cybersecurity features

The software is compliant to the major cybersecurity requirements and is fully protected and provide intrusion detection and protection services. All the data and setting files are encrypted as per standard practices applicable. All configurations and settings are password protected.

The communication port configuration of the software can be set based on the organization's cybersecurity policies and firewall settings.

Inbuilt cybersecurity features
Unauthorised background image

Your product is just steps away!

Register for FREE to buy, get downloads and access free trials.

Get Resources and Start FREE Trials

Easy Product Activation with Your Account

Products Saved to Personal Digital Library