Automated Logic’s WebCTRL software has traditionally been deployed on-premises, where the customer and local dealer host/maintain the software via on-site servers. To enhance flexibility, customers can now deploy WebCTRL software in the cloud, where Automated Logic hosts, secures, and maintains the software for the customer. Automated Logic’s Cloud-Managed Building Automation Solution utilizes Amazon Web Services (AWS), the world’s most comprehensive and broadly adopted cloud offering. WebCTRL Cloud is the same powerful building automation tool as on-premises managed WebCTRL, but with nominal upfront costs and significantly reduced maintenance support burdens.
Benefits of WebCTRL Cloud
Automated Logic created WebCTRL Cloud to be a solution for customers who could benefit from a more flexible, scalable approach to building management by using a software-as-a-service (SaaS) delivery model, without sacrificing the powerful capabilities of WebCTRL. By eliminating an on-site BAS server and through AWS hosting, WebCTRL Cloud updates automatically to guarantee the system is always running the most current version. This reduces the support burden placed on the customer and creates efficiencies for other maintenance needs.
With no on-site server, the customer has nominal upfront costs and pays by usage on a subscription model. This allows for easy scalability to meet growing facility requirements. Replacing upfront expenditure with period subscriptions enables customers to plan and scale with confidence because WebCTRL Cloud can easily be expanded to support additional controllers, buildings, and users, as well as added trend/alarm storage at any time. It also integrates easily with other cloud software, services, and Internet of Things (IoT) equipment/systems throughout the facility.
WebCTRL Cloud, powered by AWS, ensures the building automation system is always up-to-date, secure, and compliant. WebCTRL Cloud uses BACnet Secure Connect (TLS v1.3) to encrypt network communications and keep the building automation networks secure. This provides better security against cyber threats by decoupling IT and OT infrastructures through airtight connections that authenticate permitted devices via international IT security standards.