BM8 PRO

Access control, closed‑circuit television (CCTV) video surveillance and intercoms — operational and observable

— a tool for inspection checklists and follow‑up maintenance in security systems. Offline evidence capture, tasks for non‑conformities with SLA tracking, client portal and reporting.welcome@bm8.pro

Key features

Plans and health checks

Health checks with date/time, scope and schedule, assignments and alerts. Monitor image quality, coverage, backups and access rules.

Offline incidents with evidence

Capture incidents with photo/video evidence and link to corrective actions. Works offline.

Non‑conformities → tasks

Automatically create tasks for detected issues, set priorities and due dates, track SLA and statuses.

Reporting and client portal

Generate operation and maintenance summaries for stakeholders. Export checklists in spreadsheets.

Asset register by zones

Import devices and zones in minutes. Controllers, readers, cameras and NVR — record models, firmware and placement. Export data for analysis and reporting.

How it works

1

Plan inspections

Define scope, cadence, and owners. Configure notifications and due dates.

2

Inspect offline

Complete checklists, record readings and photo evidence. Everything syncs when back online.

3

Non‑conformities → tasks

Automatically create tasks with priorities and due dates, track SLA and progress.

4

Acceptance and reporting

Client portal for transparency and spreadsheet/document exports for audits.

See the workflow

Inspection plan and checklist

Creating a component-based inspection plan and assigning owners for the plan and its checklist.

Conduct an inspection

Example of conducting an inspection according to the plan. Record readings. Email notifications on start and completion.

Add a component to a building system

Example of importing components and then attaching them to a building system.

Create a building

Example of creating a building record and adding the first engineering system.

Create a component

Example of creating an engineering system component with a characteristic and metric values.

Sign up and sign in

Free registration of a new user and firm on the platform.

Share the product

We’ll send a brief overview with key features and demo links.

Advantages

Higher system availability

Routine checks prevent silent failures and gaps.

Faster troubleshooting

Structured data shortens root cause analysis.

Policy visibility

Track rule changes and responsible roles.

Evidence archive

Central repository for incidents and fixes.

Join on special terms

We will import your device inventory and zones for access control and closed‑circuit television (CCTV).

Explore a guided demonstration tailored to your incident workflow.