Access control, closed‑circuit television (CCTV) video surveillance and intercoms — operational and observable
— a tool for inspection checklists and follow‑up maintenance in security systems. Offline evidence capture, tasks for non‑conformities with SLA tracking, client portal and reporting.welcome@bm8.pro
Key features
Plans and health checks
Health checks with date/time, scope and schedule, assignments and alerts. Monitor image quality, coverage, backups and access rules.
Offline incidents with evidence
Capture incidents with photo/video evidence and link to corrective actions. Works offline.
Non‑conformities → tasks
Automatically create tasks for detected issues, set priorities and due dates, track SLA and statuses.
Reporting and client portal
Generate operation and maintenance summaries for stakeholders. Export checklists in spreadsheets.
Asset register by zones
Import devices and zones in minutes. Controllers, readers, cameras and NVR — record models, firmware and placement. Export data for analysis and reporting.
How it works
Plan inspections
Define scope, cadence, and owners. Configure notifications and due dates.
Inspect offline
Complete checklists, record readings and photo evidence. Everything syncs when back online.
Non‑conformities → tasks
Automatically create tasks with priorities and due dates, track SLA and progress.
Acceptance and reporting
Client portal for transparency and spreadsheet/document exports for audits.
See the workflow
Inspection plan and checklist
Creating a component-based inspection plan and assigning owners for the plan and its checklist.
Conduct an inspection
Example of conducting an inspection according to the plan. Record readings. Email notifications on start and completion.
Add a component to a building system
Example of importing components and then attaching them to a building system.
Create a building
Example of creating a building record and adding the first engineering system.
Create a component
Example of creating an engineering system component with a characteristic and metric values.
Sign up and sign in
Free registration of a new user and firm on the platform.
Share the product
We’ll send a brief overview with key features and demo links.
Advantages
Higher system availability
Routine checks prevent silent failures and gaps.
Faster troubleshooting
Structured data shortens root cause analysis.
Policy visibility
Track rule changes and responsible roles.
Evidence archive
Central repository for incidents and fixes.
Join on special terms
We will import your device inventory and zones for access control and closed‑circuit television (CCTV).
Explore a guided demonstration tailored to your incident workflow.