IxArma 4+

Business Continuity Management

INAX AG

Designed for iPhone

    • Free

iPhone Screenshots

Description

ixArma app 6 is the mobile application of alarm server management ixArma 6 enabling a comprehensive business continuity management for any alarm scenarios.

IxArma app is the mobile part of alarm server management ixArma enabling a comprehensive business continuity management for any alarm scenarios. Users of ixArma App can rapidly respond to incidents and emergencies in real time and on the go, and send alarms from the app. ixArma 6 app is browser independent and simple to operate.


Main functionalities:
• Receive alarms of different priorities according to predefined alarm scenarios and plans
• Alarms of various priorities with visual and acoustic signalling
• Interactive alarms with updates in real time
• Acknowledge alarm or reject, also with PIN
• Attach documents to alarms
• Trigger alarm from the app
• Alarm progress and control monitoring in real time
• Localization of the smartphone
• Fully server based app management
• Mass SMS notification
• Multilingual
• MDM version available on request

ixArma is alarm server management console that concentrates alerts from all your devices and manually triggered alarms into one system enabling implementation of a comprehensive business continuity management.
ixArma is built to the highest connectivity to all external devices, and offers streamlined alerting via almost unlimited channels to any number of recipients, regardless of how large your organisation is.

If your ixArma is lower than version 6.1.0 and would like to use our app, please speak to our customer support how to upgrade to our latest ixArma

What’s New

Version 1.0.7

- Alarm status marker added
- Display alarm name functionality added
- Small bugs and fixes to improve user experience

App Privacy

The developer, INAX AG, indicated that the app’s privacy practices may include handling of data as described below. For more information, see the developer’s privacy policy.

Data Linked to You

The following data may be collected and linked to your identity:

  • Contact Info
  • Identifiers

Data Not Linked to You

The following data may be collected but it is not linked to your identity:

  • Usage Data
  • Other Data

Privacy practices may vary based on, for example, the features you use or your age. Learn More

You Might Also Like

TimeControl
Business
Continuity Innovations
Business
invoiceR
Business
Crisis Communication Center
Business
MSB Disaster ERP
Business
Food Magnet : Vendor
Business