Documentation
Quick Start Steps
Get up and running with EazyTrax in just a few simple steps
Choose Your Software
Select the appropriate installer based on your deployment needs.
Download & Install
Click the download button to access the installation guide and files.
Follow the Guide
Each software package includes detailed installation instructions.
Overview
EazyTrax is a powerful software solution designed to collect, store, and visualize data received from BLE gateways, access points, and other IoT devices. It seamlessly handles data such as RSSI, MAC addresses, iBeacon, Eddystone, and various sensor inputs, providing users with fast, flexible, and reliable insights — all with zero-runtime overhead.
Real-time Collection
Gather data from multiple IoT sources simultaneously with minimal latency and high throughput performance.
Efficient Storage
Optimized database structure for fast queries and minimal storage footprint with intelligent data compression.
Advanced Visualization
Interactive dashboards and real-time charts with customizable views and comprehensive analytics tools.
System Components
EazyTrax consists of several interconnected components that work together to provide a comprehensive IoT data management solution.
EazyTrax Engine
The core processing engine that handles data collection, transformation, and storage with high-performance capabilities.
Web Dashboard
Intuitive web interface for monitoring, configuration, and data visualization with responsive design.
Data Collector
Specialized modules for different gateway types including Aruba, Meraki, FortiGate, and TP-Link devices.
Database Layer
Optimized MariaDB/MySQL database with efficient indexing and partitioning for time-series data.
API Gateway
RESTful API endpoints for third-party integrations and custom application development.
Message Queue
MQTT broker integration for real-time data streaming and device communication.
Trust & Security
Enterprise-grade security and reliability for your IoT data
End-to-End Encryption
All data transmission and storage is encrypted using industry-standard protocols
SOC 2 Type II
Certified compliance with security, availability, and confidentiality standards
Role-Based Access
Granular permission controls and user management for enterprise environments