play_arrow

Quick Start Steps

Get up and running with EazyTrax in just a few simple steps

1

Choose Your Software

Select the appropriate installer based on your deployment needs.

2

Download & Install

Click the download button to access the installation guide and files.

3

Follow the Guide

Each software package includes detailed installation instructions.

flash_on

Overview

EazyTrax is a powerful software solution designed to collect, store, and visualize data received from BLE gateways, access points, and other IoT devices. It seamlessly handles data such as RSSI, MAC addresses, iBeacon, Eddystone, and various sensor inputs, providing users with fast, flexible, and reliable insights — all with zero-runtime overhead.

schedule

Real-time Collection

Gather data from multiple IoT sources simultaneously with minimal latency and high throughput performance.

storage

Efficient Storage

Optimized database structure for fast queries and minimal storage footprint with intelligent data compression.

analytics

Advanced Visualization

Interactive dashboards and real-time charts with customizable views and comprehensive analytics tools.

device_hub

System Components

EazyTrax consists of several interconnected components that work together to provide a comprehensive IoT data management solution.

settings

EazyTrax Engine

The core processing engine that handles data collection, transformation, and storage with high-performance capabilities.

dashboard

Web Dashboard

Intuitive web interface for monitoring, configuration, and data visualization with responsive design.

cloud_download

Data Collector

Specialized modules for different gateway types including Aruba, Meraki, FortiGate, and TP-Link devices.

storage

Database Layer

Optimized MariaDB/MySQL database with efficient indexing and partitioning for time-series data.

api

API Gateway

RESTful API endpoints for third-party integrations and custom application development.

queue

Message Queue

MQTT broker integration for real-time data streaming and device communication.

security

Trust & Security

Enterprise-grade security and reliability for your IoT data

lock

End-to-End Encryption

All data transmission and storage is encrypted using industry-standard protocols

verified_user

SOC 2 Type II

Certified compliance with security, availability, and confidentiality standards

admin_panel_settings

Role-Based Access

Granular permission controls and user management for enterprise environments