Every organisation has different security requirements. AVM-360 is the only AV monitoring platform that adapts completely to yours — from fully air-gapped on-premise to full cloud — with the same capabilities across all options.
Most monitoring platforms force you to compromise your security requirements to use their product. AVM-360 was architected from day one to adapt to your environment — the platform is the same, the deployment model is your choice.
All three models use a local collector on your VLAN to communicate with AV devices. What changes is where the management platform sits — and who controls it.
The entire AVM-360 platform — collector, database, and web interface — runs inside your network on a Windows VM or NUC. AVM-360 deploys it remotely. Once live, you manage everything locally. Zero data ever leaves your network perimeter.
| HTTPS (logo/updates) | 443 TCP |
| Email alerts (SMTP) | 587 TCP |
| SQL Server (if used) | 1433 TCP |
A local collector on your VLAN polls AV devices directly and translates complex multi-vendor data into lightweight JSON status packets. Only those sanitised status summaries are pushed to a cloud dashboard — raw device traffic and credentials stay on-premise.
A local collector on your VLAN still handles all AV device communication — this is always required since AV devices speak proprietary protocols on your local network. The management platform, database, and dashboard are hosted in the cloud: either on your own infrastructure or in AVM-360's managed Azure environment.
AV devices (Crestron, Biamp, Cisco etc.) communicate via Telnet, SSH, REST, and SNMP — protocols that only operate inside your local network. There is no way to poll them directly from the cloud. The local collector bridges this gap and sends only status packets outward.
| Feature | On-Premise | Hybrid | Full Cloud |
|---|---|---|---|
| Data leaves your network | Never | Status only | Status + config |
| Local collector required | Yes | Yes | Yes |
| Cloud dashboard | — | Read-only | Full access |
| Who hosts the platform | You (on-prem) | Mixed | You or AVM-360 |
| Best for regulated industries | ✓✓✓ | ✓✓ | ✓ |
Every layer of AVM-360 is built with security as the default. These apply across all three deployment models.
Every user, service, and process has only the minimum access required — nothing more, nothing less.
All data in transit is encrypted — between collector and cloud, and between users and the dashboard.
Granular RBAC for technicians, administrators, facility managers, and read-only client users.
The collector is the only component that talks to AV devices. It never exposes raw device traffic externally.
Room schematics and device credentials protected with role-based access and optional password protection.
All user actions, device changes, and remote commands are logged — full audit trail for compliance.
Yes — with Full On-Premise deployment, the entire platform runs inside your network. No data of any kind is transmitted externally. Designed specifically for air-gapped and highly regulated environments.
Only sanitised status summaries — device online/offline state, error codes, and uptime metrics. Raw device traffic, credentials, and network topology all remain on-premise.
Device credentials are stored on the local collector only — inside your network. They are never transmitted to or stored in the cloud under any deployment model.
Microsoft Azure. Data residency options are available on request. All data is encrypted at rest and in transit, with daily backups and a 99.9% uptime SLA.
Yes — Full Cloud Option A. We deploy the platform on your own cloud infrastructure, giving you full control of the hosting environment while AVM-360 manages the application layer.
Remote access to the local collector only via TeamViewer or equivalent — scoped to the collector. We do not require access to your broader network, Active Directory, or other infrastructure.
Our team works with your IT and security stakeholders to recommend the right deployment model for your environment.