Energy management system Reduxi is simple to use. It includes Reduxi controller and Reduxi application. The installation is user-friendly, based on “Plug & Play” approach and does not require any technical skills.
Reduxi modular controller is the central unit of the system. The design of the controller is based on the flexibility. Thus, the input / output part of the controller can be adjusted to individual requirements without adding external units. The controller communicates with all connected electrical devices via various protocols (LAN, Wi-Fi, RS485, etc.). Due to its modular design, Reduxi provides numerous functions for electricity efficiency. You connect the controller to electricity and to internet. Once you see the green light on the controller, Reduxi is properly connected and installed.
Reduxi can be connected to various users (EV charging station, hear pump, washing machine ets.), electric energy producers (solar cells) and accumulator (batteries). To ensure the largest possible number of electrical devices connected to Reduxi, we produced special converters. Thus, even the devices that use outdated communication protocols can be connected to Reduxi by using the converters.
The Reduxi application is part of software. The application shows all electrical devices connected to the system. Measurements and analysis of electricity consumption for each electrical device are illustrated. Various functions, such as adapting consumption to the needs of the grid are aimed at ensuring greater electricity efficiency and reducing costs. The application works on both computers and smart devices. Data on electricity consumption will always be at your fingertips.
Reduxi uses cloud technology for its operation and data storage. It is equipped with a security mechanism that provides a high level of protection for both data and electrical devices connected to the system. Due to the advanced encryption of communication, data and devices are secure in the event of misuse of the controller as well as in the event of misuse of the system by an unauthorized person. The system is protected by symmetric and asymmetric encryption and thus meets high standards of protection and GDPR regulation requirements.
Keep in touch