IoT - Cloud Unified Device Management Service (SaaS)

Walt Technologies' provides a Cloud based Software-as-a-Service (SaaS) for Device Management (TR-069, LWM2M, MQTT, OMA-DM, SNMP, SMS).



Affordable, Light and Robust Cloud Solution

Targeted to companies looking to manage 100-1000 or more CPE devices, or those who prefer SaaS model to a long-term commitment, LYNX Cloud ACS enables organisations and services providers to purchase ACS as a monthly subscription (pay per use).

Despite being light, and easy to install, the solution is a full-featured Unified ACS that enables management of M2M, IoT, LTE, Data, VoIP and IPTV services. Organisations and service providers opting for this version of ACS enjoy the immediate roll-out and can start managing their CPEs (end-points) instantly. We take significant measures and best practices to ensure the security of our cloud offering.


  • Affordable solution, no upfront payments
  • Lower entry barrier for small and mid-size organisations and service providers
  • Accessible any time, anywhere
  • Implementation does not require professional services
  • Enables Service Providers to focus on customers, instead of maintenance of an on-premise solutions
  • Reliability and robust performance
  • Fastest network services provided with hosting facilities in Australia

In this hosted, multi-tenant solution each tenant has a full-featured portfolio with total separation. Furthermore, the tenants are not limited, an organisation can build unlimited sub-tiers in their partition.



  • Management Console - The Device Management Console offers remote management of CPEs/endpoints. It enables the independant creation of new data models to be supported by the ACS. New CPE types or data models can be easily added by the system administrator without any assistance or extensive knowledge of TR-069 / LWM2M etc...
  • Provisioning Portal - The Provisioning Portal automates the provisioning of new subscribers to Internet services. The provisioning portal offers a single unified interface for the provisioning of all device types and serves as a front end to all the back-office systems involved in the provisioning process.
  • Call Center Portal - The Support Center Application allows service representatives to manage and control a specific CPE during a support call. Using the Support Center Application, the CSR can remotely diagnose and resolve problems through intuitive screens and automated processes.
  • Self-Support Portal - The Self Support portal reduces the number of calls to the help desk and increases customer satisfaction, by allowing non-technical subscribers to independently diagnose and repair problems related to data, voice and video services.
  • BI Report Generator - The Business Intelligence (BI) Report Generator enables quick and reliable generation of reports related to the status of managed devices and their activities


  • Full-featured Unified ACS
  • Supports: TR-069, LWM2M, MQTT, OMA-DM, SNMP, SMS
  • Management of Data, VoIP and IPTV services
  • Instant roll-out. Start managing your CPEs right away!
  • Pay as you go
  • Secured Cloud solution
  • Multi-tenant solution
  • Robust and scalable at all modules and features level
  • Modularity and easy per-tenant adaptations and management
  • Support of any types of devices
  • API to your existing systems
  • Easy to install and use – no need for TR-069 or LWM2M expertise
  • Automated provisioning
  • Remote CPE configuration
  • Remote CPE group updates
  • Remote firmware upgrade
  • Remote diagnostics and repair
  • 24/7 Support


We have introduced the following additional security enhancements to cover the main vulnerabilities stated below. These are explained in more detail in a document “Friendly’s TR69 security aspects” document and is provided to Service Providers opting for LYNX Cloud ACS Solution.

  • Security Zones
  • ACS WS authentication
  • NBI WS obscured
  • DB connection details encrypted
  • Users Management
  • Path Traversal Vulnerability
  • Cross Site Scripting Vulnerability
  • Unprotected Management Interface Vulnerability
  • Insecure HTTP Methods Vulnerability
  • Insufficient Anti-Automation Vulnerability
  • Information Leak Vulnerability


We welcome you to contact us and try it out.  

Click on the >> Contact us <<   page and open up the Contact Form.