How does it work?
Monitor and manage all IoT and M2M SIM cards via a comprehensive and user-friendly web platform: activate, manage and check the consumption of your SIM cards, enter alert thresholds and check the network operation of the SIM cards. With no initial costs.BUY AN IOT SIM CARD NOW
Add as many IoT SIM cards as you want
In the IoT Portal you can add an unlimited number of IoT SIM cards and manage your devices with a single simple and user-friendly web platform.
Transfer IoT SIM cards to another user
Just one click to transfer one or more IoT SIM cards from one user to another: send the request and, as soon as it is accepted, all the IoT SIM cards are transferred.
Choose the countries of operation
Set up the countries where you want the IoT SIM card to be operational. In all other countries, you can disable the connection to prevent it from connecting to the network.
Set up automations
Create custom automations for credit and data traffic management on IoT SIM cards. Manage your resources as best as possible to save time and money.
See where each IoT SIM card is located
Manage your IoT SIM cards with names, tags, groups, global search and custom filters. Get valuable information, such as the location of the last connected mobile tower, and IoT SIM card detail pages.
Manage all parameters
Activate, lock, unlock, set the expiration date and change plans whenever you want. You have absolute flexibility and control over every IoT SIM card and data plan.
Keep everything under control
View every aspect of how your team is using the Things Mobile network. The analytics show connections and usage both globally and for each IoT SIM card.
Immerse yourself in details and diagnostics
Consult the data sessions for detailed information and read analyses to identify IoT SIM cards that are not performing well.
Simple and honest prices
Choose and activate the data plan that best suits your needs; you can change it whenever you want with a click from your IoT Portal. All our plans are transparent and free of additional fees.
Share access with other people
Create secondary users and manage authorizations for each member of your team to make sure your device settings are secure.