Access control with cloud technology

With this document we want to expose the main characteristics of access control based on cloud technology, from the point of view of who has to buy and install it, who has to control the spaces, and end users.

according to the privacy policy
we do not send spam