• Challenges

     

  • Connections

     

  • Solutions

     

  • Requirements

     

  • Connections

     

  • Answers

     

  • Challenges

     

  • Connections

     

  • Answers

     

Low Risk Solutions

Minimize risk to defend your utility’s future.

There is no reward in risk


Elster provides the most effective and proven solutions that reduce risk and accelerate return on investment (ROI) for your utility. With the world’s largest AMI deployments using two-way RF mesh or PLC together with cellular networks, our systems have been – and will continue to be – the most operationally effective, scalable and capable of providing the timely data your utility must have.


Our products have a strong reputation for high quality because we have been dedicated to serving the needs of the utility industry for 175 years. Not only can you count on the accuracy of our metering, you can rely on the safety of our products and solutions to protect your customers and your reputation.


Unparalleled flexibility for growth


We’ve engineered all of our solutions to ensure that an Elster system does not quickly become obsolete. With superior bandwidth, substantial processing power, remote firmware upgrades, and a strong commitment to backward compatibility of our solutions, Elster gives you the confidence to move forward with your AMI deployment.

 

Our standards-based open architecture Meter Data Collection and Meter Data Management platforms integrates quickly with your back-office and in-home solutions. It gives you the flexibility you need for your billing, finance, customer service, operations, distribution planning and engineering departments. Plus, our unmatched interoperability enables us to create solutions that can be adapted to accommodate future technologies and changing utility requirements.


Your data is more secure


Elster solutions offer the world’s finest multi-level security across all components to protect your data during storage, transfer and use. Protection at the meter includes DES encryption, encryption algorithms, EIS identifier, utility identifier, Elster protocol and individual meter passwords and encryptions. Data management and storage are safeguarded with role based access control, stringent password management, logging and monitoring, intrusion detection, security patches and customized firewalls.