Frequently Asked Questions
What is Engine Angel?
Engine Angel is a series of applications designed to collect, store and analyze data for a fleet of vehicles over time. The purpose is to give the Fleet Manager data and tools to support better decision making taking into account:
- Specific vehicle/engine combinations
- Driver/Route/Load factors
- ECM data
- Engine Polygraph signature analysis
- Pre- and Post-trip inspection reports
- And Oil Analysis data
How much does it cost?
Engine Angel and Engine Polygraph are priced separately because customers may have need for only one of the components.
- Engine Polygraph (EP) requires a hardware purchase of at least one kit: The Engine Polygraph kits start at $5,000 with a 2-channel automotive oscilloscope. Each shop that collects EP data will need at least one. The 4-channel option is available for $7,500.
- The Assessment reports are free for the first 90 days after first kit purchase for a site.
- The EPReader software that simplifies the data collection for the assessment is free as a download from the (enginepolygraph.com)
website to EP users.
- A $25 charge for each report, or
- A $500 charge per month for unlimited reports for that facility.
- If you subscribe to Engine Angel, there is no charge for use of Engine Polygraph for reports on engines that are registered in your fleet.
- The charge for Engine Angel is $20 per month per engine that we ‘manage’ in the system. So a 20 engine fleet costs $400 per month.
- The engine manufacturer’s ECM data extract hardware and software varies in cost, but the Engine Angel “ECMDataSync” is free. (This software keeps the data extracted on your PCs for your fleet synchronized with the Engine Angel databases.)
How do I sign up?
Click on the “No Account? Request one” on the upper right of this screen. Fill out the basic information and Submit it. Feel free to contact the support staff at email@example.com
You will need some basic Fleet data, such as:
- Fleet name, address, phone
- A fleet administrator name, phone, email
- USDOT Number
Training videos, user manuals and assistance are available for
Is support available 24/7?
Currently 24/7 support is not set up, however the email address firstname.lastname@example.org is monitored and you may call (989) 859-6213 for any issues you may have and someone will respond as quickly as possible. Support staff will increase as we grow the subscriber base with the goal being to offer 24/7 support globally.
Is the interface available in other languages besides English?
Not completely. We engineered the application for multilingual capability from the beginning, so it is a matter of prioritizing the languages we will localize the application to first. Obviously, subscriber languages from a location where English is not the preferred interface language will have a priority in the localization process.
Where is the data stored?
The application is currently hosted on a trusted platform and as we gain subscribers we monitor performance to determine the optimum future hosting arrangements. The focus will be on hosting services capable of handling large amounts of data and users with simultaneous access without slowing performance. We will always attempt to weigh the cost of enhancing the existing environment with additional capacity versus changing platforms completely to another hosting provider. Regardless of which way we expand, we will endeavor to make it a seamless transition so any impacts of the changing environment will not be felt by our subscribers.
How secure is my data?
Security is always a high priority, especially when dealing with proprietary and personal data. We secure the data with standard methods, such as encryption and SSL certificates. The hosting service has robust physical security (fire, storms, and anti-theft) with highly trained professionals, comprehensive backup capability, reliable power and UPS, connected via a dedicated fiber optic circuit for reliable communications. The data in itself is of little use until aggregated, synchronized and run through our analytical routines, so in the unlikely event of an intrusion, access to the raw data will be of no value. Critical items, such as passwords and other sensitive information undergo additional security measures in order to deter theft.