All we sense is heat.
It's that simple.
Our Heatic Sensors are based on capturing thermal arrays and inferring human presence and activity from there. We will never capture Personal Identifiable Information (PII).
Camera
PIR Sensors
Butlr
Cameras have their place but we shouldn't have to rely on cameras scrubbing out PII for rich, accurate occupancy data.
Besides lower sensitivity and less coverage, PIR sensors output a 1 or a 0, regardless of number of occupants, and then reset to 0 if no further motion is detected.
“Private by design” means that our thermal sensors literally cannot capture Personally Identifiable Information (PII). Instead, we infer human presence and activity via the changes of heat pixels that we sense per the images below.
Why is data security critical for a truly anonymous platform like Butlr?
Enterprise-grade data security is a no-brainer when it comes to safeguarding our customers’ data. Captured thermal data are encrypted in all phases; from our sensors all the way to our end users, we make sure your data are kept private.
Secure all the way to how our team works everyday.
Security and privacy are a core part of our DNA, and we take great care to secure our customers' data as well as our own. Below are some measures we take to ensure the security and integrity of our system.
Why is data security critical for a truly anonymous platform like Butlr?
Enterprise-grade data security is a no-brainer when it comes to safeguarding our customers’ data. Captured thermal data are encrypted in all phases; from our sensors all the way to our end users, we make sure your data are kept private.
Secure all the way to how our team works everyday.
Security and privacy are a core part of our DNA, and we take great care to secure our customers' data as well as our own. Below are some measures we take to ensure the security and integrity of our system.
Enterprise-grade Security
Annual Penetration Testing
Employee Security Training
End-to-end Encryption
Regular Vulnerability Scans
Robust Hardware Protection
Disaster Recovery Processes
01
Data Security
Butlr encrypts data at rest and in transit for all of our customers. Butlr uses tools like Amazon Web Service’s Key Management System (KMS) to manage encryption keys using hardware security modules for maximum security in line with industry best practices. Data in transit is encrypted with TLS (2023).
02
Application Security
Butlr regularly engages some of the industry’s best application security experts for third-party penetration tests. Our penetration testers evaluate the running application, and the deployed environment. Butlr also uses high-quality static analysis tooling provided by GitHub Advanced Security scanners such as Dependabot and AWS Inspector to secure our product at every step of the development process.
03
Infrastructure Security
Butlr uses Amazon Web Services to host our application. We make full use of the security products embedded within the AWS ecosystem, including KMS, GuardDuty, and Inspector. In addition, we deploy our application using containers run on AWS managed services, meaning we typically do not manage servers or EC2 instances in production.