All we sense is heat.
It's that simple.
Our Heatic Sensors are based on capturing thermal arrays and inferring human presence and activity from there. We will never capture Personal Identifiable Information (PII).
Camera
PIR Sensors
Butlr
Cameras have their place but we shouldn't have to rely on cameras scrubbing out PII for rich, accurate occupancy data.
Besides lower sensitivity and less coverage, PIR sensors output a 1 or a 0, regardless of number of occupants, and then reset to 0 if no further motion is detected.
“Private by design” means that our thermal sensors literally cannot capture Personally Identifiable Information (PII). Instead, we infer human presence and activity via the changes of heat pixels that we sense per the images below.
Why is data security critical for a truly anonymous platform like Butlr?
Enterprise-grade data security is a no-brainer when it comes to safeguarding our customers’ data. Captured thermal data are encrypted in all phases; from our sensors all the way to our end users, we make sure your data are kept private.
Secure all the way to how our team works everyday.
Security and privacy are a core part of our DNA, and we take great care to secure our customers' data as well as our own. Below are some measures we take to ensure the security and integrity of our system.
Why is data security critical for a truly anonymous platform like Butlr?
Enterprise-grade data security is a no-brainer when it comes to safeguarding our customers’ data. Captured thermal data are encrypted in all phases; from our sensors all the way to our end users, we make sure your data are kept private.
Secure all the way to how our team works everyday.
Security and privacy are a core part of our DNA, and we take great care to secure our customers' data as well as our own. Below are some measures we take to ensure the security and integrity of our system.
Enterprise-grade Security
Annual Penetration Testing
Employee Security Training
End-to-end Encryption
Regular Vulnerability Scans
Robust Hardware Protection
Disaster Recovery Processes