Security & Privacy
Built-In, Not Bolted-On
Enterprise-grade security and privacy controls to protect your data and comply with global regulations. Your data never leaves your premises.
Our Security Principles
Security and privacy are fundamental to everything we build
On-Premise Only
All AI processing happens on your infrastructure. Zero cloud dependencies.
Data Encryption
End-to-end encryption for data at rest and in transit using industry standards.
Privacy by Design
Privacy controls built into every feature from the ground up.
Compliance Ready
GDPR, CCPA, BIPA compliant with comprehensive audit trails.
Technical Security Measures
Enterprise-grade security architecture
Data Protection
AES-256 encryption for all stored data including video, face embeddings, and databases
TLS 1.3 for all network communications between components
Encrypted file systems with key management and rotation
Multi-tenant architecture with complete data separation
Access Control
Granular permissions system with customizable roles
Optional 2FA/MFA support for enhanced security
Secure JWT tokens with automatic expiration
SAML 2.0 and OAuth 2.0 support for enterprise SSO
Network Security
Works behind corporate firewalls with configurable ports
Full support for VPN and air-gapped deployments
Separate networks for management and video traffic
Rate limiting and connection management
Audit & Monitoring
Detailed logs of all user actions and system events
Generate compliance reports for audits
Monitor for suspicious activities and anomalies
Real-time monitoring of system security status
Compliance & Regulations
Built to meet global privacy and data protection standards
GDPR
General Data Protection Regulation
European Union
- Right to erasure (delete face data)
- Data portability and export
- Consent management
- Data processing records
- Privacy impact assessments
CCPA
California Consumer Privacy Act
California, USA
- Consumer data requests (DSAR)
- Opt-out mechanisms
- Data disclosure reports
- Data deletion capabilities
- Privacy policy compliance
BIPA
Biometric Information Privacy Act
Illinois, USA
- Biometric data consent
- Retention schedules
- Disclosure policies
- Secure storage requirements
- Destruction protocols
Additional Compliance Support
We also support industry-specific regulations including HIPAA (healthcare), FERPA (education), and various government security standards. Contact us to discuss your specific compliance requirements.
Privacy-First Features
Powerful capabilities that respect privacy
Automatic Data Retention
Configure automatic deletion of old video footage and face data based on your policies
Privacy Zones
Mask or blur sensitive areas in video feeds to protect privacy
Anonymization
Option to anonymize faces and people in recordings for non-security use cases
Access Logging
Complete audit trail of who accessed what data and when
Data Minimization
Only collect and store data necessary for your specific use case
User Consent Management
Built-in consent tracking and management for face recognition
Our Security Commitments
Questions About Security?
Our security team is happy to discuss your specific requirements