Better Data Doesn’t Mean More Risk

VergeSense provides data to transform spaces. We place data integrity at the center of all our technology, business, and design decisions. From our anonymous-at-the-source design to encrypted data transfer and storage, we adhere to the highest standards to ensure the security and privacy of our enterprise clients. Don’t sacrifice accuracy for the illusion of privacy.

Security at Every Step

Fortune 1000 companies around the world trust VergeSense to safeguard their data throughout its lifecycle. Our team will work with you to configure a system architecture compatible with your existing security protocols.

  • Device

    Raw data is captured by VergeSense sensors and encrypted on the device with industry-standard WPA2 AES encryption.

  • In-Transit

    Whether utilizing your corporate network for maximum control, or an independent cellular network, optimizing for speed of deployment, all data in transit is encrypted using TLS 1.2.

  • Processing

    Ultra-low resolution data is instantly processed and converted to anonymous people count data. This further ensures the safety of your data by minimizing opportunities to be compromised.

  • VergeSense Cloud

    Upon conversion, anonymous people-count data is transferred to the VergeSense Cloud, our cloud-hosted database, which is encrypted at rest using AES-256.

Our Process

We have built privacy and security into our internal processes. We hold our team to the highest standards when handling sensitive data.

  • Annual penetration testing
  • Employee background checks and annual security training
  • 100% of our devices are managed and FileVault enabled
  • Regular vulnerability scans
  • We adhere to a security development process
  • Disaster recovery tests performed regularly

Privacy by Design

Our patented computer vision model is uniquely capable of processing ultra-low resolution imagery, ensuring the highest degree of accuracy while remaining 100% anonymous.

  • Capture of personally identifiable information (PII) is not 
technically possible
  • Raw data captures are destroyed on device

  • Metadata is based on an assigned SensorID number and 
not tied to any geographically identifiable information
  • People are counted, not tracked

Compliance 
and Regulation

We adhere to all of the strictest standards for data security and privacy.

  • GDPR Compliant
  • SOC2
  • RoHS Compliant