Armored Things is SOC 2 Type 1 certified. SOC 2 compliance ensures that systems, controls, and policies are in place to assure security, availability, integrity, confidentiality, and privacy of customer data. SOC 2 requires that comprehensive information security policies and procedures be established and followed and is verified through formal auditing.
Customer data is logically separated and encrypted in transit and at rest. Appliance to cloud communication is over industry standard VPNs with uniquely provisioned certificates, and all transport-level communication is encrypted using TLS.
Key vaults are used to manage secrets, generate communication tokens, and protect sensitive data including API tokens, credentials, and encryption keys. Armored Things maintains controls and safeguards to ensure systems are protected against unauthorized access, disclosure, or damage that might compromise customer data or system operation.
All production services are protected by web application firewalls following OWASP security best practices and configuration rules.
Our anonymous people-counting system delivers spatial representation of information, such as interactive bird’s eye views of an entire campus, and zoomed-in views of floor maps for every building, on which we overlay occupancy heatmaps to display patterns of people and crowds flowing through spaces. Our data never displays faces or other personally identifiable information.
We deliver near real-time high-throughput data and machine learning pipelines that convert raw data inputs into crowd density estimates in seconds. These location insights and results are combined with other data sources and delivered through alerts, dashboards, & mobile apps within one minute.
We maintain and display historical records. With features such as Occupancy Graph, Playback, Bookmark, and location comparison, our spatial intelligence UI is designed to make it easy to review historical information, analyze space utilization patterns/trends, comparisons, and replays.
YES. We support both indoor and outdoor open areas. The spatial partitioning of a location is based on operational needs and not just physical structures or large-scale features.
We customize crowd management solutions based on the uniqueness of a space or existing infrastructure. We do not require the installation of any physical sensors throughout the campus. However, if there are areas that lack any existing supported data sources, we will work with you to identify the most cost-effective technology to maximize your location analytics coverage.
None. Our crowd management services are entirely software-based and use existing digital infrastructure, such as Wi-Fi & cameras, to gather data.
We empower customers to create customized alerts, which provide notifications of occupancy behaviors and space utilization concerns. Additionally, our crowd density tools can trigger capacity management alerts to notify operational personnel about managing occupancy limits when people are detected as clustered closely together. Our platform provides a variety of methods for users to be notified.
We provide multiple reporting and data extraction options, including search/query capability, data exporting, report printing, and APIs.
YES. We provide APIs and can be connected to customer-developed applications or reporting databases, or 3rd party business intelligence and reporting systems like Power BI, Splunk and Tableau, among others.
Our platform is an anonymous people-counting system and does not do facial recognition or identify individuals in any way, and whenever possible, information about people does not leave the customer’s computer appliance. Only data aggregates necessary for analysis are sent to the cloud and stored. We are strongly committed to privacy and safeguarding the privacy of customer data through a distributed design that processes the most sensitive data at the edge of the network, where it is produced in the customer environment, retains only a small subset necessary for machine learning and only for bounded periods of time, and maintains anonymous information about occupancy, movement, and location in the cloud. Higher-level modeling and analytics are done without personally identifiable information.