Deeper.

Accurate, Fast, Secure, Flexible & Scalable.

 

Our software is deployable in the cloud, on-premises, or at the Edge with computer vision-centric solutions for safety, security and identity.

De-identified Data
Any information we obtain is de-identified, aggregated data, expressed as a number in a graph, and nothing else.

Encrypted Photos
We use mathematical representations of faces instead of actual photos, meaning devices store no photos and keep your identity safe, even when compromised.

Customer Owned Lists
Customers exclusively own the database where information lives, and all Personally Identifiable Information (PII) lives on the cloud, preventing 3rd party access or sharing.

Opt-in Only
All users must actively opt-in, and users who wish to opt-out of the program may do so immediately and at any time.

Trust.
Transparency.

These are the values we
live by everyday.

  • Face Detection

    Find faces and landmarks in the most difficult environments with ease. Detected faces can be passed to face recognition at the edge, on-premises, or in the cloud.

  • 1:1 Face Verification

    Compare one face to another, for applications where faces may be combined with a second factor (such as an ID document) for lookup.

  • Edge Processing

    Integrate complete facial recognition access control with embedded devices at the network edge, enabling responsive UI, low latency, and high uptime.

  • 1:N Face Identification

    Compare a presented face against a gallery to identify a person when lookup needs to happen at large scale.

  • Real-Time Streaming

    Deliver converged solutions bringing together the benefits of video security and access control software.

  • Spoof Detection

    Guard against spoofing and other presentation attacks with computer vision designed to harness the latest hardware and sensor advances.