Your information is securely protected with intenseye

Intenseye does not capture personally identifiable information from the visual data that we process. We exist to scale worker safety and protect their privacy.

Face Anonymization

Privacy is a non-negotiable, and a founding principal for us at Intenseye. We are GDPR complaint and only retain data, as per your specific company policy. Facial blurring is used in our processes to prevent retaliation, and protect the privacy of workers.

Data Security

Data Segregation and Retention

Intenseye’s system ties each user’s ID with exactly one tenant, which is then used to access the Intenseye Service. All the objects are tenant-based so every time a new object is created it is irrevocably linked to the user’s tenant. The Intenseye system manages these links automatically and restricts access to every object based on user ID, user role, and permissions and their respective tenant. When a user requests any sort of data, the system automatically applies a tenancy filter to ensure that it retrieves only information corresponding to the user’s tenant.

Encryption in-transit and at-rest

Intenseye encrypts every attribute of customer data within the application before it is stored in our database. Intenseye relies on the Advanced Encryption Standard algorithm with a key size of 256 bits. User’s access Intenseye via the internet, protected by Transport Layer Security (TLS). This secures network traffic from passive eavesdropping, active tampering, and forgery of messages.

Regular third party penetration test

Vulnerability assessments and penetration testing of the Intenseye network infrastructure is also evaluated and conducted on a regular basis by both internal Intenseye resources and external third-party vendors.

Data Backups and Disaster Recovery

We have developed a Disaster Recovery Plan that covers emergency and non-emergency conditions to ensure that the company will be able to continue supporting its customers. Intenseye has defined a mature approach to ensure that its information and data are backed up securely and frequently and that its restoration occurs in the most timely and efficient manner possible.

Authentication and Authorization

Intenseye security access is role-based and supports SAML for single-sign-on (SSO). Intenseye allows customers to set up different authentication requirements for different user populations. Intenseye also enables users to select an authentication type in situations where organizations wish to use multiple authentication types for users due to geographical and/or organizational variances.

Training and Awareness

All employees within Intenseye are to undergo annual security awareness training initiatives to ensure they stay abreast of significant security issues that pose a credible threat to the organization as a whole, including, but not limited to, Intenseye’s network infrastructure and all supporting system resources. The training and awareness program is reviewed on at least an annual basis to ensure that it is effective for the organization’s current and future state.

Health and Safety is our number one priority at Coats. It’s been great to partner with Intenseye who shares this priority and who worked with us collaboratively to roll out this innovative technology globally to help us enhance the safety of our employees. Intenseye has been excellent at addressing our needs and finding solutions together as well as listening to our feedback for future developments.

As TİSK & TİSK Microsurgery and Reconstruction Foundation, we’re proud to cooperate with Intenseye to enhance the culture of occupational health and safety in hundreds of facilities from different industries across Turkey. We value their cutting-edge technology, reliability, and easy-to-use platform during our journey to zero incidents. Together, we aim to create a nationwide awareness of workplace health and safety.

When we started the project with Intenseye, initially we have set the existing use cases and got great value from the platform by being able to see the hazards, unsafe acts & conditions, and our compliance rate per facility, area, and even per shift. After that, we have thought about how to use Intenseye’s technology with our existing manufacturing processes. With the involvement of relevant parties and Intenseye team, we were able to shut down the process line automatically when there is an unsafe act and unauthorized entry detected. That added great value to our health and safety management on-site and using the cutting-edge technology for our employees’ safety was also recognized by the Arcelik management and all our employees. We see Intenseye as a great partner to manage health and safety in our facilities and we believe that we will be coming up with many outstanding solutions with the Intenseye Team.

Customers
Our category defining EHS software platform is deployed over 15 countries around the world.

Compatible with 200+ camera make and models

Careers at intenseye

Our well-funded and profitable company is growing fast. We are looking for passionate, talented and creative people to join us.
Schedule a demo
Join our community of EHS professionals. Share your knowledge and experience with peers and develop best practices together.
AI-powered workplace safety
Camera Integrations
Name
Can not find your camera make in the list?
As long as you have IP cameras connected to a network in your facility, we are pretty sure that we can integrate them. You can share the make and models with us through the get a demoform and our integrators will check the compatibility and get back you!
Can not find your camera make in the list?
As long as you have IP cameras connected to a network in your facility, we are pretty sure that we can integrate them. You can share the make and models with us through the get a demoform and our integrators will check the compatibility and get back you!