Signal Intelligence for retail, critical infrastructure & consumer analytics.

Patented iDTag sensors passively detect and anonymously track any WiFi device — including those rotating/randomizing their identities — SIGINT perimeter protection for utilities, water treatment, pipelines, and government facilities, plus precise journey analytics for retail, gaming, and banking.

Patented Technology Proprietary ML & AI UL Certified FCC Certified GDPR / CCPA Privacy by Design
iPS · LIVE SCAN 10MS
SENSOR iDTAG-01
WIFI · PASSIVE · ANONYMOUS
Electric Utilities Water Treatment Pipelines Cell Towers Federal Facilities DoD Installations Retail Flagships Shopping Centers Gaming & Casinos Banking Theme Parks Convention Centers
How It Works

Intelligence delivered in four steps.

From physical sensor to actionable insight — iViu's end-to-end platform handles every layer, automatically.

STEP 01

Sensor Deployed

iDTag sensors installed at site — indoors or outdoors. PoE or USB-C powered. No facility network required.

STEP 02

Signals Detected

Every 10 milliseconds the sensor sweeps for WiFi devices in range — capturing anonymous signal data with under 1 meter accuracy.

STEP 03

Platform Processes

Signal data transports via MQTT over an encrypted independent uplink to the iDPlatform on Azure — Go-powered services correlate and analyze in real time.

STEP 04

Intelligence Delivered

Dashboards, heatmaps, journey playback, alerts, and API feeds surface decision-ready intelligence for ops and security.

Signal Intelligence — SIGINT

Detect threats before they reach your perimeter.

Traditional physical security — cameras, guards, fencing — can only react once threats arrive. iViu's SIGINT platform passively detects any WiFi-emitting device 600+ feet before it crosses your perimeter — giving operators critical advance time to respond, secure assets, and notify authorities.

SUBSTATION A-12 UDID-120704732518 UDID-774935699588 UDID-674095507544 UDID-697650891632 UDID-100728737997 UDID-302824931412 UDID-781820130315 LAT 33.8366° N LON 117.9143° W DETECTION ZONE — 600FT+ ⚠ ALERT — DEVICE INSIDE PERIMETER ⚠ BREACH — DEVICE INSIDE FENCE WIFI · PASSIVE · ANONYMOUS
Signal Detection Feed — Substation A-12 Live
TIME UDID TYPE RSSI DIST STATUS

Deployed across four critical-infrastructure verticals.

The iDTag sensor operates on its own encrypted independent uplink — no facility network required. Built for critical-infrastructure environments and applicable federal security frameworks. PoE power options for remote deployment.

Electric Utilities
Perimeter monitoring for grid & substations
Water & Pipelines
Distribution perimeter intelligence
Cell Towers
Unauthorized-access detection for telecom
Gov / DoD
Secure SIGINT for federal & state facilities
Full SIGINT Details Request Briefing
SIGINT OPERATIONAL LIFECYCLE

Detect Deter Protect Record.

Four operational pillars covering the full threat response — from invisible early detection through encrypted forensic record.

  1. 01

    Detect

    See it 600+ feet before the fence.

    iDTag sensors perform a passive, promiscuous WiFi spectrum scan 150× per second, capturing any WiFi-emitting device long before traditional cameras or guards can react.

    • Passive, promiscuous wifi spectrum scan
    • Identity-resilient · sees through device identity randomization
    • < 1 m accuracy
  2. 02

    Deter

    Make bad actors leave before they act.

    Integrate with lighting, PA, sirens, and access systems. Confirmed approaches trigger visible deterrents that escalate posture — most threats withdraw before reaching the perimeter.

    • Audible & visible deterrents
    • PA / lighting / siren integration
    • Tiered escalation rules
  3. 03

    Protect

    Alert security, law enforcement, and lockdown in seconds.

    Multi-level automated alerts route through SMS, email, and API. Connect to door access, gates, and lockdown protocols. Security staff in < 1s. Law enforcement in < 5s.

    • SMS / email / API alerts
    • Door access & lockdown hooks
    • Person-of-interest watchlist
  4. 04

    Record

    Every signal, time-stamped and auditable.

    Every detection is logged as an encrypted record — anonymous device fingerprint, timestamp, location — and routed via MQTT to Azure. Operator-controlled audit trail for incident response and forensics.

    • Encrypted, time-stamped log
    • GDPR / CCPA · no PII
    • Forensics-ready audit trail
SIGINT Safety & Security

Bad actor detection,
before they cross the threshold.

Identify persons of interest and bad actors by anonymously tracking the WiFi device signals they emit. The moment a flagged UDID enters an enrolled location, iViu automatically alerts security staff, corporate security, and law enforcement — in that order, in seconds.

UDID ENROLLMENT · ACTIVE
Alert Escalation Ladder AUTOMATED · MULTI-TIER
L1
SECURITY STAFF
Security Officers receive an immediate alert when a person of interest UDID enters the perimeter.
< 1s
L2
CORPORATE SECURITY
Regional and corporate security teams are notified with full event context, location, and historical actor profile.
< 3s
L3
LAW ENFORCEMENT
For confirmed threats, automated notifications are sent to Monitoring Center or Corporate SOC for dispatch to local law enforcement with structured intel for response.
< 5s
L4
STORE LOCKDOWN
Trigger Manual procedure to lockdown door access, lighting, and PA systems to trigger lockdown protocols on confirmed alerts.
manual

Four operating modes.

Each mode triggers independently — configurable per sensor, interior zone, or site. Combine modes on the same deployment for layered coverage.

Restricted Area Presence
Alerts when any WiFi device enters a defined off-limits zone — back office, server room, or employee-only area — regardless of time of day.
After-Hours Detection
Triggers when devices are detected during operator-defined closed hours — exterior perimeter, parking areas, and rooftop access included.
Bad Actor / Person of Interest
Known UDID from the watchlist detected at site level or in a specific interior zone. Triggers on first detection — no dwell time required.
Rule-Based Escalation
Multi-factor trigger on configurable thresholds: proximity distance, dwell time, known bad actor match, device cluster size, or perimeter line crossing — any or all.
PRIVACY GUARANTEE

iViu only tracks anonymous device identifiers (UDIDs). No names, emails, phone numbers, or PII is collected or stored. The UDID is not reversible to its origin-state, and the watchlist is operator-controlled and fully auditable.

Discuss a Deployment Loss Prevention Brief
Consumer Journey Analytics

Understand every step your customers take.

The most actionable and cost-effective consumer intelligence in the industry. Patented iDTag sensors anonymously detect and track any WiFi-enabled device — delivering data for heatmaps, journey playback, dwell time analysis, and real-time dashboards with under 1 meter indoor accuracy. Fully GDPR and CCPA compliant.

Venue Heatmap — Zone Activity
FLAGSHIP STORE / FLOOR 1
ZONE A — ENTRY ZONE B — APPAREL ZONE C — CHECKOUT ZONE D — DISPLAY
Live UPDATED 0S AGO
High Medium Low Trace 4 SENSORS · 1,247 DEVICES · 99.97% UPTIME
Live Metrics Live
Visitors Today
1,247↑ 12.4%
Avg. Dwell Time
18.3min↑ 2.1
Conversion Rate
24.7%↑ 0.8
Return Visitor Rate
68%↓ 1.2
01
Dashboard Views
Reporting on visits, traffic, peak hours, conversion funnels.
02
Heatmap Graphics
Floor-plan heatmaps for high-traffic & dwell hotspots.
03
Journey Playback
Time-based replay of individual device journeys.
04
Visitor Analytics
New vs. returning, frequency, dwell, loyalty trends.
05
Count Reports
Entry/exit tracking and zone occupancy counts.
06
Automated Alerts
SMS/email/API alerts on threshold or anomaly.
Industry Solutions

Built for every venue type.

From individual retail stores to national utility networks — iViu serves commercial and infrastructure environments with a single, scalable sensor platform.

Retail Stores
01
Retail Stores
Analytics, AP & loss prevention
Malls & Centers
02
Malls & Centers
Traffic, tenant, security
Gaming & Casinos
03
Gaming & Casinos
Floor optimization & security
Banking
04
Banking
Branch analytics & alerts
Conventions
05
Conventions
Attendance & journey tracking
Theme Parks
06
Theme Parks
Flow, engagement, queues
Transport Hubs
07
Transport Hubs
Station & terminal analytics
Critical Infra
08
Critical Infra
Utilities, pipelines, gov
The iViu Platform

Three pillars.
One sensor.

A single iDTag sensor deployment powers SIGINT critical-infrastructure protection, retail consumer journey analytics, and safety & bad-actor detection — all simultaneously, from the same hardware investment.

PLATFORM v3.0
PILLAR / 01

Critical Infrastructure SIGINT

Detect bad actors at electric substations, water treatment facilities, pipelines, cell towers, and government installations — minutes before cameras can identify them. WiFi/SIGINT perimeter protection at detection ranges no camera system can match.

  • WiFi/SIGINT perimeter detection
  • Patent-protected identity resilience — proprietary ML defeats device randomization
  • Encrypted independent uplink — no facility network
  • 600ft+ outdoor detection range
Full SIGINT Details
PILLAR / 02

Safety & Bad Actor Detection

Identify persons of interest and bad actors by anonymously tracking WiFi device signals — automatically alerting security staff, corporate security, and law enforcement the moment a flagged device enters any enrolled location.

  • UDID watchlist enrollment — AI-driven pattern matching
  • Multi-tier automated alert escalation
  • Integration to assist in real-time law enforcement notification
  • Alert features to activate door access & lockdown procedures
SIGINT Safety & Security Details
PILLAR / 03

Consumer Journey Analytics

Under 1 meter indoor positioning accuracy — delivering heatmaps, journey playback, dwell time analysis, and real-time dashboards. Patented technology powered by proprietary ML algorithms that turns existing floor space into a data-generating asset.

  • Under 1 meter accuracy
  • Live heatmaps & journey playback
  • New vs. returning visitor segmentation
  • Dashboard & API data feeds
  • Campaign & ops optimization
Consumer Analytics Details
10,000+
Sensors Shipped Worldwide
50.20B
WiFi Signals Processed YTD
<1m
Positioning Accuracy
Over a decade
Providing Foot Traffic Intelligence
iDTag Sensor — iPS Platform

The hardware that powers everything.

The iDTag is iViu's precision indoor positioning sensor — a compact, industrial-rated unit roughly 4×2.5×0.7 inches. One sensor deployment serves both SIGINT critical-infrastructure monitoring and consumer journey analytics. One hardware investment. Two revenue-generating applications.

VIZ MODE · TOPOGRAPHIC PERIMETER
Site-overlay with isobar detection bands
Toggle visualization → iDPlatform · Azure IoT Hub · mTLS
HARDWARE / iDTAG iPS SENSOR

Compact, ruggedized, network-isolated.
Built for any environment.

iDTag iPS Sensor hardware
HARDWARE DIMENSIONS
4.0" × 2.5" × 0.7"
101 × 64 × 18 mm · Approx. 142 g
PoE · USB-C · external whip antenna

Industrial-rated for −40°C to +85°C, PoE or USB powered, with FOTA firmware over Azure IoT Hub. Its encrypted independent uplink means the sensor never touches your facility network — critical for utility, gov, and DoD deployments where network access is restricted.

Accuracy
< 1 m
Scan Rate
10 ms
Operating Range
−40 / +85°C
Power
PoE / USB
Connectivity
Encrypted Uplink
Firmware
FOTA · OTA
POWER PROFILE P = V × I
Voltage
3.3V
typical
Current
250mA
peak Tx · 5 μA sleep
Power
0.825W
worst case · ≤1 W PoE
View Full Spec Sheet Request Eval Unit
Architecture & Deployment

From device to dashboard, end-to-end.

How the SIGINT Platform fits together — solution flow, information flow, deployable capabilities, and a real-world retail deployment.

PLATFORM REFERENCE
01
The First Line of Defense is Proactive Security
CAPABILITIES
✓  Complementary security layer
✓  Identifies repeat offenders & patterns
✓  No line-of-sight required
✓  600+ ft detection radius
✓  Historical data & forensics
OUTCOMES
Before Reactive response
After Proactive prevention
✓  Reduce operational blind spots
✓  Strengthen situational awareness
✓  Improve resolution & evidence

What the solution does.

The SIGINT Platform adds a complementary layer of security — identifying repeat offenders and suspicious patterns with no line-of-sight required and 600+ ft detection radius. Moves security posture from reactive response to proactive risk prevention.

02
WiFi DEVICES
any & all
iDTAG SENSOR
Promiscuous · 150x/sec
ENCRYPTED
MQTT · mTLS
SIGINT PLATFORM
Azure · correlate
· Detects anonymous RF signal data
· Captures randomized device identities
· Cleanses & filters white-noise
· Proactive alerting on defined rules
· Heuristic pattern recognition
· SOC management integration
· GDPR & CCPA compliant
· Retail data analytics
REPEAT OFFENDERS
Identified
LINE-OF-SIGHT
Not required
RANGE
600+ ft radius
HISTORY
Forensic record

How the solution works.

iDTag sensors detect ambient WiFi devices in their coverage area, package each anonymous detection as an encrypted record, and stream it to the SIGINT Platform on Azure for correlation and alerting.

03
WiFi DEVICES
any radio
iDTAG SENSOR
PoE · USB-C
CELLULAR GW
encrypted uplink
AZURE CLOUD
secure store
INTEGRATION SERVICE
· Email & SMS
· Teams Channel
· MQTT
· URL CLI
· REST API
SIGINT MONITOR
· Bad actor matching
· Incident triggers
· Heuristic learning
· SOC integration
PLATFORM UI
· System management
· Configuration
· Data retrieval
· Investigation tool

Information flow.

WiFi device detections route from the iDTag through an encrypted independent uplink (PoE, USB-C, or third-party cellular gateway) to Microsoft Azure — where the Integration Service, SIGINT Monitor, and Platform UI run.

04
BAD ACTOR MONITORING
Continuously Capture Foot Traffic
Sensors placed at entrances and exits to capture Wi-Fi signals from mobile devices entering and leaving.
Alert Triggered on "Bad Actors"
Continuously compares identified devices against the Potential Bad Actors list. Incident message triggered on match.
Record Criminal Events
Captures all devices present at time of incident. Continuously updates Person of Interest and Bad Actor lists.
AFTER HOURS / RESTRICTED AREA
Continuously Capture Foot Traffic
Sensors deployed in surveillance areas to protect equipment and key ingress and egress points.
Alert on Unauthorized Devices
Incident message triggered immediately on detection. Intrusion reported to Live Video Monitoring Center.
AI / SOC Takes Action
Security personnel: record the incident · turn on lights · sound alarm · speak to intruder · dispatch · call authorities
SIGINT detects BAD ACTORS & suspicious activity 3–5 minutes before visible to cameras or other sensors.

SIGINT Operations.

Bad Actor Monitoring tracks repeat offenders and triggers alerts when known bad actors are detected. After-Hours or Restricted Area Monitoring detects unauthorized devices immediately — notifying the SOC or Live Video Monitoring Center.

05
SENSOR RANGE
· 3 ft – 250 ft indoors
· 600+ ft outdoor radius
DEPLOYMENT
✓ Sensor placement — no line-of-sight
✓ Define zones of interest
✓ Adjust coverage range
✓ Define incident trigger rules
✓ Burn-in & learning 2–3 wks
DETECTION MODES
· Bad actor detection
· Person of interest
· Authorized personnel
· Zone level indoor
· Restricted area indoor & outdoor
· After-hours loitering
Sample Retail Store

Capabilities & deployment settings.

Definable sensor range from 3 ft to 250 ft indoors, 600+ ft outdoor radius. No line-of-sight required. Operator-defined zones, coverage range, incident trigger rules, and 2–3 week burn-in for environmental learning.

06
EXTERIOR / AFTER-HOURS
Exterior retail store — after-hours monitoring
· Loitering cluster — Zone 1
· Vehicle of interest — Zone 1
· After-hours loitering detected
INSIDE STORE
Interior retail store — inside store monitoring
· Unauthorized signal in restricted zone
· Known bad actor in store
· Excess persons of interest
Interior Sensor
Exterior Sensor
Visitor
Bad Actor
Person of Interest

Sample deployment — retail.

Layered exterior and interior monitoring. Exterior sensors detect after-hours loitering, vehicle-of-interest proximity, and parking-lot bad actors. Interior sensors detect unauthorized signals in restricted zones and known bad actors entering the store.

07
ANALYTICS DATA
✓ Traffic capture rate
✓ Store visitors
✓ New & repeat visitors
✓ Visit dwell time
✓ Abandonment rate
✓ Visitor frequency
✓ Sale conversion rate
VISITOR COUNTS BY TYPE
· Visitors
· Person of Interest
· Bad actors
SAMPLE METRICS
44,546
Walked by the store
14,371
Walked in
1,757
Repeat visitors
1,387
Purchased
12.7 min
Average time in store

Analytics data.

Every SIGINT-monitored location automatically captures retail analytics at no additional cost: traffic capture rate, dwell time, new vs. repeat visitors, abandonment rate, conversion rate, and visitor counts segmented by type.

Architecture & Proprietary Technology

Anonymous by design.
Engineered for throughput.

The iViu platform is GDPR and CCPA compliant from the ground up. Core platform capabilities — including de-randomization, identity resolution, and indoor positioning — are protected by patents and powered by proprietary ML & AI algorithms developed exclusively by iViu. Our proprietary iViu UDID ensures complete anonymization — no names, emails, phone numbers, or PII. Ever.

01
iViu
iPS Hardware
Patented iDTag sensors. PoE/USB. −40°C to +85°C.
02
Azure Cloud
IoT Hub + iDPlatform. mTLS secured. Global capacity.
03
Go
Go Backend
Compiled Go services for maximum throughput, minimal latency.
04
iViu
iViu UDID
Patent-protected anonymous device identifier. Proprietary ML algorithm resolves every WiFi-emitting device — even when rotating/randomizing its identity. No PII collected or stored. Ever.
Go MySQL MongoDB Azure IoT Hub Encrypted Uplink MQTT mTLS Linux JSON REST API
System Overview

Edge to cloud, in four layers.

The platform spans four layers: sensor hardware at the edge, a secure transport layer via MQTT over TLS, Azure-hosted Go microservices for processing and API, and a MySQL analytics database. Each layer is independently scalable and communicates exclusively over encrypted channels with mutual TLS authentication.

Layer 1
Edge Sensors
iDTag iPS — passive WiFi spectrum sensor
150× / sec scan rate, 600+ ft range
PoE / USB-C direct power options
AES-256 on-device encryption
MQTT client with mTLS cert auth
Layer 2
Secure Transport
EMQX Broker — enterprise MQTT cluster
mTLS — per-device client certificates
TLS 1.2/1.3 in transit
MQTT 3.1.1 / 5.0 protocol
QoS 1 guaranteed delivery
Layer 3
Cloud Processing
Azure — IoT Hub + VM hosting
Go microservices — listener, MCDR, analytics
iViu UDID — proprietary identity resolution
Real time patented positioning services
REST APIs with Bearer token auth
Layer 4
Data & Analytics
MySQL — analytics_db, high-write optimized
Partner Portal — React SPA, JWT sessions
Admin Dashboard — operations & tuning
ORC — Organized Retail Crime - investigation tools and reporting
SumDF — summary data feed API
Backend Services

Go microservices.

All backend services are compiled Go binaries deployed on Azure VMs. Each service is single-purpose, runs as a systemd unit, and communicates internally over private VNet addresses. Services are independently deployable via the iViu deploy toolchain.

Listener

  • Ingests raw MQTT telemetry from all iDTag sensors
  • Validates mTLS client certificates per device
  • Writes raw signal records to analytics_db
  • Scales horizontally via MQTT broker clustering

MCDR Engine

  • Patent-protected mobile de-randomizer — proprietary ML resolves randomized MAC identities
  • Classifies devices into persistent iViu UDIDs in real time
  • Processes signal records in real-time pipeline
  • Configurable sensitivity and dwell thresholds

Positioning

  • Patented sub-1m accuracy — proprietary AI signal-fingerprinting & triangulation
  • Multi-sensor fusion with zone assignment
  • Real-time device location feeds via MQTT
  • Configurable zone maps per site deployment

Partner API

  • Authenticated REST API for partner portal
  • Foot traffic, dwell, conversion, and journey analytics
  • Per-partner data isolation and access control
  • JWT Bearer token sessions with TOTP 2FA

ORC / SumDF

  • Organized Retail Crime - investigation tools and reporting
  • Summary data feed for downstream BI integrations
  • Configurable aggregation windows (5m, 1h, 1d)
  • REST + webhook push delivery options

Alerts & Heartbeat

  • Person-of-interest watchlist alerts via SMS and email
  • Sensor heartbeat monitor with auto-remediation
  • Configurable alert escalation tiers
  • Integration hooks for access control and PA systems
Deployment

Deployment topologies.

iViu supports single-site, multi-site, and enterprise managed deployments. All configurations share the same cloud processing layer with per-site sensor isolation, independent MQTT namespacing, and segregated analytics partitions.

01
Single Site
2–32 sensors · one location
  • PoE switch or USB-C powered sensors on-premise
  • Direct MQTT connection to Azure broker over internet
  • Single location_id partition in analytics_db
  • Setup time: 4–8 hours including calibration
  • Ideal for retail flagship, casino floor, government facility
02
Multi-Site Enterprise
2–500+ locations
  • Independent sensor networks per location
  • Shared EMQX cluster with per-site topic isolation
  • Unified partner portal with per-site drill-down
  • Centralized alerting and watchlist management
  • Ideal for retail chains, mall portfolios, banking networks
03
Critical Infrastructure
Air-gapped & hybrid options
  • On-premise Azure Stack or private cloud deployment
  • Air-gapped operation with local MQTT broker option
  • FIPS 140-2 compliant encryption throughout
  • Integration with VMS and other SOC management platforms
  • Ideal for DoD, utilities, federal facilities, pipelines
Network

Network requirements.

Sensor Uplink Protocol
MQTT 3.1.1 / 5.0 over TLS 1.2+
TCP port 8883 (mTLS) or 443 (WSS)
Required Bandwidth (per sensor)
~50 Kbps uplink typical
~200 Kbps peak (high-traffic environment)
Sensor LAN
10/100 Ethernet or 802.11ac WiFi
Isolated VLAN recommended
Firewall Rules Required
TCP 8883 outbound to broker IP
No inbound ports required on sensor LAN
DNS Requirements
Outbound DNS to broker FQDN
NTP sync required (time-sensitive signal data)
IP Assignment
DHCP or static IPv4
IPv6 optional
Proxy / NAT
NAT traversal supported
Authenticated HTTP proxy not supported
Latency Tolerance
< 500 ms RTT to broker
Buffering up to 30s on disconnect
Security

Security architecture.

Security is enforced at every layer. No sensor can communicate without a valid client certificate. No API call is processed without a verified Bearer token. No PII is collected — device identifiers are anonymous UDIDs derived from signal fingerprints, never linked to personal identity.

mTLS Client Authentication

Every iDTag sensor is provisioned with a unique client certificate signed by the iViu CA. The EMQX broker rejects any connection without a valid certificate — no username/password fallback.

End-to-End Encryption

All sensor-to-cloud traffic is TLS 1.2+ encrypted. Data at rest in the analytics database uses AES-256. Internal service communication occurs over Azure private VNet with no public exposure.

API Authentication — TOTP + Bearer

All administrative and partner API access requires username + argon2-hashed password followed by RFC 6238 TOTP verification. Sessions use UUID v4 Bearer tokens stored server-side with configurable expiry.

Zero PII Architecture

iViu never collects, stores, or transmits personal identifiable information. The iViu UDID is a proprietary anonymous device fingerprint derived from signal characteristics — it cannot be reverse-mapped to a personal identity or linked to any device owner.

Network Segmentation

Sensor LANs are isolated on a dedicated VLAN with no route to corporate networks. Outbound-only firewall rules mean sensors can push telemetry without any inbound attack surface on the customer network.

On-Premise & Air-Gap Options

For critical infrastructure and federal deployments, iViu supports fully on-premise or air-gapped configurations using Azure Stack or private Kubernetes clusters, with no dependency on public internet connectivity.

Installation

Power & installation.

PoE Installation

  • IEEE 802.3af PoE (15.4W) or 802.3at PoE+ (30W)
  • Single CAT5e/CAT6 cable carries power and data
  • Compatible with all standard PoE switches and injectors
  • Mounting: wall, ceiling, pole, or underside of eave
  • Weatherproof enclosure — IP66 rated for outdoor use
  • Operating temp: −30°C to +70°C

Site Survey & Planning

  • iViu engineering performs pre-deployment RF site survey
  • Sensor placement plan optimized for coverage and accuracy
  • Overlap zone analysis to eliminate dead spots
  • Coverage map delivered before hardware ships
  • On-site calibration included with all deployments

Commissioning & Go-Live

  • Remote provisioning via iViu deploy toolchain
  • Certificate issuance and MQTT registration automated
  • Sensor health dashboard live within minutes of power-on
  • Typical go-live: same day as installation
  • Remote monitoring and firmware OTA throughout lifecycle
Integrations

Integrations & APIs.

iViu exposes a full REST API for all analytics data, alerting, and configuration. Custom integrations are supported via webhook push and the Partner API.

Partner REST API

  • Foot traffic counts, dwell times, zone analytics
  • Journey paths and conversion funnel data
  • Historical export — CSV, JSON, or webhook stream
  • OpenAPI 3.0 spec available on request

Alerting Webhooks

  • POI watchlist match — HTTP POST to your endpoint
  • Perimeter breach notifications with GPS coordinates
  • Sensor health alerts — offline, low battery, error
  • Configurable per-event retry and signing
Get In Touch

Ready to transform your intelligence?

Whether you're protecting critical infrastructure or optimizing your retail space, iViu has the platform for you. Contact us to discuss your specific needs or schedule a demo.

Corporate HQ
100 Tower Dr., Ste 115
Burr Ridge, IL 60527
Engineering & Production
Anaheim, CA
Additional Engineering
Milwaukee, WI · San Diego County, CA · Detroit, MI
+ remote developers & engineers nationwide
Phone
(949) 536-8441
Email
sales@iviutech.com
Partner Portal
partner.iviuinsights.com
Request a Briefing SECURE FORM · TLS 1.3
Banking
Conventions
Gaming
Malls
Retail
Theme Parks
Transport
Security
SIGINT / Infra
GDPR & CCPA compliant. No PII shared.