Unleash the potential of your data without compromising privacy.

Avatar software turns your personal data into anonymous synthetic data, ready to be augmented, analyzed, shared, or used in AI — in full compliance.

✅ RGPD-compliant
✅ Successfully evaluated by the CNIL
✅ Made in France
✅ 100% transparent and explainable
✅ Proven confidentiality & maintenance of utility

Avatar platform

What the avatar software allows

At the entrance:

  • Several million lines
  • Several hundreds of columns
  • Numeric and categorical values
  • Dates
  • Geolocations
  • Time series
  • Hierarchical data
Graphic illustration of a database before and after anonymization using the Octopize avatar method
Graphic illustration of the anonymization report, proof of anonymization, generated by the Octopize avatar method

Out:

1. A new avatar dataset
  • Same structure
  • Same granularity
  • Similar aggregates
  • Dependencies on similar variables
2. An anonymization report
  • Confidentiality measures
  • Utility metrics

How to use it?

One of our priorities is to make data anonymized facile thanks to avatar data.
With this in mind, we follow 5 main steps to perform an avatarization:

Pipeline describing the main steps of Octopize's avatar anonymization.
  • Import : Import your data in a few clicks.
  • Set : Define your preferences and constraints.
  • Generate : Turn your data into secure avatar data.
  • Evaluate: Automatically check usefulness and confidentiality.
  • Exploit: Share, analyze, or train your AI models.

Two pillars: usefulness & confidentiality
Avatar evaluates each data set according to these two key criteria.
The result: an automatic, clear and demonstrable report.

And to accompany you?
Training, responsive support, Python and R clients already ready to use.

Simple and secure installation

Available in A few seconds via our SaaS offer, but can be deployed in A few hours on your infrastructures thanks to docker.

Applications consist of several components: a HTTPS API, a Cluster Dask, a temporary storage And a database to store metadata. It is deployed on site via docker-compose.

The end user can use the web client or the python client to facilitate integration into any tool, data processing pipeline, or notebook.

La security is one of our pillars: our code is audited using automated static analysis, data is encrypted in transit and at rest. Find more details in our technical documentation.

Sign up for our tech newsletter!