Designed with your IT needs in mind.

Butterfly integrates with hospital user identity management and mobile device security systems to enable large scale, seamless and secure deployment of ultrasound.

Security features that keep your data safe.

Single Sign-On.

​Butterfly Single Sign-On (SSO) is a feature that enables users access to the Butterfly mobile application and cloud with one set of credentials. The integration validates usernames and passwords against a corporate user database using the SAML 2.0 protocol.

Mobile Device Management.

Mobile Device Management (MDM) enables Butterfly Enterprise customers to manage user access to the Butterfly mobile application and optimise authentication workflows with their authorised mobile devices.

System integration.

Butterfly Cloud connects to your organisation’s DICOM endpoints using Butterfly Link or an encrypted TLS connection to send ultrasound exams to a Picture Archiving and Communication System (PACS) or Vendor Neutral Archive (VNA). Butterfly also supports sending study documentation to your EMR via HL7 using either an encounter-based or order-based workflow.

Security and user management

Secure by design. Privacy prioritized.

Keep your patient data safe with GDPR-ready cloud storage, SSO for user authentication, and MDM for smart device security, and ultrasound fleet management.

Get the enterprise security control tools you need to scale your point-of-care ultrasound deployment. For more details please see our Technology and Security Whitepaper.

Native data ownership

Maintain ownership of patient data, in a highly resilient and readily available environment with secure storage, collaboration, integration and governance.

Inherent compliance

Adherent with applicable global data protection regulations and data residency within Europe, the United States, Canada, Europe, and Australia.

Scalable data infrastructure.

Scalability without the burden of managing infrastructure, complete with continuous improvements and rapid deployments.

Enterprise shared responsibility model

Security and compliance.

Customer responsibility
Shared
responsibility
Butterfly responsibility
Patient Consent/Assumed Consent
Butterfly Access
System access control
Role types and permissioning
Study finalization restrictions
SSO
MDM
Regulatory Compliance
Data Protection
Data Localization
Encryption
Monitoring and Logging
Vulnerability Management
Patching
Regional Data Protection
Customer responsibility
Patient Consent/Assumed Consent
Butterfly Access
System access control
Role types and permissioning
Study finalization restrictions
Shared responsibility
SSO
MDM
Butterfly responsibility
Data Protection
Data Localization
Encryption
Monitoring and Logging
Vulnerability Management
Patching
Regional Data Protection
Regulatory Compliance