Security and Governance at Interval
Interval helps enterprises understand their business and customers using blockchain and AI to deliver higher quality experiences and drive new revenue. For our qualified partners in tech-forward economies, security and privacy are the cornerstone of our product development, company culture, and internal operations.
The Interval platform is built for security-conscious organizations who need to handle sensitive business data, customer information, and proprietary insights in a secure and compliant manner. Our architecture meets regulatory requirements across industries and regions by aligning with global privacy frameworks and implementing privacy-preserving technologies by design.
As our software powers mission-critical operations for large corporate partners, our threat model focuses on sophisticated and persistent threats. To mitigate these risks, we enforce a high minimum security standard for all our partners
Interval’s goal is to bridge real-world business activity and cryptographic technology without compromising on data sovereignty or compliance. We do this through:
Privacy Preservation by Design: Data never travels outside authorized zones without encryption; privacy-preserving inference ensures AI can operate even under strict data residency rules.
Secure and Compliant Infrastructure: We deploy a multi-layer defense-in-depth strategy using Infrastructure-as-Code, network segmentation, and continuous monitoring.
Comprehensive Governance: Our platform provides granular access controls, user- or enterprise-level permissioning, and an auditable ledger for data and AI events.
Our Approach
Interval’s security & governance framework will comprise three core pillars: Platform, Enterprise, and Infrastructure.
Platform Security
The Interval platform has security as a core development philosophy. Our unique privacy-preserving inference system enables AI processing while maintaining strict data residency and privacy compliance across global regulations. The platform security model enables:
Strict enforcement: Users only have access to data they're authorized to interact with
Granular controls: Flexible access control with role-based and attribute-based permissions
Transparency: Clear visibility into who has access to resources and why
Usability: Intuitive access management that empowers secure collaboration
The Interval security model addresses both authentication (verifying identity) and authorization (granting access based on attributes and permissions). Our blockchain infrastructure features permissioned ‘mempools’ and networks, ensuring data isn't accessible to the public by default.
Data security is guaranteed through a combination of mandatory and discretionary controls. Mandatory controls propagate through our data lineage capabilities, while discretionary permissions grant specific roles and operations on individual resources. For sensitive data, additional markings ensure only specifically authorized users can discover or access such information. See Interval’s Platform Security document for additional information.
-> Read more about Platform Security
Enterprise Security
We believe core security features should never be premium upgrades. Every partner, regardless of size, receives enterprise-grade security features in our standard offering:
Mandatory encryption of all data, both in transit and at rest, using robust cryptography standards
Strong authentication and identity protection, including single sign-on and multi-factor authentication
Comprehensive authorization controls with mandatory and discretionary access mechanisms
Robust security audit logging for detecting and investigating potential abuse
Highly extensible information governance and privacy controls to meet diverse regulatory requirements
Our privacy-preserving inference system creates a unique security advantage, with the only components seeing clear text data being encrypted and capable of on-premises deployment. This architecture enables compliance with data residency requirements while maintaining AI performance. See Interval’s Enterprise Security document for additional information.
-> Read more about Enterprise Security
Infrastructure Security
Interval's hosted infrastructure includes multiple layers of security controls to protect your data:
Security architecture built around zero trust principles, least privilege, and defense-in-depth
Enforced security baseline configurations with rigorous change management
Network security hardening and segmentation with permissioned access
Intrusion detection systems to identify and prevent anomalous activity
Aggressive vulnerability management and patching
Continuous security monitoring at all layers of the environment
Our infrastructure-as-code approach ensures security controls are consistently applied across deployments. We implement fault isolation and graceful degradation to maintain 99.99% service reliability even during partial outages. See Interval’s Infrastructure Security document for additional information.