Security and Governance at Interval

Interval helps enterprises understand their business and customers using blockchain and AI to deliver higher quality experiences and drive new revenue. For our qualified partners in tech-forward economies, security and privacy are the cornerstone of our product development, company culture, and internal operations.

The Interval platform is built for security-conscious organizations who need to handle sensitive business data, customer information, and proprietary insights in a secure and compliant manner. Our architecture meets regulatory requirements across industries and regions by aligning with global privacy frameworks and implementing privacy-preserving technologies by design.

As our software powers mission-critical operations for large corporate partners, our threat model focuses on sophisticated and persistent threats. To mitigate these risks, we enforce a high minimum security standard for all our partners

Interval’s goal is to bridge real-world business activity and cryptographic technology without compromising on data sovereignty or compliance. We do this through:

  • Privacy Preservation by Design: Data never travels outside authorized zones without encryption; privacy-preserving inference ensures AI can operate even under strict data residency rules.

  • Secure and Compliant Infrastructure: We deploy a multi-layer defense-in-depth strategy using Infrastructure-as-Code, network segmentation, and continuous monitoring.

Comprehensive Governance: Our platform provides granular access controls, user- or enterprise-level permissioning, and an auditable ledger for data and AI events.

Our Approach

Interval’s security & governance framework will comprise three core pillars: Platform, Enterprise, and Infrastructure.

Platform Security

The Interval platform has security as a core development philosophy. Our unique privacy-preserving inference system enables AI processing while maintaining strict data residency and privacy compliance across global regulations. The platform security model enables:

  • Strict enforcement: Users only have access to data they're authorized to interact with

  • Granular controls: Flexible access control with role-based and attribute-based permissions

  • Transparency: Clear visibility into who has access to resources and why

  • Usability: Intuitive access management that empowers secure collaboration

The Interval security model addresses both authentication (verifying identity) and authorization (granting access based on attributes and permissions). Our blockchain infrastructure features permissioned ‘mempools’ and networks, ensuring data isn't accessible to the public by default.

Data security is guaranteed through a combination of mandatory and discretionary controls. Mandatory controls propagate through our data lineage capabilities, while discretionary permissions grant specific roles and operations on individual resources. For sensitive data, additional markings ensure only specifically authorized users can discover or access such information. See Interval’s Platform Security document for additional information.

-> Read more about Platform Security

Enterprise Security

We believe core security features should never be premium upgrades. Every partner, regardless of size, receives enterprise-grade security features in our standard offering:

  • Mandatory encryption of all data, both in transit and at rest, using robust cryptography standards

  • Strong authentication and identity protection, including single sign-on and multi-factor authentication

  • Comprehensive authorization controls with mandatory and discretionary access mechanisms

  • Robust security audit logging for detecting and investigating potential abuse

  • Highly extensible information governance and privacy controls to meet diverse regulatory requirements

Our privacy-preserving inference system creates a unique security advantage, with the only components seeing clear text data being encrypted and capable of on-premises deployment. This architecture enables compliance with data residency requirements while maintaining AI performance. See Interval’s Enterprise Security document for additional information.

-> Read more about Enterprise Security

Infrastructure Security

Interval's hosted infrastructure includes multiple layers of security controls to protect your data:

  • Security architecture built around zero trust principles, least privilege, and defense-in-depth

  • Enforced security baseline configurations with rigorous change management

  • Network security hardening and segmentation with permissioned access

  • Intrusion detection systems to identify and prevent anomalous activity

  • Aggressive vulnerability management and patching

  • Continuous security monitoring at all layers of the environment

Our infrastructure-as-code approach ensures security controls are consistently applied across deployments. We implement fault isolation and graceful degradation to maintain 99.99% service reliability even during partial outages. See Interval’s Infrastructure Security document for additional information.

-> Read more about Infrastructure Security

Interval revolutionizes how businesses turn data into new markets.

© 2025 Interval Network. All rights reserved.

Interval revolutionizes how businesses turn data into new markets.

© 2025 Interval Network. All rights reserved.

Interval revolutionizes how businesses turn data into new markets.

© 2025 Interval Network. All rights reserved.