Security & Governance

Enterprise-Grade Security

Built to operate securely across fragmented and unstructured data while preserving customer control, compliance, and trust.

The platform operates within customer-defined data boundaries, respecting existing access controls, governance policies, and authority structures. Intelligence is generated holistically, but exposed only in line with role, responsibility, and decision rights.

SOC 2 Type II
HIPAA
GDPR
ISO 27001
0
Customer data used for training
Ever
256-bit
AES encryption
At rest
TLS 1.3
Encryption in transit
Always
24/7
Security monitoring
Real-time
Our Commitment

Data Privacy Principles

Built on fundamental principles that put you in complete control.

Your Data Stays Yours

We never train on your data. Complete isolation between tenants with verified right to deletion.

  • No training on customer data
  • Complete tenant isolation
  • Right to deletion with verification

Complete Visibility

Full audit logs of all data access with real-time monitoring and custom retention policies.

  • Full audit logs
  • Real-time monitoring
  • Custom retention policies

Your Infrastructure, Your Rules

Deploy on-premise, in your VPC, or air-gapped. Your data never leaves your control.

  • On-premise deployment
  • VPC deployment
  • Air-gapped support
Compliance

Certifications & Compliance

Independently verified security and compliance standards.

SOC 2 Type II

Certified

Annual third-party audit of security controls

HIPAA

Compliant

Healthcare data protection. BAA available.

GDPR

Compliant

EU data protection and privacy regulation

ISO 27001

Certified

Information security management system

CCPA

Compliant

California consumer privacy protection

SOC 2 Type I

Certified

Point-in-time security assessment

Security Framework

Six Pillars of Trust

With strong isolation, auditability, privacy controls, and transparency built into every layer, Marvin enables organizations to move fast with confidence.

Role-Based Access
Customer-Controlled Data
Tenant Isolation
Data Privacy
Audit & Governance
Transparency & Oversight

Security is not a constraint on intelligence.

It is what makes intelligence usable at scale.

Access Management

Enterprise Access Controls

Single Sign-On
SAML 2.0, OIDC, OAuth 2.0
Role-Based Access
Granular RBAC permissions
Multi-Factor Auth
MFA enforcement policies
Attribute-Based Access
ABAC for fine-grained control
Session Management
Configurable timeouts & controls
IP Allowlisting
Network-level restrictions
Practices

Security Practices