Technical Guide

Monolith security & data management procedures

Our approach to ensuring your data is kept safe

Monolith Security & Data Management Procedures

Details

At the core of machine learning lies your data. Making sure that your data is safe is a key part of how we operate. 

In this document, you will find details about:

  • The Monolith platform
  • System architecture and cloud vendors supported
  • Security (standards and certifications)
  • Data security
  • Access control
  • Installation and support

Who should read this guide


  • Data scientists: Gain insights to where your data is stored, how the platform connects with the data, etc...
  • R&D managers: Discover how the Monolith platform works in terms of access control, data storage, etc...
  • Quality assurance professionals: See how the Monolith platform is designed to ensure your data remains safe. 
  • Lab technicians: Learn more about how the Monolith platform interconnects with your systems. 
  • IT team professionals: Understand Monolith's approach to data management, security, and compliance to information security standards. 

By reading this document, you will learn about our data management principles, the controls available when working with Monolith, and our information security standards (ISO27001). 

Download guide