Mixpeek Logo

    Security at Mixpeek

    Protecting your multimodal data, vector embeddings, and ML pipelines with robust security controls. From ingestion to retrieval, security is built into every layer of our platform.

    Multimodal Data Protection

    Your videos, images, audio files, and documents are encrypted at rest using AES-256 and in transit using TLS 1.3. Vector embeddings and extracted features are stored securely in isolated collections.

    API Key Management

    Developer-first API security with key rotation, rate limiting, and request authentication. All API communications are encrypted and authenticated with granular access controls.

    Namespace Isolation

    Multi-tenant architecture with strict namespace-based isolation. Your buckets, collections, and vector embeddings are logically separated from other users with no cross-tenant data access.

    Distributed Compute Security

    Our Ray-based GPU cluster runs in isolated environments with secure job scheduling. ML model inference and feature extraction jobs are sandboxed to prevent unauthorized access.

    Access Control & RBAC

    Role-based access control ensures only authorized users can manage collections, run retrievals, and access indexed data. Fine-grained permissions for buckets, collections, and API operations.

    Audit Logging

    Comprehensive audit trails for all API operations, data ingestion, feature extraction jobs, and retrieval queries. Track who accessed what data and when for complete visibility.

    Pipeline Security

    Secure processing pipelines from ingestion to indexing. Video frames, audio transcriptions, and extracted embeddings are processed in isolated environments with encrypted temporary storage.

    Vector Database Security

    Vector embeddings stored in Qdrant with encrypted connections and isolated collections. MongoDB metadata is secured with authentication, encryption, and access controls.

    Model & LLM Security

    Secure integration with LLM providers (OpenAI, Gemini, etc.) with API key encryption and request monitoring. Budget controls prevent runaway costs and unauthorized usage.

    Security-First Architecture

    Built with security best practices from day one. We're developing our infrastructure with compliance requirements in mind as we work toward certifications like SOC 2 and GDPR readiness.

    Security is a Shared Responsibility

    We secure the platform infrastructure, GPU clusters, and data storage. You control access through API keys, manage your namespace permissions, and configure retrieval pipeline policies. Together, we keep your multimodal data protected.

    Security Reporting

    We take security seriously and encourage responsible disclosure of security vulnerabilities. If you discover a security issue, please report it to our security team.

    [email protected]