Deployment options
Choose the ValidMind deployment option that best suits your organization, ensuring secure data protection and seamless integration with your existing environment.
Available options
Our deployment options provide a balance of control and cost-efficiency while integrating seamlessly with your infrastructure. For added flexibility, you can deploy on Amazon Web Services (AWS), Google Cloud Platform (GCP), or Microsoft Azure.
We offer two deployment models:
Multi-tenant cloud — Multiple organizations (tenants) share infrastructure while keeping data isolated, providing cost-efficiency and scalability. For secure connectivity, a private link can be established to ensure traffic stays within your network, avoiding the public internet.
Virtual Private ValidMind (VPV) — A single-tenant architecture where one organization uses dedicated infrastructure, offering greater control, customization, and enhanced security. This option is ideal for high-compliance needs, and secure connectivity can also be established via a private link.
Architecture overview
In your own environment, model developers can continue to run models using your existing tools for data science and model development, such as Python, Jupyter Notebooks, and R, accessing data from sources such as Google Cloud Storage, Amazon S3, and Snowflake.
These models are then integrated with the ValidMind Library, which communicates with the ValidMind Platform via our Python Library API.
The ValidMind Platform provides:
Model inventory — Centralized tracking and organization of models, accessible by developers, validators, and executives.
Documentation & validation engine — Automated testing and documentation, with validation processes, ensuring compliance with regulations and internal policies.
Template management — Allows for easy creation, customization, and reuse of documentation templates.
ValidMind dashboard — A user-friendly interface providing insights, status updates, and governance reporting for model risk.
Security & data privacy
We ensure data security through strong data isolation, encryption, and role-based access controls.1 Personal identifiable information and customer data are not stored in model documentation. For more information, see our data privacy policy.2
Secure access
Deployments support secure access via private link, giving you full control over your resources without exposing traffic to the public internet. Integration options include:
Additionally, all connections are secured with HTTPS/SSL to ensure encrypted communication.