Security by design
Your data stays yours
Customer data is encrypted at rest and in transit. We never access your data without explicit permission.
No training on customer data
We never use your documents to train our models. Your proprietary information remains proprietary.
End-to-end encryption
AES-256 encryption at rest, TLS 1.3 in transit. Data is encrypted throughout the entire pipeline.
Role-based access control
Granular permissions let you control exactly who can access what documents and workspaces.
Comprehensive audit logs
Every action is logged with user, timestamp, and context. Full visibility for compliance needs.
Certifications & standards
SOC 2 Type II
Independently audited security controls
CertifiedISO 27001
Information security management
In ProgressGDPR
EU data protection compliance
CompliantCCPA
California privacy compliance
CompliantHIPAA
Healthcare data protection
AvailableTechnical controls
SSO / SAML
Enterprise identity provider integration
Data residency
Choose where your data is stored
Incident response
24/7 security monitoring and response
Network security
WAF, DDoS protection, VPC isolation
Trust throughverifiability
Every answer in Horizon AI is linked to its source. Review the evidence, trace the reasoning, and verify outputs before taking action.
- Citation-backed answers with source links
- Evidence preview for every finding
- Reasoning trace for complex analyses
- Confidence scores and uncertainty flagging
- Full change history and version control
Responsible AI practices
Reviewability
Every AI output can be reviewed, challenged, and corrected. Human judgment remains in the loop.
Controllability
Administrators control which features are enabled, what data is accessible, and who can do what.
Transparency
We're clear about what our AI can and cannot do. No black boxes, no unexplainable outputs.
Appropriate use
Clear policies on acceptable use. We actively prevent misuse and abuse of the platform.