Org Logo

Controls

Here are the controls implemented at Horizons to ensure compliance, as a part of our security program.

Product security (2)

Vulnerability Remediation Process

Centralized Management of Flaw Remediation Processes

Data security (5)

Multi-factor Authentication

Encrypting Data At Rest

Inventory of Infrastructure Assets

Data Backups

Backup Testing

Network security (8)

Impact analysis

Limit Network Connections

External System Connections

Transmission Confidentiality

Anomalous Behavior

Capacity & Performance Management

Data used in Testing

Centralized Collection of Security Event Logs

App security (1)

Approval of Changes

Endpoint security (2)

Malicious Code Protection (Anti-Malware)

Endpoint Security Validation

Corporate security (24)

Code of Business Conduct

Competency Screening

Personnel Screening

New Hire Policy Acknowledgement

Security & Privacy Awareness

Performance Review

Periodic Policy Acknowledgement

Incident Reporting by Employees

Incident Reporting by Customers

Risk Framing

Risk Assessment

Fraud

Third-Party Criticality Assessments

Information Security Officer

Internal Audit

Periodic Review & Update of Cybersecurity & Privacy Program

Management Review of Org Chart

Management Review of Risks

Management Review of Third-Party Risks

Subservice organization evaluation

Contingency Plan Testing

Asset Ownership Assignment

Data Governance

Updates During Installations / Removals