Here are some frequently asked questions about Horizons’s security posture.
Overview
Compliances
Controls
Resources
Subprocessors
FAQ
Where is the Horizons system and its data hosted?
What network security is in place to help Horizons respond to common methods of attack?
What physical security measures are in place?
How secure is Horizons’s network?
What is Horizons’s software maintenance/patching strategy?
Will data be encrypted at rest?
Will data be encrypted in transit?
What user activity auditing does Horizons have in place?
What does Horizons do around multi-factor authentication to access the system?
What Disaster Recovery provision does Horizons have in place?
What is Horizons’s uptime and availability?
What is your data retention policy?
How does Horizons securely identify and delete any data the Customer requests Horizons delete?
How does Horizons ensure that its sub-processors meet its security policies?
What measures does Horizons have in place to prevent the accidental or deliberate publication of protected information, data corruption or loss?
Is Horizons a data processor or data controller?
Where can I find out more about how Horizons will support our obligations under GDPR, including provisions to protect the rights of data subjects.
Create your own Trust Center | Powered by