Trust Center

Security Policy

How Horyqen AI protects customer data, platform integrity, and autonomous defense operations.

Encryption

TLS 1.3 for data in transit. AES-256 for data at rest. Customer-managed keys available for enterprise deployments.

Access Control

Role-based permissions, MFA enforcement, and session isolation across administrative and analytical interfaces.

Network Segmentation

Production environments are isolated with strict egress controls and continuous vulnerability assessment.

Incident Response

Documented playbooks, 24/7 security operations, and customer notification procedures for confirmed incidents.