
SECURITY
BY INVITATION ONLY
Collaboration thrives with trust.
Every member of a team benefits from transparency within a framework of least-privileged access that keeps the tasks focused and protects sensitive information.
HELIX operates with this principle in mind. Build your teams explicitly, use simple rules to grant each person item-level access across features, and use all the standards of a modern cloud platform to trust the information is safely stored and communicated.
With fundamental security taken care of, we can do our best work together.
DETAILS
AUTHENTICATION
Every user is authenticated for every session using OAuth 2.0, the industry-standard protocol for authorization.
INVITATIONS
Individuals gain access to project information only through explicit invitation to the project Directory by project admins.
NON-DISCLOSURE AGREEMENTS
Custom project agreements can be enforced on acceptance of every project Directory invitation, with acknowledgement recorded automatically.
PERMISSIONS
Each individual in the project Directory is given a set of role-based permissions to project information, chosen from a standard set or customized across all features.
PRIVACY
Project access can be restricted to just those in the project Directory, hiding even project names from non-participating members of the project admin company.
ENCRYPTION
All information is encrypted in-flight using certificate authority-signed SSL, and encrypted at rest using AES-256 at the storage layer on Google Cloud Platform.