SECURITY

BY INVITATION ONLY

Collaboration thrives with trust.

Every member of a team benefits from transparency within a framework of least-privileged access that keeps the tasks focused and protects sensitive information.

HELIX operates with this principle in mind. Build your teams explicitly, use simple rules to grant each person item-level access across features, and use all the standards of a modern cloud platform to trust the information is safely stored and communicated.

With fundamental security taken care of, we can do our best work together.

 

DETAILS

AUTHENTICATION

Every user is authenticated for every session using OAuth 2.0, the industry-standard protocol for authorization.

INVITATIONS

Individuals gain access to project information only through explicit invitation to the project Directory by project admins.

NON-DISCLOSURE AGREEMENTS

Custom project agreements can be enforced on acceptance of every project Directory invitation, with acknowledgement recorded automatically.

PERMISSIONS

Each individual in the project Directory is given a set of role-based permissions to project information, chosen from a standard set or customized across all features.

PRIVACY

Project access can be restricted to just those in the project Directory, hiding even project names from non-participating members of the project admin company.

ENCRYPTION

All information is encrypted in-flight using certificate authority-signed SSL, and encrypted at rest using AWS and GCP storage volumes for data and documents.