Oxaide
Security, custody & deployment

Trust &
security controls

We are small on purpose and direct about boundaries. Verify runs through a scoped review workflow for the files you share. Horizon can run inside your own environment when you need continuous monitoring. This page shows what we handle, what you control, and how responsibilities change by deployment model.

Trust controls
Managed review or customer-controlled deployment
Scoped review
Verify intake

Files arrive only for the agreed forensic review scope.

Restricted handling
Controlled workspace

Managed reviews use access-controlled workflows and documented retention.

Local deployment
On-site Horizon

Continuous monitoring can run inside your own environment.

Clear ownership
Customer sign-off

Deployment, deletion, and support terms are agreed in advance.

Usual sequence
Start with Verify. Add Horizon only where ongoing monitoring is genuinely needed.

Security Architecture

Oxaide supports two practical operating modes: a managed review workflow for Verify, and customer-controlled deployment for Horizon. The exact controls depend on which mode you buy, so we document them that way instead of pretending every workflow is identical.

Encryption in Transit

All data transmitted between your device and our servers is encrypted using industry-standard TLS 1.3.

Encryption at Rest

Managed storage uses encryption at rest through the underlying hosted infrastructure.

Data Isolation

Customer materials are handled in separate workspaces and only for the agreed review or deployment scope.

Zero-Trust Access

Administrative access follows least-privilege principles and restricted operational workflows.

Continuous Backups

Managed data services use regular backups and recovery controls appropriate to the deployment model.

Infrastructure Monitoring

Managed systems use automated monitoring and alerting for service health and operational anomalies.

Compliance & Privacy

Data Custody Commitment

For Verify engagements, customer data is handled only for the agreed review deliverable. For Horizon deployments, telemetry can remain entirely inside customer-controlled infrastructure.

Practical privacy support

We support customer privacy and security reviews with deployment-specific answers. If you need a DPA, deletion terms, or a customer-controlled deployment path, we scope it directly.

  • Data deletion workflow available on request
  • Data export support for customer materials
  • Data Processing Addendum available where appropriate
  • Security review support for regulated operating environments
  • Can support customer IM8 or internal security review processes with the right deployment model and documentation.

Sub-processors

We keep the managed stack small. These providers may appear in managed workflows. On-premise Horizon deployments can reduce or remove several of them.

ProviderPurposeManaged WorkflowCustomer-Controlled Deployment
Microsoft AzureManaged computeConfigured per engagementCustomer-controlled instance or agreed private deployment
Supabase / AWSDatabaseUsed only where the workflow requires managed storageLocal or customer-controlled storage path where required
Ollama / LocalLocal Agent InferenceN/AClient premises when local inference is required
CloudflareEdge delivery & protectionConfigured only where needed for managed deliveryDirect or edge-protected path, depending on customer architecture

Availability & SLA

Status-first

Support expectations

Managed workflows are monitored and enterprise deployments can include agreed response windows. For on-premise systems, availability is shared with the customer environment and hardware stack.

Managed SLAs are scoped in contract. On-premise deployments depend partly on customer infrastructure, networking, and hardware operations.

Scoped data handling
Encrypted review workflow
Customer-controlled deployment options
Direct principal review