Login
By logging in, you agree to our Terms of Use and Privacy Policy.
© 2026 Red Helix, All Rights Reserved.
Company Reg No. 01828804
By logging in, you agree to our Terms of Use and Privacy Policy.
© 2026 Red Helix, All Rights Reserved.
Company Reg No. 01828804
Enter the 6-digit code from your app.
Last Updated: March 2026
1. Introduction
These Terms of Use ("Terms") govern your access to and use of the Red Helix Security Intelligence Portal ("Portal"). By accessing or using the Portal, you agree to be bound by these Terms.
2. Nature of the Information (Guidance Only)
The information, analytics, and reporting materials displayed on the Portal are provided for general guidance and situational awareness only. They do not constitute professional legal or cybersecurity advice, nor are they a definitive statement of your organisation's security posture.
4. Limitation of Liability
To the maximum extent permitted by applicable law (including the Unfair Contract Terms Act 1977):
5. Portal Availability & "As Is" Basis
The Portal and all data herein are provided on an "as is" and "as available" basis. We expressly disclaim all warranties, express or implied, regarding the accuracy, timeliness, completeness, or reliability of data ingested from third-party sources. Red Helix does not guarantee 100% uptime of the Portal and reserves the right to suspend access for routine maintenance or security updates.
6. Acceptable Use & User Responsibilities
You are responsible for maintaining the confidentiality of your login credentials and must immediately notify Red Helix of any unauthorised use. You agree not to reverse-engineer the Portal, attempt to bypass access controls, run automated vulnerability scanners against the Portal URL without explicit prior written permission, or input malicious payloads into any fields.
7. Third-Party API Authorisation
By integrating third-party security tools into the Portal, you explicitly authorise Red Helix to utilise the provided API keys and credentials to query your environment for the purpose of threat hunting, log analysis, and security posture validation.
8. Governing Law
These Terms are governed by the laws of England and Wales. The courts of England and Wales shall have exclusive jurisdiction.
9. AI Transparency (Principle 10)
This Portal utilises Artificial Intelligence (Google Vertex AI) to assist with threat hunting, risk analysis, and reporting. While robust guardrails are in place, users should be aware that AI-generated content is probabilistic and all critical security decisions should be verified by a human analyst. Data Privacy: Red Helix ensures that customer telemetry and queried data processed via Vertex AI are strictly isolated per tenant and are never used to train Google’s public foundation models.
1. Data Controller
Red Helix Limited is the Data Controller for the personal data processed within this Portal.
2. Data We Collect
We collect and process:
3. Purpose of Processing
We process this data to authenticate users, secure the Portal, and maintain an immutable audit trail for compliance (ISO 27001, SOC 2).
4. Sub-Processors
To deliver this service reliably and securely, we utilize trusted sub-processors, including Google Cloud Platform (Firebase) for hosting, authentication, and database infrastructure, and Microsoft 365 / Third-Party SMTP providers for transactional email delivery. All sub-processors are bound by strict Data Processing Agreements (DPAs).
5. Data Retention & Destruction