Horizon
Horizon

Welcome to the Official Horizon Security Support Community. Horizon is designed to serve security events, confirm the authenticity of query authors, verify all types of data and operations within large and complex multi-user systems. The horizon is already used in the Territory system. Horizon uses the same-name consensus of trust, using the model of organizing horizontal loyal connections, reputations and behavioral patterns of ordinary people in real life. Anyone can participate in the network. To do this, you must be a user of a system that uses Horizon, as well as have a mobile phone or tablet.

Specialized security system “Horizon” with blockchain technology in the stack and its own consensus of trust, was presented in Moscow at the international forum “Technologies and Security”.

Using the example of using the Horizon system to ensure the security of operations and protect users in the Territory National System, at round tables and expert sessions, the integration capabilities of the Horizon for use in complex critical systems in a variety of areas and for solving problems were considered, including:

- Verification of the authenticity of the authors of requests

- Maintenance of security events and incidents

- Protection of the profile from the actions of attackers

- Verification of changes in personal data

- Verification of operations in the system

- Integrity of private and public communications

- Work with personal and corporate digital signature

- Agreements and transactions, trusted document management

- Transactions with assets

- Version management

At the forum, working meetings were held on the use of the Horizon in third-party projects and applications.

Go to group