Helcyon was built by someone who managed hundreds of millions across five continents. The same financial discipline that protected billions now protects your business.
Your financial data is the nervous system of your business. It reveals everything — cash position, customer behavior, vendor relationships, operational health. In the wrong hands, it's a weapon. In careless hands, it's a liability.
Helcyon was designed with one non-negotiable principle: we see your data to help you. We never touch it, move it, share it, or use it for anything else.
This isn't a setting. It's the architecture.
Helcyon connects to your accounting software with read-only API access. We can analyze your transactions, interpret your financial patterns, and detect anomalies.
✕
Move, transfer, or touch any funds✕
Create, modify, or delete transactions✕
Access your banking credentials✕
Take any action on your behalf✕
Store payment or login credentialsRead-only permissions are enforced at the API level by your accounting provider (QuickBooks, Xero, etc.). Helcyon cannot request or receive elevated permissions.
What You Can Do
What We Commit To
All data is encrypted at rest and in transit using 256-bit AES encryption with TLS 1.3 — the same standard used by banks, government agencies, and Fortune 500 companies.
Encryption
Infrastructure
Your Access
Our Access
We operate on the principle of least privilege. The majority of our team has zero access to customer data — and never needs it.
No system is invulnerable. What matters is how quickly problems are detected, contained, and communicated.
✓
Detection — Continuous automated monitoring for anomalies, unauthorized access, and potential breaches✓
Response — Documented incident response protocol with designated security team✓
Notification — If your data is affected, you'll be notified within 72 hours with a clear explanation✓
Remediation — Root cause analysis and preventive measures for every incidentOur infrastructure and controls are built to meet enterprise security standards. We're actively completing third-party certifications to formalize what's already in place.
SOC 2 Type II
Security & availability audit
GDPR
EU data protection
CCPA
California privacy compliance
For enterprise customers requiring BAAs, DPAs, or custom compliance documentation — contact us directly.
"I've managed financial operations across five continents — chemicals in Asia, payments in Latin America, food service in the US. Every operation had one thing in common: financial data was the most sensitive asset we handled. Helcyon was built with the same security discipline that protected billions. Because the businesses we serve deserve nothing less."
Lukas Swid
Founder & CEO
Can Helcyon employees see my financial data?
Only with your explicit permission, for a documented support reason, with full access logging. Routine operations require zero access to customer data.
What happens to my data if I cancel?
All data is permanently deleted within 30 days. You can request immediate deletion, and we'll confirm completion within 7 business days.
Do you use my data to train AI models?
No. Your data is never used for training, benchmarking, or any purpose beyond providing your diagnostics.
What if there's a security breach?
If your data is affected, you'll be notified within 72 hours with a full explanation of what happened, what was affected, and what we're doing about it.
Do you have a Data Processing Agreement?
Yes. Contact us for DPA, BAA, or other compliance documentation.