Helios control plane
Allowlist and deployment health only
Tenant approval, deployment identity, version, and heartbeat stay with Helios.
Privacy
The website is public because buyers need to find and evaluate the product. That does not mean the product should centralize client message data inside the shared Helios environment.
Helios control plane
Tenant approval, deployment identity, version, and heartbeat stay with Helios.
Client data plane
Raw messages, normalized payloads, events, timelines, exports, and secrets stay inside the client Azure environment.
App separation
The sales funnel, the Helios pilot app, and external partner deployments should not be treated as the same operating surface.
Banks, asset managers, hedge funds, and similar institutions do not want a vendor to default into custody of sensitive communications evidence. The correct answer is deployment isolation, not just tenant allowlisting in a shared environment.
The public site should clearly communicate that DecisionTrail can be deployed in a privacy-safe model, explain the boundary between Helios and the client, and route qualified traffic into a sales conversation.
The product must preserve tenant-scoped auth, deployment identity, review auditability, and narrative exports inside the environment that actually owns the data.