skip to Main Content

About Horizon

Accomplish your mission with the right experts by your side.

Providing Supreme Customer Support


These are the values our company is built upon.

Our Values:

  1. We embrace Customer Service as our number one priority.
  2. We view Teamwork and Professionalism necessary for Excellence.
  3. We view Quality as necessary for continued success.
  4. We recognize Diversity and deliver Creativity.

It's a Team Effort

Horizon will be recognized as possessing excellence in research and development; demonstrating exceptional customer service; listening to and acting upon the needs of our customers; being a respected strategic partner with our customers; and, providing business applications and technology services at a competitive rate.

Security is Our Priority

Security is Our Priority

Your organization’s data security is mission-critical, and we take our commitment to protecting it extremely seriously. It’s just one more reason many human services organizations trust us as their partner.

Our world-class security, privacy, and risk-management teams work every day to ensure the safety of your data by adhering to industry standard practices, conducting ongoing risk assessments, aggressively testing the security of our products, and continually assessing our infrastructure.

Compliance & Certifications

We maintain numerous security certifications, and our solutions meet rigorous security and privacy standards, as validated by external auditors.


Horizon Information Systems, Inc. has demonstrated compliance with federal HIPAA regulation by completing Compliancy Group’s proprietary 6-Stage HIPAA Risk Analysis and remediation process.

At Horizon Information Systems, we promise to be vigilant with the protection of sensitive and personal health information. We believe in purposeful training that not only highlights how to remain compliant, but also shows why we need to protect the data our software is designed to manage.

Horizon employees are trained to respect the sensitivity of the data stored in our programs, and we are extensively educated in best practice methods of protecting our users and ourselves from any potential threats.

Back To Top