SlideShare una empresa de Scribd logo
1 de 6
Virtual Data Room
 From Deal Making to Due Diligence
           Built with the leading Investment Banks and Law Firms, our
           revolutionary technology is used by tens of thousands of
           professionals all over the world.




               www.EthosData.com
Virtual Data Room:
What you need to know and why

Transactions are becoming increasingly more complicated. Deals involve numerous participants who need
access to an escalating number of documents at any given stage of the deal. This creates a huge
administrative burden on lawyers, bankers and companies driving cost up and slowing down execution.

Our Virtual Data Room helps optimize all stages of the deal cycle. From idea marketing to post closing, with
our Virtual Data Room, you can easily and securely share information with potential investors, buyers and
partners.


1. Security:
Our platform is built on the highest industry standards and technology. Our infrastructure has passed the
most demanding security audits and is SAS 70 Level II compliant. You can easily customize security to each
particular user and/or document – which gives you ultimate control over disclosure.

2. Service:
Our experienced Deal Coordinators will work with you to prepare and perform all steps needed to optimize
set up and execution of your transaction. This includes Virtual Data Room structure design, scanning and
upload of documents, permission management and the rest of our suite. Each project is assigned a local
dedicated Deal Coordinator who is available 24/7.

3. Simplicity:
Our interface and process makes it extremely easy for you to manage the Virtual Data Room. Everything is
essentially point-and-click, meaning there is no learning curve. Although the technology-end of the Virtual
Data Room is quite complex, from the user perspective, it could not be easier.


4. Speed:
Virtual Data Rooms can be set up in a matter of minutes. Our interface and infrastructure are designed to
make the process quick and easy so that you can get started immediately.


5. Cost Certainty:
The cost of our Virtual Data Room is certain and transparent. Our fees include unlimited use of our dedicated
Deal Coordinators and their expertise. There are no hidden fees, overnight or weekend charges.




         24 hours a day, 7 days a week, 365 days a year! Our Deal
        Coordinators have been selected for their M&A experience
                    with banks and investment rms.
Over the years, our platform has evolved with the help of nance professionals, lawyers and
corporations. All the functionality of our platform is built to optimize transactions, to give our users
                  the best and most secure Virtual Data Room experience possible.


Simplicity
The EthosData platform is designed so that both users and administrators can apply its functionality easily
without any training. Its tools and practicality make it very simple for users to get the most from the platform.

Windows Explorer Look and Feel
Users will be able to start working in the Virtual Data Room almost immediately. Navigation has a very familiar
interface, based on the Windows Explorer aesthetic and functionality. It effortlessly guides users and
administrators through the content, without the time-constraining process of training.

Google Powered Search
All documents are searchable by title and content using the world’s leading search engine, Google . Search
terms can be simple or advanced and search results are prioritized by relevance.

Site Map
The Virtual Data Room provides a single view of the entire project that can be easily printable or exportable as a
worksheet. If you need to work on multiple documents, the Site Map allows you to stay in the same window
instead of digging through various folders.

                                                                           Document Messages
                                                                           Administrators can easily send new
                                                                           content or links to all users. Users can also
                                                                           opt to receive daily or weekly emails
                                                                           highlighting any changes in the Virtual
                                                                           Data Room.

                                                                           New Items
                                                                           Users can get a list of the les that have
                                                                           been uploaded to the project since their
                                                                           last log in date or within a date range.
                                                                           Users can also lter to show only unread
                                                                           documents.




                                                                                               Access your
                                                                                               Virtual Data
                                                                                             Room anywhere
                                                                                              in the world.



                               www.EthosData.com
Security
Security is top priority for our clients. We continually invest to keep our technology and platform secure and
con dential.

Infrastructure Security
Our servers are housed in two geographically remote and highly secure data centers with SunGard Availability
Services (SAS70 Type II certi ed), the industry-leading hosting service provider that boasts over 10,000 global
clients. These facilities are used by a number of leading banks, government agencies and blue-chip corporations.
Each facility uses real-time replication, multiple connections, alternate power sources, intrusion detection and
state-of-the-art emergency response systems for further data protection. In addition, re wall mechanisms, virus
scanning and intrusion detection software are continuously monitored on our platform. The hosting facilities are
equipped with video surveillance, proximity card readers and biometric scanners, which operate 24 hours a day,
7 days a week and 365 days a year.

Application Security
Over the years, our software engineers have responded to client and regulatory requirements to ensure that our
application adheres to the highest security standards. This guarantees that all content is safeguarded against
unauthorized access.

Data Encryption
All communication transmitted to and from the Virtual Data Room is protected with 128-bit encryption.

Document Protection and Locking
We use the strongest document level protection available. Our document security provides the ability to
remotely lock down PDF documents. The site administrator can easily control whether users can copy, print,
forward or alter a document.
Our Virtual Data Room can block the use of the “print screen” key, and add a personalized watermark. This
encryption and locking functionality can be enforced on any PDF document posted to the Virtual Data Room
system. Our Virtual Data Room allows you to track and audit usage and even alter permissions and revoke read
access after the document has been distributed.

Process Security
Our operations have been audited for processes, technology and security by leading nancial institutions and
law rms. We also perform regular internal audits to ensure that all points of potential data compromise are
minimized.

Personnel Security
In addition to layers of technical security, we rigorously screen our staff, requiring each employee to sign a non-
disclosure agreement. All EthosData employees from software engineers to account managers, undergo a
thorough background check. All members of staff go through comprehensive training in data privacy and
compliance prior to any involvement in client transactions. All client data is kept strictly con dential and all user
passwords are stored in our secure database in a hash format, inaccessible by even our technical team.




                                                                   Taking every precaution to
                                                                   ensure that your deal is safe
                                                                           and secure




                       www.EthosData.com
Advanced Functionality
Our Virtual Data Room provides simple, effective tools that allow our clients to obtain valuable information
regarding the individual interest of each user. It also tracks every single action for compliance, and provides a
very powerful and easy to use platform to organize all questions and answers about a document or folder.

Reporting
Get detailed information about the activities of each user or organization including what documents he or she
has viewed, questions asked and log-ins. Information is presented in an easy-to-read graphical format. The
underlying detailed information can be exported to Excel for further analysis.

QnA
Manage the entire the ow of questions and comments about a given document with convenience and ease.
Administrators can answer multiple questions, add links to existing documents and export to Excel for easy
organization.

Audit
The Virtual Data Room logs every action performed by users in the system. Site administrators can search
these actions using our comprehensive audit search tool. Each audit record will provide information on the
action, the user that performed the action, the exact date and time when the action was performed, and any
additional metadata relevant to the action. This ensures full coverage to minimize the risks associated with all
aspects of compliance and disclosure.




                                                                 Customized to your
                                                              speci cations for ultimate
                                                                     disclosure


Speed
Our platform and processes are set up so that projects can be launched in minutes.

Add a folder structure in one go
Easily upload entire projects with multiple les and folders. No need for cumbersome installations or plug-ins.

Bulk upload of users
Adding a list of users is as easy as pasting their email addresses together in one text box. The platform will do
the rest, guiding the administrator through the process with a few simple steps.

Open documents fast
Our PDF based document encryption provides a secure and speedy experience for the user. Users can also
download more than one le at a time with the bulk download tool.



                             www.EthosData.com
Speed, Security and Service
brought to you by EthosData the leading provider of
critical document exchange services.




                        www.EthosData.com
                      contact@EthosData.com



                              (c) 2010 EthosData Limited

Más contenido relacionado

La actualidad más candente

Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudIRJET Journal
 
IRJET- Document Management System, Open Source and Secure
IRJET-  	  Document Management System, Open Source and SecureIRJET-  	  Document Management System, Open Source and Secure
IRJET- Document Management System, Open Source and SecureIRJET Journal
 
Identity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud StorageIdentity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud Storage1crore projects
 
Design and implementation of a privacy preserved off premises cloud storage
Design and implementation of a privacy preserved off premises cloud storageDesign and implementation of a privacy preserved off premises cloud storage
Design and implementation of a privacy preserved off premises cloud storagesarfraznawaz
 
Remote Access and Dual Authentication for Cloud Storage
Remote Access and Dual Authentication for Cloud StorageRemote Access and Dual Authentication for Cloud Storage
Remote Access and Dual Authentication for Cloud StorageIJMER
 
Reactive Systems with Data Distribution Service (DDS)
Reactive Systems with Data Distribution Service (DDS)Reactive Systems with Data Distribution Service (DDS)
Reactive Systems with Data Distribution Service (DDS)Abdullah Ozturk
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniquesijcsa
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationIRJET Journal
 
M365 launch event introduction - 090518
M365 launch event   introduction - 090518M365 launch event   introduction - 090518
M365 launch event introduction - 090518Jonathan Stuckey
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
Information Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud ComputingInformation Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud ComputingIJERA Editor
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Shakas Technologies
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
 
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...IRJET Journal
 
Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...eSAT Publishing House
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationIJSRD
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computingAlexander Decker
 

La actualidad más candente (20)

Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
 
IRJET- Document Management System, Open Source and Secure
IRJET-  	  Document Management System, Open Source and SecureIRJET-  	  Document Management System, Open Source and Secure
IRJET- Document Management System, Open Source and Secure
 
Identity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud StorageIdentity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud Storage
 
Design and implementation of a privacy preserved off premises cloud storage
Design and implementation of a privacy preserved off premises cloud storageDesign and implementation of a privacy preserved off premises cloud storage
Design and implementation of a privacy preserved off premises cloud storage
 
Remote Access and Dual Authentication for Cloud Storage
Remote Access and Dual Authentication for Cloud StorageRemote Access and Dual Authentication for Cloud Storage
Remote Access and Dual Authentication for Cloud Storage
 
Reactive Systems with Data Distribution Service (DDS)
Reactive Systems with Data Distribution Service (DDS)Reactive Systems with Data Distribution Service (DDS)
Reactive Systems with Data Distribution Service (DDS)
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniques
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
 
M365 launch event introduction - 090518
M365 launch event   introduction - 090518M365 launch event   introduction - 090518
M365 launch event introduction - 090518
 
L04302088092
L04302088092L04302088092
L04302088092
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
Information Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud ComputingInformation Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud Computing
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
 
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
 
Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 

Destacado

Modernidad en latinoamerica
Modernidad en latinoamericaModernidad en latinoamerica
Modernidad en latinoamericadaniel2094
 
Turismo alternativo
Turismo alternativoTurismo alternativo
Turismo alternativoEstef1214
 
Pantallas Electrónicas Publicitarias de LED P10 Asincrónica
Pantallas Electrónicas Publicitarias de LED P10 Asincrónica Pantallas Electrónicas Publicitarias de LED P10 Asincrónica
Pantallas Electrónicas Publicitarias de LED P10 Asincrónica Pantallas Electrónicas LED DMX
 
Anahilia y Gabriela
Anahilia y Gabriela Anahilia y Gabriela
Anahilia y Gabriela EscapadaRural
 
PROTOCOLO FINAL
PROTOCOLO FINALPROTOCOLO FINAL
PROTOCOLO FINALrogelio01
 
Horizon V72 Presentation
Horizon V72 PresentationHorizon V72 Presentation
Horizon V72 PresentationJay Goldman
 
Tinae Goodell Resume 01 15
Tinae Goodell Resume 01 15Tinae Goodell Resume 01 15
Tinae Goodell Resume 01 15tgoodell
 
Historia de la arquitectura seccion 4ª [recovered]
Historia de la arquitectura seccion 4ª [recovered]Historia de la arquitectura seccion 4ª [recovered]
Historia de la arquitectura seccion 4ª [recovered]daniel2094
 
Elementos de diseño de ciudades
Elementos de diseño de ciudadesElementos de diseño de ciudades
Elementos de diseño de ciudadesJorge Augusto
 
Historia de la arq.
Historia de la arq.Historia de la arq.
Historia de la arq.Will Alfonzo
 
La Naturaleza de las Ciudades - Ludwig Karl Hilberseimer V3
La Naturaleza de las Ciudades - Ludwig Karl Hilberseimer V3La Naturaleza de las Ciudades - Ludwig Karl Hilberseimer V3
La Naturaleza de las Ciudades - Ludwig Karl Hilberseimer V3Proyectar Ciudad
 
112023155 catena-aurea-do-evangelho-de-nosso-senhor-jesus-cristo-segundo-sao-...
112023155 catena-aurea-do-evangelho-de-nosso-senhor-jesus-cristo-segundo-sao-...112023155 catena-aurea-do-evangelho-de-nosso-senhor-jesus-cristo-segundo-sao-...
112023155 catena-aurea-do-evangelho-de-nosso-senhor-jesus-cristo-segundo-sao-...rooseveltdecastro
 
Paola embarazo
Paola embarazoPaola embarazo
Paola embarazoCINTHIPAO
 
Presentación Jorge Bailey - eRetail Day México 2016
Presentación Jorge Bailey - eRetail Day México 2016Presentación Jorge Bailey - eRetail Day México 2016
Presentación Jorge Bailey - eRetail Day México 2016eCommerce Institute
 
Quinta Da Malagueira - Alvaro Siza
Quinta Da Malagueira - Alvaro SizaQuinta Da Malagueira - Alvaro Siza
Quinta Da Malagueira - Alvaro SizaJoseph Valladolid
 
Innovar para Ganar - Jurgen Klaric
Innovar para Ganar - Jurgen KlaricInnovar para Ganar - Jurgen Klaric
Innovar para Ganar - Jurgen KlaricTic Forum - Movistar
 

Destacado (20)

Modernidad en latinoamerica
Modernidad en latinoamericaModernidad en latinoamerica
Modernidad en latinoamerica
 
Turismo alternativo
Turismo alternativoTurismo alternativo
Turismo alternativo
 
Pantallas Electrónicas Publicitarias de LED P10 Asincrónica
Pantallas Electrónicas Publicitarias de LED P10 Asincrónica Pantallas Electrónicas Publicitarias de LED P10 Asincrónica
Pantallas Electrónicas Publicitarias de LED P10 Asincrónica
 
Anahilia y Gabriela
Anahilia y Gabriela Anahilia y Gabriela
Anahilia y Gabriela
 
PROTOCOLO FINAL
PROTOCOLO FINALPROTOCOLO FINAL
PROTOCOLO FINAL
 
Carmen Suárez
Carmen SuárezCarmen Suárez
Carmen Suárez
 
Whats app security-whitepaper
Whats app security-whitepaperWhats app security-whitepaper
Whats app security-whitepaper
 
Horizon V72 Presentation
Horizon V72 PresentationHorizon V72 Presentation
Horizon V72 Presentation
 
Tinae Goodell Resume 01 15
Tinae Goodell Resume 01 15Tinae Goodell Resume 01 15
Tinae Goodell Resume 01 15
 
Historia de la arquitectura seccion 4ª [recovered]
Historia de la arquitectura seccion 4ª [recovered]Historia de la arquitectura seccion 4ª [recovered]
Historia de la arquitectura seccion 4ª [recovered]
 
Elementos de diseño de ciudades
Elementos de diseño de ciudadesElementos de diseño de ciudades
Elementos de diseño de ciudades
 
Sebastián Valencia Usuga
Sebastián Valencia UsugaSebastián Valencia Usuga
Sebastián Valencia Usuga
 
Historia de la arq.
Historia de la arq.Historia de la arq.
Historia de la arq.
 
La Naturaleza de las Ciudades - Ludwig Karl Hilberseimer V3
La Naturaleza de las Ciudades - Ludwig Karl Hilberseimer V3La Naturaleza de las Ciudades - Ludwig Karl Hilberseimer V3
La Naturaleza de las Ciudades - Ludwig Karl Hilberseimer V3
 
112023155 catena-aurea-do-evangelho-de-nosso-senhor-jesus-cristo-segundo-sao-...
112023155 catena-aurea-do-evangelho-de-nosso-senhor-jesus-cristo-segundo-sao-...112023155 catena-aurea-do-evangelho-de-nosso-senhor-jesus-cristo-segundo-sao-...
112023155 catena-aurea-do-evangelho-de-nosso-senhor-jesus-cristo-segundo-sao-...
 
Paola embarazo
Paola embarazoPaola embarazo
Paola embarazo
 
Presentación Jorge Bailey - eRetail Day México 2016
Presentación Jorge Bailey - eRetail Day México 2016Presentación Jorge Bailey - eRetail Day México 2016
Presentación Jorge Bailey - eRetail Day México 2016
 
Quinta Da Malagueira - Alvaro Siza
Quinta Da Malagueira - Alvaro SizaQuinta Da Malagueira - Alvaro Siza
Quinta Da Malagueira - Alvaro Siza
 
Innovar para Ganar - Jurgen Klaric
Innovar para Ganar - Jurgen KlaricInnovar para Ganar - Jurgen Klaric
Innovar para Ganar - Jurgen Klaric
 
Unidad 5
Unidad 5Unidad 5
Unidad 5
 

Similar a Virtual Data Room Brochure

201002 vdr-brochure-international
201002 vdr-brochure-international201002 vdr-brochure-international
201002 vdr-brochure-internationalEthosData
 
Virtual Data Room Brochure
Virtual Data Room BrochureVirtual Data Room Brochure
Virtual Data Room BrochureEthosData
 
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...IRJET Journal
 
Company profile TriCoSys Solutions Private Limited
Company profile TriCoSys Solutions Private LimitedCompany profile TriCoSys Solutions Private Limited
Company profile TriCoSys Solutions Private LimitedSubodh Deshpande
 
DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010dcampbellelite
 
DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010Darrin Campbell
 
Restore brochure optimising document management through technology
Restore brochure optimising document management through technologyRestore brochure optimising document management through technology
Restore brochure optimising document management through technologyNicola (Grice) Tatters
 
Landmark In Control Product Flyer
Landmark In Control Product FlyerLandmark In Control Product Flyer
Landmark In Control Product Flyertaglia3
 
How Virtual Data Rooms Are Revolutionizing Business Transactions.pdf
How Virtual Data Rooms Are Revolutionizing Business Transactions.pdfHow Virtual Data Rooms Are Revolutionizing Business Transactions.pdf
How Virtual Data Rooms Are Revolutionizing Business Transactions.pdfHokme
 
Progea Cloud - Databoom eng
Progea Cloud - Databoom engProgea Cloud - Databoom eng
Progea Cloud - Databoom engSimona Giosa
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principlesardexateam
 
Inforouterproducttour V7
Inforouterproducttour V7Inforouterproducttour V7
Inforouterproducttour V7Charles Rey
 

Similar a Virtual Data Room Brochure (20)

201002 vdr-brochure-international
201002 vdr-brochure-international201002 vdr-brochure-international
201002 vdr-brochure-international
 
Virtual Data Room Brochure
Virtual Data Room BrochureVirtual Data Room Brochure
Virtual Data Room Brochure
 
eQuorum-eBook-6-2021.pdf
eQuorum-eBook-6-2021.pdfeQuorum-eBook-6-2021.pdf
eQuorum-eBook-6-2021.pdf
 
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
 
Tech Vault Solution
Tech Vault SolutionTech Vault Solution
Tech Vault Solution
 
Electronic Data Discovery
Electronic Data DiscoveryElectronic Data Discovery
Electronic Data Discovery
 
LiveDOCS
LiveDOCSLiveDOCS
LiveDOCS
 
Company profile TriCoSys Solutions Private Limited
Company profile TriCoSys Solutions Private LimitedCompany profile TriCoSys Solutions Private Limited
Company profile TriCoSys Solutions Private Limited
 
DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010
 
DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010
 
Restore brochure optimising document management through technology
Restore brochure optimising document management through technologyRestore brochure optimising document management through technology
Restore brochure optimising document management through technology
 
Landmark In Control Product Flyer
Landmark In Control Product FlyerLandmark In Control Product Flyer
Landmark In Control Product Flyer
 
DocTrix DocFlow 2013
DocTrix DocFlow 2013DocTrix DocFlow 2013
DocTrix DocFlow 2013
 
Abhilash_Documentum
Abhilash_Documentum Abhilash_Documentum
Abhilash_Documentum
 
Abhilash_Documentum
Abhilash_Documentum Abhilash_Documentum
Abhilash_Documentum
 
Document case study-Systweak - Go4Hosting
Document case study-Systweak - Go4HostingDocument case study-Systweak - Go4Hosting
Document case study-Systweak - Go4Hosting
 
How Virtual Data Rooms Are Revolutionizing Business Transactions.pdf
How Virtual Data Rooms Are Revolutionizing Business Transactions.pdfHow Virtual Data Rooms Are Revolutionizing Business Transactions.pdf
How Virtual Data Rooms Are Revolutionizing Business Transactions.pdf
 
Progea Cloud - Databoom eng
Progea Cloud - Databoom engProgea Cloud - Databoom eng
Progea Cloud - Databoom eng
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principles
 
Inforouterproducttour V7
Inforouterproducttour V7Inforouterproducttour V7
Inforouterproducttour V7
 

Virtual Data Room Brochure

  • 1. Virtual Data Room From Deal Making to Due Diligence Built with the leading Investment Banks and Law Firms, our revolutionary technology is used by tens of thousands of professionals all over the world. www.EthosData.com
  • 2. Virtual Data Room: What you need to know and why Transactions are becoming increasingly more complicated. Deals involve numerous participants who need access to an escalating number of documents at any given stage of the deal. This creates a huge administrative burden on lawyers, bankers and companies driving cost up and slowing down execution. Our Virtual Data Room helps optimize all stages of the deal cycle. From idea marketing to post closing, with our Virtual Data Room, you can easily and securely share information with potential investors, buyers and partners. 1. Security: Our platform is built on the highest industry standards and technology. Our infrastructure has passed the most demanding security audits and is SAS 70 Level II compliant. You can easily customize security to each particular user and/or document – which gives you ultimate control over disclosure. 2. Service: Our experienced Deal Coordinators will work with you to prepare and perform all steps needed to optimize set up and execution of your transaction. This includes Virtual Data Room structure design, scanning and upload of documents, permission management and the rest of our suite. Each project is assigned a local dedicated Deal Coordinator who is available 24/7. 3. Simplicity: Our interface and process makes it extremely easy for you to manage the Virtual Data Room. Everything is essentially point-and-click, meaning there is no learning curve. Although the technology-end of the Virtual Data Room is quite complex, from the user perspective, it could not be easier. 4. Speed: Virtual Data Rooms can be set up in a matter of minutes. Our interface and infrastructure are designed to make the process quick and easy so that you can get started immediately. 5. Cost Certainty: The cost of our Virtual Data Room is certain and transparent. Our fees include unlimited use of our dedicated Deal Coordinators and their expertise. There are no hidden fees, overnight or weekend charges. 24 hours a day, 7 days a week, 365 days a year! Our Deal Coordinators have been selected for their M&A experience with banks and investment rms.
  • 3. Over the years, our platform has evolved with the help of nance professionals, lawyers and corporations. All the functionality of our platform is built to optimize transactions, to give our users the best and most secure Virtual Data Room experience possible. Simplicity The EthosData platform is designed so that both users and administrators can apply its functionality easily without any training. Its tools and practicality make it very simple for users to get the most from the platform. Windows Explorer Look and Feel Users will be able to start working in the Virtual Data Room almost immediately. Navigation has a very familiar interface, based on the Windows Explorer aesthetic and functionality. It effortlessly guides users and administrators through the content, without the time-constraining process of training. Google Powered Search All documents are searchable by title and content using the world’s leading search engine, Google . Search terms can be simple or advanced and search results are prioritized by relevance. Site Map The Virtual Data Room provides a single view of the entire project that can be easily printable or exportable as a worksheet. If you need to work on multiple documents, the Site Map allows you to stay in the same window instead of digging through various folders. Document Messages Administrators can easily send new content or links to all users. Users can also opt to receive daily or weekly emails highlighting any changes in the Virtual Data Room. New Items Users can get a list of the les that have been uploaded to the project since their last log in date or within a date range. Users can also lter to show only unread documents. Access your Virtual Data Room anywhere in the world. www.EthosData.com
  • 4. Security Security is top priority for our clients. We continually invest to keep our technology and platform secure and con dential. Infrastructure Security Our servers are housed in two geographically remote and highly secure data centers with SunGard Availability Services (SAS70 Type II certi ed), the industry-leading hosting service provider that boasts over 10,000 global clients. These facilities are used by a number of leading banks, government agencies and blue-chip corporations. Each facility uses real-time replication, multiple connections, alternate power sources, intrusion detection and state-of-the-art emergency response systems for further data protection. In addition, re wall mechanisms, virus scanning and intrusion detection software are continuously monitored on our platform. The hosting facilities are equipped with video surveillance, proximity card readers and biometric scanners, which operate 24 hours a day, 7 days a week and 365 days a year. Application Security Over the years, our software engineers have responded to client and regulatory requirements to ensure that our application adheres to the highest security standards. This guarantees that all content is safeguarded against unauthorized access. Data Encryption All communication transmitted to and from the Virtual Data Room is protected with 128-bit encryption. Document Protection and Locking We use the strongest document level protection available. Our document security provides the ability to remotely lock down PDF documents. The site administrator can easily control whether users can copy, print, forward or alter a document. Our Virtual Data Room can block the use of the “print screen” key, and add a personalized watermark. This encryption and locking functionality can be enforced on any PDF document posted to the Virtual Data Room system. Our Virtual Data Room allows you to track and audit usage and even alter permissions and revoke read access after the document has been distributed. Process Security Our operations have been audited for processes, technology and security by leading nancial institutions and law rms. We also perform regular internal audits to ensure that all points of potential data compromise are minimized. Personnel Security In addition to layers of technical security, we rigorously screen our staff, requiring each employee to sign a non- disclosure agreement. All EthosData employees from software engineers to account managers, undergo a thorough background check. All members of staff go through comprehensive training in data privacy and compliance prior to any involvement in client transactions. All client data is kept strictly con dential and all user passwords are stored in our secure database in a hash format, inaccessible by even our technical team. Taking every precaution to ensure that your deal is safe and secure www.EthosData.com
  • 5. Advanced Functionality Our Virtual Data Room provides simple, effective tools that allow our clients to obtain valuable information regarding the individual interest of each user. It also tracks every single action for compliance, and provides a very powerful and easy to use platform to organize all questions and answers about a document or folder. Reporting Get detailed information about the activities of each user or organization including what documents he or she has viewed, questions asked and log-ins. Information is presented in an easy-to-read graphical format. The underlying detailed information can be exported to Excel for further analysis. QnA Manage the entire the ow of questions and comments about a given document with convenience and ease. Administrators can answer multiple questions, add links to existing documents and export to Excel for easy organization. Audit The Virtual Data Room logs every action performed by users in the system. Site administrators can search these actions using our comprehensive audit search tool. Each audit record will provide information on the action, the user that performed the action, the exact date and time when the action was performed, and any additional metadata relevant to the action. This ensures full coverage to minimize the risks associated with all aspects of compliance and disclosure. Customized to your speci cations for ultimate disclosure Speed Our platform and processes are set up so that projects can be launched in minutes. Add a folder structure in one go Easily upload entire projects with multiple les and folders. No need for cumbersome installations or plug-ins. Bulk upload of users Adding a list of users is as easy as pasting their email addresses together in one text box. The platform will do the rest, guiding the administrator through the process with a few simple steps. Open documents fast Our PDF based document encryption provides a secure and speedy experience for the user. Users can also download more than one le at a time with the bulk download tool. www.EthosData.com
  • 6. Speed, Security and Service brought to you by EthosData the leading provider of critical document exchange services. www.EthosData.com contact@EthosData.com (c) 2010 EthosData Limited