SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
Virtual Data Room
 From Deal Making to Due Diligence
           Built with the leading Investment Banks and Law Firms, our
           revolutionary technology is used by tens of thousands of
           professionals all over the world.




              www.EthosData.com
Virtual Data Room:
What you need to know and why

Transactions are becoming increasingly more complicated. Deals involve numerous participants who
need access to an escalating number of documents at any given stage of the deal. This creates a huge
administrative burden on lawyers, bankers and companies driving cost up and slowing down execution.

Our Virtual Data Room helps optimize all stages of the deal cycle. From idea marketing to post closing,
with our Virtual Data Room, you can easily and securely share information with potential investors,
buyers and partners.


1. Security:
Our platform is built on the highest industry standards and technology. Our infrastructure has passed
the most demanding security audits and is SAS 70 Level II compliant. You can easily customize security
to each particular user and/or document – which gives you ultimate control over disclosure.


2. Service:
Our experienced Deal Coordinators will work with you to prepare and perform all steps needed to
optimize set up and execution of your transaction. This includes Virtual Data Room structure design,
scanning and upload of documents, permission management and the rest of our suite. Each project is
assigned a local dedicated Deal Coordinator who is available 24/7.


3. Simplicity:
Our interface and process makes it extremely easy for you to manage the Virtual Data Room.
Everything is essentially point-and-click, meaning there is no learning curve. Although the technology-
end of the Virtual Data Room is quite complex, from the user perspective, it could not be easier.


4. Speed:
Virtual Data Rooms can be set up in a matter of minutes. Our interface and infrastructure are designed
to make the process quick and easy so that you can get started immediately.


5. Cost Certainty:
The cost of our Virtual Data Room is certain and transparent. Our fees include unlimited use of our
dedicated Deal Coordinators and their expertise. There are no hidden fees, overnight or weekend
charges.



        24 hours a day, 7 days a week, 365 days a year! Our Deal
      Coordinators have been selected for their M&A experience with
                      banks and investment firms.
Over the years, our platform has evolved with the help of finance professionals, lawyers and
 corporations. All the functionality of our platform is built to optimize transactions, to give our
            users the best and most secure Virtual Data Room experience possible.

Simplicity
The EthosData platform is designed so that both users and administrators can apply its functionality
easily without any training. Its tools and practicality make it very simple for users to get the most from
the platform.

Windows Explorer Look and Feel
Users will be able to start working in the Virtual Data Room almost immediately. Navigation has a very
familiar interface, based on the Windows Explorer aesthetic and functionality. It effortlessly guides users
and administrators through the content, without the time-constraining process of training.

Google Powered Search
All documents are searchable by title and content using the world’s leading search engine, Google .
Search terms can be simple or advanced and search results are prioritized by relevance.

Site Map
The Virtual Data Room provides a single view of the entire project that can be easily printable or
exportable as a worksheet. If you need to work on multiple documents, the Site Map allows you to stay
in the same window instead of digging through various folders.

                                                                     Document Messages
                                                                     Administrators can easily send new
                                                                     content or links to all users. Users can
                                                                     also opt to receive daily or weekly
                                                                     emails highlighting any changes in the
                                                                     Virtual Data Room.

                                                                     New Items
                                                                     Users can get a list of the files that
                                                                     have been uploaded to the project since
                                                                     their last log in date or within a date
                                                                     range. Users can also filter to show only
                                                                     unread documents.




                                                                                        Access your
                                                                                        Virtual Data
                                                                                      Room anywhere
                                                                                       in the world.




                            www.EthosData.com
Security
Security is top priority for our clients. We continually invest to keep our technology and platform secure
and confidential.

Infrastructure Security
Our servers are housed in two geographically remote and highly secure data centers with SunGard
Availability Services (SAS70 Type II certified), the industry-leading hosting service provider that boasts
over 10,000 global clients. These facilities are used by a number of leading banks, government agencies
and blue-chip corporations. Each facility uses real-time replication, multiple connections, alternate power
sources, intrusion detection and state-of-the-art emergency response systems for further data protection.
In addition, fire wall mechanisms, virus scanning and intrusion detection software are continuously
monitored on our platform. The hosting facilities are equipped with video surveillance, proximity card
readers and biometric scanners, which operate 24 hours a day, 7 days a week and 365 days a year.

Application Security
Over the years, our software engineers have responded to client and regulatory requirements to ensure
that our application adheres to the highest security standards. This guarantees that all content is
safeguarded against unauthorized access.

Data Encryption
All communication transmitted to and from the Virtual Data Room is protected with 128-bit encryption.

Document Protection and Locking
We use the strongest document level protection available. Our document security provides the ability to
remotely lock down PDF documents. The site administrator can easily control whether users can copy,
print, forward or alter a document.
Our Virtual Data Room can block the use of the “print screen” key, and add a personalized watermark.
This encryption and locking functionality can be enforced on any PDF document posted to the Virtual
Data Room system. Our Virtual Data Room allows you to track and audit usage and even alter
permissions and revoke read access after the document has been distributed.

Process Security
Our operations have been audited for processes, technology and security by leading financial institutions
and law firms. We also perform regular internal audits to ensure that all points of potential data
compromise are minimized.

Personnel Security
In addition to layers of technical security, we rigorously screen our staff, requiring each employee to sign a
non-disclosure agreement. All EthosData employees from software engineers to account managers, undergo
a thorough background check. All members of staff go through comprehensive training in data privacy and
compliance prior to any involvement in client transactions. All client data is kept strictly confidential and all
user passwords are stored in our secure database in a hash format, inaccessible by even our technical team.




                                                                       Taking every precaution to
                                                                      ensure that your deal is safe
                                                                              and secure




                             www.EthosData.com
Advanced Functionality
Our Virtual Data Room provides simple, effective tools that allow our clients to obtain valuable
information regarding the individual interest of each user. It also tracks every single action for
compliance, and provides a very powerful and easy to use platform to organize all questions and
answers about a document or folder.

Reporting
Get detailed information about the activities of each user or organization including what documents he
or she has viewed, questions asked and log-ins. Information is presented in an easy-to-read graphical
format. The underlying detailed information can be exported to Excel for further analysis.

QnA
Manage the entire the flow of questions and comments about a given document with convenience and
ease. Administrators can answer multiple questions, add links to existing documents and export to
Excel for easy organization.

Audit
The Virtual Data Room logs every action performed by users in the system. Site administrators can
search these actions using our comprehensive audit search tool. Each audit record will provide
information on the action, the user that performed the action, the exact date and time when the action
was performed, and any additional metadata relevant to the action. This ensures full coverage to
minimize the risks associated with all aspects of compliance and disclosure.




                                                             Customized to your
                                                          specifications for ultimate
                                                                  disclosure

Speed
Our platform and processes are set up so that projects can be launched in minutes.

Add a folder structure in one go
Easily upload entire projects with multiple files and folders. No need for cumbersome installations or
plug-ins.

Bulk upload of users
Adding a list of users is as easy as pasting their email addresses together in one text box. The platform
will do the rest, guiding the administrator through the process with a few simple steps.

Open documents fast
Our PDF based document encryption provides a secure and speedy experience for the user. Users can
also download more than one file at a time with the bulk download tool.


                          www.EthosData.com
Speed, Security and Service
brought to you by EthosData the leading provider of
critical document exchange services.




                        www.EthosData.com
                      contact@EthosData.com



                               (c) 2010 EthosData Limited

Weitere ähnliche Inhalte

Was ist angesagt?

Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...
eSAT Publishing House
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
IJECEIAES
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
Alexander Decker
 
Advanced redaction whitepaper
Advanced redaction whitepaperAdvanced redaction whitepaper
Advanced redaction whitepaper
Mark_Miller
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
David J Rosenthal
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
IJSRD
 
DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2
Lucas Gritziotis
 

Was ist angesagt? (20)

Restore brochure optimising document management through technology
Restore brochure optimising document management through technologyRestore brochure optimising document management through technology
Restore brochure optimising document management through technology
 
Project Rhino: Enhancing Data Protection for Hadoop
Project Rhino: Enhancing Data Protection for HadoopProject Rhino: Enhancing Data Protection for Hadoop
Project Rhino: Enhancing Data Protection for Hadoop
 
Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...
 
489 493
489 493489 493
489 493
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniques
 
PKI by Tim Polk
PKI by Tim PolkPKI by Tim Polk
PKI by Tim Polk
 
Article data-centric security key to cloud and digital business
Article   data-centric security key to cloud and digital businessArticle   data-centric security key to cloud and digital business
Article data-centric security key to cloud and digital business
 
Advanced redaction whitepaper
Advanced redaction whitepaperAdvanced redaction whitepaper
Advanced redaction whitepaper
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
 
IRJET- Secure E-Documents Storage using Blockchain
IRJET- Secure E-Documents Storage using BlockchainIRJET- Secure E-Documents Storage using Blockchain
IRJET- Secure E-Documents Storage using Blockchain
 
4AA4-1812ENW
4AA4-1812ENW4AA4-1812ENW
4AA4-1812ENW
 
Design an active verification mechanism for certificates revocation in OCSP f...
Design an active verification mechanism for certificates revocation in OCSP f...Design an active verification mechanism for certificates revocation in OCSP f...
Design an active verification mechanism for certificates revocation in OCSP f...
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and Compliance
 
DDS for Internet of Things (IoT)
DDS for Internet of Things (IoT)DDS for Internet of Things (IoT)
DDS for Internet of Things (IoT)
 
DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2
 
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
 

Ähnlich wie 201002 vdr-brochure-international

DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010
dcampbellelite
 
DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010
Darrin Campbell
 
CESSI Digital Library Case Study Eng
CESSI Digital Library Case Study EngCESSI Digital Library Case Study Eng
CESSI Digital Library Case Study Eng
atolomei
 
LegalAnywhereConnect Brochure
LegalAnywhereConnect BrochureLegalAnywhereConnect Brochure
LegalAnywhereConnect Brochure
Nancy DaCorsi
 

Ähnlich wie 201002 vdr-brochure-international (20)

LiveDOCS
LiveDOCSLiveDOCS
LiveDOCS
 
Virtual Data Room Brochure
Virtual Data Room BrochureVirtual Data Room Brochure
Virtual Data Room Brochure
 
eQuorum-eBook-6-2021.pdf
eQuorum-eBook-6-2021.pdfeQuorum-eBook-6-2021.pdf
eQuorum-eBook-6-2021.pdf
 
Inforouterproducttour V7
Inforouterproducttour V7Inforouterproducttour V7
Inforouterproducttour V7
 
Electronic Data Discovery
Electronic Data DiscoveryElectronic Data Discovery
Electronic Data Discovery
 
Tech Vault Solution
Tech Vault SolutionTech Vault Solution
Tech Vault Solution
 
Laserfiche cloud factsheet
Laserfiche cloud factsheetLaserfiche cloud factsheet
Laserfiche cloud factsheet
 
N2WDMS - A Workflow and Document Management Software
N2WDMS - A Workflow and Document Management SoftwareN2WDMS - A Workflow and Document Management Software
N2WDMS - A Workflow and Document Management Software
 
DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010
 
DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010
 
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
 
DocTrix DocFlow 2013
DocTrix DocFlow 2013DocTrix DocFlow 2013
DocTrix DocFlow 2013
 
CESSI Digital Library Case Study Eng
CESSI Digital Library Case Study EngCESSI Digital Library Case Study Eng
CESSI Digital Library Case Study Eng
 
How Virtual Data Rooms Are Revolutionizing Business Transactions.pdf
How Virtual Data Rooms Are Revolutionizing Business Transactions.pdfHow Virtual Data Rooms Are Revolutionizing Business Transactions.pdf
How Virtual Data Rooms Are Revolutionizing Business Transactions.pdf
 
Landmark In Control Product Flyer
Landmark In Control Product FlyerLandmark In Control Product Flyer
Landmark In Control Product Flyer
 
Abhilash_Documentum
Abhilash_Documentum Abhilash_Documentum
Abhilash_Documentum
 
Abhilash_Documentum
Abhilash_Documentum Abhilash_Documentum
Abhilash_Documentum
 
LegalAnywhereConnect Brochure
LegalAnywhereConnect BrochureLegalAnywhereConnect Brochure
LegalAnywhereConnect Brochure
 
Mobile content generation application | Wireless Community Network Enabler#
Mobile content generation application | Wireless Community Network Enabler#Mobile content generation application | Wireless Community Network Enabler#
Mobile content generation application | Wireless Community Network Enabler#
 
Wireless mobile content genteration application with RSS feed integration
Wireless mobile content genteration application with RSS feed integrationWireless mobile content genteration application with RSS feed integration
Wireless mobile content genteration application with RSS feed integration
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

201002 vdr-brochure-international

  • 1. Virtual Data Room From Deal Making to Due Diligence Built with the leading Investment Banks and Law Firms, our revolutionary technology is used by tens of thousands of professionals all over the world. www.EthosData.com
  • 2. Virtual Data Room: What you need to know and why Transactions are becoming increasingly more complicated. Deals involve numerous participants who need access to an escalating number of documents at any given stage of the deal. This creates a huge administrative burden on lawyers, bankers and companies driving cost up and slowing down execution. Our Virtual Data Room helps optimize all stages of the deal cycle. From idea marketing to post closing, with our Virtual Data Room, you can easily and securely share information with potential investors, buyers and partners. 1. Security: Our platform is built on the highest industry standards and technology. Our infrastructure has passed the most demanding security audits and is SAS 70 Level II compliant. You can easily customize security to each particular user and/or document – which gives you ultimate control over disclosure. 2. Service: Our experienced Deal Coordinators will work with you to prepare and perform all steps needed to optimize set up and execution of your transaction. This includes Virtual Data Room structure design, scanning and upload of documents, permission management and the rest of our suite. Each project is assigned a local dedicated Deal Coordinator who is available 24/7. 3. Simplicity: Our interface and process makes it extremely easy for you to manage the Virtual Data Room. Everything is essentially point-and-click, meaning there is no learning curve. Although the technology- end of the Virtual Data Room is quite complex, from the user perspective, it could not be easier. 4. Speed: Virtual Data Rooms can be set up in a matter of minutes. Our interface and infrastructure are designed to make the process quick and easy so that you can get started immediately. 5. Cost Certainty: The cost of our Virtual Data Room is certain and transparent. Our fees include unlimited use of our dedicated Deal Coordinators and their expertise. There are no hidden fees, overnight or weekend charges. 24 hours a day, 7 days a week, 365 days a year! Our Deal Coordinators have been selected for their M&A experience with banks and investment firms.
  • 3. Over the years, our platform has evolved with the help of finance professionals, lawyers and corporations. All the functionality of our platform is built to optimize transactions, to give our users the best and most secure Virtual Data Room experience possible. Simplicity The EthosData platform is designed so that both users and administrators can apply its functionality easily without any training. Its tools and practicality make it very simple for users to get the most from the platform. Windows Explorer Look and Feel Users will be able to start working in the Virtual Data Room almost immediately. Navigation has a very familiar interface, based on the Windows Explorer aesthetic and functionality. It effortlessly guides users and administrators through the content, without the time-constraining process of training. Google Powered Search All documents are searchable by title and content using the world’s leading search engine, Google . Search terms can be simple or advanced and search results are prioritized by relevance. Site Map The Virtual Data Room provides a single view of the entire project that can be easily printable or exportable as a worksheet. If you need to work on multiple documents, the Site Map allows you to stay in the same window instead of digging through various folders. Document Messages Administrators can easily send new content or links to all users. Users can also opt to receive daily or weekly emails highlighting any changes in the Virtual Data Room. New Items Users can get a list of the files that have been uploaded to the project since their last log in date or within a date range. Users can also filter to show only unread documents. Access your Virtual Data Room anywhere in the world. www.EthosData.com
  • 4. Security Security is top priority for our clients. We continually invest to keep our technology and platform secure and confidential. Infrastructure Security Our servers are housed in two geographically remote and highly secure data centers with SunGard Availability Services (SAS70 Type II certified), the industry-leading hosting service provider that boasts over 10,000 global clients. These facilities are used by a number of leading banks, government agencies and blue-chip corporations. Each facility uses real-time replication, multiple connections, alternate power sources, intrusion detection and state-of-the-art emergency response systems for further data protection. In addition, fire wall mechanisms, virus scanning and intrusion detection software are continuously monitored on our platform. The hosting facilities are equipped with video surveillance, proximity card readers and biometric scanners, which operate 24 hours a day, 7 days a week and 365 days a year. Application Security Over the years, our software engineers have responded to client and regulatory requirements to ensure that our application adheres to the highest security standards. This guarantees that all content is safeguarded against unauthorized access. Data Encryption All communication transmitted to and from the Virtual Data Room is protected with 128-bit encryption. Document Protection and Locking We use the strongest document level protection available. Our document security provides the ability to remotely lock down PDF documents. The site administrator can easily control whether users can copy, print, forward or alter a document. Our Virtual Data Room can block the use of the “print screen” key, and add a personalized watermark. This encryption and locking functionality can be enforced on any PDF document posted to the Virtual Data Room system. Our Virtual Data Room allows you to track and audit usage and even alter permissions and revoke read access after the document has been distributed. Process Security Our operations have been audited for processes, technology and security by leading financial institutions and law firms. We also perform regular internal audits to ensure that all points of potential data compromise are minimized. Personnel Security In addition to layers of technical security, we rigorously screen our staff, requiring each employee to sign a non-disclosure agreement. All EthosData employees from software engineers to account managers, undergo a thorough background check. All members of staff go through comprehensive training in data privacy and compliance prior to any involvement in client transactions. All client data is kept strictly confidential and all user passwords are stored in our secure database in a hash format, inaccessible by even our technical team. Taking every precaution to ensure that your deal is safe and secure www.EthosData.com
  • 5. Advanced Functionality Our Virtual Data Room provides simple, effective tools that allow our clients to obtain valuable information regarding the individual interest of each user. It also tracks every single action for compliance, and provides a very powerful and easy to use platform to organize all questions and answers about a document or folder. Reporting Get detailed information about the activities of each user or organization including what documents he or she has viewed, questions asked and log-ins. Information is presented in an easy-to-read graphical format. The underlying detailed information can be exported to Excel for further analysis. QnA Manage the entire the flow of questions and comments about a given document with convenience and ease. Administrators can answer multiple questions, add links to existing documents and export to Excel for easy organization. Audit The Virtual Data Room logs every action performed by users in the system. Site administrators can search these actions using our comprehensive audit search tool. Each audit record will provide information on the action, the user that performed the action, the exact date and time when the action was performed, and any additional metadata relevant to the action. This ensures full coverage to minimize the risks associated with all aspects of compliance and disclosure. Customized to your specifications for ultimate disclosure Speed Our platform and processes are set up so that projects can be launched in minutes. Add a folder structure in one go Easily upload entire projects with multiple files and folders. No need for cumbersome installations or plug-ins. Bulk upload of users Adding a list of users is as easy as pasting their email addresses together in one text box. The platform will do the rest, guiding the administrator through the process with a few simple steps. Open documents fast Our PDF based document encryption provides a secure and speedy experience for the user. Users can also download more than one file at a time with the bulk download tool. www.EthosData.com
  • 6. Speed, Security and Service brought to you by EthosData the leading provider of critical document exchange services. www.EthosData.com contact@EthosData.com (c) 2010 EthosData Limited